Adaptec iSA1500 User Manual
Hide thumbs Also See for iSA1500:
Table of Contents

Advertisement

Quick Links

Adaptec iSA1500

Storage Array

User's Guide

Advertisement

Table of Contents
loading
Need help?

Need help?

Do you have a question about the iSA1500 and is the answer not in the manual?

Questions and answers

Summary of Contents for Adaptec iSA1500

  • Page 1: Storage Array

    Adaptec iSA1500 Storage Array User’s Guide...
  • Page 2 Copyright ©2004 Adaptec, Inc. All rights reserved. No part of this publication may be reproduced, stored in a retrieval system, or transmitted in any form or by any means, electronic, mechanical, photocopying, recording or otherwise, without the prior written consent of Adaptec, Inc., 691 South Milpitas Blvd., Milpitas, CA 95035.
  • Page 3 Adaptec Customer Support If you have questions about installing or using your Adaptec product, check this document first—you will find answers to most of your questions here. If you need further assistance, use the support options listed below. Technical Support Identification (TSID) Number ■...
  • Page 4 German: To speak with a Technical Support Specialist, call +49 89 43 66 55 22, ■ Monday to Friday, 9:00 to 17:00, CET. For support via e-mail, submit your question to Adaptec’s Technical Support Specialists at French: To speak with a Technical Support Specialist, call +49 89 43 66 55 33, ■...
  • Page 5 Limited 3-Year Hardware Warranty 1. Adaptec, Inc. (“Adaptec”) warrants to the purchaser of this product that it will be free from defects in material and workmanship for a period of three (3) years from the date of purchase. If the product should become defective within the warranty period, Adaptec, at its option, will repair or replace the product, or refund the purchaser’s purchase price for the...
  • Page 6 APPLICABLE TO THE SOFTWARE, YOU MAY RETURN THE ENTIRE UNUSED PRODUCT FOR A FULL REFUND. In return for acquiring a license to use the Adaptec software (“Software”) and the related documentation, you agree to the following terms and conditions: 1. License. This Agreement grants you, the Licensee, a license to: a.
  • Page 7 This warranty gives you specific legal rights and you may also have other rights which vary from state to state. 9. The entire liability of Adaptec and its licensors, and your exclusive remedy for a breach of this warranty, shall be: a.
  • Page 8 Agreement, in writing signed by an officer of Adaptec. You assume full responsibility for the use of the Software and agree to use the Software legally and responsibly. This Agreement shall be governed by California law, except as to copyright matters, which are covered by Federal law.
  • Page 9 ■ TUV CB Certified CE Mark The Adaptec iSA1500 storage enclosure will be CE marked to indicate compliance with the European Low Voltage Directive and the EMC directive. The Adaptec storage enclosure is certified to Class A emission limits. 1. Product Safety: EN60950 ITE 2.
  • Page 10 ■ ■ Power Frequency Magnetic FieldsCENELEC EN61000-4-8 ■ Power Line Interruption Electromagnetic Radiation The Adaptec Storage Enclosure is labeled with the following compliance marks: United States FCC standard, 47 CFR Part 15 ■ ■ Canadian standard, Industry Canada ICES-003 ■...
  • Page 11: Table Of Contents

    Introduction About This Guide 1-2 Kit Contents 1-2 Features of the Adaptec iSA1500 1-3 Managing the Adaptec iSA1500 1-3 System Requirements and Operating System Support 1-4 About Your Adaptec Storage Manager License 1-4 Introduction to iSCSI and IPSANs What is iSCSI and How Does It Work? 2-2...
  • Page 12 Basic IPSAN Security Recommendations 5-2 Understanding Access Levels 5-2 Creating User Accounts and Assigning Passwords 5-3 Editing User Accounts 5-4 Generating SAN Passwords 5-4 Setting iSCSI Target Authentication 5-5 Using Access Control Lists 5-7 Managing Your IPSAN Viewing and Activating Software Features 6-2 Managing Volumes 6-3 Managing Initiators 6-12 Managing Storage Pools 6-15...
  • Page 13 Contents Diag Commands 8-19 Events Commands 8-20 Image commands 8-25 Initiator / iSCSI nodes Commands 8-26 Interface Commands 8-28 Ipsec Commands 8-33 iSCSI Commands 8-42 Mirror Commands 8-44 Network Commands 8-48 Pool Commands 8-50 Route Commands 8-54 SLP Scope Commands 8-55 Service Commands 8-57 Target Commands 8-59 SNMP Commands 8-63...
  • Page 14: Introduction

    Features of the Adaptec iSA1500 Managing the Adaptec iSA1500 System Requirements and Operating System Support About Your Adaptec Storage Manager License This chapter introduces the features of the Adaptec Storage Array iSCSI-to-SATA RAID subsystem, lists the system requirements, and provides software license information. ®...
  • Page 15: About This Guide

    It also assumes that you have basic knowledge of Redundant Array of Independent Disks (RAID) technology. Kit Contents Your Adaptec iSA1500 Storage Array subsystem kit includes these components: Adaptec Quick Install iSA1500 CD...
  • Page 16: Features Of The Adaptec Isa1500

    Features of the Adaptec iSA1500 These Figures illustrate the main features of the Adaptec iSA1500 Storage Array subsystem. Front of Enclosure (Behind Bezel) Rear of Enclosure Fans Power Port Keyboard Port Mouse Port Managing the Adaptec iSA1500 You can manage your Adaptec iSA1500 subsystem and IPSAN...
  • Page 17: System Requirements And Operating System Support

    Product-specific License Keys are required to unlock these features in your Adaptec iSA1500 subsystem. For example, you need a License Key to enable synchronous mirroring or increase the number of snapshots. (See To purchase a License Key, contact your Adaptec Reseller or refer...
  • Page 18: Introduction To Iscsi And Ipsans

    What is Adaptec Storage Manager’s Role? Planning Your IPSAN This chapter provides a brief introduction to iSCSI and IPSAN technology, gives an overview of how your Adaptec iSA1500 Storage Array components work together, and provides sample topologies to help you plan your IPSAN.
  • Page 19: What Is Iscsi And How Does It Work

    Introduction to iSCSI and IPSANs What is iSCSI and How Does It Work? This section provides a general overview of iSCSI technology and explains how it’s used for networking. What is iSCSI? When SCSI command blocks are encapsulated with IP and transferred over an IP network, it is known as Internet SCSI (iSCSI).
  • Page 20 Introduction to iSCSI and IPSANs How does iSCSI Work? iSCSI communicates over IP networks through the use of iSCSI initiators and targets. iSCSI is bi-directional, so the same protocol is used for both requests for data and responses to requests. The initiator always initiates a command or data sequence.
  • Page 21 Storage pooling becomes a very powerful tool when used with SANs. Storage pools can be created and expanded using all the storage available on an Adaptec storage enclosure. The SAN is not restricted by the amount of storage physically attached to a single machine.
  • Page 22: What Is An Ipsan

    What is an IPSAN? An IPSAN is a collection of iSCSI initiators and targets grouped together into a network. A basic IPSAN may consist of one iSCSI initiator and one iSCSI target, as shown in the Figure below. However, the real benefits of iSCSI technology and IPSANs are realized when there are greater numbers of initiators and targets.
  • Page 23: What Is Wmi

    Software developers use WMI as a kind of “shortcut” when creating software functions, referring to the WMI code instead of creating new code. Without WMI support, automated features of the Adaptec Storage Manager software will not work on your computer and will have to be performed manually.
  • Page 24: What Is Adaptec Storage Manager's Role

    What is Adaptec Storage Manager’s Role? The Adaptec Storage Manager is a Web-based graphical user interface (GUI) that provides secure management of your Adaptec iSA1500 Storage Array subsystem and Windows servers. You can use Adaptec Storage Manager to complete automated volume creation and to manage storage pools, iSCSI targets, mirrors, snapshots, and events.
  • Page 25 Installations Server Storage Enclosure Adaptec Storage Manager must be installed on the Management Station and all iSCSI Stations on your IPSAN. Note: Only one Management Station is allowed on your IPSAN. (Your Management Station can also be an iSCSI Station.)
  • Page 26: Planning Your Ipsan

