SANRAD V-Switch Switch User Manual


 
Table of Contents 9
Working with SCSI Storage Devices 78
Maintaining Cluster Communications 78
Enabling and Disabling Failover 79
Further V-Switch Cluster Configurations 79
Viewing V-Switch Neighbor Details 80
MANAGING A CLUSTER...................................................................................................81
CHAPTER 6: VOLUME CONFIGURATION .............................................. 83
INTRODUCTION TO VOLUME CONFIGURATION ...................................................................84
IDENTIFYING AVAILABLE STORAGE DEVICES....................................................................85
CREATING A TRANSPARENT VOLUME ..............................................................................88
CREATING A SUBDISK (LUN CARVING) ...........................................................................90
CREATING A SIMPLE VOLUME .........................................................................................93
CREATING A CONCATENATED VOLUME............................................................................95
CREATING A STRIPED VOLUME .......................................................................................97
CREATING A MIRRORED VOLUME ..................................................................................100
Replicating Data in a Mirrored Volume 101
CREATING A RAID 10 AND RAID 0+1...........................................................................103
CHAPTER 7: VOLUME EXPOSURE & SECURITY.................................. 107
INTRODUCTION TO VOLUME EXPOSURE & SECURITY......................................................108
iSCSI Targets 108
Identities 109
Access Rights 111
Authentication 113
Default Identity 113
CREATING AN ISCSI TARGET........................................................................................115
Viewing iSCSI Targets 116
Viewing iSCSI Target Details 117
Viewing Access Rights 117
CHANGING THE DEFAULT IDENTITY................................................................................119
CREATING AN IDENTITY.................................................................................................120
ADDING INITIATORS TO AN IDENTITY ..............................................................................122
ASSIGNING IDENTITY CREDENTIALS...............................................................................125
Using a RADIUS Server 128
Viewing Configured RADIUS Servers 131
CONNECTING AN IDENTITY AND TARGET ........................................................................132
EXPOSING AN ISCSI TARGET AND LUN.........................................................................134
Viewing LUNs 136
CHAPTER 8: ADVANCED VOLUME OPERATIONS................................ 137
INTRODUCTION TO ADVANCED VOLUME CONFIGURATIONS .............................................138
Data Replication: Off-line versus On-line 138
Mirror versus Snapshot 138
Actual Capacity versus Potential Capacity 138
Resizing versus Expanding 138