Thecus i Series User Manual
Thecus i Series User Manual

Thecus i Series User Manual

Thecus network adapter user's manual

Advertisement

Quick Links

Thecus i Series
User's Manual

Advertisement

Table of Contents
loading
Need help?

Need help?

Do you have a question about the i Series and is the answer not in the manual?

Questions and answers

Subscribe to Our Youtube Channel

Summary of Contents for Thecus i Series

  • Page 1 Thecus i Series User’s Manual...
  • Page 2: About This Manual

    Preface About this manual This manual is the introduction of i Series, and to help user to know the operation of the disk array system easily. Information contained in the manual has been reviewed for accuracy, but not for product warranty because of the various environments/OS/settings, Information and specification will be changed without further notice.
  • Page 3: Table Of Contents

    Chapter 1 RAID introduction... 5 Features... 5 Terminology ... 6 RAID levels ... 8 Chapter 2 Getting started ... 9 Before starting... 9 iSCSI introduction ... 9 Management methods ... 11 2.3.1 Web GUI... 11 2.3.2 Remote control – secure shell ... 12 Enclosure ...
  • Page 4 Enclosure management ... 50 3.7.1 SES configuration... 51 3.7.2 Hardware monitor ... 51 3.7.3 Hard drive S.M.A.R.T. function support ... 52 3.7.4 UPS ... 53 System maintenance ... 54 3.8.1 Upgrade... 55 3.8.2 Info ... 55 3.8.3 Reset to default ... 56 3.8.4 Config import &...
  • Page 5: Chapter 1 Raid Introduction

    For more detail, please contact with your direct sales or email to “sales@thecus.com”. i Series connects to the host system in iSCSI interface. It can be configured to any RAID level. i Series provides reliable data protection for servers and the RAID 6 function ready.
  • Page 6: Terminology

    UDVs. The UDVs from one VG share the same RAID level, but may have different volume capacity. Cache Volume. i Series uses the on board memory as cache. All RAM (except for the part which is occupied by the controller) can be used as cache. User can divide the cache for one UDV or sharing among all UDVs.
  • Page 7 Write-Through cache write policy. A caching technique in which the completion of a write request is not signaled until data is safely stored on non-volatile media. Each data is synchronized in both data cache and the accessed physical disks. Write-Back cache write policy. A caching technique in which the completion of a write request is signaled as soon as the data is in cache and actual writing to non-volatile media occurs at a later time.
  • Page 8: Raid Levels

    iSCSI Internet Small Computer Systems Interface. Challenge Handshake Authentication Protocol. An optional CHAP security mechanism to control access to an iSCSI storage system over the iSCSI data ports. iSNS Internet Storage Name Service. 1.3 RAID levels Disk striping. RAID 0 needs at least one hard drive. RAID 0 Disk mirroring over two disks.
  • Page 9: Chapter 2 Getting Started

    Chapter 2 Getting started 2.1 Before starting Before starting, prepare the following items. Check the “Certification list” in Appendix A to confirm the hardware setting is fully supported. Read the latest release notes before upgrading. Release notes accompany with release firmware. A server with a NIC or iSCSI HBA.
  • Page 10 The iSCSI target is the storage device itself or an appliance which controls and serves volumes or virtual volumes. The target is the device which performs SCSI commands or bridges it to an attached storage device. iSCSI targets can be disks, tapes, RAID arrays, tape libraries, and etc.
  • Page 11: Management Methods

    2.3.1 Web GUI i Series support graphic user interface to manage the system. Be sure to connect LAN cable. The default setting of management port IP is Static IP. Default IP address: 192.168.1.100 Click any function at the first time; it will pop up a dialog to authenticate current user.
  • Page 12: Remote Control - Secure Shell

    2.3.2 Remote control – secure shell SSH (secure shell) is required for i Series to remote login. The SSH client software is available at the following web site: SSHWinClient WWW: http://www.ssh.com/ Putty WWW: http://www.chiark.greenend.org.uk/ Host name: 192.168.1.100 Login name: admin...
  • Page 13 The following table is function description. Mute alarm when error occurs. Alarm Mute Reset or shutdown controller. Reset/Shutdown Quick three steps to create a volume. Please refer to Quick Install section 3.3 for operation in web UI. Display current IP address, subnet mask, and gateway. View IP Setting Set IP address, subnet mask, and gateway.
  • Page 14: System Buzzer

