Page 3
Adaptec Customer Support If you have questions about installing or using your Adaptec product, check this document first—you will find answers to most of your questions here. If you need further assistance, use the support options listed below. Technical Support Identification (TSID) Number ■...
Page 4
German: To speak with a Technical Support Specialist, call +49 89 43 66 55 22, ■ Monday to Friday, 9:00 to 17:00, CET. For support via e-mail, submit your question to Adaptec’s Technical Support Specialists at French: To speak with a Technical Support Specialist, call +49 89 43 66 55 33, ■...
Page 5
Limited 3-Year Hardware Warranty 1. Adaptec, Inc. (“Adaptec”) warrants to the purchaser of this product that it will be free from defects in material and workmanship for a period of three (3) years from the date of purchase. If the product should become defective within the warranty period, Adaptec, at its option, will repair or replace the product, or refund the purchaser’s purchase price for the...
Page 6
APPLICABLE TO THE SOFTWARE, YOU MAY RETURN THE ENTIRE UNUSED PRODUCT FOR A FULL REFUND. In return for acquiring a license to use the Adaptec software (“Software”) and the related documentation, you agree to the following terms and conditions: 1. License. This Agreement grants you, the Licensee, a license to: a.
Page 7
This warranty gives you specific legal rights and you may also have other rights which vary from state to state. 9. The entire liability of Adaptec and its licensors, and your exclusive remedy for a breach of this warranty, shall be: a.
Page 8
Agreement, in writing signed by an officer of Adaptec. You assume full responsibility for the use of the Software and agree to use the Software legally and responsibly. This Agreement shall be governed by California law, except as to copyright matters, which are covered by Federal law.
Page 9
■ TUV CB Certified CE Mark The Adaptec iSA1500 storage enclosure will be CE marked to indicate compliance with the European Low Voltage Directive and the EMC directive. The Adaptec storage enclosure is certified to Class A emission limits. 1. Product Safety: EN60950 ITE 2.
Page 10
■ ■ Power Frequency Magnetic FieldsCENELEC EN61000-4-8 ■ Power Line Interruption Electromagnetic Radiation The Adaptec Storage Enclosure is labeled with the following compliance marks: United States FCC standard, 47 CFR Part 15 ■ ■ Canadian standard, Industry Canada ICES-003 ■...
Introduction About This Guide 1-2 Kit Contents 1-2 Features of the Adaptec iSA1500 1-3 Managing the Adaptec iSA1500 1-3 System Requirements and Operating System Support 1-4 About Your Adaptec Storage Manager License 1-4 Introduction to iSCSI and IPSANs What is iSCSI and How Does It Work? 2-2...
Page 12
Basic IPSAN Security Recommendations 5-2 Understanding Access Levels 5-2 Creating User Accounts and Assigning Passwords 5-3 Editing User Accounts 5-4 Generating SAN Passwords 5-4 Setting iSCSI Target Authentication 5-5 Using Access Control Lists 5-7 Managing Your IPSAN Viewing and Activating Software Features 6-2 Managing Volumes 6-3 Managing Initiators 6-12 Managing Storage Pools 6-15...
Features of the Adaptec iSA1500 Managing the Adaptec iSA1500 System Requirements and Operating System Support About Your Adaptec Storage Manager License This chapter introduces the features of the Adaptec Storage Array iSCSI-to-SATA RAID subsystem, lists the system requirements, and provides software license information. ®...
It also assumes that you have basic knowledge of Redundant Array of Independent Disks (RAID) technology. Kit Contents Your Adaptec iSA1500 Storage Array subsystem kit includes these components: Adaptec Quick Install iSA1500 CD...
Features of the Adaptec iSA1500 These Figures illustrate the main features of the Adaptec iSA1500 Storage Array subsystem. Front of Enclosure (Behind Bezel) Rear of Enclosure Fans Power Port Keyboard Port Mouse Port Managing the Adaptec iSA1500 You can manage your Adaptec iSA1500 subsystem and IPSAN...
Product-specific License Keys are required to unlock these features in your Adaptec iSA1500 subsystem. For example, you need a License Key to enable synchronous mirroring or increase the number of snapshots. (See To purchase a License Key, contact your Adaptec Reseller or refer...
What is Adaptec Storage Manager’s Role? Planning Your IPSAN This chapter provides a brief introduction to iSCSI and IPSAN technology, gives an overview of how your Adaptec iSA1500 Storage Array components work together, and provides sample topologies to help you plan your IPSAN.
Introduction to iSCSI and IPSANs What is iSCSI and How Does It Work? This section provides a general overview of iSCSI technology and explains how it’s used for networking. What is iSCSI? When SCSI command blocks are encapsulated with IP and transferred over an IP network, it is known as Internet SCSI (iSCSI).
Page 20
Introduction to iSCSI and IPSANs How does iSCSI Work? iSCSI communicates over IP networks through the use of iSCSI initiators and targets. iSCSI is bi-directional, so the same protocol is used for both requests for data and responses to requests. The initiator always initiates a command or data sequence.
Page 21
Storage pooling becomes a very powerful tool when used with SANs. Storage pools can be created and expanded using all the storage available on an Adaptec storage enclosure. The SAN is not restricted by the amount of storage physically attached to a single machine.
What is an IPSAN? An IPSAN is a collection of iSCSI initiators and targets grouped together into a network. A basic IPSAN may consist of one iSCSI initiator and one iSCSI target, as shown in the Figure below. However, the real benefits of iSCSI technology and IPSANs are realized when there are greater numbers of initiators and targets.
Software developers use WMI as a kind of “shortcut” when creating software functions, referring to the WMI code instead of creating new code. Without WMI support, automated features of the Adaptec Storage Manager software will not work on your computer and will have to be performed manually.
What is Adaptec Storage Manager’s Role? The Adaptec Storage Manager is a Web-based graphical user interface (GUI) that provides secure management of your Adaptec iSA1500 Storage Array subsystem and Windows servers. You can use Adaptec Storage Manager to complete automated volume creation and to manage storage pools, iSCSI targets, mirrors, snapshots, and events.
Page 25
Installations Server Storage Enclosure Adaptec Storage Manager must be installed on the Management Station and all iSCSI Stations on your IPSAN. Note: Only one Management Station is allowed on your IPSAN. (Your Management Station can also be an iSCSI Station.)
Planning Your IPSAN This section outlines the issues and concepts you should understand as you plan your IPSAN. Basic and complex IPSAN configurations are provided as sample solutions. Invalid IPSAN configurations are also included to help you avoid mistakes. What’s a Subnet? A subnet (short for subnetwork) is a separate identifiable portion of a network.
Page 27
Station are connected to the server over Subnet_2. The file server has a single iSCSI port. This configuration must be managed through the Management port (Eth0). iSCSI Stations Management Station Subnet_2 Subnet_2 Subnet_2 Switch Subnet_2 Network File Server iSCSI Connection Adaptec iSA1500 Subnet_1 2-10...
