Dell PowerVault MD3000 User Manual

Page 20

Advertising
background image

20

Storage Array

6 Configure Host Access — Set up one or more hosts to access the storage

array. See "Configuring Host Access" on page 43 for more information.

7 Configure storage array (2 options)

a

Automatic (Simple) configuration
• Step 1: Automatic Configuration — See "Creating Disk Groups

and Virtual Disks" on page 54 for more information.

• Step 2: Create Host-to-Virtual Disk Mappings — See "Creating

Host-to-Virtual Disk Mappings" on page 60 for more information.

b

Manual (Advanced) configuration
• Step 1: Create Virtual Disks — See "Manual Configuration" on

page 55 for more information.

• Step 2: Configure Hot Spare Physical Disks — See "Manually

Configuring Hot Spares" on page 59 for more information.

8 Manage iSCSI Settings — This option will be present only if your

controllers contain iSCSI host ports.

a

Change Target Authentication — Choose the authentication methods

and permissions (if required) for an initiator to access the target.

b

Enter Mutual Authentication Permissions — If initiators require

mutual authentication, you can enter permissions for the target to

access the initiator.

c

Change Target Identification — Define an alias for the target for easy

identification.

d

Change Target Discovery — Configure parameters for how the target

will be discovered on the network.

9 View and Enable Premium Features (Optional) — You may have

purchased premium features, including snapshot virtual disks and virtual

disk copies. See which premium features are currently available to you and

enable these features if they are currently turned off.

10 Configure Ethernet Management Ports (Optional) — Configure network

parameters for the Ethernet management ports managing a storage array

for out-of-band Ethernet connections.

Advertising