    Caution Before power off, it is better to execute “Shutdown” to flush the data from cache to physical disks. 2.4.2 System buzzer The system buzzer features are describing in the following: The system buzzer alarms 1 second when system boots up successfully.
  • Page 15: Chapter 3 Web Gui Guideline

    Chapter 3 Web GUI guideline 3.1 GUI hierarchy The below table is the hierarchy of i Series GUI. Quick Install System Config System name IP address Language Login config Password SNMP Messenger System log server Event log iSCSI config Entity Property...
  • Page 16: Login

    Shutdown Logout 3.2 Login i Series supports graphic user interface (GUI) to operate the system. Be sure to connect the LAN cable. The default IP address is 192.168.1.100; open the browser and enter: http://192.168.1.100 (Please check IP address first on LCM) Click any function at the first time;...
  • Page 17: Quick Install

    HDD for the RAID level which user decides. But, when the system is inserted with different sizes of HDD, e.g., 2*200G HDD and 3*80G, i Series also lists all possibilities and combinations of different RAID Level and different sizes.
  • Page 18 Step 1: Select “Quick install” then choose the RAID level to set. Please refer to Figure 3.3.1. After choosing the RAID level, click “ links to another page, user can set up “LUN” here. Step 2: Please select a LUN number. Access control of host would show as a wildcard “*”, which means every host can access this volume.
  • Page 19: System Configuration

    3.4 System configuration “System config” selection is for the setup of “System name”, “IP address”, “Language”, “Login config”, “Password”, “Date”, “Mail”, “SNMP”, “Messenger” , “System log server” and view “Event log”. Figure 3.4.1 3.4.1 System name Select “System name” to change system name. Default system name composed by model name and serial number of this system.
  • Page 20: Ip Address

    3.4.2 IP address Select “IP address” to change IP address for remote administration usage. There are 2 selections, DHCP (Get IP address from DHCP server) or static IP. The default setting is Static IP (192.168.1.100 ) enabled. User can change the HTTP, HTTPS, and SSH port number when the default port number is not allowed on host/server.
  • Page 21: Login Config

    3.4.4 Login config Select “Login config” is to set only one admin and set the auto logout timing. The only one admin can prevent multiple users access the same controller in the same time. Auto logout: The options are (1) Disable; (2) 5 mins; (3) 30 mins; (4) 1 hour.
  • Page 22: Date

    3.4.6 Date Select “Date” to set up the current date, time, and time zone before using or synchronize time from NTP(Network Time Protocol) server. 3.4.7 Mail Select “Mail” to enter at most 3 mail addresses for receiving the event notification. Some mail servers would check “Mail-from address” and need authentication for anti-spam.
  • Page 23: Snmp

    3.4.8 SNMP Select “SNMP” to set up SNMP trap for alert via SNMP. It allows up to 3 SNMP trap addresses. Default community setting is “public”. User can choose the event log levels and the default value of SNMP is INFO event log enabled only. There are many SNMP tools.
  • Page 24: Messenger

    3.4.9 Messenger Select “Messenger” to set up pop-up message alert via Windows messenger (not MSN). User must enable the service “Messenger” in Windows (Start Control Panel Administrative Tools logs can be received. It allows up to 3 messenger addresses. User can choose the event log levels and the default values are WARNING and ERROR event logs enabled only.
  • Page 25: Event Log

    3.4.11 Event log Select “Event log” to view the event messages. Press “Filter” button to choose the display. Press “Download” button will save the whole event log as text file with file name “log-ModelName-SerialNumber-Date-Time.txt”. Press “Clear” button will clear event log. Press “Mute” button will stop alarm if system alerts. For customizing your own display of event logs, there are total three display methods, on Web UI/Console event log page, popup windows on Web UI, and on LCM.
  • Page 26: Iscsi Config

    3.5 iSCSI config “iSCSI config” selection is for the setup of “Entity Property”, “NIC”, “Node”, “Session”, and “CHAP account”. Figure 3.5.1 3.5.1 Entity property Select “Entity property” to view the view the entity name of the controller, and setup “iSNS IP” for iSNS (Internet Storage Name Service). Add an iSNS server IP address to the iSNS servers list which the iSCSI initiator service can send queries.
  • Page 27: Nic

    3.5.2 Select “NIC” to change IP addresses of iSCSI data ports. (Figure 3.5.2.2: there are 2 iSCSI data ports.) User can change IP address by clicking the button “ column. There are 2 selections, DHCP (Get IP address from DHCP server) or static IP.
  • Page 28: Session

