Home
APC SC 420VA Computer Accessories User Manual
Contents
1. ndun tav da 37 3 6 Volume configuration 38 3 6 1 Volume relationship 38 3 6 2 PhysicalidisK scuro demie UM LUE UM tat ee eta 39 3 6 3 VOUM GOUD 42 3 6 4 dels M PRESE m T 44 3 6 5 Cache 46 3 6 6 Logical dni HUI 47 3 6 7 48 3 Enclosure management cesses 58 3 7 1 DES CONMO UN ANON ET 59 9 4 2 Hardware MONO E Um UT 59 MAS Hard drive S M A R T function 60 3 7 4 WD 61 3 8 SYSTEM maintenance 62 3 8 1 63 3 8 2 Iioc M E E 64 3 8 3 FRESE LO 64 3 8 4 CONTIG EXPO uices kd pH IUE E eR e e ruere a eet 64 3 8 5 EE cu 66 3 9 OO OU Rr PEE 67 Chapter 4 Advanced operation 68 4 1 See na Sor 68 4 2 VG migration and expansion 70 4 3 IN mb SUN 72 4 4 olabshot FROMDAGCK tedio ko 73 4 4 1 Create snapshot 74 4 4 2 0 Sea ena EHE 76 4
2. Erg guns Lo Lee oa teni vans eat Hrurc c E kan Tar rroriarar r Haile 1 lacie lH quiim aul la ce un l es claw l H 2ki 11 12i Cx H 217 fate LAMINAS LAN U HANN CE TI Frirzsli Eae Ir api 1 Figure G 5 Click Refresh and find a new target with iSCSI name wal GLE TET M EIFE Eic Hos XX nadine Fawr rds LOGIC j pare Shi C Taire BE ime queque E am Hz CDD d LE HEA uL BCS Por bas Har 121 e Se rares 1H dO 1 5C 21 Deren aut ebita are Falerdlal Boot rieulcez ard Ee mociflec Tar ues Can arsdpn I Ez ap 9 n ITA GS EU AR iH id ibi Gee Elige ay limda lil LE me RAS cam ee eS bea red je ri sd screens card resp Bidet Hail ida rmn Hn elim omi deed AbH Takes A 9e Tp Eres ni Sd tl i 4 1
3. A T a z I7 n noelb ns ent I Carm Parameters Pam Befresh Save IE qigin 1 Figure G 2 118 Disable Immediate Data and enable Initial R27 gimu galfl Lael Pati nities Swed Max Target TargetlD Enable Dmamic Snack Inika Thratlg Burgi Lan JITHPTISTGISG 3 Aj cmoa Figure G 3 Fire Burgi Len 99 Click inmediate Eragon Max Twrgut Engbig mamik Enark Inthe Threat Burgi Lan 1 11 2103380 Ta O Figure G 4 Click Save settings and click Yes on next page 119 La Mans por Ll xl cde Hes yrm o BLOC Pool RIA Pul Hia inm daz ee ees tC Le LETTE TICA 13 A HII eX SDD Man ee PP gn TEX s e I HESS 2 51 5703 Grova CUE sentrieg gra Pat rdiol Bost dave cannet b madad pa pe Cadig alan Aadi ASI unr roll a quis rorum Led app di eee Ha pir H uses bes
4. FR 1 5Gb 8 Good 200b001378a20032 111 mi FR 1 5Gb Auto spindown Disabled Select H Free disks e Global spares e Dedicated spares e Figure 3 6 7 7 Figure 3 6 7 7 Slot 5 is set as global spare disk Step 5 Done They can be used as iSCSI disks Delete UDVs VG please follow the steps Step 6 Detach LUN from UDV In Volume config Logical unit Volume config Logical unit Attach e Detach e F Host LUN Permission UDV name 5ession 0 Read write UDV R5 1 1 Fi iqn 1991 05 com microsoft demo 1 Read write UDV R5 2 0 Attach e Detach e Figure 3 6 7 8 52 1 Select LUNs by clicking the checkbox of the row then click Detach o 2 Choose 3 Done There will pop up a confirm page Step 7 Delete UDV User Data Volume To delete the user data volume please follow the procedures 1 Select Volume config User data volume 2 Select UDVs by clicking the checkbox of the row 3 Click Delete There will pop up a confirm page 4 Choose 5 Done Then the UDVs are deleted 414 Tips w m When deleting UDV the attached LUN s related to this UDV _ will be detached automatically too Step 8 Delete VG Volume Group To delete the volume group please follow the procedures 1 Select Volume config Volume group oelect a VG by clicking the checkbox of the row make sure that there is no UDV on this VG o
5. Multicast Suppo iem Statistics RMON Quality of Service javascript presubmit Ports 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 vor UE RENE M Hun IER ER RT ET IURIS ERU EE ER EU S trustedstes g Figure E 10 Select If Trunking is needed please see Figure E 8 iSCSI contig NIC Aggregation C Multi hamaed C Trunking ACD Aggregation ze Back a Confirm Figure E 11 96 Now the setting is LACP mode iSCSI config NIC Mo Port Aggregation DHCP IP address Netmask Gateway MTU MAC address LACP na 1500 1 LANI12 i 1892 1568 11 228 235 255 255 0 1852 158 11 254 00 13 76 00 03 50 Entity name Iqn 1997 05 tw com proware sb 3164 g1a3 000a200ed Figure E 12 Enable switch LACP function of port 21 and 23 Below is an example of Dell PowerConnect 5324 E Dell OpenManage Switch Administrator Microsoft Internet Explorer Eile Edit View Favorites Tools Help Back r x 2 22 Search lt gt Favorites n a gt ta E3 i Dell OpenManage Switch Administrator Support Help About Log Qut L PowerConnect 324 192 168 10 252 LAG Membership Home system LAG Membership El 3 witch a Metwork Securit Parts Be Address Tables Ports 2 3 4 5 7 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 xm Statistics RMON imm
6. Create Delete No Name Total Free PD UDV Status 5 i GB GB id 1 R5 Online RAID 5 o 9 B 3 Create Delete e Figure F 2 Create a UDV by using RAID 5 VG 102 Volume config User data volume Attach Snapshot e Create Delete Size R Snapshot VG CV No Name GB Status 1 2 3 EE RAID LUN name 1 R5 10 we HI 0 00 0 00 C 2 a x Bi 14 RAIDS a R5 100 Attach Snapshot Create Delete r Figure F 3 Run Microsoft iSCSI initiator 2 03 and check the Initiator Node Name iSCSI Initiator Properties General Discovery Targets Persistent Targets Bound Yolumes Devices The SCSI protocol uses the following information to uniquely zn identity this initiator and authenticate targets Initiator Node Mame ign 1331 D5 com microsoft qa chrischoudl rename the initiator node click Change Change To authenticate targets using CHAP click Secret to a CHAP secret Secret Ta configure IPSec Tunnel Mode addresses click Tunnel Tunnel ddi Figure F 4 Attaching LUN to R5 UDV Input the Initiator Node Name in Host field Volume config Logical unit Attach UDV R5 10GB EZ Host iqn 1991 05 com microsoft demo LUN 0 Permission O Read only 9 Read write lt lt Back confirm e Figure F 5 The volume config setting is done 10
7. the target iSCSI Initiator Properties E i X General Discovery Targets Persistent Targets Bound Volumes Devices Select a target and click Log On to access the storage devices for that target Click details ta see information about the sessions connections and devices for that target Targets Connected Details Log Refresh Figure H 15 Status is Connected the initiator setting is done Step C Initialize Format Mount the disk 1 Go to Control Panel Computer Management Device Manger Disk drives 127 ia M rite Took Evari ares asa Disk drives HH Sire Poart Se HOPS FAGA SCS ik ene Loc Liss Br Groups hols LAS ISI Dk Device Performance and Aert polls Disk Device Macar WOC WOSIA ug Shaye Hr adapters Figure H 16 Disk drive status of IS16GL 2 Go to Control Panel Computer Management Disk Management Computer Management m File Action View Window Help s Am Computer Management Local Volume Layout File System Status Capacity Free Space Free Fault Tolerance Overhead E a System Tools ES c Partition Basic FATS2 Healthy System 19 52 58 17 0166 87 No g H 1 Event viewer E pj Partition Basic FAT32 Healthy Boat 19 52 GB 16 32656 83 Ds H
8. m GR Stotus 1 2 3 amp yg RAID ALUN GB Type VGID EYID non cire Create Time 1 VEDI 2793 Ondine WE HI 1 04 0 0 00 NORMAL 342494529 0001 422009120 126 41 4096 11733476021 Figure H 10 block size 4K for 32bit OS setting Volume config User data volume Attach E Create e Delete Size R YG CV GB Status 1 2 3 RAID LUN MB pome 1 2 03 nline fil we E HI e Attach e Create e Delete e Figure H 11 attach LUN for iSCSI controller 125 Volume config User data volume Attach Uunpwv uovo 12179358 Host LUN 0 Permission Read only Read write Figure H 12 attach LUN Step B configure your host server 1 User needs to setup software iSCSI initiator or iSCSI HBA first 2 Below is the configuration for Windows Server 2003 R2 with Microsoft iSCSI initiator Please install the latest Microsoft iSCSI initiator from below link http www microsoft com downloads details aspx FamilyIDz 12cb3c12a 15d6 4585 b385 befd1319f825 amp DisplayLang en iSCSI Initiator Properties E _ E iSCSI Initiator Properties E Type the IP address or DNS name and socket number of Ehe portal you want to add Click Advanced to select specific settings For the discovery session to the portal General Discovery Targets Persistent Targets Bound Volumes Devices e The SCSI protocol
9. Shared Falders Partition Basic Healthy 19 5358 19 5368 100 085 Local Users and Groups E Partition Basic NTFS Healthy 18 08GB 16 40GB 90 0 E Fi Performance Logs and Alert jew 05 2999 2 6 Partition Basic UDF Healthy 3 20GB OMB 0 No 0 Hum Device Manager B storage p a Removable Storage Disk Defragmenter Disk Management Disk 0 Basic 75 68 GB 13 53 GB FAT32 19 53 GB FAT32 18 08 GB NTFS Online Healthy System Healthy Boot Healthy Disk 1 i aun ra a ana E 2792 99 GB 2792 99 GB Unallocated PEL EPA PE a uu uuu ER ee ee I UE petu utut CELA AALS Initialized CD ROM 0 DvD 05 2939 2 G 3 20 GB 3 20 GB UDF Online Healthy ZPDisk 0 Basic C D F 76 58 GB 13 53 GB FAT3z 13 53 GB FAT3z s 18 08 56 NTFS Online Healthy System Healthy Boot Healthy Z Disk 1 Unknown mi 2702 GB Initialize Disk Mot Initialized Properties ZSED ROMO Sonos ee d 3 20 GB 3 20 GB UDF Online Healthy Figure H 18 Initialize disk 128 EP Disk 0 Basic Dy F 76 58 GB 13 53 GB FAT3z 13 53 GB FAT3z 18 08 GB NTFS Online Healthy Svsbem Healthy Boot Healthy 1 Basic 2702 02 GB to Dynamic Disk 744 96 GB Online Convert to GPT Disk Unallocated Icp Romo Properties DYD 3 20 G
10. 2 72TB Notice if user setup 512B block size for UDV and the host server OS is 32bit in the last step of formatting disk user will find OS cannot format the area after 2048GB 2TB m 13 55 58 2099 00 NTFS 744 05 GB C OS cannot ormat this area Heath Linelloc aded iron on TT 20302 Gs 320 dE T Figure H 23 wrong setting result OS cannot format area after 2048GB 2 130 System information 5166 2 2 1 Build 20070531 131
11. 3 drive S M A R T function support S M A R T Self Monitoring Analysis and Reporting Technology is a diagnostic tool for hard drives to give advanced warning of drive failures S M A R T provides users chances to take actions before possible drive failure 60 o M A R T measures many attributes of the hard drive all the time and decide the hard drives which are close to out of tolerance The advanced notice of possible hard drive failure can allow users to back up hard drive or replace the hard drive This is much better than hard drive crash when it is writing data or rebuilding a failed hard drive Enter S M A R T function will display S M A R T information of hard drives The number is the current value the number in parenthesis is the threshold value The threshold values of hard drive vendors are different please refer to vendors specification for details Enclosure management S M A R T Slot pup Reallocated sector Seek error Spin up Calibration Status count rate retries 1 203 63 253 63 253 0 253157 253 223 41 bene ws Good 2 100 16 107 24 100 5 100 67 100 60 31 p 2 Good 3 100 16 104 24 100 5 100 67 10060 32 Good 4 70 61 96 0 100 36 75 30 100 97 31 Good 5 10016 102 24 100 5 100 67 100 860 am i Good 6 203 63 253 63 253 0 253 157 253 223 28 Good rj 94 16 99 24 100 5 100 67 1
