
7065iSCSI_Config2.fm
Draft Document for Review August 30, 2007 12:59 am
400
IBM System Storage DS3000: Introduction and Implementation Guide
mppBusRescan
When new logical drives are mapped to the host at runtime use the
mppBusRescan
command
to scan for new LUNs available to this host. This command is similar to the Windows
hotadd
command. See Example 17-20.
Example 17-20
mppBusRescan
command
[root@hooghly ~]# mppBusRescan
Starting new devices re-scan...
scan iSCSI software initiator host /sys/class/scsi_host/host8...
found 8:0:0:2
scan iSCSI software initiator host /sys/class/scsi_host/host7...
found 7:0:0:2
scan iSCSI software initiator host /sys/class/scsi_host/host5...
found 5:0:0:2
scan iSCSI software initiator host /sys/class/scsi_host/host6...
found 6:0:0:2
run /usr/sbin/mppUtil -s busscan...
scan mpp virtual host /sys/class/scsi_host/host9...
found 9:0:0:2->/dev/sdf
/usr/sbin/mppBusRescan is completed.
[root@hooghly ~]#
mppUpdate
Use the
mppUpdate
command to create a new MPP initial RAM disc. This could be required in
case a driver for the SCSI controller where the disk with the root file system is attached needs
an update.See Example 17-21.
Example 17-21 mppUpdate
[root@hooghly ~]# mppUpdate
Creating new MPP initrd image...
[root@hooghly ~]#
17.7 Enhance connection security
After everything is working and tested, you should implement security for the iSCSI
connection - essentially this means configuring initiator and target authentication. Initiator
authentication means that an initiator must prove its identity with a password that is known by
the target, when the initiator attempts access. Target authentication is the opposite - the
target authenticates itself to the initiator with a password.
Since an iSCSI qualified name can be modified within Storage Manager, this does not protect
against spoofing of the qualified name, and hence security can be compromised. This section
will now describe the steps required to setup initiator and target authentication.
Like the QLogic iSCSI HBA described in Chapter 16, “iSCSI configuration 1 - Windows 2003
with QLogic QMC4052 HBA” on page 341, the iSCSI software initiator requires initiator
authentication as a prerequisite for target authentication.
1. Edit the configuration file /etc/iscsi.conf of the iSCSI software initiator. Define the incoming
and outgoing user names and passwords in this file. Incoming means the target has to
authenticate itself against the initiator, and is also called target authentication. Outgoing