Novell LINUX ENTERPRISE SERVER 10 - INSTALLATION AND ADMINISTRATION 11-05-2007 Installation Manual page 276

Table of Contents

Advertisement

12.1.1 Creating iSCSI Targets with YaST
The iSCSI target configuration exports existing block devices or file system images to
iSCSI initiators. First create the needed block devices with YaST or create file system
images. For an overview of partitioning, see
(page 149). File system images must be created manually. For example, if you want to
create the image /var/lib/xen/images/xen-0 with the size 4GB, first make
sure that the directory is there then create the image itself:
mkdir -p /var/lib/xen/images
dd if=/dev/zero of=/var/lib/xen/images/xen-0 seek=1M bs=4096 count=1
To configure the iSCSI target, run the iSCSI Target module in YaST. The configuration
is split into three tabs. In the Service tab, select the start mode and the firewall settings.
If you want to access the iSCSI target from a remote machine, select Open Port in
Firewall.
The Global tab provides settings for the iSCSI server. The authentication set here is
used for the discovery of services, not for accessing the targets. If you do not want to
restrict the access to the discovery, use No Authentication.
If authentication is needed, there are two possibilities to consider. One is that an initiator
must prove that it has the permissions to run a discovery on the iSCSI target. This is
done with Incoming Authentication. The other is that the iSCSI target must prove to
the initiator that it is the expected target. Therefore, the iSCSI target can also provide
a username and password. This is done with Outgoing Authentication. Find more infor-
mation about authentication in RFC 3720 (see
rfc3720.txt).
The targets are defined in the Targets tab. Use Add to create a new iSCSI target. The
first dialog asks for information about the device to export.
Target
The Target line has a fixed syntax that looks like the following:
iqn.yyyy-mm.<reversed domain name>
It always starts with iqn. yyyy-mm is the format of the date when this target is ac-
tivated. Find more about naming conventions in RFC 3722 (see
.ietf.org/rfc/rfc3722.txt).
258
Installation and Administration
Section 8.5.7, "Using the YaST Partitioner"
http://www.ietf.org/rfc/
http://www

Advertisement

Table of Contents
loading

This manual is also suitable for:

Suse linux enterprise server 10

Table of Contents