Page 28
Note: A system with dual iSCSI ports provides enhanced performance compared to a system with a single iSCSI port. The Management port (Eth0) is connected to the general network (subnet_2) for remote management with Adaptec Storage Manager or the CLI, and remote event notification. iSCSI Stations...
Page 29
This configuration is managed through Management port Eth0 over subnet_2. iSCSI Stations Subnet_2 Network iSCSI Connection Subnet_2 Introduction to iSCSI and IPSANs Management Station Subnet_2 Switch Subnet_2 Network Subnet_2 iSCSI Subnet_1 Subnet_1 Connection GbE Switch iSCSI Connection Adaptec iSA1500 Subnet_1 Subnet_2 2-12...
Page 30
Stations Subnet_2 Network Subnet_3 Subnet_1 GbE Switch Subnet_3 Subnet_2 Note: This topology can be used for cluster operation. Introduction to iSCSI and IPSANs Management Station Subnet_2 Switch Subnet_2 Network Subnet_3 Subnet_1 GbE Switch Subnet_1 Adaptec iSA1500 Subnet_2 iSCSI Connections 2-13...
Page 33
The iSCSI Stations in this example will not be able to access the database server. Subnet_2 GbE Switch Subnet_2 Introduction to iSCSI and IPSANs iSCSI Stations Subnet_2 Switch Subnet_2 Subnet_1 Subnet_1 Adaptec iSA1500 Subnet_2 Subnet_3 2-16...
Page 34
In this invalid configuration, both iSCSI interfaces are on the same subnet. This configuration may work at first, but problems will occur if a cable is pulled, or if the interface fails. iSCSI Stations Subnet_2 Subnet_2 Subnet_2 Switch Subnet_2 Subnet_2 Subnet_1 Subnet_1 GbE Switch Adaptec iSA1500 Subnet_1 Subnet_1 Subnet_2 2-17...
Page 35
Management port, which is a slower port. The configuration might appear to be working correctly, but performance would be very low (about 10%). iSCSI Stations Subnet_2 Subnet_2 Subnet_2 Switch Subnet_2 File Server Subnet_1 GbE Switch Adaptec iSA1500 Subnet_1 Subnet_1 2-18...
Adding Agents Configuring the Adaptec iSA1500 Subsystem This chapter guides you through the installation and basic set-up of the Adaptec iSA1500 Storage Array subsystem and Adaptec Storage Manager software. For a smooth and trouble-free installation, thoroughly review this chapter before you begin, and perform the tasks in the order in which they are presented.
Leave enough room behind the Adaptec iSA1500 subsystem or ■ rack for servicing and to allow for sufficient airflow. If you plan to mount the Adaptec iSA1500 subsystem into a ■ rack, select a suitable location that is clean, dust-free, well- ventilated, and close to a grounded power outlet.
Installing the Hardware This section explains how to complete the physical installation of the Adaptec iSA1500 hardware. Installing the Chassis in a Rack (Optional) Note: If you are not installing the chassis in a rack, skip to Connecting the Cables and Powering On on page...
Page 39
3 Repeat until all four disk drives are installed. Connecting a Monitor and Keyboard To configure the Adaptec iSA1500, connect a monitor to the Video port and a keyboard to the Keyboard port. (The ports are shown in the Figure in...
Page 40
Connecting the Cables and Powering On To connect and power on your subsystem: 1 Use GbE network cables to connect the Adaptec iSA1500 to the network. Connect Management Port (Eth 0) to IPSAN or LAN Connect iSCSI Data Ports to IPSAN: 2 Connect the enclosure to a grounded power outlet, using the power cord provided.
Page 41
Getting Started Quickly 3 Press the Power button on the front panel. 4 Attach the bezel. Align and attach the left side first, then swing the bezel closed and secure it in place using the button. The physical installation is complete. Continue with Completing the Network Configurations on page 3-7.
When you power on the subsystem, the Initialization Wizard opens. Use the monitor and keyboard to configure the basic network parameters of the Adaptec iSA1500 with the CLI, which is preinstalled on the subsystem. (For more information about the CLI, see...
Page 43
Table 3-1 Ensure that the management interface is on the same subnet as the station used to manage the Adaptec iSA1500. Note: Make a note of the IP addresses you assign for future reference. Table 3-1 Required Parameters for Initial Configuration...
■ To install Microsoft DiskPart, see ■ To install Adaptec Storage Manager on your Management ■ Station, see page 3-11. To install Adaptec Storage Manager on your iSCSI Stations, see ■ page 3-13 to continue. www.adaptec.com page page 3-10. Getting Started Quickly...
Page 45
2 When prompted to specify an installation option, select Install iSCSI Service Only. Note: If you plan to use the Microsoft iSCSI initiator instead of the Adaptec 7211 iSCSI adapter, select Install Complete iSCSI Initiator. 3 Follow the on-screen instructions to complete the installation.
Page 46
To install Adaptec Storage Manager on your Management Station: 1 Close all open applications and disable any anti-virus utilities. 2 Insert the Adaptec iSA1500 CD into the CD-ROM drive. The Setup program opens automatically. (If the Setup program does not open, double-click the Setup.exe icon on the CD to begin setup and installation.)
Page 47
Station only, click Management Station, then click Next. Note: If you select iSCSI and Management Station, Microsoft DiskPart must be installed on your system before the Adaptec Storage Manager installation can continue. See more information. Note: This User’s Guide assumes that you have completed an iSCSI and Management Station setup on your Management Station.
Page 48
To install Adaptec Storage Manger on an iSCSI Station: 1 Close all open applications and disable any anti-virus utilities. 2 Insert the Adaptec iSA1500 CD into the CD-ROM drive. The Setup program opens automatically. (If the Setup program does not open, double-click the Setup.exe icon on the CD to begin setup and installation.
Adding Agents This section explains how to add an agent using Adaptec Storage Manager. An agent is software that lets the Management Station communicate with each iSCSI subsystem and iSCSI Station on your IPSAN. Before Adaptec Storage Manager can recognize the iSCSI subsystem and iSCSI Stations on your IPSAN, they must each be added as static agents.
Page 50
(See Step 6 on page 3-12.) 4 Click login. The main Adaptec Storage Manager screen opens. No servers or iSCSI subsystems are listed. 5 Click the Agents button. The Static Agents window opens.
Management port. Caution: DHCP is not recommended. The Adaptec iSA1500 subsystem is configured. You can change the network settings at any time, if required (see Network Settings on page Setup is now complete.
Navigating Adaptec Storage Manager Building Your IPSAN (With WMI) Building Your IPSAN (Without WMI) Next Steps This chapter introduces Adaptec Storage Manager, and provides basic instructions for building your IPSAN. Two sets of instructions are provided, one for users who have WMI (see...
