Configuring The Vmware Iscsi Software Initiator; Naming Requirements; Discovery Methods; Iscsi Security - HP StorageWorks 1510i - Modular Smart Array User Manual

Active/active firmware v2.0 or later
Hide thumbs Also See for StorageWorks 1510i - Modular Smart Array:
Table of Contents

Advertisement

Configuring the VMware iSCSI software initiator
NOTE:
Only iSCSI software initiators are supported by MSA1510i.
This section describes how to configure the VMware iSCSI initiator to connect to a dual-controller
MSA1510i in a multipathing environment. (For single-controller configurations, omit all steps shown for
multipath or dual-controller configurations.) The initiator is native to ESX.
While configuring the iSCSI software initiator, you enable your initiator and set up the initiator's target
addresses and CHAP parameters. See the following sections for more information.
After configuring the iSCSI software initiator, perform a rescan, so that all LUNs to which the initiator
has access display on the list of storage devices available to your ESX Server. For more information,
see"Performing a

Naming requirements

Because storage area networks can become large and complex, all iSCSI initiators and targets that use
the network have unique and permanent iSCSI names and are assigned addresses for access. The iSCSI
name provides a correct identification of a particular iSCSI device, an initiator or a target, regardless
of its physical location.
When configuring your iSCSI initiators, make sure they have properly formatted names. The initiators
can use one of the following formats:
IQN (iSCSI qualified name)—Can be up to 255 characters long and has the following format:
iqn.<year-mo>.<reversed_domain_name>:<unique_name>
where <year-mo> represents the year and month your domain name was registered,
<reversed_domain_name> is the official domain name, reversed, and <unique name> is
any name you want to use, for example, the name of your server.
Example: iqn.1998-01.com.mycompany:myserver.
EUI (extended unique identifier) —Represents the eui. prefix followed by the 16-character name.
The name includes 24 bits for company name assigned by the IEEE and 40 bits for a unique
ID such as a serial number.

Discovery methods

To determine which storage resource on the network is available for access, the iSCSI initiators ESX Server
system uses these discovery methods:
Dynamic Discovery —The initiator discovers iSCSI targets by sending a SendTargets request to
a specified target address. To use this method, enter the address of the target device so that
the initiator can establish a discovery session with this target. The target device responds by
forwarding a list of additional targets that the initiator is allowed to access.
Static Discovery— After the target device used in the SendTargets session sends you the list of
available targets, they appear on the Static Discovery list. To this list, you can manually add any
additional targets, or remove targets you don't need.
The static discovery method is available only with the hardware-initiated storage.

iSCSI security

Because iSCSI technology uses the IP networks to connect to remote targets, it is necessary to ensure
security of the connection. The IP protocol itself doesn't protect the data it transports, and it doesn't have
the capability to verify the legitimacy of initiators that access targets on the network. You need to take
specific measures to guarantee security across IP networks.
70
Configuration
Rescan" on page 74.

Advertisement

Table of Contents
loading

Table of Contents