12. E 75 xn 2015001378300021 SHAS num os 1 595 B EU 2 200500 3 3 2 111 wmm 0r 1 565 Auta soindawn ME a DEAE BpaDBS Figure 3 6 2 1 Figure 3 6 2 1 Physical disks of slot 1 2 are created for a VG named VG RO Physical disks of slot 3 4 5 6 are created for a VG named VG R6 Slot 7 is set as dedicated spare disk of VG named VG R6 Slot 8 is a free disk e PD column description The position of hard drives The number of slot begins from left to right at the front side The blue square button next to the number of slot is More Information indication It shows the details of the hard drive e Wm 5 7 Size GB Capacity of hard drive Related volume group name The status of hard drive GOOD gt the hard drive is good DEFECT gt the hard drive has the bad blocks FAIL gt the hard drive cannot work in the respective volume 40 RD gt RAID Disk This hard drive has been set to RAID FR gt FRee disk This hard drive is free for use DS gt Dedicated Spare This hard drive has been set to the dedicated spare of the VG GS gt Global Spare This hard drive has been set to a global spare of all VGs RS gt ReServe The hard drive contains the VG information but cannot be used It may be caused by an unc
13. 4 5 QCopy remote replication IS16GL QCopy service is to build a IS16GL proprietary replication mechanism for created UDVs It will copy the logical user volume data exactly to the remote place The QCopy is built in service without any host based application for the data replication and it has easy configuration setup from management Uls The first QCopy version on IS16GL FW V2 2 0 supports copy from one snapshot UDVs of the source device to the remote target device QCopy V2 2 0 supports 2 copying tasks in the system which user can setup QCopy to 2 snapshot UDV for replication in the same time The target device 77 capacity needs to be greater or equal to the source capacity The target UDV capacity is equal or larger than the source UDV capacity To do a QCopy task please follow the below steps 1 Take snapshot on the source UDV for detail setup steps of snapshot please refer to section 4 4 1 When setup UDV block size please set 012B for the block size The QCopy now supports 512B block size only Click QCopy icon on the selected snapshot UDV Input the remote iSCSI target IP Click Next gt gt and for a while when webui recieves the target UDV information and corresponding LUN oelect remote target LUN of the target UDV which is for QCopy Click confirm then there will be a pop up window to ask user to dismount the target UDV from host server first This dismount step is to avoid
14. GB start start Info Snapshot rollback Info The snapshot of UDV name rollback finish finish QCopy events ee eee eee X X X X ype Duplicate Duplicate QCopy Connection Warning QCopy connection fail Down bail QCopy Connection Warning QCopy task was aborted Retry QCopy Task Warning QCopy task was aborted Setting reason UDV LBA block size ONLY support 512 bytes C Known issues 88 Microsoft MPIO is not supported on Windows XP or Windows 2000 Professional Workaround solution Using Windows Server 2003 or Windows 2000 server to run MPIO D Microsoft iSCSI Initiator Here is the step by step to setup Microsoft iSCSI Initiator Please visit Microsoft website for latest iSCSI initiator The following setup may not use the latest Microsoft iSCSI initiator NO Run Microsoft iSCSI Initiator version 2 03 Please see Figure D 1 Click Discovery xj General Discovery Targets Persistent Targets Bound Volumes Devices wd The SCSI protocol uses the following information to uniquely a identify this initiator and authenticate targets Initiator Mode M arme ign 1991 05 com microsoft demo rename the initiator node click Change Change To authenticate targets using CHAP click Secret to a CHAP secret sectel configure IPSec Tunnel Made addresses click I Tunnel Figure D 1 Click Add Input IP address or
15. Mask 255 255 255 0 Gateway 192 168 1 254 Figure 3 5 2 2 Default gateway can be changed by clicking the blue square button in the Gateway column There is only one default gateway The row of No 1 would be the default gateway MTU Maximum Transmission Unit size can be changed by clicking the blue square button in the MTU column iSCSI config NIC MTU LANI MTU 1500 KJ Figure 3 5 2 3 The range of MTU size is between 1500 and 9000 Default MTU size is 1500 If it is changed the setting of MTU size on switching hub and LAN card should be set to the same size Otherwise the LAN cannot work properly Link aggregation setting can be changed by clicking the blue square button jin the Aggregation column iSCSI config Aggregation Multi homed Aggregation Q Trunking OLACP Figure 3 5 2 4 2 35 1 Multi homed The two LAN ports are connected to two different networks Multi homed is default 2 Trunking Trunking links 2 LAN ports together to be a single link Trunking could multiply the bandwidth They will be aggregated to one IP If clicking the blue square button at No 1 row the IP setting will be set to default value after setting trunking and vice versa For detailed setup steps please refer to Appendix E Trunking LACP setup instructions 3 LACP Link Aggregation Control Protocol LACP could balance the bandwidth IP setting concept is the s
16. power supply 1 and power supply 2 are located at the rear of the subsystem Turn on the power of these power supplies to power on the subsystem The power LED at the front panel will turn green If a power supply fails to function or a power supply was not turned on the Power fail LED will turn red and an alarm will sound 14 2 4 Connecting iSCSI subsystem to Your Network To connect the iSCSI unit to the network insert the cable that came with the unit into the network connection LAN1 on the back of iSCSI unit Insert the other end into a Gigabit BASE T Ethernet connection on your network hub or switch 2 5 Powering on the Subsystem You should press the ON OFF Power Supply Switch on the Switch It will turn the iS CSI unit on and the Self Test will be started automatically 1 Plug in all the power cords or power connectors located at the rear of the subsystem Power 1 switch Power Z swilch m HERESEBENN ae E Se mmm C ST CE Te EY 1 CEST EST TOL WmmEREEN i RARHRBRBBRANBEN ooo a p co8MI IF issassaa ico e TELEL power input sockel 1 AC power inpul sockel 2 Power Supply Power On Indicator Power Supply2 Power On Indicator Power Supply 1 Power Supply 7 2 You should press the ON OFF Power supply switch to turn on the power 3 The Power LED on the front panel
17. Connecting iSCSI subsystem to Your Network 15 2 5 Powering on the Subsystem 15 2 6 Install Hard Drives eee 16 2 7 IS OR CENE RS 17 2 8 Management 18 2 8 1 e PET ere eae een 18 2 8 2 Console sendi deiecta t dedi sia ctv Doa amori dads vo baa tds 19 2 8 3 Remote control secure shell eeeeeeeer 19 2 9 20 2 9 1 20 2 9 2 System DUZZO 21 Chapter 3 Web GUI guideline 23 3 1 CIE Nager ERN 23 3 2 TE 24 9 9 CK ANS Cl e EA 25 3 4 System configuration 27 3 4 1 SVSIefiTialTie edo 28 3 4 2 S Tm 28 3 4 3 M 28 3 4 4 29 3 4 5 eee Im 29 3 4 6 crcl cence A eect 30 3 4 7 NE EE 30 3 4 8 Sr x 31 3 4 9 System CIV Clee E 31 3 4 10 udi MMC 33 9 9 m 33 3 5 1 DOD CMY E tc 34 3 5 2 Mi oce lE DM DIM eee tee 34 3 5 3 se RENE RD 36 3 5 4 OGSSIDI us cu een ee nm Ee DR M LA AE LC RESTE 37 3 5 5
18. DNS name of iSCSI storage device Please see Figure D 2 x Type the IP address or DNS name and socket number of the portal vou want to add Click Advanced to select specific settings For the discovery session ba the portal IP address or DNS name Port 197 166 11 229 3260 Advanced E Cancel Figure D 2 89 4 Click OK Please see Figure D 3 xj General Discovery Targets Persistent Targets Bound Yolumes Devices Target Portals Address Port Adapter IP Address 192 166 117 229 3260 Default Default Remove Refresh SNS Servers Name Figure D 3 o Click Targets Please see Figure D 4 iSCSI Initiator Properties E xl General Discovery Targets Persistent Targets Bound Volumes Devices Select a target and click Log On to access the storage devices for that target Click details to see information about the sessions connections and devices for that target Targets Inactive Details Un Refresh Figure D 4 6 Click Log On Please see Figure D 5 Check Enable multi path if running MPIO 90 Log On to Target x Target name Automatically restore this connection when the system boots Enable multi path EN Only select this option if iSCSI multi path software is already installed 3 your computer Advanced Cancel Figure D 5 7 Click Advance if CHAP information
19. Fahl e eF e t eee z Hia e dan Erici Cdn pem I ES IE pri Ir Figure G 6 Check the parameters which Initial R2T are enabled 120 2 77 Target E E in Xj Knmeckxs Exeruon Fir Bad Enable Snark AZT Data Throttle Burgi Burst Len Len niisa riis A G e 513 11921881121022907 1 a i E E CEGE m vate Figure G 7 Check Target Information again and the state changed to Session Active SEMA 1221 HES eg E BT E ege s Cue alh LOGIE 751 H LH Lisi nz Fj q es wit j na ET enc r on dues oid 5 HE n BI Hage d 151 pla Wr bh De E vu E g I EM Bin ip cl haere n rET h ra uri Fratrrre rere be Mama ma nue Har 287 E escent Dune Dipole L 21331 P L ysl Figure G 8 Then run Computer Management in Windows Make sure the disk appears 121 m Computer Management l Im fie Action View Window x Eea Computer Management Local volume Layout File System S
20. Following sessions Identifier FFFFFFFFaEz7c684 400001370000000a Refresh Session Properties Target Portal Group 1 Status Connected Connection Count 1 Session Connections To configure how the connections within this session are load balanced click Connections Connections Cancel Figure D 8 D Check the Identifier which will be deleted C Click Log off D Done the iSCSI device log off successfully 2 95 E Trunking LACP setup instructions Here is the step by step to setup Trunking and LACP There are 2 kinds of scenarios for Trunking LACP Please see Figure E 1 Rend Wn 1 Dual ports with MPIO 2 Dual ports with MPIO Direct connect host has 7 Via swilches host has 2 LAN ports read or write in LAM parts read or write m one LIDV one UDOV Figure E 1 Network diagram of Trunking LACP The setup instructions are in the following figures Create a VG with RAID 5 using 3 HDDs i Wolinie RU T 1 Name TM re SPD UD 1 2 3 RAID 1 RE F Tarl 2 75 3 in aa Cra sts Dolata Figure E 2 93 Create a UDV by using the RAID 5 VG Volume config User data volume Attach Snapshot Create Delete a size R Snapshot VG CV Mo Name GB Status 1 2 3 RAID LUN name 1 R5 10 HI 0 00 0 00 O d z Ur 14 RAIDS 0 R5