    Planning Your IPSAN This section outlines the issues and concepts you should understand as you plan your IPSAN. Basic and complex IPSAN configurations are provided as sample solutions. Invalid IPSAN configurations are also included to help you avoid mistakes. What’s a Subnet? A subnet (short for subnetwork) is a separate identifiable portion of a network.
  • Page 27 Station are connected to the server over Subnet_2. The file server has a single iSCSI port. This configuration must be managed through the Management port (Eth0). iSCSI Stations Management Station Subnet_2 Subnet_2 Subnet_2 Switch Subnet_2 Network File Server iSCSI Connection Adaptec iSA1500 Subnet_1 2-10...
  • Page 28 Note: A system with dual iSCSI ports provides enhanced performance compared to a system with a single iSCSI port. The Management port (Eth0) is connected to the general network (subnet_2) for remote management with Adaptec Storage Manager or the CLI, and remote event notification. iSCSI Stations...
  • Page 29 This configuration is managed through Management port Eth0 over subnet_2. iSCSI Stations Subnet_2 Network iSCSI Connection Subnet_2 Introduction to iSCSI and IPSANs Management Station Subnet_2 Switch Subnet_2 Network Subnet_2 iSCSI Subnet_1 Subnet_1 Connection GbE Switch iSCSI Connection Adaptec iSA1500 Subnet_1 Subnet_2 2-12...
  • Page 30 Stations Subnet_2 Network Subnet_3 Subnet_1 GbE Switch Subnet_3 Subnet_2 Note: This topology can be used for cluster operation. Introduction to iSCSI and IPSANs Management Station Subnet_2 Switch Subnet_2 Network Subnet_3 Subnet_1 GbE Switch Subnet_1 Adaptec iSA1500 Subnet_2 iSCSI Connections 2-13...
  • Page 31 Client/Server Subnet_2 Network Network Subnet_2 Subnet_3 GbE Switch Subnet_3 Subnet_2 Introduction to iSCSI and IPSANs iSCSI Stations Management Station Subnet_2 Switch Network Subnet_2 Subnet_3 Adaptec iSA1500 Subnet_2 Network Network Subnet_2 Subnet_2 Subnet_1 Subnet_1 GbE Switch Subnet_1 2-14...
  • Page 32 Subnet_2 Network Network Subnet_2 Subnet Subnet_3 Subnet_3 GbE Switch Subnet_3 Subnet_2 Introduction to iSCSI and IPSANs iSCSI Stations Management Station Subnet_2 Switch Network Subnet_2 Subnet_1 Subnet_3 Adaptec iSA1500 Subnet_2 Network Network Subnet_2 Subnet_2 Subnet_1 Subnet_1 Subnet_3 GbE Switch Subnet_1 2-15...
  • Page 33 The iSCSI Stations in this example will not be able to access the database server. Subnet_2 GbE Switch Subnet_2 Introduction to iSCSI and IPSANs iSCSI Stations Subnet_2 Switch Subnet_2 Subnet_1 Subnet_1 Adaptec iSA1500 Subnet_2 Subnet_3 2-16...
  • Page 34 In this invalid configuration, both iSCSI interfaces are on the same subnet. This configuration may work at first, but problems will occur if a cable is pulled, or if the interface fails. iSCSI Stations Subnet_2 Subnet_2 Subnet_2 Switch Subnet_2 Subnet_2 Subnet_1 Subnet_1 GbE Switch Adaptec iSA1500 Subnet_1 Subnet_1 Subnet_2 2-17...
  • Page 35 Management port, which is a slower port. The configuration might appear to be working correctly, but performance would be very low (about 10%). iSCSI Stations Subnet_2 Subnet_2 Subnet_2 Switch Subnet_2 File Server Subnet_1 GbE Switch Adaptec iSA1500 Subnet_1 Subnet_1 2-18...
  • Page 36: Getting Started Quickly

    Adding Agents Configuring the Adaptec iSA1500 Subsystem This chapter guides you through the installation and basic set-up of the Adaptec iSA1500 Storage Array subsystem and Adaptec Storage Manager software. For a smooth and trouble-free installation, thoroughly review this chapter before you begin, and perform the tasks in the order in which they are presented.
  • Page 37: Installation Overview

    Leave enough room behind the Adaptec iSA1500 subsystem or ■ rack for servicing and to allow for sufficient airflow. If you plan to mount the Adaptec iSA1500 subsystem into a ■ rack, select a suitable location that is clean, dust-free, well- ventilated, and close to a grounded power outlet.
  • Page 38: Installing The Hardware

    Installing the Hardware This section explains how to complete the physical installation of the Adaptec iSA1500 hardware. Installing the Chassis in a Rack (Optional) Note: If you are not installing the chassis in a rack, skip to Connecting the Cables and Powering On on page...
  • Page 39 3 Repeat until all four disk drives are installed. Connecting a Monitor and Keyboard To configure the Adaptec iSA1500, connect a monitor to the Video port and a keyboard to the Keyboard port. (The ports are shown in the Figure in...
  • Page 40 Connecting the Cables and Powering On To connect and power on your subsystem: 1 Use GbE network cables to connect the Adaptec iSA1500 to the network. Connect Management Port (Eth 0) to IPSAN or LAN Connect iSCSI Data Ports to IPSAN: 2 Connect the enclosure to a grounded power outlet, using the power cord provided.
  • Page 41 Getting Started Quickly 3 Press the Power button on the front panel. 4 Attach the bezel. Align and attach the left side first, then swing the bezel closed and secure it in place using the button. The physical installation is complete. Continue with Completing the Network Configurations on page 3-7.
  • Page 42: Completing The Network Configurations

    When you power on the subsystem, the Initialization Wizard opens. Use the monitor and keyboard to configure the basic network parameters of the Adaptec iSA1500 with the CLI, which is preinstalled on the subsystem. (For more information about the CLI, see...
  • Page 43 Table 3-1 Ensure that the management interface is on the same subnet as the station used to manage the Adaptec iSA1500. Note: Make a note of the IP addresses you assign for future reference. Table 3-1 Required Parameters for Initial Configuration...
  • Page 44: Installing The Initiator

    ■ To install Microsoft DiskPart, see ■ To install Adaptec Storage Manager on your Management ■ Station, see page 3-11. To install Adaptec Storage Manager on your iSCSI Stations, see ■ page 3-13 to continue. www.adaptec.com page page 3-10. Getting Started Quickly...
  • Page 45 2 When prompted to specify an installation option, select Install iSCSI Service Only. Note: If you plan to use the Microsoft iSCSI initiator instead of the Adaptec 7211 iSCSI adapter, select Install Complete iSCSI Initiator. 3 Follow the on-screen instructions to complete the installation.
  • Page 46 To install Adaptec Storage Manager on your Management Station: 1 Close all open applications and disable any anti-virus utilities. 2 Insert the Adaptec iSA1500 CD into the CD-ROM drive. The Setup program opens automatically. (If the Setup program does not open, double-click the Setup.exe icon on the CD to begin setup and installation.)
  • Page 47 Station only, click Management Station, then click Next. Note: If you select iSCSI and Management Station, Microsoft DiskPart must be installed on your system before the Adaptec Storage Manager installation can continue. See more information. Note: This User’s Guide assumes that you have completed an iSCSI and Management Station setup on your Management Station.
  • Page 48 To install Adaptec Storage Manger on an iSCSI Station: 1 Close all open applications and disable any anti-virus utilities. 2 Insert the Adaptec iSA1500 CD into the CD-ROM drive. The Setup program opens automatically. (If the Setup program does not open, double-click the Setup.exe icon on the CD to begin setup and installation.
  • Page 49: Adding Agents

