PRIMERGY BX600 10GbE LAN I/O Module (PCIe)

Size: px
Start display at page:

Download "PRIMERGY BX600 10GbE LAN I/O Module (PCIe)"

Transcription

1 Reference Guide PRIMERGY BX600 10GbE LAN I/O Module (PCIe) Microsoft Windows Server 2003 iscsiselect Reference Guide English

2 PRIMERGY BX600 10GbE LAN I/O Module (PCIe) Microsoft Windows Server 2003 iscsiselect Reference Guide Edition April 2008

3 Comments Suggestions Corrections The User Documentation Department would like to know your opinion on this manual. Your feedback helps us to optimize our documentation to suit your individual needs. Feel free to send us your comments by to: Certified documentation according to DIN EN ISO 9001:2000 To ensure a consistently high quality standard and user-friendliness, this documentation was created to meet the regulations of a quality management system which complies with the requirements of the standard DIN EN ISO 9001:2000. cognitas. Gesellschaft für Technik-Dokumentation mbh Copyright and Trademarks Copyright Fujitsu Siemens Computers GmbH All rights reserved. Delivery subject to availability; right of technical modifications reserved. All hardware and software names used are trademarks of their respective manufacturers. This manual is printed on paper treated with chlorine-free bleach.

4 Contents ABOUT THIS GUIDE... 1 AUDIENCE... 1 VIEWING DOCUMENT... 1 DOCUMENTATION FEEDBACK... 1 THE ISCSI ENVIRONMENT... 2 ISCSI OVERVIEW... 2 Constructing a Basic iscsi SAN... 2 Managing an iscsi Session... 3 iscsi Login... 3 Security... 3 THE ISCSISELECT UTILITY... 4 ABOUT ISCSISELECT... 4 Using iscsiselect... 4 RUNNING ISCSISELECT... 4 Running iscsiselect With Multiple Controllers... 5 Navigating iscsiselect... 6 Applying Changes and Exiting... 6 CONFIGURING THE ISCSI INITIATOR... 6 Target Discovery Through DHCP... 8 Viewing Network Properties... 9 Configuring and Viewing Controller Properties... 9 Discover Boot Target Confirming iscsi Target Connectivity CONFIGURING AND MANAGING THE ISCSI TARGET Configuring an iscsi Target Enabling CHAP Authentication Viewing iscsi Target Information Managing the Target Booting the System TROUBLESHOOTING GLOSSARY iii

5 About This Guide About this Guide The ServerEngines iscsiselect Reference Guide provides information for using the iscsiselect utility to configure and manage BladeEngine in an iscsi SAN environment. It includes information on: Configuring an initiator to automatically contact network devices Setting up iscsi boot target or targets Managing iscsi targets Troubleshooting iscsi Terminology Audience This guide is intended primarily for system administrators and support personnel who are familiar with the iscsi protocol and know the fundamentals of configuring network storage devices. Viewing Document To view or print the PDF Files, you will need Adobe s Acrobat Reader or Viewer software installed on the system. Acrobat is available from Adobe as a free download. For details visit Documentation Feedback You can your comments about this document to: documents@serverengines.com. 1

6 The iscsi Environment The iscsi Environment iscsi Overview The Internet Small Computer System Interface (iscsi) is an IP-based standard for linking data-storage devices over a network and transferring data by carrying SCSI commands over IP networks. An iscsi network consists of one or more iscsi storage units (targets) connected through CX4 copper cables and optical network cabling to 10Gb Ethernet network switches and/or IP routers. To this network, one or more servers are connected, which are responsible for transferring data to or from the storage units. When an operating system receives a request it generates the SCSI command and then sends an IP packet over an Ethernet connection. At the receiving end, the SCSI commands are separated from the request, and the SCSI commands and data are sent to the SCSI controller and then to the SCSI storage device. iscsi will also return a response to the request using the same protocol. All storage protocols including iscsi have two ends in the connection; the initiator and the target. In iscsi, they are known as the iscsi initiator and the iscsi target. Each server or machine directly accessing an iscsi target requires an iscsi initiator. It is the initiator that allows the host system to communicate directly with iscsi targets. Constructing a Basic iscsi SAN There are three main components that make up an iscsi SAN: iscsi Target(s) An iscsi SAN has one or more iscsi targets, which house and make available the storage used within the SAN. The iscsi target is the storage device itself or an appliance that controls and serves volumes or virtual volumes. The target is the device that performs the SCSI command or bridges it to an attached storage device. iscsi targets can be disks, RAID arrays, or even Fibre Channel (FC) fabrics. Networking infrastructure The networking infrastructure in an iscsi SAN uses Gigabit Ethernet transport. ServerEngines uses the BladeEngine 10Gb Enterprise I/O controller and BladeXchange 10Gb blade fabric technology for a 10Gb solution. The configuration and complexity of the storage network depends on its intended function and features required. iscsi Initiator(s) The initiator allows a given machine access to the storage available in the iscsi SAN. It requests all SCSI operations like read or write. An initiator is usually located on the host/server side either as hardware (iscsi host bus adapter (HBA)) or software (iscsi software initiator). 2

7 The iscsi Environment Managing an iscsi Session In order to transmit information from an initiator to the target, the initiator must first establish a session with the target through an iscsi login process. The login process: Starts a TCP/IP connection Verifies that the initiator has access to the target (authentication), and Allows negotiation of various parameters iscsi Login An iscsi session has two phases: Login Phase iscsi parameters are negotiated using login requests and responses. Full Featured Phase Once security/authentication has occurred and operational parameters have been set, the initiator begins to perform SCSI I/Os. Security Security is a necessary and critical party of the iscsi protocol because it operates within the Internet environment. The following are different security methods used by the iscsi environment. CHAP Authentication Challenge Handshake Authentication Protocol (CHAP) is used to periodically verify the identity of the initiator by the target by using a challenge/response mechanism. This is done upon initial link establishment and may be repeated any time after the link has been established. For the challenge/response method to work, the target must know the initiator's secret key and the initiator must be set up to respond to a challenge. Although the authentication is only one-way, you can negotiate CHAP in both directions for mutual authentication, with the help of the same secret set. 3

8 The iscsiselect Utility The iscsiselect Utility About iscsiselect ServerEngines iscsiselect is an Int 13h option ROM resident utility that you can use to configure and manage BladeEngine in an iscsi SAN environment. By configuring your initiator, you can use iscsiselect to automatically contact network devices and set up an iscsi boot target or targets. With iscsiselect you can: Configure an iscsi initiator on the network Ping targets to determine connectivity with the iscsi initiator Discover and display iscsi targets and corresponding LUNS Initiate boot target discovery through Dynamic Host Configuration Protocol (DHCP) Initiate target discovery through SLP Manually configure bootable iscsi targets View initiator properties View connected target properties Using iscsiselect To successfully configure and manage an iscsi SAN environment with iscsiselect, you must complete these tasks: Configure initiator name Configure the initiator network parameters Confirm that you can Ping your target Configure a single (bootable) target (optional) Login to the target Reboot your system Before you begin, you need to know the following facts about your network: Target IP address (for at least your bootable target) Initiator IQN name Initiator IP address Initiator Subnet Mask In addition, you will need to: Verify that the initiator s IQN name you choose is listed in the target s Access Control List (ACL) so that the targets are configured to recognize the iscsi initiator name. If using target discovery through DHCP, you need to add the root path to the DHCP server. For more information see Target Discovery Through DHCP. Running iscsiselect To run the iscsiselect utility, start or restart your computer. When prompted, press Ctrl+S. 4

9 The iscsiselect Utility ServerEngines iscsi Initiator BIOS v (c) ServerEngines Corporation. All Rights Reserved. (c) Adaptec, Inc. All Rights Reserved. Controller #0 Base 0xFE4A0000 at Bus:02 Dev:00 Fun:00 Press <Ctrl><S> for iscsiselect(tm)utility The main menu will appear after the BIOS initializes. Running iscsiselect With Multiple Controllers If you are running iscsiselect with multiple controllers, all your controllers will appear when you start the utility. To run the iscsiselect utility, start or restart your computer. When prompted, press Ctrl+S. ServerEngines iscsi Initiator BIOS v (c) ServerEngines Corporation. All Rights Reserved. (c) Adaptec, Inc. All Rights Reserved. Press <Ctrl><S> for iscsiselect(tm)utility Controller #0 Controller #1 iqn.int iqn.int