21. any data inconsistence from others After the target UDV is dismounted from host server then click Yes for confirmation When the QCopy is processing data on the Volume config User data volume status colume there will be an indicator for QCopy and completed percertage The source system will issue one INFO event describes the replication setting E g INFO Wed 28 Mar 2007 17 23 55 CST Qcopy start Target iqn 2004 08 tw com proware iS 16GL 000a00021 default target IP 192 168 10 187 Type Duplicate If the replication has been completed successfully the source system will issue one INFO event describes the replication started at what time and completed at what time The source system will try to recoonect the target system when there is any network error or unstable transferring And if the replication has been stopped for some interrupts the source system will issue one WARNING event describes the possibility of the interrupts to stop the replication The possibility to stop the replication may be network link failure the target system not reachable connection fail and etc When the causes to the interrupts have been removed the users can manually activate the QCopy replication again to restart the replication work The source system will issue one INFO event describes the replication has been resumed When the QCopy is completed user can delete the LUN of the target UDV for avoiding wrong op
22. be deleted because snap1 are related to snap2 3 For resource concern the max number of snapshots is 32 4 lf snapshot space is full controller will send a warning message about space full and the new taken snapshot will replace the oldest snapshot by rotation sequence 5 Snap UDV cannot be migrated when doing migration of related VG snap UDV will fail 6 Snap UDV cannot be extended 75 4 4 2 Auto snapshot The snapshot copies can be taken manually or by schedule such as hourly or daily Please follow the procedures Select Volume config User data volume Create a snapshot space Please refer to section 4 4 1 for more detail Click in Snapshot GB column to set auto snapshot The auto snapshot can be set at the period of monthly weekly daily or hourly Done It will take snapshots automatically COIT g Volume config User data volume Auto Snapshot ivi All Moz Mos 05 Mos Mog Mii Miz Months to take snapshots Weeks to take snapshots Fis Fis Fla 15 Days to tak hots al ee sun O wed lrhu Osat Lal loo Lloi Llo2 Lloa Uos Oos Hours to take snapshots Mins Moa Flin 112 L113 E115 Etg E117 Cis E119 Flai lt lt Back e confirm 5 Figure 4 4 2 1 Figure 4 4 2 1 It will take snapshots every month and keep the last 32 snapshot
23. copies Tips Daily snapshot will be taken at every 00 00 Weekly snapshot will be taken on every Sunday 00 00 Monthly snapshot will be taken on every first day of month 00 00 76 4 4 3 Rollback The data in snapshot UDV can rollback to original UDV Please follow the procedures 1 Select Volume config User data volume 2 Take one or more snapshots Please refer to section 4 4 1 for more detail 3 Click in Snapshot GB column to rollback the data which user can recover data to the time that snapshot is taken Rollback function has some constraints as described in the following 1 Minimum RAM size of enabling rollback function is 512MB 2 When doing rollback the original UDV cannot be accessed for a while At the same time the system connects original UDV and snap UDV and then starts rollback 3 During rollback data from snap UDV to original UDV the original UDV can be accessed and the data in it just like it finished rollback At the same time the other related snap UDV s can not be accessed 4 After rollback process finished the other related snap UDV s will be deleted and snapshot space will be set to O Caution Before executing rollback it is better to dismount file system for flushing data from cache to disks in OS first SB 3164 G1A3 also send pop up message when user checks rollback function Roll back snapshot UDV now Please dismount the disk in the host side first
24. is detected Info ECC DIMM Info ECC Memory is installed Installed 84 Non ECC installed Info Non ECC Memory is installed Error Host chip failure Error Host channel chip failed Error Drive chip failure Error Drive channel chip failed Warning Ethernet port failure Warning GUI Ethernet port failed HDD IO events iS ee Warning Diskeror ErmorDisk slot readblockeror Warning Diskeror Error Disk lt slot gt writes block error Warning HDD failure ErrDisk slt isfalled Warning Channeleror Ermor Disk slot lO incomplete SES events aie ee as Se eee SES load conf OK Info SES configuration has been loaded 7 Failure device i IS disabled Environmental events NENNEN eee eee Info Admin Login OK Info Admin login from lt IP or serial console gt via via Web UI Console Ul Info iSCSI login from IQN IP Port login Number succeeds iSCSI data port Warning iSCSI login from lt IQN gt lt IP Port login reject Number gt was rejected reason of initiator error authentication failure authorization failure target not found unsupported version too many connections missing parameter session does not exist target error out of resources unknown Error Thermal critical Error System Overheated The system will do the auto shutdown immediately Warning
25. is needed Please see Figure D 6 Advanced Settings oos General IPSec Connect by using Lacal adapter Default Source Default Target Fortal Default CAC Checksum Data digest Header digest logon information CHEF helpe ensure date secunty by providing authentication between target initiate to establish a connection Ta Wee it speci the same tanget secret that was contigured ar the target for this mitiatar User rame 991 05 com microsoft demo Target secret mutual authentication To use mutual CHAF specify aninitiator secret on the Initiator Settings and configure that secretion the target E Cancel Apply Figure D 6 8 Click OK The status would be Connected Please see Figure D 7 9 Done it can connect to an iSCSI disk 91 iSCSI Initiator Properties General Discovery Targets Persistent Targets Bound Volumes Devices Select a target and click Log On to access the storage devices for that target Click details to see information about the sessions connections and devices for that target Targets as O0 Connected Details Log On Refresh tes Figure D 7 The following procedure is to log off iSCSI device A Click Details Please see Figure D 8 xj Sessions Devices Properties This target has the
26. logout Disable Login lock Disable EZ Figure 3 4 4 1 2 Login block Disable Enable When the login block is enabled the system allows only one user to login modify the system settings 3 4 5 Password oelect Password is for changing administrator password The maximum length of admin password is 12 characters System config Password Old password Password Confirm Figure 3 4 5 1 29 3 4 6 Date oelect Date to set up the current date time time zone and NTP server before using System config Date Now ott Date 2007 2 i iB Time 15 96 Hg Time zone Asia Taipel Daylight saving NTP Server Figure 3 4 6 1 3 4 7 Mail select Mail to enter at most 3 mail addresses for receiving the event notification Some mail servers would check Mail from address and need authentication for anti spam Please fill the necessary fields and select Send test mail to check whether the email works fine User can also select which levels of event logs are needed to be sent out by Mail Default setting is only ERROR and WARNING event logs enabled 30 System config Mail Mail from address mailman SB 3164 G143 Mail to address 1 Send events 1 INFO WARNING IV ERROR IV Mail ta address 2 send events 2 INFO waRNING IV ERROR IV Mail to address 3 Send events 3 INFO WARNING ERROR IV SMTP relay SMTP server Authenti
27. the procedures Step 1 Create dedicated cache volume Volume config Cache volume Create e Delete e L No Size UDV name Global d i al Empty Free 60 MB Create Delete e Figure 3 6 7 9 1 Select Volume config Cache volume 2 there is no free space for creating a new dedicated cache volume cut down the global cache size first by clicking the blue square button in the size column After resized click On mft to return to cache volume page 3 Click create enter the setup page 11 54 4 Fill in the size and click onum mfi 5 Done A new dedicated cache volume has been set Tips The minimum size of global cache volume is 40MB The minimum size of dedicated cache volume is 20MB Step 2 Create VG Volume Group Please refer to Step 1 of Example 1 to create VG Step 3 Create UDV User Data Volume Please refer to Step 2 of Example 1 to create UDV To create a user data volume with dedicated cache volume please follow the below procedures Volume config User data volume Create Name UDWV R5 2 VG name VG R5 Ed CV No Dedicated 20 MB El Capacity GB 64 Stripe height KB 64 EJ Block size B 512 E Read Write write through cache 9 write back cache Priority 2 High priority Middle priority Low priority lt lt Back confirm Figure 3 6 7 10 1 Select Volume config User data volume 2 Clic
28. unique identifier used on a iSCSI connection which enables it to differentiate among separate devices each of which is a logical unit RAID width RAID width copy and row are used to describe one VG RAID copy RAID row 9 RAID cell in One 4 disk RAID 0 volume RAID width 4 RAID one row copy 1 RAID row 1 One 3 way mirroring volume RAID width 1 RAID copy 3 RAID row 1 One RAID 10 volume over 3 4 disk RAID 1 volume RAID width 1 RAID copy 4 RAID row 3 T Write Through cache write policy A caching technique in which the completion of a write request is not signaled until data is safely stored on non volatile media Each data is synchronized in both data cache and the accessed physical disks a Write Back cache write policy A caching technique in which the completion of a write request is signaled as soon as the data is in cache and actual writing to non volatile media occurs at a later time It speeds up system write performance but needs to bear the risk where data may be inconsistent between data cache and the physical disks in one short time interval oet the volume to be Read Only Dedicated Spare disks The spare disks are only used by one specific VG Others could not use these dedicated spare disks for any rebuilding purpose disks pool for such requirement DC Dedicated Cache Global Cache DeGraded mode Not all of the arrays member disks are functioning but the array is
