10400880-003
©2019-21 Overland-Tandberg
22
3
iSCSI Configuration
The data that you want to store, back up, and restore is transferred from your host
computers to the RDX QuikStation via the iSCSI (Internet Small Computer System
Interface) protocol. In iSCSI terminology, a host computer is referred to as an “initiator”
and the storage device it connects to as the iSCSI “target.”
Topics in iSCSI Configuration:
•
•
Connecting to iSCSI Targets Without Authentication
•
iSCSI Configuration Overview
Before you can begin to back up and restore data with the RDX QuikStation, the host
computers (initiators) must establish an iSCSI connection to the storage targets on the
RDX QuikStation.
To establish an iSCSI connection, you first need to verify that the host computer OS has
the iSCSI initiator software installed.
Depending on how you configured the logical device type for the RDX QuikStation (see
Chapter 5, “Select the Logical Device Type,” on page 64
), you will have either one to four
iSCSI targets (RDX QuikStation 4) or one to eight iSCSI targets (RDX QuikStation 8) with
which to connect.
NOTE: For more information about viewing iSCSI targets, see
Chapter 6, “iSCSI Device General
You can configure iSCSI initiators with or without iSCSI security. The RDX QuikStation
supports the one-way Challenge Handshake Authentication Protocol (CHAP). The CHAP
protocol is used to authenticate iSCSI connections and is based upon the initiator and
target sharing a
secret
(a security key that is similar to a password).
With CHAP authentication, the iSCSI target (storage device) authenticates the initiator
(host computer). The secret is set only for the target. All initiators that want to access that
target need to use the same secret to connect to the target. For more information, see
The following describes iSCSI Management rules for the RDX QuikStation iSCSI devices:
•
Libraries and autoloaders can have up to 10 initiator users (using CHAP) or host
computers (using host authentication).
•
Single iSCSI storage targets (RDX docks, tape drives, logical volumes, and protected
volumes) can only have one initiator user (using CHAP) or host computer (using host
authentication).