10 The iscsiselect Utility An Adapter Selection menu will appear after the BIOS initializes. Select your controller from this menu and press Enter. The main menu will appear after you select your controller. Navigating iscsiselect iscsiselect is a menu-driven utility and instructions for completing tasks appear on-screen. Menus can be navigated using the arrow keys and Enter, Esc, and other buttons on your keyboard. Navigation instructions and function key information is located at the bottom of the of the menu screens. For example: Applying Changes and Exiting 1. To exit iscsiselect, press Esc until you are prompted to exit. If you modified any settings, you are prompted to save the changes before you exit. 2. Select Yes to exit. Configuring the iscsi Initiator Once you have an initiator host system running, you must configure the initiator to allow access to the iscsi SAN. To do this: 1. From the main menu, select Adapter Configuration, then select Network Properties. 2. From the Network Properties, press Display/Set IP Address. 3. From the IP Address menu, type the IP address. 4. From the IP Address menu, type the Subnet Mask. 5. From the IP Address menu, type the Default Gateway information if necessary. 6. Press Save to save settings, then press Esc to return to the main menu. 6

11 The iscsiselect Utility The following is an example of an IP Address entry: IP Address The unique 32-bit address that specifies the location of each device or workstation in the Network. This address is required for communication to the iscsi SAN. An initiator with its own network interface must be assigned an IP address in the same range as the iscsi SAN. Subnet Mask Provides a way of segmenting networks. All hosts (iscsi initiators or targets) on the same physical network will usually have the same subnet mask. For instance, in the above example, the initiator is in the subnet xxx. The hosts (initiators or targets) on this network will have IP addresses with this prefix. Default Gateway A router on a computer network that serves as an access point to another network and that an initiator will use by default (any data to addresses not on the initiator s subnet will be sent through the default gateway). 7

12 The iscsiselect Utility Target Discovery Through DHCP For your target to be discovered by the initiator through DHCP, you will need to add the root path to the DHCP server. To do this: 1. From the DHCP Server screen, select Scope Options then right-click and select Configure Options. 2. From the General Tab scroll down the list of available options to find 017 Root Path and select it. 3. In the String Value box add the location of the iscsi Target that you will be using for iscsi Boot. Enter the string in the following format: iscsi:<ipaddress>:<protocol>:<iscsi port number>:<lun>:<target name> For example: iscsi: :0:3260:0:iqn.com.se.tgt1 4. When finished, select Apply. The DHCP server is now ready and can be used to discover boot targets. When you have finished adding the root path to the DHCP server, you can enable the DHCP option through iscsiselect. For more information see Discover Boot Target. 8

13 The iscsiselect Utility Viewing Network Properties You can view your network information by displaying the Network Properties menu. To view Network Properties: 1. From the main menu, select Adapter Configuration, then press Enter. 2. From the Adapter menu, select Network Properties, then press Enter. 3. From the Network Properties Menu you can view Network Properties and enable DHCP. By enabling DHCP from this menu, you can use DHCP to provide the initiator with an IP address. To enable DHCP, select DHCP and press Enabled. 4. Press Enter to accept your selection. Press Esc to return to the main menu. The following is an example of the Network Properties menu: Note: If you are using the DHCP server to obtain an IP address for your iscsi initiator, it is recommended that you set up a reservation. A reservation will assign a specific IP address based on the MAC address of your iscsi function. If you do not reserve an IP Address through DHCP, then you must set the lease length for the iscsi initiator IP address to unlimited. This allows the IP address lease not to expire. Configuring and Viewing Controller Properties Once your initiator host system is running, you can check your controller information with iscsiselect. From this menu you can also enable Boot and ICDS support and/or change the iscsi initiator name (IQN). To do this: 1. From the main menu, select Adapter Configuration then select Controller Properties. 2. Accept the defaults (Disabled) or enable Boot and/or ICDS support by selecting Enabled, and pressing Save. You can also change the iscsi Initiator Name before pressing Save. Note: The Identification Configuration and Directory Services (ICDS) support feature may not be available for your system. The following is an example of the Controller Properties menu: 9

14 The iscsiselect Utility Discover Boot Target With iscsiselect you can enable or disable the Boot Target Discovery option from the Discover Boot Target menu. To do this: 1. From the Adapter Menu, select Discover Boot Target. The following is an example of the Discover Boot Target menu: 2. To enable Boot Target Discovery, from the Discover Boot Target menu select Dynamic Host Control Protocol (DHCP) or Service Location Protocol (SLP) and press Enable. Disable is the default value. Note: If Boot support is disabled on the Controller Properties menu, you will not be able to boot from your iscsi devices. 10

15 The iscsiselect Utility Dynamic Host Control Protocol (DHCP) By enabling this option a DHCP server can be used to discover boot targets. You can only use this option if you have set up the root path to a DHCP server. For more information see Target Discovery Through DHCP. Service Location Protocol (SLP) By enabling this option an SLP server can be used to provide the iscsi initiator with an IP address and to discover boot targets. You can only use this option if you have SLP support. 1. When you receive this message, press Y: Controller Firmware will use DHCP (or SLP) to find Boot Target? 2. Press Save. Confirming iscsi Target Connectivity After you have configured your initiator, you may want to confirm connectivity with the target. You can do this by using the Ping feature. To Ping your Target: 1. From the main menu, select Target Configuration, then select Ping Target. 2. From the Ping Target menu, enter the IP address of the iscsi target you want to Ping. If your Ping is unsuccessful you will receive a failed message. Otherwise, you will be notified that your Ping is successful. The following is an example of a Successful Ping: Note: the Ping command will work for any IP address that supports ICMP (Echo). Configuring and Managing the iscsi Target Once you have configured your iscsi initiator and verified that you can Ping your target, you need to log into your target to establish your connection. Configuring an iscsi Target 1. From the main menu, select Target Configuration, then select Add Target. 2. From the Add Target menu, you can either enter the iscsi Target Name (optional), or leave the name blank for Send targets response. 3. Enter the IP address. 4. Enter the Port number (the default target port number is 3260). 11

16 The iscsiselect Utility 5. Select Y, if you want to enable the Persistent option. If you enable Persistent, your iscsi session will be automatically restored after you reboot your system. Caution: ServerEngines recommends that you leave the Login Parameters option as Default. 6. Press Login. If the firmware logs into the target a Login Successful message will be displayed. Enabling CHAP Authentication iscsiselect uses CHAP to authenticate initiators and targets for added network security. By using a challenge/response security mechanism, CHAP periodically verifies the identity of the initiator. This authentication method depends on a secret known only to the initiator and the target. Although the authentication can be one-way or you can negotiate CHAP in both directions with the help of the same secret set for Mutual authentication. To enable CHAP authentication with iscsiselect: 1. From the Main menu, select Target Configuration, then select Add Target. 2. Follow steps 2-5 in Configuring an ISCSI Target. 3. Tab to the Login Parameters field and select Custom, then press Enter. 4. Press Login. 5. From the Target menu, tab to Authentication Method and select One Way Chap or Mutual Chap and press Enter. 6. If you select One Way Chap, enter the Target chap name and Target chap secret, then press OK. Note: The Target/Initiator chap name and Target/Initiator chap secret can be any name or sequence of numbers. However, the name and secret on the target side must match the name and Target on the Initiator side. The following is an example of the One Way CHAP Options menu: 7. If you select Mutual Chap, enter the Target chap name, Target chap secret, Initiator chap name, and Initiator chap secret, then press OK. The following is an example of the Mutual Chap Options menu: 12

17 The iscsiselect Utility When you have successfully enabled the CHAP authentication, you will be taken back to the Add Target menu. Viewing iscsi Target Information After you have successfully logged into your target, you can view the details of your newly added target. To display your target information: 1. From the main menu, select Target Configuration, then select Manage Targets. The Target menu will only display information for the first 64 targets. Managing the Target With iscsiselect you can view your target information, but from the Target menu you can also apply some management options including target login in or logout. The function keys are located at the bottom of the menu and the options available on the screen are: Display Target Properties From the Target menu, press Enter to view target Properties, including compete name. For an example see Fehler! Verweisquelle konnte nicht gefunden werden. Delete Target From the Target menu, press Delete to delete the target. Login Target From the Target menu, press F5 to log into the target. Toggle Persistence From the Target menu, press F2 to toggle the Persistence attribute. Logout Target From the Target menu, press F6 to log out of the Target. 13