Once you have completed all the installation tasks listed in Chapter 3, all the iSCSI subsystems and iSCSI Stations (referred to as servers in Adaptec Storage Manager) on your IPSAN appear in the Tree Menu, as shown in the Figure below. Tree Menu,...
Page 54
Refresh and Go Back icons (shown at right) appear in the upper right-hand corner of many Application Windows. Logging Out Always close your browser, or log out of Adaptec Storage Manager by clicking the Logout button (shown at right), at the end of each session.
Building Your IPSAN (With WMI) If your system has WMI, the automated features of Adaptec Storage Manager are supported. Follow the instructions in this section to build your IPSAN. Prerequisites Windows 2003 or Windows 2000 SP3 ■ Microsoft iSCSI Service ■...
Page 56
(RAID). Before you begin, plan your storage—do you need everything in one pool, or would multiple pools be more convenient? Adaptec recommends that you make your pools at least 20% larger than is required for the targets, to leave room for snapshots and other advanced features that need available free space.
Page 57
3 Click Create Pool. Note: The Create Pool option is only available if sufficient disk drives are present on the system. The Create Pool window opens. 4 Choose a name for your pool. Pool names can be alphanumeric, such as pool1 5 Select a RAID level (or select No RAID), and specify the cache.
Page 58
7 Click OK to create the storage pool. The new pool is added to the iSCSI subsystem’s list of storage pools. Note: Click your browser’s Refresh button if the pool does not appear. Creating a New Volume The next step in building your IPSAN is to add a volume to a server.
Page 59
3 Click Create Volume. The Automated Volume Creation window opens. Note: Automated volume creation is only available on systems with Microsoft iSCSI Service installed. 4 Enter the Volume Size, Volume Name, and Storage Type. 5 In the Volume Type drop-down menu, select Simple (Basic) to create a simple volume on the server, or select iSCSI Subsystem Mirror (Basic) to create a mirrored volume, which will reside on the server you selected in...
Page 60
7 Continue by following the instructions for the type of volume you are creating: Simple (Basic)—Select which storage pool to use, as shown ■ in the example below. iSCSI Subsystem Mirror (Basic)—Select the pools you want ■ to use, as shown in the example below. You must select at least two pools to create a mirrored volume.
Page 61
8 Click OK to begin volume creation. The Job Details window opens, showing the volume creation process and status Note: You can also view the job progress at any time by clicking the Jobs button at the top of your screen. You can delete a job in progress by clicking the Trash Can icon (shown at right) beside the job.
Building Your IPSAN (Without WMI) This section provides basic instructions for creating an IPSAN manually, without using the automated features of Adaptec Storage Manager that are supported by WMI. Set-up Task List To set up your IPSAN manually, complete these tasks, in order: 1 Add a storage pool to the iSCSI subsystem.
Page 63
3 Click Create Target. The Create Logical Target window opens. 4 Set the parameters for your iSCSI target. You can use an existing or default SLP scope, or create a new one. If you choose to create a new SLP scope, you will be asked to create a name for that scope as part of information, see What’s an SLP Scope? on page...
Page 64
6 Click Next, then select a Pool and set the Pool size. 7 Click OK to create the iSCSI target. When the iSCSI target has been created, it appears in the Targets On This iSCSI Subsystem window. The iSCSI target has the same redundancy level as its storage pool.
Page 65
To create a spare: 1 In the Tree Menu, click the iSCSI subsystem on which you want to create a spare. 2 In the Application Window, click on the Hardware tab. 3 Click on an available drive. The Disk in Enclosure window opens. 4 Click Make Global Spare.
Manage Your IPSAN — Manage your IPSAN using Adaptec ■ Storage Manager (see using the CLI (see Use the Event Log — Monitor the status of your Adaptec ■ iSA1500 subsystem using the Event Log in Adaptec Storage Manager. See Chapter 7, Managing Events for more information.
Page 67
Basic IPSAN Security Recommendations Understanding Access Levels Creating User Accounts and Assigning Passwords Editing User Accounts Generating SAN Passwords Setting iSCSI Target Authentication Using Access Control Lists This chapter provides detailed information about the access and security features of Adaptec Storage Manager.
Basic IPSAN Security Recommendations When setting up your IPSAN, consider these security recommendations: Always log out of Adaptec Storage Manager when you are ■ finished using it. Don’t allow account sharing. ■ Keep the Manager Level password confidential. ■ Use account names that easily relate to your IPSAN users, to ■...
Note: Only a user with manager-level access can create user accounts. To create a user account: 1 In Adaptec Storage Manager, click the Users button (shown at right) to open the Users window. All users and their assigned access levels are listed.
Editing User Accounts You can change a user’s access level and password, or delete a user. To edit or delete a user account: 1 In Adaptec Storage Manager, click the Users button. (See the Figure in Step 1 on page 2 Under Options: Click the Key icon to change the user’s access level.
2 Click Generate SAN Password. 3 Click OK to confirm the creation of a new password. Beginning immediately, your management station and all of its associated agents use this new password during authentication checks. Setting iSCSI Target Authentication When you create an iSCSI target, you can set an authentication method.
Page 72
2 In the Application Window, click View under Authentication. The Authentication window opens. 3 Click Add Authentication User. The Add an Authentication User window opens. 4 Type in the user name and password, re-enter the password, then click OK. Note: Passwords must be at least 12 characters long. The new user information appears in the Authentication window.
2 Under Options beside the User Name: Click the Lock icon to change the user’s password. ■ Click the Trash Can icon to delete the user. ■ 3 Follow the on-screen instructions to edit or delete the authentication user account. All authentication user account changes take effect immediately.
Managing Devices (Disk Drives) Managing Network Settings Managing Portals Enabling Network Drive Sharing Upgrading the Subsystem Firmware Managing the iSCSI Subsystem’s Settings This chapter explains how to use Adaptec Storage Manager to manage your IPSAN. 6-12 6-15 6-22 6-23 6-38...
About Your Adaptec Storage Manager License on page 1-4.) To view the features currently enabled on your Adaptec iSA1500: 1 Open Adaptec Storage Manager and log in, following Steps Adding Agents on page 2 In the Tree Menu, click the iSCSI subsystem you want, then click Features.
Managing Volumes This section provides instructions for using Adaptec Storage Manager to manage storage volumes. You can use Adaptec Storage Manager to: Create a new volume. (See ■ Increase the size of (extend) a volume. (See ■ Reassign a volume to a different server. (See ■...
Page 77
You can extend a volume (increase the size of a volume) up to the amount of free space within its parent storage pool. Note: Adaptec recommends that you always have spare capacity in your storage pools to allow for advanced functions, such as snapshots, which require available free space.
Page 78
2 Select the iSCSI volume to be extended, then click Extend Volume. The Automated Extend Volume window opens. 3 Enter the size of the volume extension. Ensure that you have sufficient free space on your target for the size increase. 4 Click OK.
