Dell Computer Drive Computer Drive User Manual


 
20 Storage Array
6
Configure Host Access — Set up one or more hosts to access the storage
array. See "Configuring Host Access" on page 43 for more information.
7
Configure storage array (2 options)
a
Automatic (Simple) configuration
Step 1: Automatic Configuration — See "Creating Disk Groups
and Virtual Disks" on page 54 for more information.
Step 2: Create Host-to-Virtual Disk Mappings — See "Creating
Host-to-Virtual Disk Mappings" on page 60 for more information.
b
Manual (Advanced) configuration
Step 1: Create Virtual Disks — See "Manual Configuration" on
page 55 for more information.
Step 2: Configure Hot Spare Physical Disks — See "Manually
Configuring Hot Spares" on page 59 for more information.
8
Manage iSCSI Settings — This option will be present only if your
controllers contain iSCSI host ports.
a
Change Target Authentication — Choose the authentication methods
and permissions (if required) for an initiator to access the target.
b
Enter Mutual Authentication Permissions — If initiators require
mutual authentication, you can enter permissions for the target to
access the initiator.
c
Change Target Identification — Define an alias for the target for easy
identification.
d
Change Target Discovery — Configure parameters for how the target
will be discovered on the network.
9
View and Enable Premium Features (Optional) — You may have
purchased premium features, including snapshot virtual disks and virtual
disk copies. See which premium features are currently available to you and
enable these features if they are currently turned off.
10
Configure Ethernet Management Ports (Optional) — Configure network
parameters for the Ethernet management ports managing a storage array
for out-of-band Ethernet connections.