18 The iscsiselect Utility Display LUNs From the Target menu, press F7 to display the LUNs associated with the iscsi node. Toggle Primary Bootable From the Target menu, press F3 to toggle between any primary boot targets. Toggle Secondary Bootable From the Target menu, press F4 to toggle between any secondary boot targets. Note: Logging out of a non-persistent target will result in the target being deleted from the list. The following is an example of the Manage Target menu: The following is an example of the F7 Display LUN option: If there are no LUNS available you will receive the following message: No LUN available, please check your configuration on the Target. For more information see Problem 3 in the Troubleshooting section. 14

19 The iscsiselect Utility The following is an example of the Display Target Properties option: Booting the System After you have successfully configured the iscsi initiator and target, reboot the system. At the next boot the iscsi BIOS will log into the configured iscsi boot target and display its target/lun information in the BIOS sign-on banner. For example: ServerEngines iscsi Initiator BIOS v (c) ServerEngines Corporation. All Rights Reserved. (c) Adaptec, Inc. All Rights Reserved. Controller #0 Base 0xFE4A0000 at Bus:02 Dev:00 Fun:00 Press <Ctrl><S> for iscsiselect(tm) Utility Controller #0 Initiator iscsi Name: iqn com.serverengines.1 Initiator IP Address: Drive #0 NETAPP LUN MB Drive Geometry FE00 FE FE BIOS Installed Successfully! 15

20 Troubleshooting # Problem Solution(s) 1 ServerEngines iscsi BIOS banner is not displayed during system post. Appendix A Go to your motherboard BIOS configuration and make sure that Option ROM is enabled is set for the PCI-E slot into which the BladeEngine board is inserted. 2 Unable to Ping iscsi target IP address Check cable connections and make sure they are securely connected at both ends. Make sure the link light is on at both ends of the cable. Verify that you have assigned a valid IP address with the correct subnet mask to the interface(s) that are connected to the network. Check for Duplicate IP addresses If the IP address is coming from DHCP, check that the DHCP server is up and available. Is the target on a different subnet? Check the default gateway and make sure that the IP addresses of both the default gateway and the remote host are correct. 3 Login to iscsi target fails or Login succeeds but no LUNS are available. Check initiator IQN name and target IQN name. Verify that they are properly specified Check target s ACL settings (if any) to verify that the initiator s IQN name is listed and can be recognized Make sure that the target login parameters are compatible with the initiator s 4 Login to iscsi target is successful, but iscsi IO causes the system to hang or freeze. 5 You are unable to boot from your iscsi target Check the jumbo frame settings on the iscsi target. If enabled, change the frame size to 1514 and retry. This will isolate any problems in the network related to jumbo frames. Jumbo frames, when supported by the entire network, provide increased performance. Note: The BladeEngine supports jumbo frames. Check the Target setup, check Target ACL to verify that the initiator s iscsi name is listed and can be recognized Check Initiator name and make sure it is correct Verify in iscsiselect that you have marked your boot target as Primary bootable If applicable, verify that you have selected the iscsi LUN as the boot LUN in your system BIOS setting Check the system BIOS for boot device priority order. Make sure that the ServerEngines boot device is at the top (SE-xxxxxx) If using DHCP: 16

21 Appendix A If DHCP boot support is not enabled, enable it on the Controller Properties menu. For more information see Configuring and Viewing Controller Properties If DHCP boot support is enabled, check the DHCP setup and also verify that you have added the root path to the DHCP server. For more information see Target Discovery Through DHCP 6 If Problems 1-3, and 5 all fail Use the iscsiselect utility to clear the Adapter Configuration. To do this: 1. From the Adapter menu select Clear Configuration, then press Enter. 2. A message will appear asking if you want to clear the current configuration. Press Y. 3. You will be cautioned that the operation will remove any existing configuration permanently. Press Y. After you clear the Adapter Configuration, reboot the system and then reconfigure BladeEngine. 17

22 Glossary Glossary A Access Control List (ACL) A list of IQN s that are allowed to access a given target. ACLs are one way to enable security in an iscsi environment and ensure that only the initiators that should see a given target can. authentication Security measure designed to protect a communications system against fraudulent transmissions and establish the authenticity of a message. B blade server A server chassis housing multiple thin, modular electronic circuit boards, known as server blades. Each blade is a server in its own right, often dedicated to a single application. The blades are servers on a card, containing processors, memory integrated network controllers, an optional fiber channel host bus adaptor (HBA) and other input/output (IO) ports. block A sequence of text, commands, or records that are read, written, or processed as a unit. block I/O Allows direct access to random disk blocks in computer disk storage. Block storage is normally abstracted by a file system or database management system for use by applications and end users. The physical or logical volumes accessed through Block I/O may be devices internal to a server, direct attached through SCSI, Fibre Channel, or distant devices accessed through a SAN using a protocol such as iscsi. Database management systems often use their own Block I/O for improved performance and recoverability. C Challenge Handshake Authentication Protocol (CHAP) A technique to authenticate initiators and targets. Also known as a 3-way handshake, CHAP periodically verifies the identity of the initiator by using a challenge/response security mechanism. This happens at the time of establishing the initial link, and may happen again at any time afterward. The verification is based on a shared secret (such as the user's password). CHAP is defined as a one-way authentication method. However, you use CHAP in both directions to create a two-way authentication (Mutual). With two-way CHAP, a separate three-way handshake is initiated by each side. D default gateway A router on a computer network that serves as an access point to another network. discovery The automatic detection of a network topology change, for example, new and deleted nodes or links. Domain Name Service (DNS) An internet service that translates domain names into IP addresses. Every time you use a domain name, a DNS service translates the name into the corresponding IP address. Dynamic Host Configuration Protocol (DHCP) A communications protocol used by networked computers (clients) to obtain IP addresses and other parameters such as the default gateway, subnet masks, and IP addresses of DNS servers from a DHCP server, which has a list of addresses available for assignment. It facilitates access to a network because 18

23 Glossary these settings would otherwise have to be made manually for the client to participate in the network. For example, DHCP automatically assigns IP addresses to computers in a network. E encryption The translation of data into a secret code. Encryption is the most effective way to achieve data security. To read an encrypted file, you must have access to a secret key or password that enables you to decrypt it. Unencrypted data is called plain text while encrypted data is referred to as cipher text. F Fibre Channel Is a gigabit-speed network technology primarily used for storage networking. Fibre Channel fabric Is a set of interconnected HBAs, bridges, storage devices, and switches. A fabric can be thought of as a set of switches sharing inter-switch links (ISLs) together with the devices to which they are connected. A SAN installation often contains multiple fabrics for redundancy. Fully Qualified Domain Name (FQDN) Consists of a host and domain name including top-level domain. For example, is a fully qualified domain name. WWW is the host, xyz is the second-level domain, and.com is the top level domain. A FQDN always starts with a host name and continues all the way up to the top-level domain name. G gateway A device or program used to connect networks or systems with different network architectures. The systems may have different characteristics, such as different communication protocols, different network architecture, or different security policies, in which case the gateway performs a translation role as well as a connection role. I input/output (I/O) Pertaining to a device, process, channel, or communication path involved in data input, data output, or both. iscsi The Internet Small computer system interface is protocol used to transport SCSI commands, data, and status across an IP network. This protocol is connection-oriented, and is currently defined over TCP. iscsi uses a client- server relationship. The client end of the connection is an initiator, and sends SCSI commands; the server end of the connection is called a target, and receives and executes the commands. 19

24 Glossary iscsi Qualified Name (IQN) Is a name required by the initiator system to identify itself in the iscsi SAN. It must begin with the 3-letter qualifier of IQN. iscsi Session Identifies all the connections between and initiator and target. initiator A system (server, workstation, storage device, router, switch) that starts (initiates) the transfer of information or requests to/from an iscsi target. Internet Control Message Protocol (ICMP) A protocol chiefly used by the operating systems of networked computers to send error messages indicating, for instance, that a requested service is not available or that a host or router could not be reached. Internet Key Exchange (IKE) Is a key management protocol standard that is used in conjunction with the IPsec standard. IPsec can be configured without IKE, but IKE enhances IPSec by providing additional features, flexibility, and ease of configuration for the IPSec standard. Internet Protocol (IP) A protocol that routes data through a network or interconnected networks. IP acts as an intermediary between the higher protocol layers and the physical network. It specifies the format of packets (or datagrams), and the addressing scheme. Most networks combine IP with a higher-level TCP protocol, which establishes a virtual connection between a destination and a source. IP allows you to address a package and drop it in the system, but there's no direct link between you and the recipient. Internet Protocol (IP) address The unique 32-bit address that specifies the location of each device or workstation in the Internet. For example, is an IP address. The address field contains two parts: the first part is the network address; the second part is the host number. Internet Protocol (IP) Security (IPsec) Is a security protocol that provides encryption and authentication over the Internet. IPsec has been used widely to implement Virtual Private Networks (VPN). For IPsec to work, the sending and receiving devices must share a public key. This is accomplished through a protocol known as Internet Key Exchange, which allows the receiver to obtain a public key and authenticate the sender using digital certificates. Internet Storage Name Service (isns) Is a common discovery, naming, and resource management service for all the IP storage protocols. L Local Area Network (LAN) A network that connects several devices into a limited area (such as a single building or campus) and that can be connected to a larger network. 20