    Adding Agents This section explains how to add an agent using Adaptec Storage Manager. An agent is software that lets the Management Station communicate with each iSCSI subsystem and iSCSI Station on your IPSAN. Before Adaptec Storage Manager can recognize the iSCSI subsystem and iSCSI Stations on your IPSAN, they must each be added as static agents.
  • Page 50 (See Step 6 on page 3-12.) 4 Click login. The main Adaptec Storage Manager screen opens. No servers or iSCSI subsystems are listed. 5 Click the Agents button. The Static Agents window opens.
  • Page 51: Configuring The Adaptec Isa1500 Subsystem

    Management port. Caution: DHCP is not recommended. The Adaptec iSA1500 subsystem is configured. You can change the network settings at any time, if required (see Network Settings on page Setup is now complete.
  • Page 52: Building Your Ipsan

    Navigating Adaptec Storage Manager Building Your IPSAN (With WMI) Building Your IPSAN (Without WMI) Next Steps This chapter introduces Adaptec Storage Manager, and provides basic instructions for building your IPSAN. Two sets of instructions are provided, one for users who have WMI (see...
  • Page 53: Navigating Adaptec Storage Manager

    Once you have completed all the installation tasks listed in Chapter 3, all the iSCSI subsystems and iSCSI Stations (referred to as servers in Adaptec Storage Manager) on your IPSAN appear in the Tree Menu, as shown in the Figure below. Tree Menu,...
  • Page 54 Refresh and Go Back icons (shown at right) appear in the upper right-hand corner of many Application Windows. Logging Out Always close your browser, or log out of Adaptec Storage Manager by clicking the Logout button (shown at right), at the end of each session.
  • Page 55: Building Your Ipsan (With Wmi)

    Building Your IPSAN (With WMI) If your system has WMI, the automated features of Adaptec Storage Manager are supported. Follow the instructions in this section to build your IPSAN. Prerequisites Windows 2003 or Windows 2000 SP3 ■ Microsoft iSCSI Service ■...
  • Page 56 (RAID). Before you begin, plan your storage—do you need everything in one pool, or would multiple pools be more convenient? Adaptec recommends that you make your pools at least 20% larger than is required for the targets, to leave room for snapshots and other advanced features that need available free space.
  • Page 57 3 Click Create Pool. Note: The Create Pool option is only available if sufficient disk drives are present on the system. The Create Pool window opens. 4 Choose a name for your pool. Pool names can be alphanumeric, such as pool1 5 Select a RAID level (or select No RAID), and specify the cache.
  • Page 58 7 Click OK to create the storage pool. The new pool is added to the iSCSI subsystem’s list of storage pools. Note: Click your browser’s Refresh button if the pool does not appear. Creating a New Volume The next step in building your IPSAN is to add a volume to a server.
  • Page 59 3 Click Create Volume. The Automated Volume Creation window opens. Note: Automated volume creation is only available on systems with Microsoft iSCSI Service installed. 4 Enter the Volume Size, Volume Name, and Storage Type. 5 In the Volume Type drop-down menu, select Simple (Basic) to create a simple volume on the server, or select iSCSI Subsystem Mirror (Basic) to create a mirrored volume, which will reside on the server you selected in...
  • Page 60 7 Continue by following the instructions for the type of volume you are creating: Simple (Basic)—Select which storage pool to use, as shown ■ in the example below. iSCSI Subsystem Mirror (Basic)—Select the pools you want ■ to use, as shown in the example below. You must select at least two pools to create a mirrored volume.
  • Page 61 8 Click OK to begin volume creation. The Job Details window opens, showing the volume creation process and status Note: You can also view the job progress at any time by clicking the Jobs button at the top of your screen. You can delete a job in progress by clicking the Trash Can icon (shown at right) beside the job.
  • Page 62: Building Your Ipsan (Without Wmi)

    Building Your IPSAN (Without WMI) This section provides basic instructions for creating an IPSAN manually, without using the automated features of Adaptec Storage Manager that are supported by WMI. Set-up Task List To set up your IPSAN manually, complete these tasks, in order: 1 Add a storage pool to the iSCSI subsystem.
  • Page 63 3 Click Create Target. The Create Logical Target window opens. 4 Set the parameters for your iSCSI target. You can use an existing or default SLP scope, or create a new one. If you choose to create a new SLP scope, you will be asked to create a name for that scope as part of information, see What’s an SLP Scope? on page...
  • Page 64 6 Click Next, then select a Pool and set the Pool size. 7 Click OK to create the iSCSI target. When the iSCSI target has been created, it appears in the Targets On This iSCSI Subsystem window. The iSCSI target has the same redundancy level as its storage pool.
  • Page 65 To create a spare: 1 In the Tree Menu, click the iSCSI subsystem on which you want to create a spare. 2 In the Application Window, click on the Hardware tab. 3 Click on an available drive. The Disk in Enclosure window opens. 4 Click Make Global Spare.
  • Page 66: Next Steps

    Manage Your IPSAN — Manage your IPSAN using Adaptec ■ Storage Manager (see using the CLI (see Use the Event Log — Monitor the status of your Adaptec ■ iSA1500 subsystem using the Event Log in Adaptec Storage Manager. See Chapter 7, Managing Events for more information.
  • Page 67 Basic IPSAN Security Recommendations Understanding Access Levels Creating User Accounts and Assigning Passwords Editing User Accounts Generating SAN Passwords Setting iSCSI Target Authentication Using Access Control Lists This chapter provides detailed information about the access and security features of Adaptec Storage Manager.
  • Page 68: Controlling Access And Adding Security

    Basic IPSAN Security Recommendations When setting up your IPSAN, consider these security recommendations: Always log out of Adaptec Storage Manager when you are ■ finished using it. Don’t allow account sharing. ■ Keep the Manager Level password confidential. ■ Use account names that easily relate to your IPSAN users, to ■...
  • Page 69: Creating User Accounts And Assigning Passwords

    Note: Only a user with manager-level access can create user accounts. To create a user account: 1 In Adaptec Storage Manager, click the Users button (shown at right) to open the Users window. All users and their assigned access levels are listed.
  • Page 70: Editing User Accounts

    Editing User Accounts You can change a user’s access level and password, or delete a user. To edit or delete a user account: 1 In Adaptec Storage Manager, click the Users button. (See the Figure in Step 1 on page 2 Under Options: Click the Key icon to change the user’s access level.
  • Page 71: Setting Iscsi Target Authentication

    2 Click Generate SAN Password. 3 Click OK to confirm the creation of a new password. Beginning immediately, your management station and all of its associated agents use this new password during authentication checks. Setting iSCSI Target Authentication When you create an iSCSI target, you can set an authentication method.
  • Page 72 2 In the Application Window, click View under Authentication. The Authentication window opens. 3 Click Add Authentication User. The Add an Authentication User window opens. 4 Type in the user name and password, re-enter the password, then click OK. Note: Passwords must be at least 12 characters long. The new user information appears in the Authentication window.
  • Page 73: Using Access Control Lists

    2 Under Options beside the User Name: Click the Lock icon to change the user’s password. ■ Click the Trash Can icon to delete the user. ■ 3 Follow the on-screen instructions to edit or delete the authentication user account. All authentication user account changes take effect immediately.
  • Page 74: Managing Your Ipsan

    Managing Devices (Disk Drives) Managing Network Settings Managing Portals Enabling Network Drive Sharing Upgrading the Subsystem Firmware Managing the iSCSI Subsystem’s Settings This chapter explains how to use Adaptec Storage Manager to manage your IPSAN. 6-12 6-15 6-22 6-23 6-38...
  • Page 75: Viewing And Activating Software Features

    About Your Adaptec Storage Manager License on page 1-4.) To view the features currently enabled on your Adaptec iSA1500: 1 Open Adaptec Storage Manager and log in, following Steps Adding Agents on page 2 In the Tree Menu, click the iSCSI subsystem you want, then click Features.
  • Page 76: Managing Volumes