29. will turn green 15 2 6 Install Hard Drives This section describes the physical locations of the hard drives supported by the subsystem and gives instructions on installing a hard drive The subsystem supports hot swapping allowing you to install or replace a hard drive while the subsystem is running 1 Pull out an empty disk tray You can install in any available slot 2 ake off the bracket before installing hard drive peer Bracket 3 Place the hard drive in the disk tray gt Install the mounting screws on each side to secure the drive in the mobile rack Note Insert screws through the front sides of the mounting holes 5 Slide the tray into a slot until it clicks into place The HDD status LED will turn green on front panel Latch Lever 6 Press the lever in until you hear the latch click into place 7 If the HDD power LED did not turn green check the hard drive is in good condition If the hard drive is not being accessed the HDD access LED will not illuminate The LED blinks only when being accessed 16 2 7 iSCSI introduction ISCSI Internet SCSI is a protocol which encapsulates SCSI Small Computer system Interface commands and data in TCP IP packets for linking storage devices with servers over common IP infrastructures iSCSI provides high performance SANs over standard IP networks like LAN WAN or the Internet IP SANs are true SANs Storage Area Networks which allow
30. 0060 31 Good 8 200 51 171 21 200 140 200 51 100 51 10051 30 Figure 3 7 3 1 3 7 4 UPS Enter UPS function will set UPS Uninterruptible Power Supply Enclosure management UPS UPS Type None Shutdown Battery Level 96 5 Shutdown Delay 5 Shutdown UPS OFF Status Battery Level Confirm 5 Figure 3 7 4 1 61 Currently the system only support and communicate with smart UPS function of APC American Power Conversion Corp UPS Please check detail from http www apc com First connect the system and APC UPS via RS 232 for communication Then set up the shutdown values when the power is gone UPS of other vendors can work fine but they have no such function of communication UPS Type Select UPS Type Choose Smart UPS for APC None for other vendors or no UPS Shutdown Battery Level Shutdown Delay s Battery Level 7o When below the setting level the system will shutdown Setting level to 0 will disable UPS function If power failure occurred and the system can not return back to the setting value period the system will shutdown Setting delay to 0 will disable the function oelect ON when power is gone UPS will shutdown by itself after the system shutdown successfully After power comes back UPS will start working and notify system to boot up OFF will not The status of UPS Detecting Running Unabl
31. 100 Attach Snapshot e Create Delete Figure E 3 Run Microsoft iSCSI initiator 2 03 and check Initiator Node Name iSCSI Initiator Properties AX General Discover Targets Persistent Targets Bound Volumes Devices e The SCSI protocol uses the following information to uniquely j identity this initiator and authenticate targets Initiator Hame ign 1991 05 com microsoft ga chrischoud rename the initiator node click Change Change To authenticate targets using CHAP click Secret to a CHAP secret Secret To configure IPSec Tunnel Mode addresses click Tunnel Tunnel iel Figure E 4 Attaching LUN to UDV Input the Initiator Node Name in the Host field 94 Volume config Logical unit Attach UDV R5 10GB Host iqn 1991 05 com microsoft demo LUN 0 Permission ORead only 9 Read write lt lt Back confirm e Figure E 5 Done please check the settings Volume config Logical unit Attach Detach e Host LUN Permission UDV name E Session iqn 1991 05 com microsaft demo Read write R5 l Session Attach Detach Figure E 6 Check iSCSI settings The IP address of iSCSI data port 1 is 192 168 11 229 Using port 1 as Trunking or LACP Click the blue square in Aggregation field to set Trunking or LACP iSCSI config NIC Port Aggregation DHCP IP address Netmask Gateway MTU MAC addres
32. 3 Volume config Logical unit Attach Detach 5 E Host LUN Permission UDV name Session iqn 1991 05 com microsoaft demo Read write R5 l Session Attach Detach Figure F 6 Check iSCSI settings The IP address of iSCSI data port 1 is 192 168 11 229 port 2 is 192 168 12 229 for example iSCSI config MIC Mo Port Aggregation DHCP IP address Netmask Gateway MTU MAC address na na 1500 1 LAN 192 168 11 2293 293 205 252 0 192 168 11 2 54 m 00 13 e 00 03 50 na na 1500 LAM 197 166 12 229 293 295 255 0 00 13 9 00 03 51 Entity name ign 1997 05 tw com proware sb 3164 gla3 000a200ed Figure F 7 Add Target Portals on Microsoft iSCSI initiator 2 03 iSCSI Initiator Properties General Discovery Targets Persistent Targets Bound Valumes D evices Target Portals IP Address Remove Refresh SNS Servers Name Remove Refresh Figure F 8 Input the IP address of iSCSI data port 1 192 168 11 229 as mentioned in previous page 104 Figure F 9 Add second Target Portals on Microsoft iSCSI Initiator 2 03 E18 Initiator Properties Figure F 10 Input the IP address of iSCSI data port 2 192 168 12 229 as mentioned iN previous page 105 192 168 12 229 3260 E 2 Figure F 12 Log on 106 iSCSI Initiator Properties XI General Discovery Targets Persistent
33. 4 3 E 77 4 5 QCopy remote 77 4 6 46014 81 4 7 Support Microsoft MPIO and 81 PG GI dem t 82 A 02 B Event notifications Red ane ed co blue donatam o no Os d 84 C IOWITISSUBS stu M uidens DEDE M NEN Edu ia sot 88 D Microsoft iSCSI Initiator eene 89 Trunking LACP setup instructions 93 F MPIO and MC S setup instructions 102 G QLogic QLA4010C setup instructions 117 H Installation Steps for Large Volume TB 122 Chapter 1 RAID introduction 1 1 Features Front end 2 1Gb full iSCSI offload complete ULP TCP offload Supports load balancing amp fail over 802 3ad port trunking LACP Supports iSCSI jumbo frame supports Microsoft Multipath I O MPIO Supports RAID levels 0 1 0 1 3 5 6 10 30 50 60 and JBOD Local N way mirror Extension to RAID 1 level N copies of the disk Global and dedicated hot spare disks Write through or write back cache policy for different application usage Dedicated or shared cache allocation for volume usage Supports greater than 2TB per volume set 64 bit LBA support Supports manual or scheduling volume snapshot up to 32 snapshot Snapshot rollback m
34. 9 port 2 is 192 168 12 229 for example Add Target Portals on Microsoft iSCSI initiator 2 03 Input the IP address of iSCSI data port 1 192 168 11 229 as mentioned in previous pages For MC S there is only ONE Target Portals in the Discovery tab 112 Default Apply Figure F 24 Log on nm iSCSI Initiator Properties Figure F 25 Then click Advanced 113 Log On to Target pqn 1997 05 tw com proware sb 3164 9143 000a200ed default target LS LE TA STC SN SE NE NR ET a E o Figure F 26 Select set Local Adapter Source IP and Target Portal to iSCSI data port 1 192 168 11 229 Then click OK Advanced Settings Figure F 27 After connected click Details then in the Session tab click Connections ti iSCSI Initiator Properties E X General Discovery Targets Persistent Targets Bound Volumes Devices Select a target and click Log to access the storage devices for that target Click details to see information about the sessions connections and devices for that target Targets Connected Details Log On Refresh Figure F 28 Choose Round Robin for Load Balance Policy Connections Load Balance Policy Round Robin Fail Over Round Robin Round Robin With Subset Least Queue Depth Weighted Paths This session has the
35. AC power input socket 2 Power Supply Power On Indicator Power Supply2 Power On Indicator Power Supply 1 Power Sunply 2 1 Power Supply Alarm Reset button You can push the power supply reset button to stop the power supply buzzer alarm 2 Uninterrupted Power Supply UPS Port APC Smart UPS only The subsystem may come with an optional UPS port allowing you to connect a APC Smart UPS device Connect the cable from the UPS device to the UPS port located at the rear of the subsystem This will automatically allow the subsystem to use the functions and features of the UPS 3 R Link Port Remote Link through RJ 45 ethernet for remote management The subsystem is equipped with one 10 100 Ethernet RJ45 LAN port You use web based browser to management RAID subsystem through Ethernet for remote configuration and monitoring 4 Monitor Port The subsystem is equipped with a serial monitor port allowing you to connect a PC or terminal 5 Fan Fail indicator If a fan fails this LED will turn red NT 6 Cooling Fan module Two blower fans are located at the rear of the subsystem They provide sufficient airflow and heat dispersion inside the chassis In case a fan fails to function the Fan fail LED will turn red and an alarm will sound 7 Power Supply Power On Indicator Green LED indicates power is on 8 System Power On Indicator Green LED indicates power is on 9 Power Supply Unit 1 2 Two power supplies
36. Active 117 Ea a 4 EH PEJE Ble Whew pel o Efren QLOGIC Tages LUHLES BC5I Boa xax DES i nua hlc SCS Pod Abas Hare Misis hne LA ea Probet HI 124 4124 10 laH Home 1 4 23 1 LE eie m cH Hale lig gal iid En pale ANAL 110 Figure G 1 Click Target settings Then select the target and click Config Parameters Star i HIR Alay a x Ble Wem Ui pp Comod QLOGIC d Anl inlig m iin I lah TIHANE laginal e E Ps o 1 HEA 0 40 10 ISCH Hae ks Ez 2H Hume gre Eb Asper ar antrisz are Foatertigl Boot devices and cannot be Tar pei Candi 2 bak ECS en Iste a a 15 paired Dizshir of God cece dar 11 ap Scar gres wih CHAD canes pan Ec ered nre ee dp ded Eo ed ell reri Acres carl pets lile F5 iis un Hid nel coded nd ANrip i Disc 7 ar peri bmc pa ec puer are Tar er zat Iu 1 14H ir red
37. B Hep Online Healthy Figure H 19 Convert to GPT Disk for over 2TB capacity For more detail about GPT please visit http www microsoft com whdc device storage GPT FAQ mspx C 19 53 GB 2 Healthy System D 19 53 GB FAT32Z Healthy Boot 18 08 NTFS Healthy 2792 88 GB 27 gt peer a 05 2939 2 G 3 20 UDF Healthy Figure H 20 format disk Disk 0 Basic D F 76 58 GB 19 53 GB FAT32 19 53 GB FAT32 18 08 GB NTFS Online Healthy System Healthy Boot Healthy 1 Basic 2792 97 GB Online r FEFEFE a a a a a RE D a a a ee NE a S gags d NT a ai I a cSIED ROM DVD EN 05 2939 2 G 3 20 iB 3 20 B Online Healthy Figure H 21 format is done 129 P My Computer File Edit View Favorites Tools Help pack search Folders i XO Ee o gt amp He Address Address 18 my Computer My Computer Hard Disk Drives Se Local Disk C Local Disk 19 5 GB 17 0 GB S Local Disk D Local Disk 19 5 GB 16 2 GB Local Disk E Local Disk Local Disk i Local Disk 18 0 GB 16 4 GB Local Disk 2 72 TB 2 72 OS 2939 2 G CD Drive 3 20 GB bytes Figure H 22 the new disk is ready to go available size