25 Glossary Logical unit number (LUN) A unique identifier used on a SCSI bus that enables it to differentiate between up to eight separate devices (each of which is a logical unit (LU)). Each LUN is a unique number that identifies a specific logical unit, which may be an end user, a file, or an application program. M Media Access Control (MAC) address A unique value associated with a network adapter. MAC addresses are also known as hardware addresses or physical addresses. They uniquely identify an adapter on a LAN. N node In networking, a point capable of sending and receiving data. A node can be a device, such as printer or workstation, a system, or a storage location on a disk. A location in a communications network that provides host-processing services. P persistent iscsi sessions that are automatically restored after the host reboots. Pertaining to data that is maintained across session boundaries, usually in nonvolatile storage such as a database system or a directory. port Can be: A hardware interface to which an I/O device is attached for the purpose of sending and receiving data. An entrance to or exit from a network. An end point for communication between applications, generally referring to a logical connection. A port provides queues for sending and receiving data. Each port has a port number for identification. An access point (for example, a logical unit) for data entry or exit. Protocol Data Unit (PDU) A unit of data exchanged between peer systems. S session See iscsi Session server blade A thin, modular electronic circuit board containing one, two, or more microprocessors and memory, that is intended for a single, dedicated application (such as serving Web pages) and that can be easily inserted into a blade server, which is a space-saving rack with many similar servers. Service Location Protocol (SLP) A protocol for querying lists of network resources. It identifies and uses network hosts without having to designate a specific network host name. It is a standard for local service delivery in an intranet. Storage Area Network (SAN) A network (referred to as a fabric) that transfers data between computer systems and storage elements. A SAN consists of a communication infrastructure, which provides physical connections, and a management layer, which organizes the connections, storage elements, and computer systems so that data transfer is secure and robust. The term SAN is usually (but not necessarily) identified with block I/O services rather 21

26 Glossary than file access services. A SAN consists of storage elements, storage devices, computer systems, and/or appliances, plus all control software, communicating over an ethernet network. subnet (subnetwork) An identifiably separate part of an organization's network; to divide a network into smaller interconnected, but independent subgroups. Typically, a subnet may represent all the machines at one geographic location, in one building, or on the same local area network (LAN). Having an organization's network divided into subnets allows it to be connected to the Internet with a single shared network address. subnet address In Internet communications, an extension to the basic IP addressing scheme where a portion of the host address is interpreted as the local network address. subnet mask Is a 4 byte (32-bit) number used to identify the sub-network ID and the host ID from an IP address. An IP address has two components, the network address and the host address. Looking at a network address and a subnet mask in binary, a device can determine which part of the address is the network address and which part is the host address. All the hosts in a sub-network will have the same subnet mask. For example, , , T TCP/IP Are Network Transmission Protocols that together establishes a connection between two hosts so that they can send messages back and forth for a period of time. Target Any device that responds to or communicates with the initiator, while terminating the TCP/IP protocol and the iscsi protocol. The target represents the iscsi storage component. Target discovery For an initiator to discover targets it needs to identify which devices on a network are storage devices and what IP addresses it needs to access them. A query to an isns server will return a list of IP addresses that an initiator has permission to access. Transmission Control Protocol (TCP) Is one of the main protocols in TCP/IP networks. TCP enables two hosts to establish a connection and exchange streams of data. TCP guarantees delivery of data and also guarantees that packets will be delivered in the same order in which they were sent. 22

27 Dieses Handbuch wurde erstellt von / This manual was produced by cognitas. Gesellschaft für Technik-Dokumentation mbh Herausgegeben von / Published by Fujitsu Siemens Computers GmbH Printed in the Federal Republic of Germany Ausgabe/Edition March 2008

28 Information on this document On April 1, 2009, Fujitsu became the sole owner of Fujitsu Siemens Computers. This new subsidiary of Fujitsu has been renamed Fujitsu Technology Solutions. This document from the document archive refers to a product version which was released a considerable time ago or which is no longer marketed. Please note that all company references and copyrights in this document have been legally transferred to Fujitsu Technology Solutions. Contact and support addresses will now be offered by Fujitsu Technology Solutions and have the The Internet pages of Fujitsu Technology Solutions are available at and the user documentation at Copyright Fujitsu Technology Solutions, 2009 Hinweise zum vorliegenden Dokument Zum 1. April 2009 ist Fujitsu Siemens Computers in den alleinigen Besitz von Fujitsu übergegangen. Diese neue Tochtergesellschaft von Fujitsu trägt seitdem den Namen Fujitsu Technology Solutions. Das vorliegende Dokument aus dem Dokumentenarchiv bezieht sich auf eine bereits vor längerer Zeit freigegebene oder nicht mehr im Vertrieb befindliche Produktversion. Bitte beachten Sie, dass alle Firmenbezüge und Copyrights im vorliegenden Dokument rechtlich auf Fujitsu Technology Solutions übergegangen sind. Kontakt- und Supportadressen werden nun von Fujitsu Technology Solutions angeboten und haben die Die Internetseiten von Fujitsu Technology Solutions finden Sie unter und unter finden Sie die Benutzerdokumentation. Copyright Fujitsu Technology Solutions, 2009

The activities described in these upgrade instructions may only be performed by engineers or maintenance/technical staff.

The activities described in these upgrade instructions may only be performed by engineers or maintenance/technical staff. Introduction The upgrade instructions show how to remove the standard power supply and replace it with a hotplug power supply. The following steps only apply to the PRIMERGY 400 and 00 tower servers.!

More information

Copyright (C) Fujitsu Siemens Computers GmbH 2005 All rights reserved

Copyright (C) Fujitsu Siemens Computers GmbH 2005 All rights reserved Fujitsu Siemens Computers GmbH SM2-TOOLS (BS2000/OSD) Version 7.5A Juli 2006 Release Notice Copyright (C) Fujitsu Siemens Computers GmbH 2005 All rights reserved Release Notice SM2-TOOLS V7.5A 1 General

More information

PRIMERGY S40-DF Capacity Extension

PRIMERGY S40-DF Capacity Extension Server PRIMERGY S40-DF Capacity Extension Xenia Fierley Siemens Nixdorf Informationssysteme AG ICP CS PS QM 3 81730 München e-mail: email: manuals@fujitsu-siemens.com Tel.: (089) 636-47896 Fax: 0 700 /

More information

WebTransactions V7.1. Supplement

WebTransactions V7.1. Supplement WebTransactions V7.1 Supplement Edition: December 2006 This manual describes the new functions in WebTransactions V7.1. It is intended to supplement the WebTransactions V7.0 manuals. Comments Suggestions

More information

R E L E A S E N O T I C E C O S M O S T O O L S V A. (c) Fujitsu Siemens Computers GmbH 2001

R E L E A S E N O T I C E C O S M O S T O O L S V A. (c) Fujitsu Siemens Computers GmbH 2001 R E L E A S E N O T I C E C O S M O S T O O L S V 1 4. 0 A (c) Fujitsu Siemens Computers GmbH 2001 Word and Excel are registered trademarks of Microsoft Postscript is a registered trademark of Adobe Contents

More information

Copyright (C) Fujitsu Siemens Computers GmbH 2005 All rights reserved

Copyright (C) Fujitsu Siemens Computers GmbH 2005 All rights reserved Fujitsu Siemens Computers GmbH DRV (BS2000/OSD) Version 3.1A November 2005 Release Notice Copyright (C) Fujitsu Siemens Computers GmbH 2005 All rights reserved Release Notice DRV V3.1A 1 General 2 1.1

More information

FUJITSU SIEMENS COMPUTERS. Release Notice PCMX (LINUX-S390) V6.0A. Table of Contents

FUJITSU SIEMENS COMPUTERS. Release Notice PCMX (LINUX-S390) V6.0A. Table of Contents FUJITSU SIEMENS COMPUTERS Release Notice PCMX (LINUX-S390) V6.0A Table of Contents 1 General 1.1 Documentation 2 Notes on product use 2.1 Software/hardware configuration 2.1.1 Operating system 2.2 Resource

More information

Copyright (C) Fujitsu Siemens Computers GmbH 2008 All rights reserved

Copyright (C) Fujitsu Siemens Computers GmbH 2008 All rights reserved Fujitsu Siemens Computers GmbH XHCS-SYS (BS2000/OSD) Version 2.0A June 2008 Release Notice Copyright (C) Fujitsu Siemens Computers GmbH 2008 All rights reserved Release Notice XHCS-SYS V2.0A 1 General

More information

Fujitsu Siemens Computers. internet Value Edition. Version 1.0B. July Release Notice

Fujitsu Siemens Computers. internet Value Edition. Version 1.0B. July Release Notice Fujitsu Siemens Computers internet Value Edition Version 1.0B July 2002 Release Notice Copyright (C) Fujitsu Siemens Computers 2002 All rights reserved Release Notice internet Value Edition V1.0B 1 General.....................