    Managing Volumes This section provides instructions for using Adaptec Storage Manager to manage storage volumes. You can use Adaptec Storage Manager to: Create a new volume. (See ■ Increase the size of (extend) a volume. (See ■ Reassign a volume to a different server. (See ■...
  • Page 77 You can extend a volume (increase the size of a volume) up to the amount of free space within its parent storage pool. Note: Adaptec recommends that you always have spare capacity in your storage pools to allow for advanced functions, such as snapshots, which require available free space.
  • Page 78 2 Select the iSCSI volume to be extended, then click Extend Volume. The Automated Extend Volume window opens. 3 Enter the size of the volume extension. Ensure that you have sufficient free space on your target for the size increase. 4 Click OK.
  • Page 79 3 Select the new server from the drop-down menu, then click Next. 4 Select the mount point. The mount point is a drive letter. When the volume is reassigned, it appears as space on that existing drive letter. 5 Click OK to reassign the volume. Taking a Snapshot of a Volume A snapshot is a frozen image of a volume at a particular point in time.
  • Page 80 Once the volume snapshot job begins, its status is tracked in the Job Details window, which you can access by clicking the Jobs button (shown at right) on the Adaptec Storage Manager toolbar. Managing Your IPSAN...
  • Page 81 You can view a list of scheduled volume snapshots by clicking the Schedules button (shown at right) on the Adaptec Storage Manager toolbar. Viewing Volume Snapshots You can view the details of any volume snapshot. To view a volume snapshot: 1 In the Tree Menu, click on the server that contains the volume and volume snapshot, then click Automation.
  • Page 82 The snapshot rollback job is tracked in the Job Details window, which you can access by clicking the Jobs button on the Adaptec Storage Manager toolbar. Note: If your iSCSI Station does not have WMI, you can use the Event Log to track the progress of the snapshot rollback.
  • Page 83 Assigning a New Drive Letter to a Volume You can assign a new drive letter to a volume. You might want to do this to mount a specific volume to a drive that’s used for a different type of information. Caution: Changing a volume’s drive letter also changes the drive letter in the OS, which can disrupt existing drive mappings and applications.
  • Page 84: More Information

    You can remove a volume from a server. When you delete a volume that is the last volume on a server, the server is logged out from the Adaptec iSA1500 subsystem. Before deleting a volume, ensure that your data is adequately backed up.
  • Page 85: Managing Initiators

    Managing Initiators This section provides instructions for using Adaptec Storage Manager to manage your IPSAN’s initiators. You can: View a list of initiators on an iSCSI subsystem. (See ■ View details about a specific initiator. (See ■ Edit an initiator’s details. (See ■...
  • Page 86 Viewing Details About a Specific Initiator To view details about a specific initiator on an iSCSI subsystem: 1 In the Tree Menu, click on the iSCSI subsystem you want, then click Initiators. 2 In the list of Initiator IQNs, click the initiator you want. The Initiator Information window opens, listing the settings for that initiator.
  • Page 87 Creating a New Initiator To create a new initiator: 1 In the Tree Menu, click on the iSCSI subsystem you want, then click Initiators. 2 Click Create Initiator. The Create an Initiator window opens. 3 Enter the new initiator information and settings as desired. 4 Click OK to create the initiator.
  • Page 88: Managing Storage Pools

    A storage pool is a disk drive or collection of disk drives which can be divided into iSCSI targets. You can use one, some, or all of the Adaptec iSA1500 disk drives in a storage pool. You can also create a storage pool from a RAID array.
  • Page 89 Viewing Details of a Specific Storage Pool To view details of a specific storage pool: 1 In the Tree Menu, click on the iSCSI Subsystem you want, then click Storage Pools. 2 In the Application Window, click the pool you want to view. The Pool Information window appears.
  • Page 90 Adding a Disk Drive to a Storage Pool You can add a disk drive to a non-RAID storage pool to increase the capacity of the pool. Note: When no disks are available for use, you can’t add disk drives to a storage pool. Consider removing a disk drive from one storage pool to make it available to another storage pool.
  • Page 91 Note: You can’t remove a disk drive from a RAID pool. If you attempt to remove a disk drive from a pool and are prevented from doing so by Adaptec Storage Manager, that disk drive is part of a RAID pool.
  • Page 92 Exporting a Storage Pool To move a storage pool from one iSCSI subsystem to another, export the pool from the old iSCSI subsystem and import it into the new iSCSI subsystem. To export a storage pool: 1 In the Tree Menu, click on the iSCSI Subsystem you want, then click Storage Pools.
  • Page 93 Importing Storage Pools You can import a storage pool that has been exported by another iSCSI subsystem. (See more information.) To import a storage pool: 1 In the Tree Menu, click on the iSCSI Subsystem you want, then click Storage Pools. 2 In the Application Window, click on the foreign pool that you want to import.
  • Page 94 Deleting a Storage Pool You can delete a storage pool from the iSCSI subsystem. Once a pool is deleted, its associated disk drives are made available again and can be used to create a new pool or be added to existing pools to increase their capacity.
  • Page 95: Deleting Spares

    Deleting Spares To delete a spare: 1 In the Tree Menu, click the iSCSI subsystem from which you want to delete a spare. 2 In the Application Window, click on the Hardware tab. 3 Click on the drive that is the Global Spare. The Disk in Enclosure window opens.
  • Page 96: Managing Iscsi Targets

    Managing iSCSI Targets This section provides instructions for using Adaptec Storage Manager to manage storage pools. You can use Adaptec Storage Manager to: View a list of the iSCSI targets associated with an iSCSI ■ subsystem, as described in the next section on this page.
  • Page 97 The Target Information window opens, displaying all information about the selected target. Note: If the target you selected is a snapshot or a mirror target, Adaptec Storage Manager may display different information than what’s shown in the Figure above. Managing Your IPSAN...
  • Page 98 4 To bring an iSCSI target back online, click Bring Online under Current Target Status. Creating a Mirror with New iSCSI Targets Note: To enable this Adaptec Storage Manager feature you must purchased a license upgrade. Contact your sales representative for licensing options.
  • Page 99 To create an iSCSI target mirror set: 1 In the Tree Menu, click on the iSCSI Subsystem you want, then click iSCSI Targets. 2 In the Application Window, click on the iSCSI target you want. The Target Information window opens, as shown on 3 Click Create Mirror.
  • Page 100 5 Click Next to open the Create Mirror (step 2) window and continue to set the parameters for your mirror target. Adaptec recommends that you only allow one initiator access to each target. Note: You can add a new initiator to the selected iSCSI subsystem from this window, if required.
  • Page 101 7 Click OK to create the mirror target. When the iSCSI target has been created, it is listed in the Targets On This iSCSI Subsystem window. Mirror Target About Your Adaptec Storage Manager for more information.) Managing Your IPSAN 6-28...
  • Page 102 Note: While supported, dynamic discovery is not recommended as some IP routers and switches do not allow certain discovery information to be passed between iSCSI subsystems. 6-25.) About Your Adaptec Storage Manager for more information.) Managing Your IPSAN Creating a page 6-24.
  • Page 103 Figure below. Synchronization Status and Icon Adaptec Storage Manager automatically begins synchronizing the new mirror with the iSCSI target. The status of the synchronization appears under Sync State, as shown in the Figure above.
  • Page 104 Breaking a Facet You can remove (break) a facet from a mirror and use it to create a new iSCSI target. To break a facet: 1 In the Tree Menu, click on the iSCSI Subsystem you want, then click iSCSI Targets. 2 In the Application Window, click on the iSCSI target you want.
  • Page 105 5 Enter a new iSCSI Alias name and set all other parameters for the new iSCSI target, then click OK. The facet is removed from the selected mirror, and a new iSCSI target is created and appears in the list of iSCSI targets. Deleting a Facet You can delete a remote or local facet from a mirror without creating a new iSCSI target.
  • Page 106 Modifying an iSCSI Target To modify an iSCSI target: 1 In the Tree Menu, click on the iSCSI Subsystem you want, then click iSCSI Targets. 2 In the Application Window, click on the iSCSI target you want. The Target Information window opens, as shown on 3 Click Modify Target.
  • Page 107 Growing an iSCSI Target You can resize the iSCSI target to make it larger, if required, as long as you have space available in the target’s storage pool. To grow an iSCSI target: 1 In the Tree Menu, click on the iSCSI Subsystem you want, then click iSCSI Targets.
  • Page 108 Creating an iSCSI Target Snapshot A snapshot is a frozen image of a target (or volume) at a particular point in time. You can take a snapshot in a read-only mode after the target itself has been modified. You may find snapshots helpful when creating backups. If data is changed during a backup, problems may arise and data could be lost.
  • Page 109 Rolling Back a Snapshot A snapshot is a frozen image of a target at a point in time, similar to a backup of that target. You can use a snapshot to roll back the contents of a target to that point in time. Note: Before beginning a snapshot rollback, ensure that all initiators are logged out of the target.
  • Page 110 The snapshot rollback job is tracked in the Job Details window, which you can access by clicking the Jobs button on the Adaptec Storage Manager toolbar. When the job is complete, the target reflects the contents as they were at the time of the snapshot.
  • Page 111: Managing Slp Scopes

