4 using iscsi, 5 event monitor, 6 about your host – Dell PowerVault MD3820f User Manual

Page 5

Advertising
background image

Setting A Password

........................................................................................................................ 51

Adding Or Editing A Comment To An Existing Storage Array

......................................................51

Removing Storage Arrays

..............................................................................................................52

Enabling Premium Features

.......................................................................................................... 52

Displaying Failover Alert

................................................................................................................ 52

Changing The Cache Settings On The Storage Array

..................................................................53

Changing Expansion Enclosure ID Numbers

............................................................................... 53

Changing The Enclosure Order

....................................................................................................53

Configuring Alert Notifications

...........................................................................................................54

Configuring E-mail Alerts

..............................................................................................................54

Configuring SNMP Alerts

...............................................................................................................55

Battery Settings

................................................................................................................................... 58

Changing The Battery Settings

..................................................................................................... 59

Setting The Storage Array RAID Controller Module Clocks

.............................................................. 59

4 Using iSCSI................................................................................................................61

Changing The iSCSI Target Authentication

........................................................................................61

Entering Mutual Authentication Permissions

..................................................................................... 61

Creating CHAP Secrets

....................................................................................................................... 62

Initiator CHAP Secret

.................................................................................................................... 62

Target CHAP Secret

...................................................................................................................... 62

Valid Characters For CHAP Secrets

.............................................................................................. 62

Changing The iSCSI Target Identification

.......................................................................................... 63

Changing The iSCSI Target Discovery Settings

................................................................................. 63

Configuring The iSCSI Host Ports

...................................................................................................... 64

Advanced iSCSI Host Port Settings

.....................................................................................................65

Viewing Or Ending An iSCSI Session

.................................................................................................. 65

Viewing iSCSI Statistics And Setting Baseline Statistics

..................................................................... 66

Edit, Remove, Or Rename Host Topology

.........................................................................................66

5 Event Monitor..........................................................................................................69

Enabling Or Disabling The Event Monitor

..........................................................................................69

Windows

........................................................................................................................................ 69

Linux

...............................................................................................................................................70

6 About Your Host......................................................................................................71

Configuring Host Access

.....................................................................................................................71

Using The Host Mappings Tab

............................................................................................................72

Defining A Host

..............................................................................................................................72

Removing Host Access

....................................................................................................................... 73

Managing Host Groups

....................................................................................................................... 73

Creating A Host Group

........................................................................................................................73

Advertising