    CHAP: CHAP is the abbreviation of Challenge Handshake Authorization Protocol. CHAP is a strong authentication method used with point-to-point for user login. It’s a type of authentication in which the authentication server sends the client a key to be used for encrypting the username and password. CHAP enables the username and password to transmitting in an encrypted form for protection.
  • Page 29: Chap Account

    (Figure 3.5.4.1: iSCSI Session.) Pressing the button “ “ will display connection(s). (Figure 3.5.4.2: iSCSI Connection.) 3.5.5 CHAP account Enter “CHAP account” function to create/delete a CHAP account for authentication. (Figure 3.5.5.1: Press “Create” to create a CHAP account.) Figure 3.5.4.1 Figure 3.5.4.2 Figure 3.5.5.1 - 29 -...
  • Page 30: Volume Configuration

    Figure 3.5.5.2 (Figure 3.5.5.2: Create a CHAP account named “chap1”.) 3.6 Volume configuration “Volume config” selection is for the setup of volume configurations including “Physical disk”, “Volume group”, “User data volume”, “Cache volume”, and “Logical unit” functions. Figure 3.6.1 3.6.1 Volume relationship diagram - 30 -...
  • Page 31 LUN 1 LUN 2 LUN 3 UDV 1 UDV 2 UDV 3 Global CV Dedicated PD 1 PD 2 PD 3 - 31 -...
  • Page 32: Physical Disk

    The above diagram describes the relationship of RAID components. One VG (Volume Group) consists of a set of UDVs (User Data Volume) and owns one RAID level attribute. Each VG can be divided into several UDVs. The UDVs from one VG share the same RAID level, but may have different volume capacity. Each UDV will be associated with one specific CV (Cache Volume) to execute the data transaction.
  • Page 33 • PD column description: The position of hard drives. The number of slot begins Slot from left to right at the front side. The button next to the number of slot is “More Information” indication. It shows the details of the hard drive. World Wide Name.
  • Page 34: Volume Group

    Set hard drive(s) to dedicated spare of selected VGs. Dedicated spares In this page, i Series also provides HDD auto spindown down function to save power. The default value is disabled. User can set up in physical disk page, too. 3.6.3 Volume group The disk doesn’t support above...
  • Page 35 Enter “Volume group” to view the status of each volume group. • VG column description: (Figure 3.6.3.1: There is a RAID 0 with 2 physical disks, named “VG-R0”, total size is 148GB, related to 2 UDV. Another is a RAID 5 with 3 physical disks, named “VG-R5”.) Number of volume group.
  • Page 36: User Data Volume

    Status 2 “R” Status 3 “M” migration. The RAID level of the volume group. The button next RAID to the RAID level is “Migrate” function. Click “Migrate” can add disk(s) to do expansion or change the RAID level of the Volume group. •...
  • Page 37 Number of this user data volume. The button in below to the UDV No. is “More Information” indication. It shows the details of the User data volume. Name of this user data volume. The button in below to Name the UDV Name is “Rename” function. Total capacity of this user data volume.
  • Page 38: Cache Volume

    • UDV operations description: Attach to a LUN. Attach Create a user data volume function. Create Delete a user data volume function. Delete 3.6.5 Cache volume Enter “Cache volume” function to view the status of cache volume. The global cache volume is a default cache volume, which is created after power on automatically, and cannot be deleted.
  • Page 39: Logical Unit Number

    • CV operations description: Create a cache volume function. Create Delete a cache volume function. Delete If there is no free space for creating a new dedicated cache volume, cut down the global cache size first. After resized, then dedicated cache volume can be created.
  • Page 40: Examples