38. Following connections Source Portal Target Portal 192 158 11 2 192 168 11 Active ES Add Remove Edit m Figure F 29 Add Source Portal for the iSCSI data port 2 192 168 12 229 115 a sper Lather rowed Roby 182 188 81 2 19218811 Come Ache nfa Figure F 31 Select Local adapter Source IP and Target Portal to iSCSI data port 2 192 168 12 229 Then select OK 116 Advanced Sethngs E 3 xl General IPSec Connect by using Local adapter Micrasoft SCS Initiator Source IP 192 168 12 34 Target Portal Checksum Data digest Header digest CHAP logon information AEP helps ensure data security Gy providing authentication between target and an initiator tring to establish a connection To use tt specity the same target CHEF secret that was cantigured on the target hor thie Username fan 331 05 com micrasaftFargree me Target secret Berfamnmutualauthienticatian mutual GAAP specu initiator secret onthe Tnitiatar settings page and that secret on the target Cancel Apply Figure F 32 The MC S setting is done G QLogic QLA4010C setup instructions The following is the step by step setup of Qlogic QLA4010C Log on the iSCSI HBA Manager and the current state shows No Connection
39. I HBA card SATA hard drive 3 Server refer to OS _Initiator List pdf for OS versions and HBA Initiator driver BIOS versions 4 or CAT 6 network cables for management port and iSCSI data ports Recommend CAT 6 cables for best performance SCSI cables and terminators 5 Prepare storage system configuration plan 6 Management and iSCSI data ports network information When using static IP please prepare static IP addresses subnet mask and default gateway 122 f Gigabit LAN switches Recommended or Gigabit LAN switches with VLAN LACP Trunking functions Optional CHAP security information including CHAP usernames and secrets Optional Setup the hardware connection before power up servers and IS16GL Connect console cable management port cable SCSI cables terminators and iSCSI data port cables first Step A configure your target 1 Go to Volume config Volume group create a VG gt Volume config group Create o Delete a Name ee PD sUDV Status 1 2 h Create Delete e Figure H 1 create VG olume config Volume group Create Name wagi RAID Level RAID 6 RAID PD slot 510111213141516 Select PD e lt lt Back 4 Next gt gt Figure H 2 choose RAID level and disks Volume config Volume group Create Confirm Create GO1 RAID 6 RAID width RAID copy 1 RAID row 1 RAID PD slot 9101112 1314 15 16 z
40. ISCSI SATA Il SUBSYSTEM Installation Reference Guide P N PW0020000000233 Preface About this manual This manual is the introduction of iSCSI SATA Il RAID subsystem and to help user to know the operation of the disk array system easily Information contained in the manual has been reviewed for accuracy but not for product warranty because of the various environments OS settings Information and specification will be changed without further notice Copyright No part of this publication may be reproduced stored in a retrieval system or transmitted in any form or by any means electronic mechanical photocopying recording or otherwise without the prior written consent Trademarks All products and trade names used in this document are trademarks or registered trademarks of their respective holders Changes The material in this document is for information only and is subject to change without notice Table of Contents Chapter 1 RAID introduction 5 1 1 UTE NR 5 1 2 TEMNO OY erc 6 1 3 wABAIUJIIMMC 8 Chapter 2 Getting started 10 2 1 BOr MN RE RR 10 2 2 Unpacking the 10 2 3 Identifying Parts of the subsystem 11 2 3 1 me E TN TER 11 2 3 2 Ricci cis eH c d 13 2 4
41. Quality of Service LITE emisse javascript preSubmit Figure E 13 Add Target Portals in Microsoft iSCSI initiator 2 03 97 J Sepe Figure E 14 Input the IP address of iSCSI data port 1 192 168 11 229 as mentioned in previous page Figure E 15 Click Targets to log on 98 Figure E 16 Log on iSCSI Initiator AZ Figure E 17 Click Advanced 99 1 proware sb 3164 g1a3 000a200dc def ault target n Figure 8 Select Target Portal to iSCSI data port 1 192 168 11 229 Then click OK Advanced Settings l angetsecret mutual authentication Figure E 19 The setting is completed 100 iSCSI Initiator PUFF X General Disowery Targets Persistent Targets Bound Volumes Devices Select a target and click Log On to access the storage devices for that target Click details to see information about the sessions connections and devices for that target Targets iqn 1 997 05 ty com proware sb 3164 g1 483 00 Connected Figure E 20 Run Computer Management in Windows Make sure the disks are available Then the disks can be tested for performance by IOMETER mj File Action View Window Help es ela x eE sA Computer Management Local Volume Layout Type File System Status Capacit 5 0 System Tools E ED Part
42. Targets Bound Volumes Devices Select a target and click Log On to access the storage devices for that target Click details ta see information about the sessions connections and devices for that target Targets asO0 Inactive Details Log Refresh Figure F 13 Enable Enable multi path checkbox Then click Advanced x Target name ign 1987 05 Ebw com proware sb 3164 91 a3 000a200ed default target Automatically restore this connection when Ehe system boots A Only select this option iF 15 51 multi path software is already installed an your computer Advanced Cancel Figure F 14 select Target Portal to iSCSI data port 1 192 168 11 229 Then click OK 107 Advanced Settings Log on again iSCSI Initiator Properties Figure F 16 Enable Enable multi path checkbox Then click Advanced 108 Log On to Target Figure F 17 Select Target Portal to iSCSI data port 2 192 168 12 229 Then select advanced senmi page and contigure t Figure F 18 ISCSI device is connected Click Details 109 iSCSI Initiator Properties General Discovery Targets Persistent Targets Bound Volumes Devices Select a target and click Log On to access the storage devices for that target Click details to see information about the sessions conn
43. Thermal warning Warning System temperature is a little bit higher Voltage critical Error System voltages failed The system will do the auto shutdown immediately 85 eee em higher lower Eror PSUFal ErmorPower number isoutofwork Eror X jFanFal ErmorFan number isoutof work Eror lt lt Error System cooling fan is not installed Eror 1055 Error AC loss for the system is detected Warning UPS Detection Fail Warning UPS detection failed Eror 1055 Error AC loss for the system is detected mM UN Gino shutdown mediate o oT auto shutdown immediately Info Mgmt Lan Port Info Management LAN Port is active Ame _ Warning Mgmt Lan Port Warning Fail to manage the system via the insat Failed LAN Port Info RTC Device OK Info RTC device is active Warning RTC Access Failed Warning Fail to access device Info Reset Password Info Reset Admin Password to default Info Reset IP Info Reset network settings set to default System config events Level Type Description NEXU MEINEN eee eee Info Sys Config Info Default system configurations restored Defaults Restored Sys NVRAM OK Info The system NVRAM is active Sys NVRAM IO Error Can t access the system NVRAM Failed Warning Sys NVRAMis full Warning The system NVRAM is f
44. VG 4 hard status 65 Physical disk Not available in import function spindown Hard disk auto spindown setting Volume group Not available in import function VG setting with 1 VG name 2 size 3 number of physical disks 4 number of UDVs 5 RAID level Cache volume Not available in import function Cache volume setting with 1 size 2 percentage User data volume Not available in import function UDV setting with 1 UDV name 2 size 3 VG name 4 cache volume 5 Stripe height 6 block size 7 write through or write back 8 priority Logical unit Not available in import function LUN setting with 1 host name 2 target name UDV name 4 LUN number 5 permission Maintenance Config import amp export Import Export Import E Import file confirm e Figure 3 8 4 1 Maintenance Config import amp export Import Export Export Export file CONFIG SB 31564 Gl1A3 AZ DED 2 00705831 102 Confirm Figure 3 8 4 2 3 8 5 Shutdown Enter Shutdown function it will display Reboot and Shutdown buttons Before power off its better to press Shutdown to flush the data from cache to physical disks The step is better for the data protection 66 Maintenance Shutdown Reboot e Shutdown e Figure 3 8 5 1 3 9 Logout For security reason Logout function will allow logout while no user is operating the system Re lo
45. abit 1 port TCP IP offload Intel PWLA8492MT Gigabit 2 port TCP IP offload Intel PWLA8494MT Gigabit 4 port TCP IP offload GbE Switch Del PowerConnect 5324 Del 2724 ProCurve 1800 24G Bac e SATA hard drive Vendor Deskstar 7K250 HDS722580VLSA80 80GB 7200RPM SATA 8M Deskstar 7K80 HDS728080PLA380 80GB 7200RPM SATA II 8M Deskstar 7 500 HDS725050KLA360 500G 7200RPM SATA II 16M DiamondMax Plus 9 6Y080MO 80G 7200RPM SATA 8M Maxtor DiamondMax 11 6H500F0 500G 7200RPM SATA 3 0Gb s 16M Samsung SpinPoint P80 HDSASP0812C 80GB 17200 SATA 8M Deskstar 7K80 HDS728040PLA320 406 7200RPM SATA II 2M Seagate Barracuda 7200 7 ST380013AS 80G 7200RPM SATA 8M Western Digital Caviar WDA4000YR 400GB 7200RPM SATA 16M NCQ B Event notifications e PD S M A R T events EE EEE aaa S M A R T Warning Disk lt slot gt S M A R T threshold threshold exceed exceed condition occurred for attribute of condition read error rate spin up time reallocated sector count seek error rate Spin up retries A calibration retries S M A R T Warning Disk slot Failure to get S M A R T information information e Physical HW events HWaming Warning Single bit ECC error is detected Error ECCemor Error Multi bit ECC error
