8
Chapter 1 Introduction
1.7
VLANs
The xStack Storage system can use a Virtual LAN (VLAN) as a filter to identify the incoming
packets it is to use on each LAG port. For each LAG port on which VLAN is to be enabled, a
VLAN ID must be defined. On a VLAN-enabled LAG port, only packets with the given VLAN ID
will be processed and all outgoing packets will be tagged with that VLAN ID.
1.8
LAGs
The xStack Storage system manages the physical data ports on the enclosure's back panel
using the concept of LAG ports. In a simple configuration, a LAG port associates a
single Ethernet port (i.e., a physical data port) with a network portal (that defines an IP
address). In this case, which is the default, there are no LAG ports shown on the
Management Console and no management is necessary.
Some server Operating Systems can aggregate multiple Ethernet ports into a LAG port and
provide increased bandwidth. For example, aggregating two GbE ports could, theoretically,
provide up to 2 Gb/s of throughput. Should a customer wish to utilize this feature, the
Management Console can be used to replace the standard one-to-one relationship of
Ethernet port to Network Portal with a LAG.
LACP protocols are not supported. Static LAG configurations are the only
supported option.
1.9
iSCSI Target Nodes
An iSCSI target node is the method of providing a permissible access to storage on an xStack
Storage system. One target node is automatically generated for each volume. The target
node name includes the volume name with any spaces and other special characters removed.
Access to that volume is granted to an initiator via its iSCSI Initiator Node name. Optionally,
a CHAP secret can be specified for a volume for additional security authentication.
1.10
iSCSI Log-In, Sessions and Connections
When an iSCSI initiator node needs access to the volumes in an xStack Storage system, it
must log in to the target node associated with that volume. When the log in is accepted, an
iSCSI session and an iSCSI connection is established. An initiator can log in to the same target
node a second time, creating a second iSCSI connection within the original iSCSI session.
1.11
Multiple Connections per Session
An initiator can log into a target more than once to establish multiple connections for a
single session. Multiple connections can be used to increase bandwidth and provide
redundancy.
Summary of Contents for xStack Storage DSN-4000 Series
Page 9: ...xStack Storage Management Center Software User s Guide ix This Page Left Intentionally Blank...
Page 10: ......
Page 90: ...80 Chapter 5 Managing Physical Storage This Page Left Intentionally Blank...
Page 107: ...xStack Storage Management Center Software User s Guide 97 Figure 6 18 Advanced Settings Tab...
Page 110: ...100 Chapter 6 System Administration This Page Left Intentionally Blank...
Page 130: ...120 Chapter 8 Performing System Actions THIS PAGE LEFT INTENTIONALLY BLANK...
Page 134: ...124 Chapter 9 Best Practices This Page Left Intentionally Blank...
Page 142: ...132 Appendix A Menu Summary THIS PAGE LEFT INTENTIONALLY BLANK...
Page 146: ...136 Appendix B Factory Default Settings THIS PAGE LEFT INTENTIONALLY BLANK...