How tos
I want to...
- Configure iSCSI ports
If your controller includes an iSCSI host connection, you can configure the iSCSI port settings from the Hardware page or the System page. - Configure iSCSI authentication
For extra security in an iSCSI network, you can set authentication between controllers (targets) and hosts (initiators). System Manager uses the Challenge Handshake Authentication Protocol (CHAP) method, which validates the identity of targets and initiators during the initial link. Authentication is based on a shared security key called a CHAP secret . - Enable iSCSI discovery settings
You can enable settings related to the discovery of storage devices in an iSCSI network. The Target Discovery Settings allow you to register the storage array's iSCSI information using the Internet Storage Name Service (iSNS) protocol, and also determine whether to allow unnamed discovery sessions. - View iSCSI statistics packages
You can view data about the iSCSI connections to your storage array. - View iSCSI sessions
You can view detailed information about the iSCSI connections to your storage array. iSCSI sessions can occur with hosts or remote storage arrays in an asynchronous mirror relationship. - End iSCSI session
You can end an iSCSI session that is no longer needed. iSCSI sessions can occur with hosts or remote storage arrays in an asynchronous mirror relationship.
Give documentation feedback