Changing the iSCSI target authentication.................................................................................................................... 49
Entering mutual authentication permissions................................................................................................................ 50
Creating CHAP secrets...................................................................................................................................................50
Changing the iSCSI target identification........................................................................................................................51
Changing iSCSI target discovery settings..................................................................................................................... 51
Configuring the iSCSI host ports................................................................................................................................... 52
Advanced iSCSI host port settings................................................................................................................................52
Viewing or ending an iSCSI session............................................................................................................................... 53
Viewing iSCSI statistics and setting baseline statistics...............................................................................................53
Edit, remove, or rename host topology.........................................................................................................................54
Windows..................................................................................................................................................................... 55
Linux............................................................................................................................................................................ 56
Adding a host to a host group..................................................................................................................................59
Removing a host from a host group........................................................................................................................60
Moving a host to a different host group................................................................................................................. 60
Removing a host group............................................................................................................................................. 60
Host topology.............................................................................................................................................................60
Starting or stopping the Host Context Agent.........................................................................................................61
I/O data path protection..................................................................................................................................................61
Managing host port identifiers....................................................................................................................................... 62
Creating disk groups..................................................................................................................................................63
Locating disk group....................................................................................................................................................64
Creating standard virtual disks.................................................................................................................................65
Contents
5