
26
iSCSI Optimization
This chapter describes how to configure internet small computer system interface (iSCSI) optimization, which enables quality-of-
service (QoS) treatment for iSCSI traffic. The topics covered in this chapter include:
•
•
Default iSCSI Optimization Values
•
iSCSI Optimization Prerequisites
•
Configuring iSCSI Optimization
•
Displaying iSCSI Optimization Information
iSCSI Optimization Overview
iSCSI is a TCP/IP-based protocol for establishing and managing connections between IP-based storage devices and initiators in a
storage area network (SAN).
iSCSI optimization enables the network switch to auto-detect Dell’s iSCSI storage arrays and triggers a self-configuration of several
key network configurations that enables optimization of the network for better storage traffic throughput. iSCSI is disabled by
default.
iSCSI optimization also provides a means of monitoring iSCSI sessions and applying quality of service (QoS) policies on iSCSI traffic.
When enabled, iSCSI optimization allows a switch to monitor (snoop) the establishment and termination of iSCSI connections. The
switch uses the snooped information to detect iSCSI sessions and connections established through the switch.
iSCSI optimization allows you to reduce deployment time and management complexity in data centers. In a data center network, Dell
EqualLogic and Compellent iSCSI storage arrays are connected to a converged Ethernet network using the data center bridging
exchange protocol (DCBx) through stacked and/or non-stacked Ethernet switches.
iSCSI session monitoring over virtual link trunking (VLT) synchronizes the iSCSI session information between the VLT peers, allowing
session information to be available in both the VLT peers. You can enable or disable iSCSI when you configure VLT.
iSCSI optimization functions as follows:
•
Auto-detection of EqualLogic storage arrays — the switch detects any active EqualLogic array directly attached to its ports.
•
Manual configuration to detect Compellent storage arrays where auto-detection is not supported.
•
Automatic configuration of switch ports after detection of storage arrays.
•
If you configure flow-control, iSCSI uses the current configuration. If you do not configure flow-control, iSCSI auto-configures
flow control settings so that receive-only is enabled and transmit-only is disabled. .
•
iSCSI monitoring sessions — the switch monitors and tracks active iSCSI sessions in connections on the switch, including port
information and iSCSI session information.
•
iSCSI QoS — A user-configured iSCSI class of service (CoS) profile is applied to all iSCSI traffic. Classifier rules are used to direct
the iSCSI data traffic to queues that can be given preferential QoS treatment over other data passing through the switch.
Preferential treatment helps to avoid session interruptions during times of congestion that would otherwise cause dropped iSCSI
packets.
•
iSCSI DCBx TLVs are supported.
The following illustration shows iSCSI optimization between servers and a storage array in which a stack of three switches connect
installed servers (iSCSI initiators) to a storage array (iSCSI targets) in a SAN network. iSCSI optimization running on the master
iSCSI Optimization
437
Содержание S4048-ON
Страница 1: ...Dell Configuration Guide for the S4048 ON System 9 9 0 0 ...
Страница 146: ...Figure 14 BFD Three Way Handshake State Changes 146 Bidirectional Forwarding Detection BFD ...
Страница 477: ...Figure 68 Inspecting Configuration of LAG 10 on ALPHA Link Aggregation Control Protocol LACP 477 ...
Страница 480: ...Figure 70 Inspecting a LAG Port on BRAVO Using the show interface Command 480 Link Aggregation Control Protocol LACP ...
Страница 481: ...Figure 71 Inspecting LAG 10 Using the show interfaces port channel Command Link Aggregation Control Protocol LACP 481 ...
Страница 522: ...Figure 87 Configuring Interfaces for MSDP 522 Multicast Source Discovery Protocol MSDP ...
Страница 523: ...Figure 88 Configuring OSPF and BGP for MSDP Multicast Source Discovery Protocol MSDP 523 ...
Страница 524: ...Figure 89 Configuring PIM in Multiple Routing Domains 524 Multicast Source Discovery Protocol MSDP ...
Страница 528: ...Figure 91 MSDP Default Peer Scenario 1 528 Multicast Source Discovery Protocol MSDP ...
Страница 529: ...Figure 92 MSDP Default Peer Scenario 2 Multicast Source Discovery Protocol MSDP 529 ...
Страница 530: ...Figure 93 MSDP Default Peer Scenario 3 530 Multicast Source Discovery Protocol MSDP ...
Страница 633: ...Policy based Routing PBR 633 ...
Страница 777: ...Figure 119 Single and Double Tag TPID Match Service Provider Bridging 777 ...
Страница 778: ...Figure 120 Single and Double Tag First byte TPID Match 778 Service Provider Bridging ...