    (Figure 3.6.6.2: UDV-01 is attached to LUN 0 with every host can access. UDV-02 is attached to LUN 1 with only initiator note named “iqn.1991-05.com.microsoft:s1300n” can access.) • LUN operations description: Attach a logical unit number to a user data volume. Attach Detach a logical unit number from a user data volume.
  • Page 41 Example 2 is to create two UDVs. One shares global cache volume, the other uses dedicated cache volume. Set a dedicated spare disk. • Example 1 Example 1 is to create two UDVs in one VG, each UDV uses global cache volume.
  • Page 42 (Figure 3.6.7.2: Creating a RAID 0 with 2 physical disks, named “VG-R0”. The total size is 148GB. Because of no related UDV there, free size still remains 148GB.) Step 2: Create UDV (User Data Volume). To create a data user volume, please follow the procedures. Select “/ Volume config / User data volume”.
  • Page 43 (Figure 3.6.7.4: Create UDVs named “UDV-1” and “UDV-2”, related to “VG-R0”, the size of “UDV-1” is 50GB, the size of “UDV-2” is 98GB. The status of these UDVs are online, write back, high priority with cache volume 383MB. There is no LUN attached.) Step 3: Attach LUN to UDV.
  • Page 44 (Figure 3.6.7.6: UDV1 is attached to LUN 0 with any hosts can access. UDV2 is attached to LUN 1 with only initiator note named “iqn.1991-05.com.microsoft:s1300n” can access.) Tips The matching rules of access control are from top to down by sequence.
  • Page 45 (Figure 3.6.7.7: Slot 5 is set as global spare disk.) Step 5: Done. They can be used as iSCSI disks. Delete UDVs, VG, please follow the steps. Step 6: Detach LUN from UDV. In “/ Volume config / Logical unit”, Select LUNs by clicking the checkbox of the row, then click “...
  • Page 46 Select “/ Volume config / Volume group”. Select a VG by clicking the checkbox of the row, make sure that there is no UDV on this VG, or the UDV(s) on this VG must be deleted first. Click “ Choose “OK” Done.
  • Page 47 Select “/ Volume config / Cache volume”. If there is no free space for creating a new dedicated cache volume, cut down the global cache size first by clicking the button “ size column. After resized, click “ cache volume page. Click “...
  • Page 48 Select “/ Volume config / User data volume”. Click “ Input a UDV name, choose a VG Name, select Dedicated cache which is created at Step 1, and input the size for the UDV; decide the stripe height, block size, read/write mode and set priority, finally click “...
  • Page 49 Step 4: Attach LUN to UDV. Please refer to Step 3 of Example 1 to attach LUN. Step 5: Set dedicated spare disk. To set dedicated spare disks, please follow the procedures: Select “/ Volume config / Physical disk”. Select a VG from the list box, then select the free disk(s), click “...
  • Page 50: Enclosure Management

    To free dedicated spare disks, please follow the procedures: Select “/ Volume config / Physical disk”. Select the dedicated spare disk by clicking the checkbox of the row, then click “ Step 11: Delete dedicated cache volume. To delete the cache volume, please follow the procedures: Select “/ Volume config / Cache volume”.
  • Page 51: Ses Configuration

    LED status: 10 seconds. 3.7.1 SES configuration SES represents SCSI Enclosure Services, one of the enclosure management standards. Enter “SES config” function can enable or disable the management of SES. (Figure 3.7.1.1: Enable SES in LUN 0, and can be accessed from every host.) The SES client software is available at the following web site: SANtools: http://www.santools.com/...
  • Page 52: Hard Drive S.m.a.r.t. Function Support

    30 seconds. When sensor is over the high temperature value for continuous 3 minutes, the Auto shutdown will be triggered immediately. If the high temperature situation doesn’t last for 3 minutes, i Series will not do auto shutdown. 3.7.3 Hard drive S.M.A.R.T.
  • Page 53: Ups

    3.7.4 Enter “UPS” function will set UPS (Uninterruptible Power Supply). Currently, the system only support and communicate with smart-UPS function of APC (American Power Conversion Corp.) UPS. Please check detail from http://www.apc.com/. First, connect the system and APC UPS via RS-232 for communication. Then set up the shutdown values when the power is gone.
  • Page 54: System Maintenance

    function. If power failure occurred, and the system can not Shutdown return back to the setting value period, the system will Delay (s) shutdown. Setting delay to “0” will disable the function. Select ON, when power is gone, UPS will shutdown by Shutdown itself after the system shutdown successfully.
  • Page 55: Upgrade

    3.8.1 Upgrade Enter “Upgrade” function to upgrade firmware. Please prepare new firmware file named “xxxx.bin” in local hard drive, then press “ Click “ you want to downgrade to the previous FW later, please export your system config first”, click “Cancel” to export system config first, then click “OK” to start to upgrade firmware.
  • Page 56: Reset To Default

    3.8.3 Reset to default Enter “Reset to default” function, it allows user to reset controller to the factory default setting. Reset to default sets password to default: admin, and set IP address to default as Static IP. Default IP address: 192.168.1.100 (Static IP) Default subnet mask: 255.255.255.0 Default gateway: 192.168.1.1 3.8.4...
  • Page 57: Shutdown

    3.8.5 Shutdown Enter “Shutdown” function; it will display “Reboot” and “Shutdown” buttons. Before power off, it’s better to press “Shutdown” to flush the data from cache to physical disks. The step is better for the data protection. Figure 3.8.5.1 3.9 Logout For security reason, “Logout”...
  • Page 58: Chapter 4 Advanced Operation