Page 79
3 Select the new server from the drop-down menu, then click Next. 4 Select the mount point. The mount point is a drive letter. When the volume is reassigned, it appears as space on that existing drive letter. 5 Click OK to reassign the volume. Taking a Snapshot of a Volume A snapshot is a frozen image of a volume at a particular point in time.
Page 80
Once the volume snapshot job begins, its status is tracked in the Job Details window, which you can access by clicking the Jobs button (shown at right) on the Adaptec Storage Manager toolbar. Managing Your IPSAN...
Page 81
You can view a list of scheduled volume snapshots by clicking the Schedules button (shown at right) on the Adaptec Storage Manager toolbar. Viewing Volume Snapshots You can view the details of any volume snapshot. To view a volume snapshot: 1 In the Tree Menu, click on the server that contains the volume and volume snapshot, then click Automation.
Page 82
The snapshot rollback job is tracked in the Job Details window, which you can access by clicking the Jobs button on the Adaptec Storage Manager toolbar. Note: If your iSCSI Station does not have WMI, you can use the Event Log to track the progress of the snapshot rollback.
Page 83
Assigning a New Drive Letter to a Volume You can assign a new drive letter to a volume. You might want to do this to mount a specific volume to a drive that’s used for a different type of information. Caution: Changing a volume’s drive letter also changes the drive letter in the OS, which can disrupt existing drive mappings and applications.
You can remove a volume from a server. When you delete a volume that is the last volume on a server, the server is logged out from the Adaptec iSA1500 subsystem. Before deleting a volume, ensure that your data is adequately backed up.
Managing Initiators This section provides instructions for using Adaptec Storage Manager to manage your IPSAN’s initiators. You can: View a list of initiators on an iSCSI subsystem. (See ■ View details about a specific initiator. (See ■ Edit an initiator’s details. (See ■...
Page 86
Viewing Details About a Specific Initiator To view details about a specific initiator on an iSCSI subsystem: 1 In the Tree Menu, click on the iSCSI subsystem you want, then click Initiators. 2 In the list of Initiator IQNs, click the initiator you want. The Initiator Information window opens, listing the settings for that initiator.
Page 87
Creating a New Initiator To create a new initiator: 1 In the Tree Menu, click on the iSCSI subsystem you want, then click Initiators. 2 Click Create Initiator. The Create an Initiator window opens. 3 Enter the new initiator information and settings as desired. 4 Click OK to create the initiator.
A storage pool is a disk drive or collection of disk drives which can be divided into iSCSI targets. You can use one, some, or all of the Adaptec iSA1500 disk drives in a storage pool. You can also create a storage pool from a RAID array.
Page 89
Viewing Details of a Specific Storage Pool To view details of a specific storage pool: 1 In the Tree Menu, click on the iSCSI Subsystem you want, then click Storage Pools. 2 In the Application Window, click the pool you want to view. The Pool Information window appears.
Page 90
Adding a Disk Drive to a Storage Pool You can add a disk drive to a non-RAID storage pool to increase the capacity of the pool. Note: When no disks are available for use, you can’t add disk drives to a storage pool. Consider removing a disk drive from one storage pool to make it available to another storage pool.
Page 91
Note: You can’t remove a disk drive from a RAID pool. If you attempt to remove a disk drive from a pool and are prevented from doing so by Adaptec Storage Manager, that disk drive is part of a RAID pool.
Page 92
Exporting a Storage Pool To move a storage pool from one iSCSI subsystem to another, export the pool from the old iSCSI subsystem and import it into the new iSCSI subsystem. To export a storage pool: 1 In the Tree Menu, click on the iSCSI Subsystem you want, then click Storage Pools.
Page 93
Importing Storage Pools You can import a storage pool that has been exported by another iSCSI subsystem. (See more information.) To import a storage pool: 1 In the Tree Menu, click on the iSCSI Subsystem you want, then click Storage Pools. 2 In the Application Window, click on the foreign pool that you want to import.
Page 94
Deleting a Storage Pool You can delete a storage pool from the iSCSI subsystem. Once a pool is deleted, its associated disk drives are made available again and can be used to create a new pool or be added to existing pools to increase their capacity.
Deleting Spares To delete a spare: 1 In the Tree Menu, click the iSCSI subsystem from which you want to delete a spare. 2 In the Application Window, click on the Hardware tab. 3 Click on the drive that is the Global Spare. The Disk in Enclosure window opens.
Managing iSCSI Targets This section provides instructions for using Adaptec Storage Manager to manage storage pools. You can use Adaptec Storage Manager to: View a list of the iSCSI targets associated with an iSCSI ■ subsystem, as described in the next section on this page.
Page 97
The Target Information window opens, displaying all information about the selected target. Note: If the target you selected is a snapshot or a mirror target, Adaptec Storage Manager may display different information than what’s shown in the Figure above. Managing Your IPSAN...
Page 98
4 To bring an iSCSI target back online, click Bring Online under Current Target Status. Creating a Mirror with New iSCSI Targets Note: To enable this Adaptec Storage Manager feature you must purchased a license upgrade. Contact your sales representative for licensing options.
Page 99
To create an iSCSI target mirror set: 1 In the Tree Menu, click on the iSCSI Subsystem you want, then click iSCSI Targets. 2 In the Application Window, click on the iSCSI target you want. The Target Information window opens, as shown on 3 Click Create Mirror.
Page 100
5 Click Next to open the Create Mirror (step 2) window and continue to set the parameters for your mirror target. Adaptec recommends that you only allow one initiator access to each target. Note: You can add a new initiator to the selected iSCSI subsystem from this window, if required.
Page 101
7 Click OK to create the mirror target. When the iSCSI target has been created, it is listed in the Targets On This iSCSI Subsystem window. Mirror Target About Your Adaptec Storage Manager for more information.) Managing Your IPSAN 6-28...
Page 102
Note: While supported, dynamic discovery is not recommended as some IP routers and switches do not allow certain discovery information to be passed between iSCSI subsystems. 6-25.) About Your Adaptec Storage Manager for more information.) Managing Your IPSAN Creating a page 6-24.
Page 103
Figure below. Synchronization Status and Icon Adaptec Storage Manager automatically begins synchronizing the new mirror with the iSCSI target. The status of the synchronization appears under Sync State, as shown in the Figure above.
Page 104
Breaking a Facet You can remove (break) a facet from a mirror and use it to create a new iSCSI target. To break a facet: 1 In the Tree Menu, click on the iSCSI Subsystem you want, then click iSCSI Targets. 2 In the Application Window, click on the iSCSI target you want.
Page 105
5 Enter a new iSCSI Alias name and set all other parameters for the new iSCSI target, then click OK. The facet is removed from the selected mirror, and a new iSCSI target is created and appears in the list of iSCSI targets. Deleting a Facet You can delete a remote or local facet from a mirror without creating a new iSCSI target.