46. able to respond to application read and write requests to its virtual disks S M A R T Self Monitoring Analysis and Reporting Technology Global Spare disks GS is shared for rebuilding purpose If some VGs need to use the global spare disks for rebuilding they could get the spare disks out from the common spare m iSCSI Internet Small Computer Systems Interface LACP Link Aggregation Control Protocol MTU Maximum Transmission Unit Challenge Handshake Authentication Protocol An optional security mechanism to control access to an iSCSI storage system over the iSCSI data ports Internet Storage Name Service 1 3 RAID levels RAID 0 Disk striping RAID 0 needs at least one hard drive Disk mirroring over two disks RAID 1 needs at least two hard drives N way Extension to RAID 1 level It has N copies of the disk mirror striping with parity on the dedicated disk RAID 3 needs at least three hard drives Striping with interspersed parity over the member disks RAID 3 needs at least three hard drives RAID 6 2 dimensional parity protection over the member disks RAID 6 needs at least four hard drives RAID 0 1 Mirroring of the member RAID 0 volumes RAID 0 1 needs least four hard drives RAID 10 striping over the member RAID 1 volumes RAID 10 needs at least four hard drives RAID 30 Striping over the member RAID volumes RAID 30 needs least six hard drives RAID 50 striping
47. ame RAID level but may have different volume capacity 38 Each UDV will be associated with one specific CV Cache Volume to execute the data transaction Each CV could have different cache memory size from user s modification setting LUN is the logical volume unit which the users could access through SCSI commands UDV 1 UDV 2 CV ee ee ee gt PD 3 RAM 3 6 2 Physical disk Enter Physical disk to view the status of hard drives inserted in the system The following are operation tips 1 Multiple select Select one or more checkboxes in front of the slot number Or select the checkbox at the top left corner will select all Check again will select none 2 The list box will disappear if there is no VG or only VG of RAID JBOD Because these RAID levels cannot be set as dedicated spare disk 3 These three functions Free disc Global spares Dedicated spares can do multiple selects too 4 The operations of the other web pages e g volume config of VG UDV CV LUN pages are similar to previous steps 39 E 7 disk Oo sw WWN n Status 1 2 Speed m m m Ln LORE 2DDaDDl1iz22s40024 75 5 i E Winkie ren E 2015001378300021 an 1 595 aD18D1378300021 18 VG R5 EL an 1568 4 Gidd E eea Epe 111 ER 1 Gh 2D17DD137HaDUOzl 18 VOR am Fr 1 55
48. ame as trunking For detailed setup steps please refer to Appendix E Trunking LACP setup instructions Caution Each of gigabit LAN ports must have IP address in different subnet for backplane solutions P120C 8 and P120C 16 3 5 3 Node select Node to view the target name for iscsi initiator Press Auth to enable CHAP authentication CHAP is the abbreviation of Challenge Handshake Authorization Protocol CHAP is a strong authentication method used with point to point for user login a type of authentication in which the authentication server sends the client a key to be used for encrypting the username and password CHAP enables the username and password to transmitting in an encrypted form for protection iSCSI config Node Auth iqn 1897 05 tw com praware sb 3164 g1a3 daz ed default target Figure 3 5 3 1 To use CHAP authentication please follow the procedures iSCSI config Node Change Authentication Authentication None Figure 3 5 3 2 36 1 Click in Auth column 2 Select CHAP 3 Go to iSCSI config CHAP account to create account and password Tips After setting CHAP the initiator in host server should be set the same Account Password Otherwise user cannot login Select None to disable the authentication method 3 5 4 Session Enter Session function it will display iSCSI session and connection information includ
49. an be taken manually or by schedule every hour or every day depends on the modification IS16GL is the most cost effective disk array subsystem with completely integrated high performance and data protection capabilities which meet or exceed the highest industry standards and the best data solution for small medium business users Caution N onapshot rollback features need 512MB RAM or more Please refer to RAM certification list in Appendix A for more detail 1 2 Terminology The document uses the following terms RAID is the abbreviation of Redundant Array of Independent Disks There are different RAID levels with different degree of the data protection data availability performance to host environment The Physical Disk belongs to the member disk of one specific volume group Volume Group A collection of removable media One VG consists of a set of UDVs and owns one RAID level attribute User Data Volume Each VG could be divided into several UDVs The UDVs from one VG share the same RAID level but may have different volume capacity Cache Volume IS16GL uses the on board memory as cache All RAM except for the part which is occupied by the controller can be used as cache User can divide the cache for one UDV or sharing among all UDVs Each UDV will be associated with one CV for data transaction Each CV could be assigned different cache memory size Logical Unit Number A logical unit number LUN is an
50. and user may forget it and use import function If the volume setting 64 was also imported the user s current data will be cleared Below is table of available configuration in import amp export function System name Controller system name IP address Web UI IP address with 1 DHCP enabled 2 IP 3 Subnet mask 4 Gateway 5 DNS iSCSI iSCSI data port address with 1 Aggregation 2 ISNS 3 CHAP 4 LAN 1 IP Aggregation IP Subnet mask Gateway MTU Login config Admin account login config with 1 Auto logout setting 2 Admin login lock Password Admin password value with 1 Current password 2 Old password Time Zone setting Event log mail setting with 1 Mail from address 2 SMTP server 3 Authentication 4 Mail account ID 5 Mail password 6 Mail To 1 address 7 Mail To 2 address 8 Mailt To 3 address 9 Event log filter setting SNMP setting with 1 SNMP trap address 1 2 SNMP trap address 2 3 SNMP trap address 3 4 Community setting 5 Event log filter function Event log Event log filter setting with 1 Web UI and console UI setting 2 LCM setting 3 Web UI pop up event setting SES management setting Auto shutdown setting vol temp UPS setting with 1 UPS type 2 Shutdown Battery Level 3 Shutdown Delay 4 Shutdown UPS Physical disk Not available in import function Current controller hard disk status with 1 size 2 block size 3
51. cation None Account Password Confirm Send test mail Figure 3 4 7 1 3 4 8 SNMP oelect SNMP to set up SNMP trap for alert via SNMP It allows up to 3 SNMP trap addresses Default community setting is public User can choose the event log type and the default value of SNMP is INFO event log enabled only System config SNMP SNMP trap address 1 SNMP trap address 2 SNMP trap address 3 Community public Send events INFO lv WARNING LI ERROR LI Figure 3 4 8 1 3 4 9 System log server oelect System log server to set up the system log server for RAID subsystem event log trapping which is able to support remote logging Remote logging 31 means that event log can be forwarded from the RAID subsystem to another running syslogd which it can actually log to a disk file 5ystem config 5ystem log server Server IP hostname Port sues Facility User Event level INFO M WARNING M ERROR IV Figure 3 4 9 1 1 Server IP hostname enter the IP address or hostname of system log server 2 Port enter the UDP port number on which system log server is listening to The default port number is 514 3 Facility select the facility for event log 4 Event level Select the event log options 5 Click Confirm button server side Linux RHEL4 The following steps are used to log RAID subsystem messages to a disk file In the followings all messages are setup with facility Local and e
52. config Cache volume T Q Create a Delete No Size UDV name 1 116 Global Free 0 MB Create Delete Figure 3 6 5 1 CV column description Number of the Cache volume The blue square button next to the CV No is More Information indication It shows the details of the cache volume Size MB Total capacity of the cache volume The blue square button next to the CV size is Resize function The CV size can be adjusted UDV Name Name of the UDV 46 e CV operations description CREATE Create a cache volume function DELETE Delete a cache volume function 3 6 6 Logical unit number Enter Logical unit function to view the status of attached logical unit number of each UDV User can attach LUN by clicking diac MA Please refer to Figure 3 6 6 1 Host must input an initiator node name for access control or fill in wildcard which means every host can access the volume Choose LUN and permission then click confirm Please refer to Figure 3 6 6 2 User can assign up to 256 LUNs per system controller For the host connection the host number limitation is 32 per system controller in the same time and 8 for single user data volume UDV which means 8 hosts can access the same UDV in the same time Volume config Logical unit Attach Host LUN O M Permission Read only 9 Read write Figure 3 6 6 1 Volume config Logica
53. control for SES management Hardware monitor System monitored voltage temperature and battery backup module S M A R T Self monitoring analysis and reporting technology for physical disks UPS Uninterruptible power supply Figure 3 7 1 3 7 1 SES configuration SES represents SCSI Enclosure Services one of the enclosure management standards Enter SES config function can enable or disable the management of SES Enclosure management SES config Enable e Disable e di Host LUN Permission UDV name 0 Read write SES Enable Disable Figure 3 7 1 1 Figure 3 7 1 1 Enable SES in LUN 0 and can be accessed from every host The SES client software is available at the following web site SANtools http www santools com 3 7 2 Hardware monitor Enter Hardware monitor function to view the information of current voltage and temperature 59 lt Enclosure management Hardware monitor Item Information T1 5V 1 52 V min 1 44 V max 1 63 V 3 3 3 28 V min 3 10 V max 3 55 V 5V 5 02 V min 44 80 V max 5 35 V 12V 412 08 V min 411 40 V max 12 80 V 2 5 2 54 V min 2 45 V max 2 75 V PSU 5V Backplane 5 10 V min 4 70 V max 5 35 V PSU 12V Backplane 412 23 V min 411 40 V max 12 80 V PSU 3 3ViBackplane 3 31 V min 3 10 V max 3 55 V Daughter Board 43 0 C hyst 0 0 C high 70 0 C PCI X BRG 33 5