    Series support Auto-Rebuild function. When the RAID level allows disk failures which the VG is protected, such as RAID 3, RAID 5, RAID 6, and etc, i Series starts Auto-Rebuild as below scenario: Take RAID 6 for example: 1.
  • Page 59 When rebuilding, the status of PD/VG/UDV is “R”; and “R%” in UDV will display the ratio in percentage. After complete rebuilding, “R” and “DG” will disappear. VG will become complete one. Tips The list box doesn’t exist if there is no VG or only VG of RAID 0, JBOD.
  • Page 60: Vg Migration And Expansion

    4.2 VG migration and expansion To migrate the RAID level, please follow the below procedures. If the VG migrates to the same RAID level of the original VG, it is expansion. Select “/ Volume config / Volume group”. Decide which VG to be migrated, click the button “ column next the RAID level.
  • Page 61: Udv Extension

    (Figure 4.2.3: A RAID 0 migrates to RAID 5, complete percentage is 2%.) To do migration/expansion, the total size of VG must be larger or equal to the original VG. It does not allow expanding the same RAID level with the same hard disks of original VG.
  • Page 62: Disk Roaming

    Extension starts. If UDV needs initialization, it will display an “I” in “Status 3” and complete percentage of initialization in “R%”. (Figure 4.3.1: Extend UDV-R0 from 80GB to 90GB.) Tips The size of UDV extension must be larger than original. Caution UDV Extension cannot be executed during rebuild or migration.
  • Page 63: Appendix

    Appendix A. Certification list • i Series RAM Spec: 184pins, DDR333(PC2700), Reg.(register) or UB(Unbufferred), ECC or Non-ECC, from 64MB to 1GB, 32-bit or 64-bit data bus width, x8 or x16 devices, 9 to 11 bits column address. Vendor AG64L72T8SQC4S, 512MB DDR-400 (ECC) with Samsung...
  • Page 64 Microsoft Microsoft iSCSI Software Initiator Version 2.04 Windows System Requirements: Windows XP Professional with SP2 Windows 2000 Server with SP4 Windows Server 2003 with SP1 Windows Server 2003 R2 Linux The iSCSI Initiators are different for different Linux Kernels. For Red Hat Enterprise Linux 3 (Kernel 2.4), install linux-iscsi- 3.6.3.tar For Red Hat Enterprise Linux 4 (Kernel 2.6), use the build-in iSCSI initiator iscsi-initiator-utils-4.0.3.0-4 in kernel 2.6.9...
  • Page 65: Event Notifications

    Dell PowerConnect 2708 ProCurve 1800-24G D-Link DGS-3024 • Hard drive i Series support SATA I, II disks. Vendor Hitachi Deskstar 7K250, HDS722580VLSA80, 80GB, 7200RPM, SATA, 8M Hitachi Deskstar 7K80, HDS728080PLA380, 80GB, 7200RPM, SATA-II, 8M Hitachi Deskstar E7K500, HDS725050KLA360, 500G, 7200RPM, SATA-II, 16M...
  • Page 66 • PD/S.M.A.R.T. events Level Type Disk inserted Info Disk removed Info S.M.A.R.T. Warning threshold exceed condition S.M.A.R.T. Warning information • Physical HW events Level Type ECC error Warning ECC error Error ECC DIMM Info Installed Non-ECC installed Info Host chip failure Error Drive chip failure Error...
  • Page 67 SES load conf. OK Info SES Load Conf. Warning Failure SES is disabled Info SES is enabled Info • Environmental events Level Type Admin Login OK Info Admin Logout OK Info iSCSI data port Info login iSCSI data port Warning login reject Thermal critical Error...
  • Page 68 RTC Access Failed Warning Reset Password Info Reset IP Info • System config events Level Type Sys Config. Info Defaults Restored Sys NVRAM OK Info Sys NVRAM IO Error Failed Sys NVRAM is full Warning • System maintenance events Level Type Firmware Info...
  • Page 69 VG Created Fail Warning VG Deleted Info UDV Created OK Info UDV Created Fail Warning UDV Deleted Info UDV Attached OK Info UDV Attached Fail Warning UDV Detached OK Info UDV Detached Fail Warning UDV_OP Rebuild Info Started UDV_OP Rebuild Info Finished UDV_OP Rebuild...
  • Page 70: Microsoft Iscsi Initiator