Page 106
Modifying an iSCSI Target To modify an iSCSI target: 1 In the Tree Menu, click on the iSCSI Subsystem you want, then click iSCSI Targets. 2 In the Application Window, click on the iSCSI target you want. The Target Information window opens, as shown on 3 Click Modify Target.
Page 107
Growing an iSCSI Target You can resize the iSCSI target to make it larger, if required, as long as you have space available in the target’s storage pool. To grow an iSCSI target: 1 In the Tree Menu, click on the iSCSI Subsystem you want, then click iSCSI Targets.
Page 108
Creating an iSCSI Target Snapshot A snapshot is a frozen image of a target (or volume) at a particular point in time. You can take a snapshot in a read-only mode after the target itself has been modified. You may find snapshots helpful when creating backups. If data is changed during a backup, problems may arise and data could be lost.
Page 109
Rolling Back a Snapshot A snapshot is a frozen image of a target at a point in time, similar to a backup of that target. You can use a snapshot to roll back the contents of a target to that point in time. Note: Before beginning a snapshot rollback, ensure that all initiators are logged out of the target.
Page 110
The snapshot rollback job is tracked in the Job Details window, which you can access by clicking the Jobs button on the Adaptec Storage Manager toolbar. When the job is complete, the target reflects the contents as they were at the time of the snapshot.
Managing SLP Scopes This section provides instructions for using Adaptec Storage Manager to manage SLP scopes. You can: View a list of SLP scopes on an iSCSI subsystem. (See ■ View details about a specific SLP scope. (See ■ Create a new SLP scope on an iSCSI subsystem. (See ■...
Page 112
Viewing SLP Scope Details To view detailed information about a specific SLP scope: 1 In the Tree Menu, click on the iSCSI Subsystem you want, then click SLP Scopes. The SLP Scopes On This iSCSI Subsystem window opens, as shown on page 6-38.
Page 113
Creating a New SLP Scope To create a new SLP scope on an iSCSI subsystem: 1 In the Tree Menu, click on the iSCSI Subsystem you want, then click SLP Scopes. The SLP Scopes On This iSCSI Subsystem window opens, as shown on page 6-38.
Page 114
3 Click Add SLP Scope Target. The Add Target to SLP Scope window opens. 4 From the Target drop-down box, select the iSCSI target you want to add to the scope. 5 Click OK to add the target to the scope. The new target appears in the list of targets for this scope.
Page 115
3 Click Delete SLP Scope Target. The Delete SLP Scope Target window opens. 4 From the list of targets, select the target to be deleted, then click The target is deleted, and no longer appears in the Targets in this SLP Scope window. Deleting an SLP Scope Note: You cannot delete all SLP scopes.
Managing Devices (Disk Drives) This section provides instructions for using Adaptec Storage Manager to manage the disk drives in your iSCSI subsystem. You can: View a list of the disk drives in your iSCSI subsystem. (See ■ 6-43.) View details about a specific disk drive. (See ■...
Page 117
Managing Your IPSAN 3 Click the slot number of the disk drive you want. The Disk in Enclosure window opens, showing the details and status for the selected disk drive. 6-44...
Managing Network Settings This section provides instructions for using Adaptec Storage Manager to manage the network settings for your iSCSI subsystem. You can use Adaptec Storage Manager to: View network information, as described on this page. ■ Set iSCSI subsystem network details. (See ■...
Page 119
Setting Network Details To set the iSCSI subsystem’s network details: 1 In the Tree Menu, click on the iSCSI Subsystem you want. 2 In the Application Window, click the Network tab. 3 Click Set Network Details. The Set Network Details window opens. 4 Change the network information, as required, then click OK to save the changes.
Page 120
Managing Your IPSAN Setting SNMP Details To set the iSCSI subsystem’s SNMP details: 1 In the Tree Menu, click on the iSCSI Subsystem you want. 2 In the Application Window, click the Network tab. 3 Click Set SNMP Details. The Set SNMP Details window opens. 4 Enter or change the SNMP details, as required.
Page 121
Viewing and Changing Network Interface Settings You can view or change the network interface settings for the interface ports of a specific iSCSI subsystem. To view or change interface settings: 1 In the Tree Menu, click on the iSCSI Subsystem you want. 2 In the Application Window, click the subtab of the interface you want to configure.
Page 122
3 Select Set Interface... The Set Interface Details window opens. 4 Change the interface details as required. Note: Adaptec recommends that you not enable DHCP. Caution: Changing the IP address during normal operation may result in data loss if iSCSI stations are connected.
Managing Portals A portal (also known as a network interface or network portal) is a combination of an initiator’s IP address and port. When you add a new server as an agent (see automatically discover new iSCSI adapters; if this does not happen automatically, you can add them manually using portals.
3 Click OK to confirm drive sharing. Upgrading the Subsystem Firmware To maintain the high performance of the Adaptec iSA1500, ensure that you are using the most recent version of the firmware. Download firmware upgrades as they become available from the...
5 Follow the on-screen instructions to complete the update. Managing the iSCSI Subsystem’s Settings This section provides instructions for using Adaptec Storage Manager to manage the settings on your Adaptec iSA1500 Storage Array. You can use Adaptec Storage Manager to: Set the iSCSI subsystem date or time. (See ■...
Page 126
Setting the Date and Time To set the date and time on a specific iSCSI subsystem: 1 In the Tree Menu, click the iSCSI subsystem you want. 2 On the System tab, click Set iSCSI Subsystem Time. The Set iSCSI Subsystem Local Time window opens. 3 Use the drop-down boxes to enter the current date and time, then click OK.
Page 127
All events are cleared from the selected iSCSI subsystem. Getting a Diagnostic Dump from the iSCSI Subsystem If you need to seek help from Adaptec Technical Support, you may be asked to create a diagnostic dump file, which contains all existing log files from an iSCSI subsystem, and email this external file to Adaptec Technical Support.
Page 128
3 Type in a name for the file, then click OK. 4 In the Adaptec Storage Manager toolbar, click the Diagnostics button, shown at right. The Diagnostic Dumps On This SAN window opens. 5 Click the Download Dump icon of the filename you want.
Page 129
Rebooting and Shutting Down the iSCSI Subsystem Caution: This option should be used with extreme caution. Access to all storage information will be lost during the iSCSI subsystem shutdown and reboot. To reboot or shut down the iSCSI subsystem: 1 Save all data and close all files. 2 In the Tree Menu, click the iSCSI subsystem you want.
Viewing Event Details Configuring the Event Log Managing Active Events The Adaptec Storage Manager Event Log records any IPSAN component errors or events as they occur. Your Management Station, iSCSI Stations, and Adaptec iSA1500 subsystem all generate events that appear in the Event Log.
Opening the Event Log You can view the Event Log at any time by clicking the Events button in the toolbar (shown at right). The Events Search Filter window opens and displays the Event Log. In the Event Log, events are listed with both brief summaries and detailed descriptions of what occurred.