    Managing SLP Scopes This section provides instructions for using Adaptec Storage Manager to manage SLP scopes. You can: View a list of SLP scopes on an iSCSI subsystem. (See ■ View details about a specific SLP scope. (See ■ Create a new SLP scope on an iSCSI subsystem. (See ■...
  • Page 112 Viewing SLP Scope Details To view detailed information about a specific SLP scope: 1 In the Tree Menu, click on the iSCSI Subsystem you want, then click SLP Scopes. The SLP Scopes On This iSCSI Subsystem window opens, as shown on page 6-38.
  • Page 113 Creating a New SLP Scope To create a new SLP scope on an iSCSI subsystem: 1 In the Tree Menu, click on the iSCSI Subsystem you want, then click SLP Scopes. The SLP Scopes On This iSCSI Subsystem window opens, as shown on page 6-38.
  • Page 114 3 Click Add SLP Scope Target. The Add Target to SLP Scope window opens. 4 From the Target drop-down box, select the iSCSI target you want to add to the scope. 5 Click OK to add the target to the scope. The new target appears in the list of targets for this scope.
  • Page 115 3 Click Delete SLP Scope Target. The Delete SLP Scope Target window opens. 4 From the list of targets, select the target to be deleted, then click The target is deleted, and no longer appears in the Targets in this SLP Scope window. Deleting an SLP Scope Note: You cannot delete all SLP scopes.
  • Page 116: Managing Devices (Disk Drives)

    Managing Devices (Disk Drives) This section provides instructions for using Adaptec Storage Manager to manage the disk drives in your iSCSI subsystem. You can: View a list of the disk drives in your iSCSI subsystem. (See ■ 6-43.) View details about a specific disk drive. (See ■...
  • Page 117 Managing Your IPSAN 3 Click the slot number of the disk drive you want. The Disk in Enclosure window opens, showing the details and status for the selected disk drive. 6-44...
  • Page 118: Managing Network Settings

    Managing Network Settings This section provides instructions for using Adaptec Storage Manager to manage the network settings for your iSCSI subsystem. You can use Adaptec Storage Manager to: View network information, as described on this page. ■ Set iSCSI subsystem network details. (See ■...
  • Page 119 Setting Network Details To set the iSCSI subsystem’s network details: 1 In the Tree Menu, click on the iSCSI Subsystem you want. 2 In the Application Window, click the Network tab. 3 Click Set Network Details. The Set Network Details window opens. 4 Change the network information, as required, then click OK to save the changes.
  • Page 120 Managing Your IPSAN Setting SNMP Details To set the iSCSI subsystem’s SNMP details: 1 In the Tree Menu, click on the iSCSI Subsystem you want. 2 In the Application Window, click the Network tab. 3 Click Set SNMP Details. The Set SNMP Details window opens. 4 Enter or change the SNMP details, as required.
  • Page 121 Viewing and Changing Network Interface Settings You can view or change the network interface settings for the interface ports of a specific iSCSI subsystem. To view or change interface settings: 1 In the Tree Menu, click on the iSCSI Subsystem you want. 2 In the Application Window, click the subtab of the interface you want to configure.
  • Page 122 3 Select Set Interface... The Set Interface Details window opens. 4 Change the interface details as required. Note: Adaptec recommends that you not enable DHCP. Caution: Changing the IP address during normal operation may result in data loss if iSCSI stations are connected.
  • Page 123: Managing Portals

    Managing Portals A portal (also known as a network interface or network portal) is a combination of an initiator’s IP address and port. When you add a new server as an agent (see automatically discover new iSCSI adapters; if this does not happen automatically, you can add them manually using portals.
  • Page 124: Enabling Network Drive Sharing

    3 Click OK to confirm drive sharing. Upgrading the Subsystem Firmware To maintain the high performance of the Adaptec iSA1500, ensure that you are using the most recent version of the firmware. Download firmware upgrades as they become available from the...
  • Page 125: Managing The Iscsi Subsystem's Settings

    5 Follow the on-screen instructions to complete the update. Managing the iSCSI Subsystem’s Settings This section provides instructions for using Adaptec Storage Manager to manage the settings on your Adaptec iSA1500 Storage Array. You can use Adaptec Storage Manager to: Set the iSCSI subsystem date or time. (See ■...
  • Page 126 Setting the Date and Time To set the date and time on a specific iSCSI subsystem: 1 In the Tree Menu, click the iSCSI subsystem you want. 2 On the System tab, click Set iSCSI Subsystem Time. The Set iSCSI Subsystem Local Time window opens. 3 Use the drop-down boxes to enter the current date and time, then click OK.
  • Page 127 All events are cleared from the selected iSCSI subsystem. Getting a Diagnostic Dump from the iSCSI Subsystem If you need to seek help from Adaptec Technical Support, you may be asked to create a diagnostic dump file, which contains all existing log files from an iSCSI subsystem, and email this external file to Adaptec Technical Support.
  • Page 128 3 Type in a name for the file, then click OK. 4 In the Adaptec Storage Manager toolbar, click the Diagnostics button, shown at right. The Diagnostic Dumps On This SAN window opens. 5 Click the Download Dump icon of the filename you want.
  • Page 129 Rebooting and Shutting Down the iSCSI Subsystem Caution: This option should be used with extreme caution. Access to all storage information will be lost during the iSCSI subsystem shutdown and reboot. To reboot or shut down the iSCSI subsystem: 1 Save all data and close all files. 2 In the Tree Menu, click the iSCSI subsystem you want.
  • Page 130: Managing Events

    Viewing Event Details Configuring the Event Log Managing Active Events The Adaptec Storage Manager Event Log records any IPSAN component errors or events as they occur. Your Management Station, iSCSI Stations, and Adaptec iSA1500 subsystem all generate events that appear in the Event Log.
  • Page 131: Opening The Event Log

    Opening the Event Log You can view the Event Log at any time by clicking the Events button in the toolbar (shown at right). The Events Search Filter window opens and displays the Event Log. In the Event Log, events are listed with both brief summaries and detailed descriptions of what occurred.
  • Page 132: Searching The Event Log

    Down—Indicates that the system is unresponsive to all ■ inquiries. This category is most often used when the Adaptec iSA1500 is powered down or is being rebooted. The component that causes an event appears in Adaptec Storage Manager with the same status as the event itself. For instance, if an iSCSI Station issues a Warning event, the icon for that iSCSI Station changes to reflect Warning status.
  • Page 133: Viewing Event Details

    Sources—Limits the list of events to only those from the servers ■ or iSCSI subsystems you want to monitor. To select multiple servers and iSCSI subsystems, press and hold the Ctrl key while selecting sources. When you have defined the search criteria, click Search to view a list of the specified events.
  • Page 134: Configuring The Event Log

