Novell LINUX ENTERPRISE SERVER 10 SP2 - INSTALLATION AND ADMINISTRATION Installation Manual page 290

Hide thumbs Also See for LINUX ENTERPRISE SERVER 10 SP2 - INSTALLATION AND ADMINISTRATION:
Table of Contents

Advertisement

12.1.1 Creating iSCSI Targets with YaST
The iSCSI target configuration exports existing block devices or file system images to
iSCSI initiators. First create the needed block devices with YaST or create file system
images. For an overview of partitioning, see Section 8.5.7, "Using the YaST Partitioner"
(page 155). File system images must be created manually. For example, if you want to
create the image /var/lib/xen/images/xen-0 with the size 4GB, first make
sure that the directory is there then create the image itself:
mkdir -p /var/lib/xen/images
dd if=/dev/zero of=/var/lib/xen/images/xen-0 seek=1M bs=4096 count=1
To configure the iSCSI target, run the iSCSI Target module in YaST. The configuration
is split into three tabs. In the Service tab, select the start mode and the firewall settings.
If you want to access the iSCSI target from a remote machine, select Open Port in
Firewall. If a iSNS server should manage the discovery and access control, activate
iSNS Access Control and enter the IP address of your iSNS Server. Note, that you cannot
use even valid hostnames, but must use the IP address. For more about iSNS, read
Chapter 13, iSNS for Linux Overview (page 283).
The Global tab provides settings for the iSCSI server. The authentication set here is
used for the discovery of services, not for accessing the targets. If you do not want to
restrict the access to the discovery, use No Authentication.
If authentication is needed, there are two possibilities to consider. One is that an initiator
must prove that it has the permissions to run a discovery on the iSCSI target. This is
done with Incoming Authentication. The other is that the iSCSI target must prove to
the initiator that it is the expected target. Therefore, the iSCSI target can also provide
a username and password. This is done with Outgoing Authentication. Find more infor-
mation about authentication in RFC 3720 (see
rfc3720.txt).
The targets are defined in the Targets tab. Use Add to create a new iSCSI target. The
first dialog asks for information about the device to export.
Target
The Target line has a fixed syntax that looks like the following:
iqn.yyyy-mm.<reversed domain name>
272
Installation and Administration
http://www.ietf.org/rfc/

Advertisement

Table of Contents
loading

This manual is also suitable for:

Suse linux enterprise server 10 sp3

Table of Contents