Down—Indicates that the system is unresponsive to all ■ inquiries. This category is most often used when the Adaptec iSA1500 is powered down or is being rebooted. The component that causes an event appears in Adaptec Storage Manager with the same status as the event itself. For instance, if an iSCSI Station issues a Warning event, the icon for that iSCSI Station changes to reflect Warning status.
Sources—Limits the list of events to only those from the servers ■ or iSCSI subsystems you want to monitor. To select multiple servers and iSCSI subsystems, press and hold the Ctrl key while selecting sources. When you have defined the search criteria, click Search to view a list of the specified events.
Configuring the Event Log You can customize event notifications by: Configuring SNMP. (See ■ Configuring email notifications. (See ■ Defining event notifications for events and errors. (See ■ Opening the Event Configuration Window To open the Event Configuration window, 1 Open the Event Log. (See 2 Click the Event Configuration icon, shown at right.
Page 135
Managing Events Configuring SNMP To configure SNMP for all email notifications: 1 Open the Event Log. (See page 7-2.) 2 Click the Event Configuration icon (see Step 2 on page 7-5). 3 Click Configure SNMP. The Configure SNMP for Events window opens. 4 Change the SNMP details as required, then click OK.
Page 136
Configuring Email Notifications Note: You must have a routable SMTP email server that does not require authentication to enable email notifications. To set up network details for the email server for event notification: 1 Open the Event Log. (See 2 Click the Event Configuration icon (see 3 Click Configure Email Server.
Page 137
Defining Event Notifications for Events and Errors To specify how events of a different severity level are handled and who receives the notification: 1 Open the Event Log. (See 2 Click the Event Configuration icon (see 3 Click Set Email and SNMP Notifications. The Set Email and SNMP Notifications window opens.
Managing Active Events By default, all new events—except Information-level events—are logged as active events (with the active keyword attached). System status comes from the highest-status-level active event. To return the system status to normal, you must deactivate any event with a status level higher than Information. (See Severity Levels on page For instance, assuming that the system is otherwise normal, a Warning-level event elevates the system status to Warning.
Page 139
You can delete an event or group of events so that they no longer appear in the Adaptec Storage Manager window. Note: Deleted events are not cleared from the iSCSI subsystem. To clear all events from your Adaptec iSA1500, see All Events on page To delete an event or group of events: 1 Open the Event Log.
Overview of CLI The CLI software is a terminal-based command line interface that allows you to monitor and manage the Adaptec iSA1500 Storage Array subsystem. iSCSI targets that will appear as local disk storage on your server can be created and managed.
Page 143
Note: If you forget your password(s) you can log into the system by physically attaching a serial cable to the Adaptec iSA1500 Storage Array and using a VT100 terminal emulation program, such as hyperterminal. (For terminal emulation...
Page 144
Character Case and White Space The CLI is not case-sensitive. Commands and parameters can be typed using any combination of upper and lower case letters IQNs, iSCSI Aliases, and initiator names must be entered in lower- case letters. Commands and parameters are separated with one or more spaces and/or tab characters (white space).
Page 145
Most commands and parameters can be abbreviated to their shortest unique abbreviation. For example, if you are in the Operator level and wish to change to the Administrator level, all you have to type is ad as there are no other commands starting with “ad”.
Page 146
Help Command completion can be requested at any time by pressing the Tab key. This gives a list of the words that may be added to the command line, taking into account what has already been typed. (See the Note on page 8-5 key.) Additionally, you can request help at any time by typing help or ?
Page 147
Global Commands Global Commands (commands that are always available) are summarized in Table each Global Command. Table 8-3 Global Commands Quick Reference Command Description administrator Enter Administrator level. A password may be required. (See authentication Manage users and passwords. (See cache Manage cache options for the IPSAN.
Page 148
Table 8-3 Global Commands Quick Reference (Continued) Command Description pool Control device pools. (See route Control static routes. (See save Write all changes to flash memory. (See scope Manage SLP scopes. (See setup (See service Manage services running on the system. (See show Display information about the system.
Page 149
Using CLI Help | ? [all] | [global] | [help | ?] | [keys] Command With no parameters entered, the following command prints the commands that are available in the current menu context; but not the global commands unless you are in the global menu context: Help | ? [all] | [global] | [help | ?] | [keys] Using the optional global parameter lists all of the commands that are available for the current context and the global commands.
Page 150
Save Command Type save to ensure that any changes have been written to flash. Changes are normally written at a time chosen by the underlying libraries. Show Option Command Type show option to display information about various parts of the system. Valid values for option are: Table 8-4 Valid Values for Show Option Command Value authentication...
Setup Wizard The Setup Wizard runs if the system is in factory default state when the CLI is started. You can also run it with the setup command. The Setup Wizard helps you enter the information required to connect the system to a local network. The Setup Wizard steps you through a set of questions (as described on Using the Setup Wizard on page...
Page 152
3 Define administrator password You are prompted to define if an Administrator password is required. If one is required, you are prompted to enter the password twice. Type CTRL(C) to leave the password unchanged. Type return at both prompts to leave the unit with no Administrator password.
Page 153
10 DNS servers Type the IP numbers for up to 3 machines that will act as DNS servers. Type false to clear the list of DNS servers. 11 Save new configuration When the Setup Wizard is finished, the system is configured but the new configuration is not saved immediately in nonvolatile memory.
Authentication Commands These commands manage users and passwords for authentication access to the targets. The commands are available after the authentication command with no parameters, or as global commands by preceding them by authentication. Table 8-6 lists the Authentication Commands. More details about each command are provided after the Table.
Device Commands These commands manage device discovery. They are available after a device command with no parameters or as global commands by preceding them by device. Table 8-7 lists the Device Commands. More details about each command are provided after the Table. Table 8-7 Device Commands Command Parameters...
Page 156
info [device_list] Command Output information about all disks. If the device_list parameter is given, information about the listed disks is supplied. If device_list is a single device, it’s identical to using the device manage device info command. list [usage] [interface] [type] Command List all known physical devices.
Page 157
Table 8-10 Valid type Values Value Description disk Just disk devices robot Robot, autochanger or jukebox devices raid RAID devices tape Just tape devices manage device Command These commands manage disks found using device discovery. They are available after a device manage device command with no parameters, or as global commands by preceding them with device manage device.
statistics [device_list] Command Output the statistics of the disks in the device_list; or all of the disks if no device_list is supplied. unused Command List those disks which have not been allocated to a pool or passthrough volume. Note: This is an alias for device list unused. Diag Commands These commands run diagnostics tests.
proc path Display the unformatted output from doing a cat /proc/path. The path value may contain / characters but the resulting pathname cannot be outside the /proc directory tree. The resulting pathname must be a file. The case of the file and directory names must be correct as upper case and lower case letters are significant for file and directory names.
Page 160
Details about each command are provided after the Tables. Table 8-14 Events Action Commands Command Parameters options list remove all | options options In the commands shown in more of the options shown in Table 8-15 Events Action Command Options Option Description active...