More information

chipdisk for RemoteView

chipdisk for RemoteView PRIMERGY chipdisk for RemoteView Xenia Fierley Siemens Nixdorf Informationssysteme AG Primergy 81730 Munich e-mail: Internet:DOCetc@mchp.siemens.de Tel.: (089) 636-47896 Fax: (++ 49) 89 6 36-4 87 17 U41102-J-Z156-1-74

More information

Copyright (C) Fujitsu Siemens Computers GmbH 2004 All rights reserved

Copyright (C) Fujitsu Siemens Computers GmbH 2004 All rights reserved Fujitsu Siemens Computers GmbH A I D Version 3.1 November 2004 Release Notice Copyright (C) Fujitsu Siemens Computers GmbH 2004 All rights reserved Release Notice AID V3.1 1 General....................

More information

FibreCAT TXF Backup Subsystem. Service Supplement

FibreCAT TXF Backup Subsystem. Service Supplement FibreCAT TXF Backup Subsystem Service Supplement Edition October 2008 Comments Suggestions Corrections The User Documentation Department would like to know your opinion of this manual. Your feedback helps

More information

Using Egenera Virtualized Boot Services

Using Egenera Virtualized Boot Services Using Egenera Virtualized Boot Services For BladeFrame BF400 S2 and BladeFrame BF200 Document Number 432-SB0045 September 2008 EVBS1.0_BF_1 Copyright Copyright 2008 Egenera, Inc. All rights reserved. This

More information

Copyright (C) Fujitsu Siemens Computers GmbH 2005 *3 All rights reserved *3

Copyright (C) Fujitsu Siemens Computers GmbH 2005 *3 All rights reserved *3 Fujitsu Siemens Computers GmbH CRTE (BS2000/OSD) Version 2.4C *4 October 2005 *4 Release Notice Copyright (C) Fujitsu Siemens Computers GmbH 2005 *3 All rights reserved *3 Release Notice CRTE V2.4C 1 General.....................

More information

Emanate Master 1.3. Readme. Edition June 2000

Emanate Master 1.3. Readme. Edition June 2000 Solaris Emanate Master 1.3 Readme Redakteur Fujitsu Siemens Computers GmbH Paderborn 33094 Paderborn e-mail: email: manuals@fujitsu-siemens.com Tel.: (089) 636-00000 Fax: (++49) 700 / 372 00001 Bestellnummer

More information

Streamer DAT160 Half-Height 80GB/160GB, USB 2.0

Streamer DAT160 Half-Height 80GB/160GB, USB 2.0 User Guide English Streamer DAT160 Half-Height 80GB/160GB, USB 2.0 Streamer DAT160 Half-Height 80GB/160GB, USB 2.0 User Guide Edition November 2008 Comments Suggestions Corrections The User Documentation

More information

Produktfamilie PRIMERGY RX200 S2

Produktfamilie PRIMERGY RX200 S2 Produktfamilie PRIMERGY RX200 S2 D1790 Setup Utility Hans-Joachim Kneba Fujitsu Siemens Computers GmbH Paderborn 33094 Paderborn e-mail: email: manuals@fujitsu-siemens.com Tel.: 05251/8-14865 Fax: (++49)

More information

The MTC Autoloader FibreCAT TX24 - Use with OSD/XC at SX Servers -

The MTC Autoloader FibreCAT TX24 - Use with OSD/XC at SX Servers - The MTC Autoloader FibreCAT TX24 - Use with OSD/XC at SX Servers - Readme File Contents 1 Introduction...2 2 Characteristics...4 2.1 General Characteristics...4 2.2 Release with OSD/XC...4 2.3 Hardware,

More information

LAN Manager/X V2.2. (SINIX) SNMP Service. System Administator's Guide

LAN Manager/X V2.2. (SINIX) SNMP Service. System Administator's Guide LAN Manager/X V2.2 (SINIX) SNMP Service System Administator's Guide Is there anything you want to tell us about this manual? Please send us your comments, quoting the order number of the manual. Siemens

More information

This symbol is followed by supplementary information, remarks and tips.

This symbol is followed by supplementary information, remarks and tips. Introduction This Technical Manual describes the system boards of the PRIMERGY 870 server systems, which can be equipped with up to four Intel Xeon processors. You may find further information in the description

More information

Release Information for FlexFrame V4.0A10 for SAP

Release Information for FlexFrame V4.0A10 for SAP Release Information for FlexFrame V4.0A10 for SAP Copyright 2008 Fujitsu Siemens Computers Table of Contents General... 1 Ordering... 1 Delivery... 1 Documentation... 2 Software Extensions / New Functionality...

More information

PAN Manager Feature Summary

PAN Manager Feature Summary PAN Manager Feature Summary For BladeFrame BF400 S2 and BladeFrame BF200 Document Number 430-SB0073 August 2008 PM5.2_BF Copyright Copyright 2008 Egenera, Inc. All rights reserved. This document, and the

More information

STREAMER 30/60 GBYTE BETRIEBSANLEITUNG OPERATING MANUAL

STREAMER 30/60 GBYTE BETRIEBSANLEITUNG OPERATING MANUAL STREAMER 30/60 GBYTE BETRIEBSANLEITUNG OPERATING MANUAL Dieses Handbuch wurde auf Recycling-Papier gedruckt. This manual has been printed on recycled paper. Ce manuel est imprimé sur du papier recyclé.

More information

SLR 50/100 GBYTE BETRIEBSANLEITUNG OPERATING MANUAL

SLR 50/100 GBYTE BETRIEBSANLEITUNG OPERATING MANUAL SLR 50/100 GBYTE BETRIEBSANLEITUNG OPERATING MANUAL Dieses Handbuch wurde auf Recycling-Papier gedruckt. This manual has been printed on recycled paper. Ce manuel est imprimé sur du papier recyclé. Este

More information

STREAMER VXA /320 GB

STREAMER VXA /320 GB Operating Manual English STREAMER VXA-320 160/320 GB Are there...... any technical problems or other questions you need clarified? Please contact our Help Desk (see warranty card). The latest information

More information

INSTALLATION GUIDE System Console Software 2.0 for Solaris Environment

INSTALLATION GUIDE System Console Software 2.0 for Solaris Environment INSTALLATION GUIDE System Console Software 2.0 for Solaris Environment High Risk Activity The Customer acknowledges and agrees that the Product is designed, developed and manufactured as contemplated for

More information

PRIMERGY BX630 S2 Scalable Server Blade. Options Guide

PRIMERGY BX630 S2 Scalable Server Blade. Options Guide PRIMERGY BX630 S2 Scalable Server Blade Options Guide Edition October 2007 Comments Suggestions Corrections The User Documentation Department would like to know your opinion of this manual. Your feedback

More information

PRIMERGY 670 Converting Guide

PRIMERGY 670 Converting Guide PRIMERGY 670 Converting Guide Server Systems A26361-K531-Z101-1-7419 Edition March 1999 Copyright and Trademarks Intel and Pentium are registered trademarks of Intel Corporation, USA. NetWare and Novell

More information

PRIMERGY TX200 S3 Server

PRIMERGY TX200 S3 Server PRIMERGY PRIMERGY TX200 S3 Server Service Supplement Susanne Däschlein Fujitsu Siemens Computers GmbH München 81730 München e-mail: email: manuals@fujitsu-siemens.com Tel.: (089) 61001155 Fax: (++49) 700

More information

8 Mailsender. internet Services V3.1A 1

8 Mailsender. internet Services V3.1A 1 8 Mailsender Files can be sent and processed as e-mail in BS2000/OSD using a local user agent, the BS2000/OSD Mailsender. The BS2000/OSD Mailsender allows you to send automated lists as e-mail from BS2000/OSD

More information

SESAM-DBAccess (JDBC) V4.0A. Server Installation, Administration

SESAM-DBAccess (JDBC) V4.0A. Server Installation, Administration SESAM-DBAccess (JDBC) V4.0A Server Installation, Administration Edition December 2005 Comments Suggestions Corrections The User Documentation Department would like to know your opinion on this manual.