    Configuring the Event Log You can customize event notifications by: Configuring SNMP. (See ■ Configuring email notifications. (See ■ Defining event notifications for events and errors. (See ■ Opening the Event Configuration Window To open the Event Configuration window, 1 Open the Event Log. (See 2 Click the Event Configuration icon, shown at right.
  • Page 135 Managing Events Configuring SNMP To configure SNMP for all email notifications: 1 Open the Event Log. (See page 7-2.) 2 Click the Event Configuration icon (see Step 2 on page 7-5). 3 Click Configure SNMP. The Configure SNMP for Events window opens. 4 Change the SNMP details as required, then click OK.
  • Page 136 Configuring Email Notifications Note: You must have a routable SMTP email server that does not require authentication to enable email notifications. To set up network details for the email server for event notification: 1 Open the Event Log. (See 2 Click the Event Configuration icon (see 3 Click Configure Email Server.
  • Page 137 Defining Event Notifications for Events and Errors To specify how events of a different severity level are handled and who receives the notification: 1 Open the Event Log. (See 2 Click the Event Configuration icon (see 3 Click Set Email and SNMP Notifications. The Set Email and SNMP Notifications window opens.
  • Page 138: Managing Active Events

    Managing Active Events By default, all new events—except Information-level events—are logged as active events (with the active keyword attached). System status comes from the highest-status-level active event. To return the system status to normal, you must deactivate any event with a status level higher than Information. (See Severity Levels on page For instance, assuming that the system is otherwise normal, a Warning-level event elevates the system status to Warning.
  • Page 139 You can delete an event or group of events so that they no longer appear in the Adaptec Storage Manager window. Note: Deleted events are not cleared from the iSCSI subsystem. To clear all events from your Adaptec iSA1500, see All Events on page To delete an event or group of events: 1 Open the Event Log.
  • Page 140: Using Cli

    Using CLI In this Chapter... Overview of CLI Setup Wizard Authentication Commands Device Commands Diag Commands Events Commands Image commands Initiator / iSCSI nodes Commands Interface Commands Ipsec Commands iSCSI Commands Mirror Commands Network Commands Pool Commands Route Commands SLP Scope Commands Service Commands Target Commands SNMP Commands...
  • Page 141 System Commands UPS Commands Using CLI 8-65 8-66...
  • Page 142: Overview Of Cli

    Overview of CLI The CLI software is a terminal-based command line interface that allows you to monitor and manage the Adaptec iSA1500 Storage Array subsystem. iSCSI targets that will appear as local disk storage on your server can be created and managed.
  • Page 143 Note: If you forget your password(s) you can log into the system by physically attaching a serial cable to the Adaptec iSA1500 Storage Array and using a VT100 terminal emulation program, such as hyperterminal. (For terminal emulation...
  • Page 144 Character Case and White Space The CLI is not case-sensitive. Commands and parameters can be typed using any combination of upper and lower case letters IQNs, iSCSI Aliases, and initiator names must be entered in lower- case letters. Commands and parameters are separated with one or more spaces and/or tab characters (white space).
  • Page 145 Most commands and parameters can be abbreviated to their shortest unique abbreviation. For example, if you are in the Operator level and wish to change to the Administrator level, all you have to type is ad as there are no other commands starting with “ad”.
  • Page 146 Help Command completion can be requested at any time by pressing the Tab key. This gives a list of the words that may be added to the command line, taking into account what has already been typed. (See the Note on page 8-5 key.) Additionally, you can request help at any time by typing help or ?
  • Page 147 Global Commands Global Commands (commands that are always available) are summarized in Table each Global Command. Table 8-3 Global Commands Quick Reference Command Description administrator Enter Administrator level. A password may be required. (See authentication Manage users and passwords. (See cache Manage cache options for the IPSAN.
  • Page 148 Table 8-3 Global Commands Quick Reference (Continued) Command Description pool Control device pools. (See route Control static routes. (See save Write all changes to flash memory. (See scope Manage SLP scopes. (See setup (See service Manage services running on the system. (See show Display information about the system.
  • Page 149 Using CLI Help | ? [all] | [global] | [help | ?] | [keys] Command With no parameters entered, the following command prints the commands that are available in the current menu context; but not the global commands unless you are in the global menu context: Help | ? [all] | [global] | [help | ?] | [keys] Using the optional global parameter lists all of the commands that are available for the current context and the global commands.
  • Page 150 Save Command Type save to ensure that any changes have been written to flash. Changes are normally written at a time chosen by the underlying libraries. Show Option Command Type show option to display information about various parts of the system. Valid values for option are: Table 8-4 Valid Values for Show Option Command Value authentication...
  • Page 151: Setup Wizard

    Setup Wizard The Setup Wizard runs if the system is in factory default state when the CLI is started. You can also run it with the setup command. The Setup Wizard helps you enter the information required to connect the system to a local network. The Setup Wizard steps you through a set of questions (as described on Using the Setup Wizard on page...
  • Page 152 3 Define administrator password You are prompted to define if an Administrator password is required. If one is required, you are prompted to enter the password twice. Type CTRL(C) to leave the password unchanged. Type return at both prompts to leave the unit with no Administrator password.
  • Page 153 10 DNS servers Type the IP numbers for up to 3 machines that will act as DNS servers. Type false to clear the list of DNS servers. 11 Save new configuration When the Setup Wizard is finished, the system is configured but the new configuration is not saved immediately in nonvolatile memory.
  • Page 154: Authentication Commands

    Authentication Commands These commands manage users and passwords for authentication access to the targets. The commands are available after the authentication command with no parameters, or as global commands by preceding them by authentication. Table 8-6 lists the Authentication Commands. More details about each command are provided after the Table.
  • Page 155: Device Commands

    Device Commands These commands manage device discovery. They are available after a device command with no parameters or as global commands by preceding them by device. Table 8-7 lists the Device Commands. More details about each command are provided after the Table. Table 8-7 Device Commands Command Parameters...
  • Page 156 info [device_list] Command Output information about all disks. If the device_list parameter is given, information about the listed disks is supplied. If device_list is a single device, it’s identical to using the device manage device info command. list [usage] [interface] [type] Command List all known physical devices.
  • Page 157 Table 8-10 Valid type Values Value Description disk Just disk devices robot Robot, autochanger or jukebox devices raid RAID devices tape Just tape devices manage device Command These commands manage disks found using device discovery. They are available after a device manage device command with no parameters, or as global commands by preceding them with device manage device.
  • Page 158: Diag Commands

    statistics [device_list] Command Output the statistics of the disks in the device_list; or all of the disks if no device_list is supplied. unused Command List those disks which have not been allocated to a pool or passthrough volume. Note: This is an alias for device list unused. Diag Commands These commands run diagnostics tests.
  • Page 159: Events Commands

    proc path Display the unformatted output from doing a cat /proc/path. The path value may contain / characters but the resulting pathname cannot be outside the /proc directory tree. The resulting pathname must be a file. The case of the file and directory names must be correct as upper case and lower case letters are significant for file and directory names.
  • Page 160 Details about each command are provided after the Tables. Table 8-14 Events Action Commands Command Parameters options list remove all | options options In the commands shown in more of the options shown in Table 8-15 Events Action Command Options Option Description active...
  • Page 161 If several actions are on the line and one takes a parameter, the word after the action will be taken as that parameter even if it also a valid action. For instance, email shutdown will be interpreted as an email to shutdown, not as an email action with no parameter followed by a shutdown action).
  • Page 162 Using CLI Select every event. It must be the only command on the line. for relative_period This command may not be combined with the to command. The relative_period is relative to the date and time specified by the from command or by the oldest event if from is not supplied.
  • Page 163 info Command Display the values associated with the event log: Size of the event log ■ List of actions for each level. ■ Current status, which means the highest active severity level Events Report Commands Table 8-17 lists commands that are used to generate event log reports.
  • Page 164: Image Commands

