Dell EMC PowerVault MD Series Administrator's Manual page 5

Storage arrays
Table of Contents

Advertisement

Configuring SNMP alerts.......................................................................................................................................... 45
Battery settings................................................................................................................................................................ 47
Changing the battery settings..................................................................................................................................47
Setting the storage array RAID controller module clocks........................................................................................... 48
4 Using iSCSI..................................................................................................................................................49
Changing the iSCSI target authentication.................................................................................................................... 49
Entering mutual authentication permissions................................................................................................................ 50
Creating CHAP secrets................................................................................................................................................... 50
Initiator CHAP secret................................................................................................................................................ 50
Target CHAP secret...................................................................................................................................................50
Valid characters for CHAP secrets.......................................................................................................................... 50
Changing the iSCSI target identification........................................................................................................................51
Changing iSCSI target discovery settings..................................................................................................................... 51
Configuring the iSCSI host ports................................................................................................................................... 52
Advanced iSCSI host port settings................................................................................................................................52
Viewing or ending an iSCSI session............................................................................................................................... 53
Viewing iSCSI statistics and setting baseline statistics...............................................................................................53
Edit, remove, or rename host topology......................................................................................................................... 54
5 Event monitor..............................................................................................................................................55
Enabling or disabling event monitor...............................................................................................................................55
Windows..................................................................................................................................................................... 55
Linux............................................................................................................................................................................ 56
6 About your host........................................................................................................................................... 57
Configuring host access..................................................................................................................................................57
Using the Host Mappings tab.........................................................................................................................................57
Defining a host........................................................................................................................................................... 58
Removing host access.................................................................................................................................................... 59
Managing host groups.....................................................................................................................................................59
Creating a host group......................................................................................................................................................59
Adding a host to a host group..................................................................................................................................59
Removing a host from a host group........................................................................................................................60
Moving a host to a different host group................................................................................................................. 60
Removing a host group............................................................................................................................................. 60
Host topology.............................................................................................................................................................60
Starting or stopping the Host Context Agent.........................................................................................................61
I/O data path protection..................................................................................................................................................61
Managing host port identifiers....................................................................................................................................... 62
7 Disk groups, standard virtual disks, and thin virtual disks............................................................................. 63
Creating disk groups and virtual disks........................................................................................................................... 63
Creating disk groups.................................................................................................................................................. 63
Locating disk group....................................................................................................................................................64
Creating standard virtual disks................................................................................................................................. 65
Contents
5

Hide quick links:

Advertisement

Table of Contents
loading

Table of Contents