54. d gateway Change IP oet IP address subnet mask and gateway There are 2 Config selections DHCP Get IP address from DHCP server or set static IP 90 Reset to Default Reset to default sets password to default 00000000 and set IP address to default as DHCP setting Default IP address 192 168 10 50 DHCP Default subnet mask 255 255 255 0 Default gateway 192 168 10 254 The following is LCM menu hierarchy Alarm Mute AYes Nov EN Reset Nov Reset Shutdown Shutdown AYes Quick Install RAID 1 RAID 3 xxxxxx G Size RAID 5 RAID 6 Apply The AYes Nov GB Config IP Config Static IP IP Address 192 168 010 050 View IP Setting IP Subnet Mask 255 255 255 0 BEDS UE IP Gateway 192 168 010 254 DHCP Adjust IP IP Subnet Adjust Submask Mask IP Change IP Config Static IP Adjust Gateway IP Apply IP Setting pues NOTI Reset to Default 4Yes Nov IP Gateway Caution Before power off it is better to execute Shutdown to flush the data from cache to physical disks 2 9 2 System buzzer The system buzzer features are describing in the following MUT The system buzzer alarms 1 second when system boots up successfully The system buzzer alarms continuously when there is error level event happened The alarm will be stopped after mute The alarm wil
55. e RAID column next the RAID level 3 Change the RAID level by clicking the down arrow mark PAID 5 bd There will be a pup up which shows if the HDD is not enough to Select support the new RAID level click Set to increase hard drives then click confi to go back to setup page When doing migration to lower RAID level such as the original RAID level is RAID 6 and user wants to migrate to RAID O the controller will evaluate this operation is safe or not and display Sure to migrate to a lower protection array to give user warning 4 Double check the setting of RAID level and RAID PD slot If no problem Next gt gt Click p 5 Finally a confirmation page shows detail RAID info If no problem click i confirm to start migration Controller also pops up a message of Warning power lost during migration may cause damage of data to give user warning When the power is abnormally off during migration the data is in high risk 6 Migration starts and it can be seen from the status 3 of a VG with a running square and an In Volume config User data volume it displays an M in Status 4 and complete percentage of migration in R Y Mom Volume config Volume group Migrate Hame G RO RAID Level RAID 5 RAID PD slot 123 Select PD lt lt Back r Next gt gt e Figure 4 2 1 Volume config Volume group Create Delete i To
56. e disk by clicking the checkbox of the row then click Free disks to free disk Step 11 Delete dedicated cache volume To delete the cache volume please follow the procedures select Volume config Cache volume Select a CV by clicking the checkbox of the row Click Delete There will pop up a confirmation page Choose OK Done The CV has been deleted Moe iuc Caution AN Global cache volume cannot be deleted Step 12 Done all volumes have been deleted 3 7 Enclosure management Enclosure management function allows managing enclosure information including SES config Hardware monitor S M A R T and UPS functions For the enclosure management there are many sensors for different purposes such as temperature sensors voltage sensors hard disks fan sensors power sensors and LED status And due to the hardware characteristics are different among these sensors for different sensors they have different polling intervals Below is the detail polling time intervals 1 Temperature sensors 1 minute 2 Voltage sensors 1 minute 3 Hard disk sensors 10 minutes 4 Fan sensors 10 seconds when there are continuous 3 times of error controller sends ERROR event log Power sensors 10 seconds when there are continuous 3 times of error controller sends ERROR event log 6 LED status 10 seconds P 58 Enclosure management SES config Access
57. e to The maximum capacity is up to 16 This volume can not be Dynamic Disk Microsoft Internet Explorer AX LBA 64 support NI Choose if using OS such as Windows 64 bits Windows Server 2003 SPI Linux kernel 2 6 x FreeBSD 5 2 1 or latter Choose Cancel Tt will change the sector size to The capacity 15 up to 16 TB This volume can not be Disk Figure H 7 choose OK for 64bit OS choose Cancel for 32bit OS this step will change block size to 4K automatically 124 config User data volume Attach e Create e Delete Size R CV 1 Mn Name GB Status 1 2 3 Es RAID LUN DE MB 1 UD T 2 83 nline ws HI E m a I 19 RAID 6 0 WOOL 156 Attach a Create a Delete a Figure H 8 a 2793G UDV is created You may want to check the detail information of this UDV go to click No 1 icon config User data volume More information xn Block Snap cy CV ID an U cine Creabe Time Size o Siro va 10 No Mane GB Stati 3 27 X irs PAID A ELE GB vu ID 1021620080 1 2763 Online WB HE D 196 84 x 0 0 00 NORMAL 345464528 10501 452358120 138 41 512 1173345454 Figure H 9 block size 512B for 64bit OS setting Volume config User volume More Sun R Sit Shap
58. e to detect UPS Communication lost UPS reboot in progress UPS shutdown in progress Batteries failed Please change them NOW Current percentage of battery level 3 8 System maintenance Maintenance function allows operation of the system functions including Upgrade to the latest firmware Info to show the system version Reset to default to reset all controller configuration values to origin settings Config 62 import amp export to export and import all controller configuration except for VG UDV setting and LUN setting and Shutdown to either reboot or shutdown the system Maintenance Upgrade Remote upload firmware Info System information Reset to default Reset to factory default Config import amp export Import export configurations Shutdown Reboot or shutdown system Figure 3 8 1 3 8 1 Upgrade Enter Upgrade function to upgrade firmware Please prepare new firmware file named xxxx bin in local hard drive then press Browse to select the file Click confirm it will pop up a message Upgrade system now If you want to downgrade to the previous FW later please export your system config first click Cancel to export system config first then click OK to start to upgrade firmware Maintenance Upgrade Browse the firmware to upgrade Browse Export config Confirm a Figure 3 8 1 1 9 Upgrade system no
59. echanism Online volume migration with no system down time Online volume expansion Instant RAID volume availability and background initialization Supports S M A R T NCQ and OOB Staggered Spin up capable drives IS16GL connects to the host system in iSCSI interface It can be configured to any RAID level IS16GL provides reliable data protection for servers and the RAID 6 function ready The RAID 6 function allows two HDD failures without any impact on the existing data Data can be recovered from the remaining data and parity drives Data can be recovered from the rest disks drives Snapshot on the box is a fully usable copy of a defined collection of data that contains an image of the data as it appeared at the point in time which means a point in time data replication It provides consistent and instant copies of data volumes without any system downtime IS16GL Snapshot on the box can keep up to 32 snapshots for all data volumes Rollback feature is provided for restoring the previously snapshot data easily while continuously using the volume for further data access The data access is regular as usual including read write without any impact to end users The on the box terminology implies that it does not require any proprietary agents installed at host side The snapshot is taken at target side and done by IS16GL It will not consume any host CPU time thus the server is dedicated to the specific or other application The snapshot copies c
60. ections and devices for that target Targets 32 00 Connected Details Log On Refresh tees Figure F 19 Click Device tab then click Advanced Sessions Devices Properties These are the devices exposed by iSc SI sessions to the target Click Advanced to view information about the device and configure the multipath policy Devices MPIO Capable proIP5 5B 3164 G143 SCSI Disk Device Multi Path Support Advanced Figure F 20 Click MPIO tab select Load Balance Policy to Round Robin 110 Device Details E AX General MPIC Load Balance Policy Fai Over Only Fail Over Onl Round Robin Round Robin With Subset Least Queue Depth Weighted Paths Least Blocks This device has the Following paths Path Id weight Session ID Ox20000 Conne Active n a FFFFFFFFFS80e87 c 400001 0 20001 Zonne Standby FFFFFFFFFS80e87c 400001 gt Details Edit o Figure F 21 Click Apply Device Details x General Load Balance Policy Description The round robin policy attempts to evenly distribute incoming requests to all processing paths This device has the Following paths Path Id Weight Session ID Ox20000 Conne Active n a FFFFFFFFFaGDe87 c 400001 0 20001 Zonne Active n a FFFFFFFFFS80e87c 400001 gt Figure F 22 Run Device Manage i
61. ed disk RAID 3 allows one hard drive fail or unplugging otriping with interspersed parity over the member disks RAID 5 allows one hard drive fail or unplugging 2 dimensional parity protection over the member disks RAID 6 allows two hard drives fails or unplugging If it needs to rebuild two hard drives at the same time it will rebuild the first one then the other by sequence RAID 0 1 Mirroring of the member RAID 0 volumes RAID 0 1 allows two hard drives fails or unplugging but at the same array RAID 10 Striping over the member RAID 1 volumes RAID 10 allows two hard drives fails or unplugging but at different arrays RAID 30 striping over the member RAID 3 volumes RAID 30 allows two hard drives fails or unplugging but at different arrays 69 RAID 50 otriping over the member RAID 5 volumes RAID 50 allows two hard drives fails or unplugging but at different arrays RAID 60 otriping over the member RAID 6 volumes RAID 40 allows four hard drives fails or unplugging but each two at different arrays The abbreviation of Just a Bunch Of Disks No protection of data VG fails if any hard drive fails or unplugs 4 2 VG migration and expansion To migrate the RAID level please follow the below procedures If the VG migrates to the same RAID level of the original VG it is expansion 1 Select Volume config Volume group Decide which VG to be migrated click the blue square button mj 2 in th
62. efault system name composed by model name and serial number of this system ex P120 000001 System config System System SB 31864 GlA 3 AZ ED Figure 3 4 1 1 3 4 2 IP address select IP address to change IP address for remote administration usage There are 2 selections DHCP Get IP address from DHCP server or static IP The default setting is DHCP enabled User can change the HTTP HTTPS and SSH port number when the default port number is not allowed on host server System config IP address 9 DHCP O Static Address Mask Gateway DNS MAC 00 13 78 A0 00 21 HTTP port 50 HTTPS port 443 SSH port 22 Figure 3 4 2 1 3 4 3 Language oelect Language is for changing GUI language There are 3 selections Auto Detect English and Simplified Chinese The default language is the same with your browser IE or Firefox default language 28 System config Language Language E IEEE pe A Detect Simplified Chinese Figure 3 4 3 1 3 4 4 Login config Select Login config is to set only one admin and set the auto logout timing The only one admin can prevent multiple users access the same controller in the same time 1 Auto logout Options are 1 Disable 2 5 mins 3 30 mins 4 1 hour When user is no response for a period of time the system will logout automatically to allow another user to login System config Login config Auto