    Image commands Image commands are available after the image global command and manage the images used to boot the unit. They can also be run as global commands by preceding them by image. Table 8-18 lists all Image commands. Details about each command appear after the Table.
  • Page 165: Initiator / Iscsi Nodes Commands

    upload ymodem | zmodem | url Upload a new image to be used the next time the unit is rebooted. If the upload is successful the new image will be used the next time the unit is booted and the current image is set as the alternative. ymodem zmodem going to be used to transfer the new image.
  • Page 166 create name iqn [align boolean] [piggyback boolean] [ping boolean] Create a new remote iSCSI node with the local name where iqn is the IQN of that node. The align, piggyback and ping parameters set up initial values for the node's attributes; in all cases the default value is true. They are described in the iscsi nodes manage node commands (see page...
  • Page 167: Interface Commands

    align boolean Change whether Protocol Data Units (PDUs) should be aligned on ethernet frames info Output information about this remote iSCSI node including an indication of which other entities, such as targets, refer to it. piggyback boolean Change the piggyback SCSI status of this remote iSCSI node. ping boolean Change whether to ping periodically to test the connection.
  • Page 168 info [interface_list] Output details about the specified interfaces including statistics. If no interface_list parameter is supplied, the details about all of the interfaces are output. See the Interface Manage Interface Info command (see Table 8-22 on page 8-30) for more information about what is displayed by this command.
  • Page 169 Table 8-22 lists all Interface Manage commands. More details about each command appears after the Table. Table 8-22 Interface Manage Commands Command Parameters broadcast ip_numb | high | low dhcp boolean info ip_numb[/mask] bytes netmask netmask speed value [full] statistics broadcast ip_numb | high | low Set the broadcast address.
  • Page 170 info Show the details about the interface. This includes: IP number ■ Netmask ■ Broadcast address ■ MAC address ■ Whether DHCP is enabled ■ Whether it is configured (up) ■ Speed of interface ■ If DHCP is enabled the output will show the active values for the interface plus the values which will be applied if DHCP is disabled.
  • Page 171 netmask netmask Set the interface's netmask to be the value supplied. This command may be combined with the ip and netmask commands on a single line. The ip command describes the default value for this option if just the IP number is changed. If DHCP is enabled this command changes the stored value which will be used if DHCP is disabled.
  • Page 172: Ipsec Commands

    Ipsec Commands These commands manage ipsec connections. They are available after the global ipsec command. They can also be used as global commands by preceding them with ipsec. Table 8-23 lists all Ipsec commands. More details about each command appear after the Table. Table 8-23 Ipsec Commands Command Parameters...
  • Page 173 Using CLI enable all | name_list Enable the connections listed in the name_list list so they can now be used. If all is used, every connection will be enabled. info Show information about the known connections. If the name_list list is supplied, information about just those connections will be shown;...
  • Page 174 psk local | (remote_host username [password password] location [name name]) The parameters to import a Public Shared Key are the same as for the RSA key file. However there is an option for that key to be the unit's local PSK in which case just the keyword local is used. x509 [dn dist_name] For a X509 connection the Distinguished Name which defines the certificate for the remote end must be supplied as the dist_name...
  • Page 175 Using CLI dynamic name id id psk | rsa | x509 policy_parameters Create a dynamic connection referred to by name. The connection is defined by the id value of the remote end. An ID can be an ip_numb, or any string, which is normally the remote host's name. Strictly, it should be preceded by an '@' although this will be added if it is not supplied.
  • Page 176 Table 8-25 lists all ipsec key commands. More details about each command appear after the Table. Table 8-25 ipsec key Commands Command Parameters clear export psk | rsa name remote_host username [password password] location generate psk | rsa info [psk | rsa] clear This command will clear all of the secrets stored in the unit.
  • Page 177 Table 8-26 lists all ipsec manage name commands. More details about each command appear after the Table. Table 8-26 ipsec manage name Commands Command Parameters arrival-check boolean authentication ah | esp compression boolean connect disconnect dist_name encryption boolean host remote_host info interfaces interface_list...
  • Page 178 Using CLI compression boolean Whether to include IPCOMP compression. connect Establish this connection. disconnect If this connection is established, break it down. dn dist_name This is an alias for policy x509 dn dist_name. encryption boolean Whether to encrypt the data. host remote_host Change the host for the remote end of a host or network connection.
  • Page 179 Using CLI pfs boolean Whether to enable PFS. policy psk (local | key_host key_user [password password] key_location) policy rsa key_host key_user [password password] key_location policy x509 dn dist_name Define which authentication policy to use for this connection and get the key or certificate from a remote server. The actual format of the command depends on the type of policy selected.
  • Page 180 start-up boolean Whether the connection should be up when the system starts. tunnel boolean Whether this is a tunnel connection. ipsec x509 commands These commands manipulate the X509 certificates. These commands are available after the ipsec x509 command. They can also be run as global commands by preceding them by ipsec x509 or by preceding them with x509 from the ipsec context.
  • Page 181: Iscsi Commands

    info [ca | crl | local [certificate_list]] Show information about some of the stored certificates. If no parameters are given, information about all of the certificates is shown. Limit the information to all certificates of a certain type by not supplying certificate_list; limit information to specific certificates of a certain type by supplying certificate_list.
  • Page 182 At least one must be defined. port number Define the port number to use. Note: Adaptec strongly recommends that you not change the iSCSI port number. r2t [bidiinitial boolean] [initial boolean] [outstanding value] Set the max outstanding R2T value. Also, whether the bidiInitial and/or the initial values should be enabled.
  • Page 183: Mirror Commands

    relaxed boolean Define whether the iSCSI service should be relaxed. timeout [retain relative_period] [wait relative_ period] Define the default time to wait to retain date and/or to wait for data. At least one parameter must be defined. Mirror Commands These commands manage mirrored targets. They are available after the global mirror command.
  • Page 184 Using CLI create name target size size local pool_list [remote async boolean [queue [blocking] pool [size size] [fixed | variable]] iqn_list { convert target target create name target size size local pool_list [remote async boolean [queue [blocking] pool [size size] [fixed | variable]] iqn_list } Create a new mirror set target to be called target consisting of some local and optionally some remote facets.
  • Page 185 list [local | remote] List all mirror targets. If the local filter is supplied only mirrors which have no remote facets will be listed. If the remote filter is supplied only those mirrors which have at least one remote facet will be listed.
  • Page 186 Table 8-30 mirror manage target Commands Command Parameters size bytes synchronize stop | [[local pool_list] [remote iqn_list]] unrestricted Note: There are several commands which take a list of local pools followed by a list of remote IQNs. Normally lists are terminated by the end of the line;...
  • Page 187: Network Commands

    remove [local pool_list] [remote iqn_list] Remove the facets in the pool_list and iqn_list lists. The space used by local facets is returned to the pool for reuse. It is legal to reduce the number of facets to a single local facet, in which case the target reverts to being an ordinary target.
  • Page 188 Using CLI Any combination of the commands marked as capable of being combined may be put on a single command to allow the unit's network identity to be set with one command. dns ip_numb_list | false Define a new list of DNS servers where ip_numb_list is a list of up to three IP numbers of name servers to use.
  • Page 189: Pool Commands

    Table 8-32 Parameter Options Parameter identity interfaces smtp ntp ip_host | false Set the NTP server to be ip_host. For no NTP server a valid false value should be given. If the ip_host name is a valid string for a false value enclose the ip_host string in "" characters.
  • Page 190 Table 8-33 Pool Commands Command Parameters identify [start | stop] [name_list] import name_list info [name_list] list [local | foreign] manage name scan unused available / unused List all of the devices that are not associated with a device pool. create name name [raid basic] device_list Create a new device pool called name with no RAID and define a list of devices to add to the new pool.
  • Page 191 Using CLI identify [start | stop] [name_list] Identify the devices which make up the pools in name_list, or all of the disks which are assigned to any pool if name_list is not supplied. Disks are identified by flashing their LED for 30 seconds or until a pool identify stop or device identify stop command is given for that disk.
  • Page 192 Table 8-34 Pool manage pool Commands Command available cache info remove add device_list Add the list of specified devices to the device pool. All of the devices in device_list must have the same block size as the size allocated to the pool. available List the devices which have not been allocated to any pool and which could be allocated to this pool.
  • Page 193: Route Commands

