Configuring SNMP alerts.......................................................................................................................................... 45
Battery settings................................................................................................................................................................ 47
Changing the battery settings..................................................................................................................................47
4 Using iSCSI..................................................................................................................................................49
Creating CHAP secrets................................................................................................................................................... 50
Initiator CHAP secret................................................................................................................................................ 50
Target CHAP secret...................................................................................................................................................50
Configuring the iSCSI host ports................................................................................................................................... 52
5 Event monitor..............................................................................................................................................55
Windows..................................................................................................................................................................... 55
Linux............................................................................................................................................................................ 56
6 About your host........................................................................................................................................... 57
Configuring host access..................................................................................................................................................57
Using the Host Mappings tab.........................................................................................................................................57
Defining a host........................................................................................................................................................... 58
Removing host access.................................................................................................................................................... 59
Managing host groups.....................................................................................................................................................59
Creating a host group......................................................................................................................................................59
Adding a host to a host group..................................................................................................................................59
Removing a host group............................................................................................................................................. 60
Host topology.............................................................................................................................................................60
I/O data path protection..................................................................................................................................................61
Managing host port identifiers....................................................................................................................................... 62
Creating disk groups.................................................................................................................................................. 63
Locating disk group....................................................................................................................................................64
Creating standard virtual disks................................................................................................................................. 65
Contents
5