More information

PRIMERGY Econel 100 Server System

PRIMERGY Econel 100 Server System PRIMERGY PRIMERGY Econel 100 Server System Service Supplement Susanne Däschlein Fujitsu Siemens Computers GmbH München 81730 München e-mail: email: manuals@fujitsu-siemens.com Tel.: (0 89) 61 001-155 Fax:

More information

PRIMERGY Econel 200 S2 Server

PRIMERGY Econel 200 S2 Server PRIMERGY PRIMERGY Econel 200 S2 Server Options Guide Susanne Däschlein Fujitsu Siemens Computers GmbH München 81730 Munich e-mail: email: manuals@fujitsu-siemens.com Tel.: (089) 61001-155 Fax: (++49) 700

More information

SESAM-DBAccess (JDBC) V5.0A. Server Installation, Administration

SESAM-DBAccess (JDBC) V5.0A. Server Installation, Administration SESAM-DBAccess (JDBC) V5.0A Server Installation, Administration Edition December 2006 Comments Suggestions Corrections The User Documentation Department would like to know your opinion on this manual.

More information

PRIMERGY TX150 S5 Server

PRIMERGY TX150 S5 Server PRIMERGY PRIMERGY TX150 S5 Server Service Supplement Susanne Däschlein Fujitsu Siemens Computers GmbH München 81730 München e-mail: email: manuals@fujitsu-siemens.com Tel.: (089) 61001155 Fax: (++49) 700

More information

iscsi Boot from SAN with Dell PS Series

iscsi Boot from SAN with Dell PS Series iscsi Boot from SAN with Dell PS Series For Dell PowerEdge 13th generation servers Dell Storage Engineering September 2016 A Dell Best Practices Guide Revisions Date November 2012 September 2016 Description

More information

PRIMERGY RX100 S3 Server System

PRIMERGY RX100 S3 Server System PRIMERGY PRIMERGY RX100 S3 Server System Options Guide Susanne Däschlein Fujitsu Siemens Computers GmbH München 81730 München e-mail: email: manuals@fujitsu-siemens.com Tel.: (089) 61001155 Fax: (++49)

More information

System Board D2619 for RX/TX300 S5. Technical Manual

System Board D2619 for RX/TX300 S5. Technical Manual System Board D2619 for RX/TX300 S5 Technical Manual Edition April 2009 Comments Suggestions Corrections The User Documentation Department would like to know your opinion of this manual. Your feedback helps

More information

Streamer LTO-3 half height 400GB/800GB SCSI Ultra320

Streamer LTO-3 half height 400GB/800GB SCSI Ultra320 Operating Manual English Streamer LTO-3 half height 400GB/800GB SCSI Ultra320 Are there...... any technical problems or other questions you need clarified? Please contact our Help Desk (see warranty card

More information

Networking interview questions

Networking interview questions Networking interview questions What is LAN? LAN is a computer network that spans a relatively small area. Most LANs are confined to a single building or group of buildings. However, one LAN can be connected

More information

Advanced iscsi Management April, 2008

Advanced iscsi Management April, 2008 April, 2008 Gene Nagle, istor Networks SNIA Legal Notice The material contained in this tutorial is copyrighted by the SNIA. Member companies and individuals may use this material in presentations and

More information

PRIMERGY BX630 Scalable Server Blade

PRIMERGY BX630 Scalable Server Blade PRIMERGY PRIMERGY BX630 Scalable Server Blade Service Supplement Redakteur Fujitsu Siemens Computers GmbH Paderborn 33094 Paderborn e-mail: email: manuals@fujitsu-siemens.com Tel.: (089) 61001-??? Fax:

More information

Dell EqualLogic Red Hat Enterprise Linux 6.2 Boot from SAN

Dell EqualLogic Red Hat Enterprise Linux 6.2 Boot from SAN Dell EqualLogic Red Hat Enterprise Linux 6.2 Boot from SAN A Dell EqualLogic best practices technical white paper Storage Infrastructure and Solutions Engineering Dell Product Group November 2012 2012

More information

System board D2004 for RX100 S3

System board D2004 for RX100 S3 PRIMERGY System board D2004 for RX100 S3 Technical manual Däschlein Fujitsu Siemens Computers GmbH München 81730 Munich e-mail: email: manuals@fujitsu-siemens.com Tel.: (089) 61001-155 Fax: (++49) 700

More information

QLogic iscsi Boot for HP FlexFabric Adapters User Guide

QLogic iscsi Boot for HP FlexFabric Adapters User Guide QLogic iscsi Boot for HP FlexFabric Adapters User Guide Abstract This document is for the person who installs, administers, and troubleshoots servers and storage systems. HP assumes you are qualified in

More information

System Management Console Security Development Guide C120-E142-01EN

System Management Console Security Development Guide C120-E142-01EN System Management Console Security Development Guide C120-E142-01EN Trademarks and Acknowledgement UNIX is a registered trademark in the United States and other countries, licensed exclusively through

More information

FUJITSU Software ServerView Suite ServerView Installation Manager

FUJITSU Software ServerView Suite ServerView Installation Manager User Guide - English FUJITSU Software ServerView Suite ServerView Installation Manager Edition June 2017 Comments Suggestions Corrections The User Documentation Department would like to know your opinion

More information

PRIMERGY BX630 S2 Scalable Server-Blade. Service Supplement

PRIMERGY BX630 S2 Scalable Server-Blade. Service Supplement PRIMERGY BX630 S2 Scalable Server-Blade Service Supplement Edition December 2007 Comments Suggestions Corrections The User Documentation Department would like to know your opinion of this manual. Your

More information

System Board D2559 for TX150 S6. Technical Manual

System Board D2559 for TX150 S6. Technical Manual System Board D2559 for TX150 S6 Technical Manual Edition November 2007 Comments Suggestions Corrections The User Documentation Department would like to know your opinion of this manual. Your feedback helps

More information

System board D2020 for Econel 200

System board D2020 for Econel 200 Produktfamilie System board D2020 for Econel 200 Technical manual Redakteur Fujitsu Siemens Computers GmbH München 81730 Munich e-mail: email: manuals@fujitsu-siemens.com Tel.: (089) 61001-??? Fax: (++49)

More information

PRIMERGY Econel 100 Server System

PRIMERGY Econel 100 Server System PRIMERGY PRIMERGY Econel 100 Server System Options Guide Susanne Däschlein Fujitsu Siemens Computers GmbH München 81730 Munich e-mail: email: manuals@fujitsu-siemens.com Tel.: (0 89) 61 001-155 Fax: (++49)

More information

Data Migration from Dell PS Series or PowerVault MD3 to Dell EMC SC Series Storage using Thin Import

Data Migration from Dell PS Series or PowerVault MD3 to Dell EMC SC Series Storage using Thin Import Data Migration from Dell PS Series or PowerVault MD3 to Dell EMC SC Series Storage using Thin Import Abstract The Thin Import feature of Dell Storage Center Operating System offers solutions for data migration

More information

System Board D2785 for TX120 S2. Technical Manual

System Board D2785 for TX120 S2. Technical Manual System Board D2785 for TX120 S2 Technical Manual Edition April 2009 Comments Suggestions Corrections The User Documentation Department would like to know your opinion of this manual. Your feedback helps

More information

American Dynamics RAID Storage System iscsi Software User s Manual

American Dynamics RAID Storage System iscsi Software User s Manual American Dynamics RAID Storage System iscsi Software User s Manual Release v2.0 April 2006 # /tmp/hello Hello, World! 3 + 4 = 7 How to Contact American Dynamics American Dynamics (800) 507-6268 or (561)

More information

PRIMERGY RX200 S3 Server. Options Guide

PRIMERGY RX200 S3 Server. Options Guide PRIMERGY RX200 S3 Server Options Guide Edition August 2006 Comments Suggestions Corrections The User Documentation Department would like to know your opinion of this manual. Your feedback helps us optimize

More information

Using iscsi with BackupAssist. User Guide

Using iscsi with BackupAssist. User Guide User Guide Contents 1. Introduction... 2 Documentation... 2 Terminology... 2 Advantages of iscsi... 2 Supported environments... 2 2. Overview... 3 About iscsi... 3 iscsi best practices with BackupAssist...