    Route Commands These commands control static routes. They are available after the global route command. They may also be used as global commands by preceding them by route. Table 8-35 lists all Route commands. More details about each command appear after the Table. Table 8-35 Route Commands Command Parameters...
  • Page 194: Slp Scope Commands

    delete destination/netmask [gateway] or delete destination netmask [gateway] Remove the existing static route defined by destination and netmask. If there is only one existing route that matches destination and netmask, gateway is not required; but if it is supplied it must match the static route. If there are several static routes that match destination and netmask, gateway must be supplied to distinguish which static route to remove.
  • Page 195 destroy name_list Destroy the named SLP scopes in the name_list list. info [name_list] Show information about all of the SLP scopes if name_list is not supplied, or the SLP scopes named in the name_list list if it is supplied. This is the same as the scope manage name info command if name_list consists of a single scope.
  • Page 196: Service Commands

    remove target_list Remove the targets in the target_list list from the scope. set target_list Replace the list of targets in the scope with the new list in target_list. Service Commands These commands manage the services running on the system. They are available after the global service command.
  • Page 197 start [force] service_list This will cause the named services to start. If the optional force parameter is used, it also forces essential services to start. stop [force] service_list Stop the named services. If the optional force parameter is used, it also forces those dependant services to stop. Service Manage Service Commands These commands control aspects of the named service.
  • Page 198: Target Commands

    start [force] Start this service. The optional force parameter will cause services on which this service depends to be started also. This is the same as the service start service_list command (see page 8-57) where service_list is just this service. stop [force] Stop this service.
  • Page 199 Using CLI create target pool [size size | remainder] (unrestricted | restricted initiator_list) Create a new target with a name of target. The iqn name used to access this target by an initiator will be automatically generated. The target will take its space from the named pool. If the size option is not used, all of the available space in that pool will be used;...
  • Page 200 Table 8-41 Filters Filter acl initiator authentication srp | chap | kerberos | false interface ethernet mirror local | remote | true | false pool pool restricted scope scope snapshot parent | true | false unrestricted Target manage target Commands These commands manipulate the attributes of the specified target.
  • Page 201 Table 8-42 Target Manage Target Commands Command Parameters allow [ro] initiator_list authentication srp | chap | kerberos | false deny initiator_list info interface all | Interface_list rename target restricted scope scope_list size bytes unrestricted allow [ro] initiator_list Give a list of initiators to add to the list of initiators which may access this target authentication srp | chap | kerberos | false Specify the authentication to use for this target.
  • Page 202: Snmp Commands

    rename target Define a new name (iSCSI alias) for this target. restricted Change the target so its ACL is active. This will restrict access to the target to those initiators defined by the target manage target allow command. scope scope_list Redefine a new list of SLP scopes to which the target should belong.
  • Page 203 Using CLI agent [community community] [port port] Define a new community and/or a new port used by the agent to access the unit. One or both of the parameters must be supplied in any order but it is illegal to have no parameters. If one parameter is supplied the stored value for the other is left unchanged.
  • Page 204: System Commands

    The trap destination used by SNMP actually consists of a single string or the three values that may be defined by this command. The default trap community can also be stored separately. If the community parameter is given by itself, the argument will be stored as the default community;...
  • Page 205: Ups Commands

    info Display this information about the operating system: BIOS version and date ■ Spitfire software version and date ■ Hardware serial number ■ Active boot image ■ Uptime since last boot ■ Current date, time and time zone ■ keyboard layout Define the type of keyboard layout for any keyboard attached to the the console.
  • Page 206 Table 8-45 UPS Commands Command Parameters info monitor usb | snmp | false | ip_host permit status thresholds [unit time] [initiators time] [cache time] info Show information about the UPS being monitored, and those hosts which are permitted to monitor the UPS if it is local to this unit. monitor usb | snmp | false | ip_host Specify which UPS to monitor.
  • Page 207 UPS Permit Commands These commands manipulate the list of hosts which may monitor the UPS if it is controlled by this unit. They are valid even if at the moment the UPS is not controlled from this unit. These commands are available after the ups permit command.
  • Page 208: Troubleshooting

    Troubleshooting In this Chapter... General Troubleshooting Tips Hot-swapping Disk Drives This chapter provides basic troubleshooting tips and suggestions for your Adaptec iSA1500 subsystem.
  • Page 209: General Troubleshooting Tips

    General Troubleshooting Tips If you experience trouble installing or using your Adaptec iSA1500, try these troubleshooting tips: Ensure that all devices are connected to a power source and ■ powered on. Replace the power cables, if required. Ensure that all Ethernet cables are properly and fully connected.
  • Page 210 To hot-swap a disk drive: 1 Remove the front bezel of the enclosure, as shown. 2 Release the extraction lever of the failed disk drive and gently pull it open. 3 If the enclosure is powered on, allow the disk drive to spin down fully.
  • Page 211: Index

    8-48 Access Control Lists. See ACL access levels Administrator level existing user accounts Manager level Operator level accounts. See user accounts activating licenses Adaptec iSA1500 management options Adaptec Storage Manager access levels custom installations installing 3-11 iSCSI Stations 3-13 licenses...
  • Page 212 commands 8-26 interface commands 8-32 ipsec commands 8-33 iSCSI commands 8-42 keyboard layout 8-66 listing known users and passwords 8-15 logout command 8-10 mirror commands 8-44 network commands 8-50 notifications 8-20 operator command overview password command passwords pool commands 8-50 quit command 8-10 rebooting...
  • Page 213 diagnostic commands diagnostic dump 6-54 Diagnostics button 6-55 disk drives adding to storage pools detailed information failed drives flashing LEDs 6-20 hot-swapping installation managing 6-43 to ?? removing from storage pools 6-18 storage pools 6-16 viewing 6-43 DiskPart 1-4, 3-10 DNS server domain name Down status...
  • Page 214 8-66 Information event Initialization Wizard initiator/iSCSI nodes commands 8-26 8-28 initiators creating 6-14 definition deleting 6-14 installation Adaptec Storage Manager agents 3-14 bezel cables configuring network disk drives enclosure initiators into rack iSCSI subsystem 3-16 Microsoft DiskPart Microsoft iSCSI Service...
  • Page 215 6-36 mirrored volumes mirroring existing iSCSI targets 6-29 mirroring iSCSI targets mirrors breaking facets deleting facets facets monitor named scopes 2-4, navigating Adaptec Storage Manager netmask, management network commands connections drive sharing information interfaces parameters portals network parameters...
  • Page 216 password command 8-10 passwords 3-8, pool commands 8-50 pools. See storage pools. portals 6-50 deleting 6-51 managing 6-50 ports Power button powering on quit command 8-10 rack installation locating rebooting iSCSI subsystem with CLI 8-66 Refresh icon reports in CLI route commands 8-54 routes...
  • Page 217 iSCSI targets 6-16 managing 6-15 6-21 online status 6-20 removing disk drives viewing lists 6-15 volume types system commands 8-65 system information 8-66 system requirements system services 8-57 system status with CLI 8-66 Tab key target commands 8-59 targets. See iSCSI targets task list (no WMI) 4-11 task list (WMI)
  • Page 218 Adaptec, Inc. 691 South Milpitas Boulevard Milpitas, CA 95035 USA ©2004 Adaptec, Inc. All rights reserved. Adaptec and the Adaptec logo are trademarks of Adaptec, Inc. which may be registered in some jurisdictions. Part Number: 513674-06, Ver. AC, LB 05/04...

Table of Contents