
Con
fi
guring the VMware iSCSI software initiator
NOTE:
Only iSCSI software initiators are supported by MSA1510i.
This section describes how to con
fi
gure the VMware iSCSI initiator to connect to a dual-controller
MSA1510i in a multipathing environment. (For single-controller con
fi
gurations, omit all steps shown for
multipath or dual-controller con
fi
gurations.) The initiator is native to ESX.
While con
fi
guring the iSCSI software initiator, you enable your initiator and set up the initiator’s target
addresses and CHAP parameters. See the following sections for more information.
After con
fi
guring the iSCSI software initiator, perform a rescan, so that all LUNs to which the initiator
has access display on the list of storage devices available to your ESX Server. For more information,
see“
Performing a Rescan
” on page 74.
Naming requirements
Because storage area networks can become large and complex, all iSCSI initiators and targets that use
the network have unique and permanent iSCSI names and are assigned addresses for access. The iSCSI
name provides a correct identi
fi
cation of a particular iSCSI device, an initiator or a target, regardless
of its physical location.
When con
fi
guring your iSCSI initiators, make sure they have properly formatted names. The initiators
can use one of the following formats:
•
IQN (iSCSI quali
fi
ed name)
—Can be up to 255 characters long and has the following format:
iqn.<year-mo>.<reversed_domain_name>:<unique_name>
where <
year-mo
> represents the year and month your domain name was registered,
<
reversed_domain_name
> is the of
fi
cial domain name, reversed, and <
unique name
> is
any name you want to use, for example, the name of your server.
Example:
iqn.1998-01.com.mycompany:myserver
.
•
EUI (extended unique identi
fi
er)
—Represents the eui. pre
fi
x followed by the 16-character name.
The name includes 24 bits for company name assigned by the IEEE and 40 bits for a unique
ID such as a serial number.
Discovery methods
To determine which storage resource on the network is available for access, the iSCSI initiators ESX Server
system uses these discovery methods:
•
Dynamic Discovery
—The initiator discovers iSCSI targets by sending a SendTargets request to
a speci
fi
ed target address. To use this method, enter the address of the target device so that
the initiator can establish a discovery session with this target. The target device responds by
forwarding a list of additional targets that the initiator is allowed to access.
•
Static Discovery
— After the target device used in the SendTargets session sends you the list of
available targets, they appear on the Static Discovery list. To this list, you can manually add any
additional targets, or remove targets you don’t need.
The static discovery method is available only with the hardware-initiated storage.
iSCSI security
Because iSCSI technology uses the IP networks to connect to remote targets, it is necessary to ensure
security of the connection. The IP protocol itself doesn’t protect the data it transports, and it doesn’t have
the capability to verify the legitimacy of initiators that access targets on the network. You need to take
speci
fi
c measures to guarantee security across IP networks.
70
Con
fi
guration
Содержание StorageWorks 1510i - Modular Smart Array
Страница 8: ...8 ...
Страница 58: ...58 Installation ...
Страница 76: ...76 Configuration ...
Страница 104: ...104 Operation and management ...
Страница 140: ...140 Regulatory compliance and safety ...
Страница 152: ...152 MSA1510i worksheets ...