SANRAD I3.1.1205 Switch User Manual


 
Table of Contents xi
Figure 5-2. Re-routing Storage Access with Off-line V-Switch ......................................................5-4
Figure 5-3. Cluster with Neighbor IP Addresses............................................................................5-7
Figure 6-1. Physical Storage used in Examples ............................................................................6-2
Figure 6-2. Transparent Volume 1 .................................................................................................6-7
Figure 6-3. Partitioning a Physical Volume.................................................................................... 6-8
Figure 6-4. Disk 1 before Subdisk..................................................................................................6-9
Figure 6-5. Disk 1 with 1 Subdisk.................................................................................................6-10
Figure 6-6. Disk 1 with 2 Subdisks...............................................................................................6-11
Figure 6-7. Simple Volume Block Distribution..............................................................................6-12
Figure 6-8. Simple Volume 1........................................................................................................6-13
Figure 6-9. Concatenated Volume Block Distribution ..................................................................6-14
Figure 6-10. Concatenated Volume 1 ..........................................................................................6-15
Figure 6-11. Striped Volume Block Distribution ...........................................................................6-16
Figure 6-12. Striped Volume 1 .....................................................................................................6-18
Figure 6-13. Mirrored Volume Block Distribution .........................................................................6-19
Figure 6-14. Mirrored Volume 1 ...................................................................................................6-20
Figure 6-15. RAID 10 Volume Block Distribution.........................................................................6-22
Figure 6-16. First Mirrored Volume of RAID 10 ...........................................................................6-23
Figure 6-17. Second Mirrored Volume of RAID 10 ......................................................................6-24
Figure 6-18. Striped Volume of RAID 10 .....................................................................................6-25
Figure 7-1. iSCSI Target Access.................................................................................................... 7-3
Figure 7-2. Identity A’s iSCSI Initiators ..........................................................................................7-3
Figure 7-3. Identity B’s iSCSI Initiators ..........................................................................................7-4
Figure 7-4. Identity C’s iSCSI Initiator............................................................................................7-4
Figure 7-5. Identities Coupled with Targets ...................................................................................7-5
Figure 7-6. Access Rights per Identity-Target Pair........................................................................7-6
Figure 7-7. iSCSI Initiator in Two Different Identities.....................................................................7-7
Figure 7-8. Identity with iSCSI Initiators and Credentials...............................................................7-8
Figure 7-9. Modifying Default Identities .........................................................................................7-9
Figure 7-10. Creating a Target.....................................................................................................7-12
Figure 7-11. Creating an Identity..................................................................................................7-17
Figure 7-12. Adding an Initiator....................................................................................................7-19
Figure 7-13. Adding a Second Initiator ........................................................................................7-20
Figure 7-14. Assigning Credentials..............................................................................................7-22
Figure 7-15. Adding Another Set of Credentials ..........................................................................7-23
Figure 7-16. Sending a CHAP Authentication Challenge ............................................................7-25
Figure 7-17. Logging in to a RADIUS Server...............................................................................7-27
Figure 7-18. Connecting a Target and Identity ............................................................................7-29
Figure 7-19. Exposing a Volume..................................................................................................7-32
Figure 8-1. Adding Another Child to a Mirror ................................................................................. 8-5
Figure 8-2. Creating a Mirror to Add Data Redundancy ................................................................8-6
Figure 8-3. Adding Sim6 to Mir4 ....................................................................................................8-7
Figure 8-4. 1
st
Snapshot Created...................................................................................................8-8
Figure 8-5. 1
st
Write to Source and Update to 1
st
Snapshot .......................................................... 8-9
Figure 8-6. 1
st
Snapshot...............................................................................................................8-11
Figure 8-7. Update to 1
st
Snapshot & 1
st
Write to Source............................................................8-11
Figure 8-8. 2
nd
Snapshot Created, Update to 1
st
Snapshot & 2
nd
Snapshot and Write to Source8-12
Figure 8-9. 3
rd
Snapshot Created, Update to 1
st
& 2
nd
Snapshot and Write to Source................8-13
Figure 8-10. Removing a Child from a Mirror...............................................................................8-17
Figure 8-11. Breaking a Mirror .....................................................................................................8-18