Page 161
If several actions are on the line and one takes a parameter, the word after the action will be taken as that parameter even if it also a valid action. For instance, email shutdown will be interpreted as an email to shutdown, not as an email action with no parameter followed by a shutdown action).
Page 162
Using CLI Select every event. It must be the only command on the line. for relative_period This command may not be combined with the to command. The relative_period is relative to the date and time specified by the from command or by the oldest event if from is not supplied.
Page 163
info Command Display the values associated with the event log: Size of the event log ■ List of actions for each level. ■ Current status, which means the highest active severity level Events Report Commands Table 8-17 lists commands that are used to generate event log reports.
Image commands Image commands are available after the image global command and manage the images used to boot the unit. They can also be run as global commands by preceding them by image. Table 8-18 lists all Image commands. Details about each command appear after the Table.
upload ymodem | zmodem | url Upload a new image to be used the next time the unit is rebooted. If the upload is successful the new image will be used the next time the unit is booted and the current image is set as the alternative. ymodem zmodem going to be used to transfer the new image.
Page 166
create name iqn [align boolean] [piggyback boolean] [ping boolean] Create a new remote iSCSI node with the local name where iqn is the IQN of that node. The align, piggyback and ping parameters set up initial values for the node's attributes; in all cases the default value is true. They are described in the iscsi nodes manage node commands (see page...
align boolean Change whether Protocol Data Units (PDUs) should be aligned on ethernet frames info Output information about this remote iSCSI node including an indication of which other entities, such as targets, refer to it. piggyback boolean Change the piggyback SCSI status of this remote iSCSI node. ping boolean Change whether to ping periodically to test the connection.
Page 168
info [interface_list] Output details about the specified interfaces including statistics. If no interface_list parameter is supplied, the details about all of the interfaces are output. See the Interface Manage Interface Info command (see Table 8-22 on page 8-30) for more information about what is displayed by this command.
Page 169
Table 8-22 lists all Interface Manage commands. More details about each command appears after the Table. Table 8-22 Interface Manage Commands Command Parameters broadcast ip_numb | high | low dhcp boolean info ip_numb[/mask] bytes netmask netmask speed value [full] statistics broadcast ip_numb | high | low Set the broadcast address.
Page 170
info Show the details about the interface. This includes: IP number ■ Netmask ■ Broadcast address ■ MAC address ■ Whether DHCP is enabled ■ Whether it is configured (up) ■ Speed of interface ■ If DHCP is enabled the output will show the active values for the interface plus the values which will be applied if DHCP is disabled.
Page 171
netmask netmask Set the interface's netmask to be the value supplied. This command may be combined with the ip and netmask commands on a single line. The ip command describes the default value for this option if just the IP number is changed. If DHCP is enabled this command changes the stored value which will be used if DHCP is disabled.
Ipsec Commands These commands manage ipsec connections. They are available after the global ipsec command. They can also be used as global commands by preceding them with ipsec. Table 8-23 lists all Ipsec commands. More details about each command appear after the Table. Table 8-23 Ipsec Commands Command Parameters...
Page 173
Using CLI enable all | name_list Enable the connections listed in the name_list list so they can now be used. If all is used, every connection will be enabled. info Show information about the known connections. If the name_list list is supplied, information about just those connections will be shown;...
Page 174
psk local | (remote_host username [password password] location [name name]) The parameters to import a Public Shared Key are the same as for the RSA key file. However there is an option for that key to be the unit's local PSK in which case just the keyword local is used. x509 [dn dist_name] For a X509 connection the Distinguished Name which defines the certificate for the remote end must be supplied as the dist_name...
Page 175
Using CLI dynamic name id id psk | rsa | x509 policy_parameters Create a dynamic connection referred to by name. The connection is defined by the id value of the remote end. An ID can be an ip_numb, or any string, which is normally the remote host's name. Strictly, it should be preceded by an '@' although this will be added if it is not supplied.
Page 176
Table 8-25 lists all ipsec key commands. More details about each command appear after the Table. Table 8-25 ipsec key Commands Command Parameters clear export psk | rsa name remote_host username [password password] location generate psk | rsa info [psk | rsa] clear This command will clear all of the secrets stored in the unit.
Page 177
Table 8-26 lists all ipsec manage name commands. More details about each command appear after the Table. Table 8-26 ipsec manage name Commands Command Parameters arrival-check boolean authentication ah | esp compression boolean connect disconnect dist_name encryption boolean host remote_host info interfaces interface_list...
Page 178
Using CLI compression boolean Whether to include IPCOMP compression. connect Establish this connection. disconnect If this connection is established, break it down. dn dist_name This is an alias for policy x509 dn dist_name. encryption boolean Whether to encrypt the data. host remote_host Change the host for the remote end of a host or network connection.
Page 179
Using CLI pfs boolean Whether to enable PFS. policy psk (local | key_host key_user [password password] key_location) policy rsa key_host key_user [password password] key_location policy x509 dn dist_name Define which authentication policy to use for this connection and get the key or certificate from a remote server. The actual format of the command depends on the type of policy selected.
Page 180
start-up boolean Whether the connection should be up when the system starts. tunnel boolean Whether this is a tunnel connection. ipsec x509 commands These commands manipulate the X509 certificates. These commands are available after the ipsec x509 command. They can also be run as global commands by preceding them by ipsec x509 or by preceding them with x509 from the ipsec context.
info [ca | crl | local [certificate_list]] Show information about some of the stored certificates. If no parameters are given, information about all of the certificates is shown. Limit the information to all certificates of a certain type by not supplying certificate_list; limit information to specific certificates of a certain type by supplying certificate_list.
Page 182
At least one must be defined. port number Define the port number to use. Note: Adaptec strongly recommends that you not change the iSCSI port number. r2t [bidiinitial boolean] [initial boolean] [outstanding value] Set the max outstanding R2T value. Also, whether the bidiInitial and/or the initial values should be enabled.
relaxed boolean Define whether the iSCSI service should be relaxed. timeout [retain relative_period] [wait relative_ period] Define the default time to wait to retain date and/or to wait for data. At least one parameter must be defined. Mirror Commands These commands manage mirrored targets. They are available after the global mirror command.
Page 184
Using CLI create name target size size local pool_list [remote async boolean [queue [blocking] pool [size size] [fixed | variable]] iqn_list { convert target target create name target size size local pool_list [remote async boolean [queue [blocking] pool [size size] [fixed | variable]] iqn_list } Create a new mirror set target to be called target consisting of some local and optionally some remote facets.
Page 185
list [local | remote] List all mirror targets. If the local filter is supplied only mirrors which have no remote facets will be listed. If the remote filter is supplied only those mirrors which have at least one remote facet will be listed.
