
Table of Contents
xi
Figure
5-2.
Re-routing Storage Access with Off-line V-Switch ...................................................... 5-4
Figure
5-3.
Cluster with Neighbor IP Addresses............................................................................ 5-7
Figure
6-1.
Physical Storage used in Examples ............................................................................ 6-2
Figure
6-2.
Transparent Volume 1 ................................................................................................. 6-7
Figure
6-3.
Partitioning a Physical Volume .................................................................................... 6-8
Figure
6-4.
Disk 1 before Subdisk.................................................................................................. 6-9
Figure
6-5.
Disk 1 with 1 Subdisk................................................................................................. 6-10
Figure
6-6.
Disk 1 with 2 Subdisks............................................................................................... 6-11
Figure
6-7.
Simple Volume Block Distribution.............................................................................. 6-12
Figure
6-8.
Simple Volume 1........................................................................................................ 6-13
Figure
6-9.
Concatenated Volume Block Distribution .................................................................. 6-14
Figure
6-10.
Concatenated Volume 1 .......................................................................................... 6-15
Figure
6-11.
Striped Volume Block Distribution ........................................................................... 6-16
Figure
6-12.
Striped Volume 1 ..................................................................................................... 6-18
Figure
6-13.
Mirrored Volume Block Distribution ......................................................................... 6-19
Figure
6-14.
Mirrored Volume 1 ................................................................................................... 6-20
Figure
6-15.
RAID 10 Volume Block Distribution ......................................................................... 6-22
Figure
6-16.
First Mirrored Volume of RAID 10 ........................................................................... 6-23
Figure
6-17.
Second Mirrored Volume of RAID 10 ...................................................................... 6-24
Figure
6-18.
Striped Volume of RAID 10 ..................................................................................... 6-25
Figure
7-1.
iSCSI Target Access.................................................................................................... 7-3
Figure
7-2.
Identity A’s iSCSI Initiators .......................................................................................... 7-3
Figure
7-3.
Identity B’s iSCSI Initiators .......................................................................................... 7-4
Figure
7-4.
Identity C’s iSCSI Initiator ............................................................................................ 7-4
Figure
7-5.
Identities Coupled with Targets ................................................................................... 7-5
Figure
7-6.
Access Rights per Identity-Target Pair ........................................................................ 7-6
Figure
7-7.
iSCSI Initiator in Two Different Identities ..................................................................... 7-7
Figure
7-8.
Identity with iSCSI Initiators and Credentials............................................................... 7-8
Figure
7-9.
Modifying Default Identities ......................................................................................... 7-9
Figure
7-10.
Creating a Target..................................................................................................... 7-12
Figure
7-11.
Creating an Identity.................................................................................................. 7-17
Figure
7-12.
Adding an Initiator.................................................................................................... 7-19
Figure
7-13.
Adding a Second Initiator ........................................................................................ 7-20
Figure
7-14.
Assigning Credentials .............................................................................................. 7-22
Figure
7-15.
Adding Another Set of Credentials .......................................................................... 7-23
Figure
7-16.
Sending a CHAP Authentication Challenge ............................................................ 7-25
Figure
7-17.
Logging in to a RADIUS Server............................................................................... 7-27
Figure
7-18.
Connecting a Target and Identity ............................................................................ 7-29
Figure
7-19.
Exposing a Volume.................................................................................................. 7-32
Figure
8-1.
Adding Another Child to a Mirror ................................................................................. 8-5
Figure
8-2.
Creating a Mirror to Add Data Redundancy ................................................................ 8-6
Figure
8-3.
Adding Sim6 to Mir4 .................................................................................................... 8-7
Figure
8-4.
1
st
Snapshot Created ................................................................................................... 8-8
Figure
8-5.
1
st
Write to Source and Update to 1
st
Snapshot .......................................................... 8-9
Figure
8-6.
1
st
Snapshot............................................................................................................... 8-11
Figure
8-7.
Update to 1
st
Snapshot & 1
st
Write to Source............................................................ 8-11
Figure
8-8.
2
nd
Snapshot Created, Update to 1
st
Snapshot & 2
nd
Snapshot and Write to Source8-12
Figure
8-9.
3
rd
Snapshot Created, Update to 1
st
& 2
nd
Snapshot and Write to Source................ 8-13
Figure
8-10.
Removing a Child from a Mirror............................................................................... 8-17
Figure
8-11.
Breaking a Mirror ..................................................................................................... 8-18
Summary of Contents for I3.1.1205
Page 1: ......
Page 6: ...SPCLI3 1 1205 SANRAD V Switch CLI User Manual ...
Page 22: ...xvi SANRAD V Switch CLI User Manual ...
Page 40: ...2 12 SANRAD V Switch CLI User Manual ...
Page 80: ...4 28 SANRAD V Switch CLI User Manual ...
Page 118: ...6 26 SANRAD V Switch CLI User Manual ...
Page 152: ...7 34 SANRAD V Switch CLI User Manual ...
Page 186: ...9 8 SANRAD V Switch CLI User Manual ...
Page 214: ...10 28 SANRAD V Switch CLI User Manual ...