More information

Configuring Server Boot

Configuring Server Boot This chapter includes the following sections: Boot Policy, page 1 UEFI Boot Mode, page 2 UEFI Secure Boot, page 3 CIMC Secure Boot, page 3 Creating a Boot Policy, page 5 SAN Boot, page 6 iscsi Boot, page

More information

Assignment No. SAN. Title. Roll No. Date. Programming Lab IV. Signature

Assignment No. SAN. Title. Roll No. Date. Programming Lab IV. Signature Assignment No. Title (A-6) SAN Roll No. Class T.E. Date Subject Programming Lab IV Signature Assignment no: (A-6) Title: Study of Storage Area Network (SAN). Problem Statement: Design and Setup LAN with

More information

iscsi Protocols iscsi, Naming & Discovery, Boot, MIBs John Hufferd, Sr. Technical Staff IBM SSG

iscsi Protocols iscsi, Naming & Discovery, Boot, MIBs John Hufferd, Sr. Technical Staff IBM SSG iscsi Protocols iscsi, Naming & Discovery, Boot, MIBs John Hufferd, Sr. Technical Staff IBM SSG hufferd@us.ibm.com What is iscsi? iscsi is a transport protocol for SCSI that operates on top of TCP through

More information

iscsi Security Overview

iscsi Security Overview iscsi Security Overview Otakar Likar, Chris Odhner Network Appliance March 2005 TR 3338 TECHNICAL REPORT Network Appliance, a pioneer and industry leader in data storage technology, helps organizations

More information

openft_ux-readme.txt Fujitsu Siemens Computers openft V8.1A20 for Unix systems openft-ftam V8.0B for Unix systems March 2006 Release notice

openft_ux-readme.txt Fujitsu Siemens Computers openft V8.1A20 for Unix systems openft-ftam V8.0B for Unix systems March 2006 Release notice Fujitsu Siemens Computers openft V8.1A20 for Unix systems openft-ftam V8.0B for Unix systems March 2006 Release notice RELEASE NOTICE openft V8.1A20 for Unix systems openft-ftam V8.0B for Unix systems

More information

Technical Brief: Titan & Alacritech iscsi Accelerator on Microsoft Windows

Technical Brief: Titan & Alacritech iscsi Accelerator on Microsoft Windows Technical Brief: Titan & Alacritech iscsi Accelerator on Microsoft Windows Abstract In today s information age, enterprise business processing & information systems are growing at an incredibly fast pace

More information

3.1. Storage. Direct Attached Storage (DAS)

3.1. Storage. Direct Attached Storage (DAS) 3.1. Storage Data storage and access is a primary function of a network and selection of the right storage strategy is critical. The following table describes the options for server and network storage.

More information

iscsi Technology: A Convergence of Networking and Storage

iscsi Technology: A Convergence of Networking and Storage HP Industry Standard Servers April 2003 iscsi Technology: A Convergence of Networking and Storage technology brief TC030402TB Table of Contents Abstract... 2 Introduction... 2 The Changing Storage Environment...

More information

USING ISCSI AND VERITAS BACKUP EXEC 9.0 FOR WINDOWS SERVERS BENEFITS AND TEST CONFIGURATION

USING ISCSI AND VERITAS BACKUP EXEC 9.0 FOR WINDOWS SERVERS BENEFITS AND TEST CONFIGURATION WHITE PAPER Maximize Storage Networks with iscsi USING ISCSI AND VERITAS BACKUP EXEC 9.0 FOR WINDOWS SERVERS BENEFITS AND TEST CONFIGURATION For use with Windows 2000 VERITAS Software Corporation 03/05/2003

More information

Configuring iscsi in a VMware ESX Server 3 Environment B E S T P R A C T I C E S

Configuring iscsi in a VMware ESX Server 3 Environment B E S T P R A C T I C E S Configuring iscsi in a VMware ESX Server 3 Environment B E S T P R A C T I C E S Contents Introduction...1 iscsi Explained...1 Initiators...1 Discovery and Logging On...2 Authentication...2 Designing the

More information

Mobile MOUSe ROUTING AND SWITCHING FUNDAMENTALS ONLINE COURSE OUTLINE

Mobile MOUSe ROUTING AND SWITCHING FUNDAMENTALS ONLINE COURSE OUTLINE Mobile MOUSe ROUTING AND SWITCHING FUNDAMENTALS ONLINE COURSE OUTLINE COURSE TITLE ROUTING AND SWITCHING FUNDAMENTALS COURSE DURATION 16 Hour(s) of Self-Paced Interactive Training COURSE OVERVIEW In the

More information

Trademarks. Statement of Conditions by NETGEAR, Inc. All rights reserved.

Trademarks. Statement of Conditions by NETGEAR, Inc. All rights reserved. 2004 by NETGEAR, Inc. All rights reserved. Trademarks @2004 NETGEAR, Inc. NETGEAR, the Netgear logo, The Gear Guy and Everybody s connecting are trademarks of Netgear, Inc. in the United States and/or

More information

Flash Image for 3200 and 8200 Series Adapters. Table of Contents

Flash Image for 3200 and 8200 Series Adapters. Table of Contents Flash Image for 3200 and 8200 Series Adapters QLogic Corporation All rights reserved Table of Contents 1 Package Contents 1.1 Update the Flash Image 2 FCoE BIOS (8200 Series only) 2.1 Supported Features

More information

STORAGE CONSOLIDATION WITH IP STORAGE. David Dale, NetApp

STORAGE CONSOLIDATION WITH IP STORAGE. David Dale, NetApp STORAGE CONSOLIDATION WITH IP STORAGE David Dale, NetApp SNIA Legal Notice The material contained in this tutorial is copyrighted by the SNIA. Member companies and individuals may use this material in

More information

STORAGE CONSOLIDATION WITH IP STORAGE. David Dale, NetApp

STORAGE CONSOLIDATION WITH IP STORAGE. David Dale, NetApp STORAGE CONSOLIDATION WITH IP STORAGE David Dale, NetApp SNIA Legal Notice The material contained in this tutorial is copyrighted by the SNIA. Member companies and individuals may use this material in

More information

A+ Guide to Software: Managing, Maintaining, and Troubleshooting, 5e. Chapter 8 Networking Essentials

A+ Guide to Software: Managing, Maintaining, and Troubleshooting, 5e. Chapter 8 Networking Essentials A+ Guide to Software: Managing, Maintaining, and Troubleshooting, 5e Chapter 8 Networking Essentials Objectives Learn about the protocols and standards Windows uses for networking Learn how to connect

More information

Citrix XenServer with Dell SC Series Storage Configuration and Deployment

Citrix XenServer with Dell SC Series Storage Configuration and Deployment Citrix XenServer with Dell SC Series Storage Configuration and Deployment Dell Storage Engineering January 2017 A Dell EMC Deployment and Configuration Guide Revisions Date January 2016 Description Initial

More information

English ETERNUS CS800 S4. OST Guide

English ETERNUS CS800 S4. OST Guide English ETERNUS CS800 S4 OST Guide Edition November 2012 Comments Suggestions Corrections The User Documentation Department would like to know your opinion on this manual. Your feedback helps us to optimize

More information

Identify the features of network and client operating systems (Windows, NetWare, Linux, Mac OS)

Identify the features of network and client operating systems (Windows, NetWare, Linux, Mac OS) Course Outline Network+ Duration: 5 days (30 hours) Learning Objectives: Install and configure a network card Define the concepts of network layers Understand and implement the TCP/IP protocol Install

More information

Technical Manual. Mainboard D1483. English

Technical Manual. Mainboard D1483. English answers 2 Technical Manual Mainboard D1483 English Are there...... any technical problems or other questions you need clarified? Please contact: your sales partner your sales outlet You will find further

More information

Defining IPsec Networks and Customers

Defining IPsec Networks and Customers CHAPTER 4 Defining the IPsec Network Elements In this product, a VPN network is a unique group of targets; a target can be a member of only one network. Thus, a VPN network allows a provider to partition

More information

Configuring Cisco UCS Server Pools and Policies

Configuring Cisco UCS Server Pools and Policies This chapter contains the following sections: Global Equipment Policies, page 1 UUID Pools, page 4 Server Pools, page 5 Management IP Pool, page 7 Boot Policy, page 8 Local Disk Configuration Policy, page