Page 186
Table 8-30 mirror manage target Commands Command Parameters size bytes synchronize stop | [[local pool_list] [remote iqn_list]] unrestricted Note: There are several commands which take a list of local pools followed by a list of remote IQNs. Normally lists are terminated by the end of the line;...
remove [local pool_list] [remote iqn_list] Remove the facets in the pool_list and iqn_list lists. The space used by local facets is returned to the pool for reuse. It is legal to reduce the number of facets to a single local facet, in which case the target reverts to being an ordinary target.
Page 188
Using CLI Any combination of the commands marked as capable of being combined may be put on a single command to allow the unit's network identity to be set with one command. dns ip_numb_list | false Define a new list of DNS servers where ip_numb_list is a list of up to three IP numbers of name servers to use.
Table 8-32 Parameter Options Parameter identity interfaces smtp ntp ip_host | false Set the NTP server to be ip_host. For no NTP server a valid false value should be given. If the ip_host name is a valid string for a false value enclose the ip_host string in "" characters.
Page 190
Table 8-33 Pool Commands Command Parameters identify [start | stop] [name_list] import name_list info [name_list] list [local | foreign] manage name scan unused available / unused List all of the devices that are not associated with a device pool. create name name [raid basic] device_list Create a new device pool called name with no RAID and define a list of devices to add to the new pool.
Page 191
Using CLI identify [start | stop] [name_list] Identify the devices which make up the pools in name_list, or all of the disks which are assigned to any pool if name_list is not supplied. Disks are identified by flashing their LED for 30 seconds or until a pool identify stop or device identify stop command is given for that disk.
Page 192
Table 8-34 Pool manage pool Commands Command available cache info remove add device_list Add the list of specified devices to the device pool. All of the devices in device_list must have the same block size as the size allocated to the pool. available List the devices which have not been allocated to any pool and which could be allocated to this pool.
Route Commands These commands control static routes. They are available after the global route command. They may also be used as global commands by preceding them by route. Table 8-35 lists all Route commands. More details about each command appear after the Table. Table 8-35 Route Commands Command Parameters...
delete destination/netmask [gateway] or delete destination netmask [gateway] Remove the existing static route defined by destination and netmask. If there is only one existing route that matches destination and netmask, gateway is not required; but if it is supplied it must match the static route. If there are several static routes that match destination and netmask, gateway must be supplied to distinguish which static route to remove.
Page 195
destroy name_list Destroy the named SLP scopes in the name_list list. info [name_list] Show information about all of the SLP scopes if name_list is not supplied, or the SLP scopes named in the name_list list if it is supplied. This is the same as the scope manage name info command if name_list consists of a single scope.
remove target_list Remove the targets in the target_list list from the scope. set target_list Replace the list of targets in the scope with the new list in target_list. Service Commands These commands manage the services running on the system. They are available after the global service command.
Page 197
start [force] service_list This will cause the named services to start. If the optional force parameter is used, it also forces essential services to start. stop [force] service_list Stop the named services. If the optional force parameter is used, it also forces those dependant services to stop. Service Manage Service Commands These commands control aspects of the named service.
start [force] Start this service. The optional force parameter will cause services on which this service depends to be started also. This is the same as the service start service_list command (see page 8-57) where service_list is just this service. stop [force] Stop this service.
Page 199
Using CLI create target pool [size size | remainder] (unrestricted | restricted initiator_list) Create a new target with a name of target. The iqn name used to access this target by an initiator will be automatically generated. The target will take its space from the named pool. If the size option is not used, all of the available space in that pool will be used;...
Page 200
Table 8-41 Filters Filter acl initiator authentication srp | chap | kerberos | false interface ethernet mirror local | remote | true | false pool pool restricted scope scope snapshot parent | true | false unrestricted Target manage target Commands These commands manipulate the attributes of the specified target.
Page 201
Table 8-42 Target Manage Target Commands Command Parameters allow [ro] initiator_list authentication srp | chap | kerberos | false deny initiator_list info interface all | Interface_list rename target restricted scope scope_list size bytes unrestricted allow [ro] initiator_list Give a list of initiators to add to the list of initiators which may access this target authentication srp | chap | kerberos | false Specify the authentication to use for this target.
rename target Define a new name (iSCSI alias) for this target. restricted Change the target so its ACL is active. This will restrict access to the target to those initiators defined by the target manage target allow command. scope scope_list Redefine a new list of SLP scopes to which the target should belong.
Page 203
Using CLI agent [community community] [port port] Define a new community and/or a new port used by the agent to access the unit. One or both of the parameters must be supplied in any order but it is illegal to have no parameters. If one parameter is supplied the stored value for the other is left unchanged.
The trap destination used by SNMP actually consists of a single string or the three values that may be defined by this command. The default trap community can also be stored separately. If the community parameter is given by itself, the argument will be stored as the default community;...
info Display this information about the operating system: BIOS version and date ■ Spitfire software version and date ■ Hardware serial number ■ Active boot image ■ Uptime since last boot ■ Current date, time and time zone ■ keyboard layout Define the type of keyboard layout for any keyboard attached to the the console.
Page 206
Table 8-45 UPS Commands Command Parameters info monitor usb | snmp | false | ip_host permit status thresholds [unit time] [initiators time] [cache time] info Show information about the UPS being monitored, and those hosts which are permitted to monitor the UPS if it is local to this unit. monitor usb | snmp | false | ip_host Specify which UPS to monitor.
Page 207
UPS Permit Commands These commands manipulate the list of hosts which may monitor the UPS if it is controlled by this unit. They are valid even if at the moment the UPS is not controlled from this unit. These commands are available after the ups permit command.
Troubleshooting In this Chapter... General Troubleshooting Tips Hot-swapping Disk Drives This chapter provides basic troubleshooting tips and suggestions for your Adaptec iSA1500 subsystem.
General Troubleshooting Tips If you experience trouble installing or using your Adaptec iSA1500, try these troubleshooting tips: Ensure that all devices are connected to a power source and ■ powered on. Replace the power cables, if required. Ensure that all Ethernet cables are properly and fully connected.
Page 210
To hot-swap a disk drive: 1 Remove the front bezel of the enclosure, as shown. 2 Release the extraction lever of the failed disk drive and gently pull it open. 3 If the enclosure is powered on, allow the disk drive to spin down fully.
Page 216
password command 8-10 passwords 3-8, pool commands 8-50 pools. See storage pools. portals 6-50 deleting 6-51 managing 6-50 ports Power button powering on quit command 8-10 rack installation locating rebooting iSCSI subsystem with CLI 8-66 Refresh icon reports in CLI route commands 8-54 routes...
Page 217
iSCSI targets 6-16 managing 6-15 6-21 online status 6-20 removing disk drives viewing lists 6-15 volume types system commands 8-65 system information 8-66 system requirements system services 8-57 system status with CLI 8-66 Tab key target commands 8-59 targets. See iSCSI targets task list (no WMI) 4-11 task list (WMI)
Need help?
Do you have a question about the iSA1500 and is the answer not in the manual?
Questions and answers