    read/write error PD read/write error Error UDV recoverable Error read/write error UDV unrecoverable Error read/write error UDV stripe rewrite Info start/fail/succeed C. Microsoft iSCSI Initiator Here is the step by step to setup Microsoft iSCSI Initiator. Please visit Microsoft website for latest iSCSI initiator. The following setup may not use the latest Microsoft iSCSI initiator.
  • Page 71 Click “OK”. Please see Figure C.3. Click “Targets”. Please see Figure C.4. Figure C.2 Figure C.3 - 71 -...
  • Page 72 Click “Log On”. Please see Figure C.5. Check “Enable multi-path” if running MPIO. Click “Advance…” if CHAP information is needed. Please see Figure C.6. Figure C.4 Figure C.5 - 72 -...
  • Page 73 Click “OK”. The status would be “Connected”. Please see Figure C.7 Done, it can connect to an iSCSI disk. Figure C.6 - 73 -...
  • Page 74 Figure C.7 The following procedure is to log off iSCSI device. - 74 -...
  • Page 75: Mpio And Mc/S Setup Instructions

    Click “Details”. Please see Figure C.8. Check the Identifier, which will be deleted. Click “Log off”. Done, the iSCSI device log off successfully. D. MPIO and MC/S setup instructions Here is the step by step to setup MPIO. There are 2 kinds of scenarios for MPIO. Please see Figure D.1.
  • Page 76 The setup instructions are in the following figures. Create a VG . Create a UDV. Figure D.1 Figure D.2 - 76 -...
  • Page 77 Run Microsoft iSCSI initiator and check the Initiator Node Name. Attaching LUN to UDV_1 UDV. Input the Initiator Node Name in Host field. The volume config setting is done. Figure D.3 Figure D.4 Figure D.5 - 77 -...
  • Page 78 Check iSCSI settings. The IP address of iSCSI data port 1 is 192.168.11.229, port 2 is 192.168.12.229 for example. Add Target Portals on Microsoft iSCSI initiator. Input the IP address of iSCSI data port 1 (192.168.11.229 as mentioned in previous page). Figure D.6 Figure D.7 Figure D.8...
  • Page 79 Figure D.9 Add second Target Portals on Microsoft iSCSI initiator. Figure D.10 - 79 -...
  • Page 80 10. Input the IP address of iSCSI data port 2 (192.168.12.229 as mentioned in previous page). Figure D.11 11. The initiator setting is done. - 80 -...
  • Page 81 Figure D.12 12. Log on. Figure D.13 - 81 -...
  • Page 82 13. Enable “Enable multi-path” checkbox. Then click “Advanced”. Figure D.14 14. Select Target Portal to iSCSI data port 1 (192.168.11.229). Then click “OK” - 82 -...
  • Page 83 15. Log on “Enable multi-path” again. 16. Enable “Enable multi-path” checkbox. Then click “Advanced…”. Figure D.15 Figure D.16 Figure D.17 - 83 -...
  • Page 84 17. Select Target Portal to iSCSI data port 2 (192.168.12.229). Then select “OK” Figure D.18 18. iSCSI device is connected. Click “Details”. - 84 -...
  • Page 85 Figure D.19 19. Click “Device” tab, then click “Advanced”. Figure D.20 - 85 -...
  • Page 86 20. Click “MPIO” tab, select “Load Balance Policy” to “Round Robin”. 21. Click “Apply”. Figure D.21 Figure D.22 - 86 -...
  • Page 87 22. Run “Device Manage” in Windows. Make sure MPIO device is available. Then the disk can be tested performance by IOMETER. The MC/S setup instructions are very similar to MPIO, detail steps are in the following figures. For the target side setting, the steps are exactly the same as MPIO.
  • Page 88 Figure D.24 10. Then click “Advanced…”. Figure D.25 - 88 -...
  • Page 89 11. Select set Local Adapter, Source IP, and Target Portal to iSCSI data port 1 (192.168.11.229). Then click “OK”. 12. After connected, click “Details”, then in the “Session” tab, click “Connections”. Figure D.26 - 89 -...
  • Page 90 13. Choose “Round Robin” for Load Balance Policy. 14. “Add” Source Portal for the iSCSI data port 2(192.168.12.229) Figure D.27 Figure D.28 - 90 -...
  • Page 91 15. Choose “Adavanced” 16. Select Local adapter, Source IP, and Target Portal to iSCSI data port 2 (192.168.12.229). Then select “OK”. 17. The MC/S setting is done. Figure D.29 Figure D.30 - 91 -...

Table of Contents