More information

x10sure 3.2 One to one recover after repair

x10sure 3.2 One to one recover after repair x10sure 3.2 One to one recover after repair 1 1:1 WITH EXTERNAL STORAGE 2 1.1 After power failure etc. 2 1.2 After repair 2 1.3 After replacement of the failed node 3 1.3.1 Boot device via FC 3 1.3.2 Boot

More information

COPYRIGHTED MATERIAL. Windows Server 2008 Storage Services. Chapter. in this chapter:

COPYRIGHTED MATERIAL. Windows Server 2008 Storage Services. Chapter. in this chapter: Chapter 1 Windows Server 2008 Storage Services Microsoft Exam Objectives covered in this chapter: ÛÛConfigure storage. May include but is not limited to: RAID types, Virtual Disk Specification (VDS) API,

More information

Configuring Cisco UCS Server Pools and Policies

Configuring Cisco UCS Server Pools and Policies This chapter contains the following sections: Global Equipment Policies, page 1 UUID Pools, page 3 Server Pools, page 5 Management IP Pool, page 7 Boot Policy, page 8 Local Disk Configuration Policy, page

More information

ZENworks for Desktops Preboot Services

ZENworks for Desktops Preboot Services 3.2 Novell ZENworks for Desktops Preboot Services DEPLOYMENT www.novell.com Legal Notices Novell, Inc. makes no representations or warranties with respect to the contents or use of this documentation,

More information

HP OpenVMS Software-Based iscsi Initiator Technology Demonstration Kit Configuration and User s Guide

HP OpenVMS Software-Based iscsi Initiator Technology Demonstration Kit Configuration and User s Guide HP OpenVMS Software-Based iscsi Initiator Technology Demonstration Kit Configuration and User s Guide November 2007 This manual describes how to configure and use the HP OpenVMS Software-Based iscsi Initiator

More information

Fujitsu Siemens Computers. internet Services (BS2000/OSD) Version 3.1A May Release Notice

Fujitsu Siemens Computers. internet Services (BS2000/OSD) Version 3.1A May Release Notice Fujitsu Siemens Computers internet Services (BS2000/OSD) Version 3.1A May 2005 Release Notice Copyright (C) Fujitsu Siemens Computers 2005 All rights reserved Release Notice internet Services V3.1A 1 General

More information

VMware vsphere Storage Appliance Installation and Configuration

VMware vsphere Storage Appliance Installation and Configuration VMware vsphere Storage Appliance Installation and Configuration vsphere Storage Appliance 1.0 vsphere 5.0 This document supports the version of each product listed and supports all subsequent versions

More information

PRIMERGY ServerView Suite ServerView Performance Manager

PRIMERGY ServerView Suite ServerView Performance Manager - English PRIMERGY ServerView Suite ServerView Performance Manager ServerView Operations Manager V4.90 Edition February 2018 Comments Suggestions Corrections The User Documentation Department would like

More information

Chapter 6: Network Layer

Chapter 6: Network Layer Chapter 6: Network Layer CCNA Routing and Switching Introduction to Networks v6.0 Chapter 6 - Sections & Objectives 6.1 Network Layer Protocols Explain how network layer protocols and services support

More information

Installing VMware vsphere 5.1 Components

Installing VMware vsphere 5.1 Components Installing VMware vsphere 5.1 Components Module 14 You Are Here Course Introduction Introduction to Virtualization Creating Virtual Machines VMware vcenter Server Configuring and Managing Virtual Networks

More information

PRIMERGY RX800 S2/S3 RemoteView Management Board RSA-II

PRIMERGY RX800 S2/S3 RemoteView Management Board RSA-II Produktfamilie PRIMERGY RX800 S2/S3 RemoteView Management Board RSA-II User Manual Joachim Pichol Fujitsu Siemens Computers GmbH Paderborn 33094 Paderborn e-mail: email: manuals@fujitsu-siemens.com Tel.:

More information

ProLiant Cluster HA/F500 for Enterprise Virtual Array Introduction Software and Hardware Pre-Checks Gathering Information...

ProLiant Cluster HA/F500 for Enterprise Virtual Array Introduction Software and Hardware Pre-Checks Gathering Information... Installation Checklist HP ProLiant Cluster F500 for Enterprise Virtual Array 4000/6000/8000 using Microsoft Windows Server 2003, Enterprise Edition Stretch Cluster May 2005 Table of Contents ProLiant Cluster

More information

ETERNUS CS800 S6 (V3.2)

ETERNUS CS800 S6 (V3.2) English ETERNUS CS800 S6 (V3.2) OST Guide Edition December 2015 Comments Suggestions Corrections The User Documentation Department would like to know your opinion on this manual. Your feedback helps us

More information

Upgrading from TrafficShield 3.2.X to Application Security Module 9.2.3

Upgrading from TrafficShield 3.2.X to Application Security Module 9.2.3 Upgrading from TrafficShield 3.2.X to Application Security Module 9.2.3 Introduction Preparing the 3.2.X system for the upgrade Installing the BIG-IP version 9.2.3 software Licensing the software using

More information

Interconnecting Cisco Networking Devices Part 1 ICND1

Interconnecting Cisco Networking Devices Part 1 ICND1 Interconnecting Cisco Networking Devices Part 1 ICND1 Course Length: 5 days Course Delivery: Traditional Classroom Online Live Course Overview Interconnecting Cisco Networking Devices, Part 1 (ICND1) v3.0

More information

Overview - English. FUJITSU Software ServerView Suite. Update Management. Overview

Overview - English. FUJITSU Software ServerView Suite. Update Management. Overview Overview - English FUJITSU Software ServerView Suite Update Management Overview Edition August 2017 Comments Suggestions Corrections The User Documentation Department would like to know your opinion of

More information

CompTIA Network+ Study Guide Table of Contents

CompTIA Network+ Study Guide Table of Contents CompTIA Network+ Study Guide Table of Contents Course Introduction Table of Contents Getting Started About This Course About CompTIA Certifications Module 1 / Local Area Networks Module 1 / Unit 1 Topologies

More information

*5 Fujitsu Siemens Computers GmbH DRIVE/WINDOWS (BS2000) *5 Version 2.1B40

*5 Fujitsu Siemens Computers GmbH DRIVE/WINDOWS (BS2000) *5 Version 2.1B40 *5 Fujitsu Siemens Computers GmbH DRIVE/WINDOWS (BS2000) *5 Version 2.1B40 Release Notice DRIVE/WINDOWS V 2.1B C o n t e n t s 1 General................ 1 1.1 Ordering............... 2 1.2 Delivery...............

More information

A Division of Cisco Systems, Inc. Dual-Band. Wireless A/G g a. User Guide. Game Adapter WIRELESS WGA54AG (EU/LA/UK) Model No.

A Division of Cisco Systems, Inc. Dual-Band. Wireless A/G g a. User Guide. Game Adapter WIRELESS WGA54AG (EU/LA/UK) Model No. A Division of Cisco Systems, Inc. Dual-Band 5GHz 2, 4GHz 802.11a 802.11g WIRELESS Wireless A/G Game Adapter User Guide Model No. WGA54AG (EU/LA/UK) Copyright and Trademarks Specifications are subject to

More information

PRIMERGY BX900/BX400 Blade Server Systems

PRIMERGY BX900/BX400 Blade Server Systems Installation Guide PRIMERGY BX900/BX400 Blade Server Systems Fujitsu Converged Network Adapter (CNA) for Blade Systems 1.0 PRIMERGY CNA Mezzanine Card 10Gbit/s 2-port (MC-CNA102E) for BX9xx Server Blades

More information

Getting Started with the VG248

Getting Started with the VG248 CHAPTER 2 Before you can configure the telephony features on the VG248 to interact with the analog phones, you must first configure the basic network, SNMP, and password settings. These settings enable

More information

IP Storage Protocols: iscsi. John L. Hufferd, Sr. Exec Dir of Technology, Brocade, Inc Ahmad Zamer Storage Technology Initiatives Manager, Intel

IP Storage Protocols: iscsi. John L. Hufferd, Sr. Exec Dir of Technology, Brocade, Inc Ahmad Zamer Storage Technology Initiatives Manager, Intel John L. Hufferd, Sr. Exec Dir of Technology, Brocade, Inc Ahmad Zamer Storage Technology Initiatives Manager, Intel SNIA Legal Notice The material contained in this tutorial is copyrighted by the SNIA.

More information