63. en iSCSI Wiki http www open iscsi org cgi bin wiki pl ATTO iSCSI initiator is available for Mac Website http www attotech com xtend html 2 8 Management methods There are three management methods to manage IS16GL describe in the following 2 8 1 Web GUI IS16GL support graphic user interface to manage the system Be sure to connect LAN cable The default setting of management port IP is DHCP and the DHCP address displays on LCM user can check LCM for the IP first then open the 18 browser and type the DHCP address The DHCP address is dynamic and user may need to check every time after reboot again When DHCP service is not available 151661 use zero config Zeroconf to get an IP address E g on LCM IS16GL gets a DHCP address 192 168 10 50 from DHCP server 192 168 10 50 IS16GL lt http 192 168 10 50 https 192 168 10 50 https connection with encrypted Secure Sockets Layer SSL Please be aware of the https function is slower than http Click any function at the first time it will pop up a dialog to authenticate current user Login name admin Default password 00000000 Or login with the read only account which only allows seeing the configuration and cannot change setting Login name user Default password 1234 2 8 2 Console serial port Use NULL modem cable to connect console port The console setting is baud rate 115200 8 bits 1 stop bit and no parity Terminal type v
64. eration or deleting data When recovery is needed the operation steps are the same as replication steps user only needs to setup the QCopy service from target system reversely 78 2 UD 04 1624 2n Hamm O5 16 3 22 02 1 _ 2 aaa Ro RAIDS 0 QUICK27514 116 Node Mame 101 1992 05 tw com proware sh 3164 g14a3 0008200ed retinitiator d01 Figure 4 5 1 Figure 4 5 1 setup QCopy on selected snapshot UDV Volume config User data volume QCopy Target IP 192 168 10 187 Port 3260 Port Replicate lt lt Back Next gt gt Figure 4 5 2 Figure 4 5 2 input the target system data port IP address Volume config User data volume QCopy Berge EIN oe Gay lt lt Back Confirm Figure 4 5 3 Figure 4 5 3 select the target UDV LUN the target UDV capacity must be equal or larger than the source UDV capacity 9 Sure to QCopy we Replicate UDV04 1624 20 GB to 192 168 10 187 3260 LUN 3 20 GB Please dismount the disk in the host side first Cancel Figure 4 5 4 Figure 4 5 4 click OK after the target UDV is dismounted from host server A UDV 20 P 5 05 18 0624 p 20 9 42 38 QUICK27514 116 za Node Mame ign 1997 05 bw com proware sb 3154 g1a3 D00az200ed refinitiatar O0 1 Figure 4 5 5 Figure 4 5 5 QCopy is copying and the completed percentage it 24 Tips When setup block size for UDV
65. ery host can access this volume Choose LUN and permission then click 3 Done NO Volume config Logical unit Attach e Detach Host LUN Permission UDV name Session 0 Read write UDV R5 1 1 Fi iqn 1991 05 com microsoft demo 1 Read write UDV R5 2 0 Attach e Detach o Figure 3 6 7 6 Figure 3 6 7 6 UDV R5 1 is attached to LUN 0 with any hosts can access UDV R5 2 is attached to LUN 1 with only initiator node named iqn 1991 05 com microsoft demo can access Tips The matching rules of access control are from top to down by sequence Please refer 3 6 6 for details Step 4 Set global spare disk To set global spare disks please follow the procedures 1 Select Volume config Physical disk Select the free disk s by clicking the checkbox of the row then click Global spares to set as global spares 3 There is a icon shown up at status 1 column 54 Volume config Physical disk Select Free disks Global spares e Dedicated spares e Slot WWN d a Status 1 J Speed i Good 200a001378a20032 7 VG R5 mmm B RD Unknown 2 Good EI 2016001378a00021 38 VG R5 fi 1 5Gb 3 Good FI 2018001378a00021 38 VG R5 fi RD 1 5Gb 4 Good m 200c001378a20032 111 VG R5 md fi 1 5Gb 3 Good E 2017001378 00021 38 cs 1 5Gb Good CI 2009001378 20032 76 rg Unknown 7 Good i E T 2015001378 00021 38
66. ferent RAID Level and different sizes After user chooses RAID level user may finds there are still some HDD are not used Free Status The result is from IS16GL s smarter policy on Quick Install which gives user 1 Biggest capacity of RAID level which user chooses and 2 The fewest disk number for the RAID level volume size 298 lt E g user chooses RAID 5 and the controller has 12 200G HDD 4 80HDD inserted Then if using all 16 HDD for a RAID 5 then the volume max size is 1200G 80G 15 But in IS16GL we do smarter check and find out the most efficient use of HDDs which results controller only use the 200G HDD Volume size is 200 11 2200G Then the volume size is bigger and full use of HDD capacity Step 1 Select Quick install then choose the RAID level to set Please refer to Figure 3 3 1 After choosing the RAID level click Next gt gt which links to another page user can set up LUN here Quick install 5tepi RAID0 304GB RAID 1 111 GB 3 266 GB RAID 5 266 GB RAID 6 228 GB Figure 3 3 1 Step 2 Please select a LUN number Access control of host would show as a wildcard which means every host can access this volume In this page the Volume size can be changed The maximum volume size is shown To re enter the size be sure it has to be less or equal to maximum volume size Then click a Next gt gt B o Step 3 Con
67. few of servers to attach to an infinite number of storage volumes by using iSCSI over TCP IP networks IP SANs can scale the storage capacity with any type and brand of storage system In addition using any type of network Ethernet Fast Ethernet Gigabit Ethernet and combining operating systems Microsoft Windows Linux solaris etc within the SAN network IP SANs also include mechanisms for security data replication multi path and high availability Storage protocol such as iSCSI has two ends in the connection These ends are the initiator and the target In iSCSI we call them iSCSI initiator and iSCSI target The iSCSI initiator requests or initiates any iSCSI communication It requests all SCSI operations like read or write An initiator is usually located on the host server side either an iSCSI HBA or iSCSI SW initiator The iSCSI target is the storage device itself or an appliance which controls and serves volumes or virtual volumes The target is the device which performs SCSI commands or bridges it to an attached storage device iSCSI targets can be disks tapes RAID arrays tape libraries and etc Host 2 Host 1 initiator initiator iSCSI HBA iSCSI device 1 target iSCSI device 2 target Figure 2 2 1 a The host side needs an iSCSI initiator The initiator is a driver which handles the SCSI traffic over iSCSI The initiator can be software or hardware HBA Please refer to the certificatio
68. firm page Click conim if all setups are correct Then a page with the User data volume just been created will be shown as Figure 9 9 2 Done You can start to use the system now 96 Volume config User data volume Attach e Snapshot Create Delete Size 9 R w Snapshot VG CV E No Name cB Status 1 2 RAID LUN cB Selen MB 1 UICK13300 304 B HI 0 00 0 00 e E RAIDO 1 QUICK20397 120 Attach e Snapshot Create Delete a Figure 3 3 2 Figure 3 3 2 A RAID 0 user data volume with the UDV name QUICK13300 named by the system itself with the total available volume size 304GB 3 4 System configuration System config selection is for the setup of System name IP address Login config Password Date Mail SNMP and view Event log System config System name System name far identification IP address Internet address for remote administration Language Language preference for Login config Configuration for auto logout and login lack Password Administrator s password Date System time for event log x 8 Alert by e mail SNMP Alert via Simple Network Management Protocol SNMP System log server Alert to remote system log server Eventlog System event log to record critical events Figure 3 4 1 24s 3 4 1 System name oelect System name to change system name D
69. gin the system please enter username and password again 67 Chapter 4 Advanced operation 4 1 Rebuild If one physical disk of the VG which is set as protected RAID level e g RAID 3 RAID 5 or RAID 6 is FAILED or has been unplugged removed then the VG status is changed to degraded mode the system will search detect spare disk to rebuild the degraded VG to a complete one It will detect dedicated spare disk as rebuild disk first then global spare disk IS16GL support Auto Rebuild function When the RAID level allows disk failures which the VG is protected such as RAID 3 RAID 5 RAID 6 and etc IS16GL starts Auto Rebuild as below scenario Take RAID 6 for example 1 When there is no global spare disk or dedicated spare disk on the system IS16GL will be in degraded mode and wait until A there is one disk assigned as spare disk or B the failed disk is removed and replaced with new clean disk then the Auto Rebuild starts The new disk will be a spare disk to the original VG automatically a If the new added disk is not clean with other VG information it would be marked as RS reserved and the system will not start auto rebuild b If this disk is not belonging to any existing VG it would be FR Free disk and the system will start Auto Rebuild function c if user only removes the failed disk and plugs the same failed disk in the same slot again the auto rebuild will start by this case But rebuilding in t
70. he same failed disk may impact customer data later from the unstable disk status IS16GL suggests all customers not to rebuild in the same failed disk for better data protection 2 When there is enough global spare disk s or dedicated spare disk s for the degraded array IS16GL starts Auto Rebuild immediately And in RAID 6 if there is another disk failure happening during the time of rebuilding IS16GL will starts the above Auto Rebuild scenario as well And the Auto Rebuild feature only works at RUNTIME It will not work the downtime Thus it will not conflict with the Roaming function In degraded mode the status of VG is DG 68 When rebuilding the status of PD VG UDV is R and R in UDV will display the ratio in percentage After complete rebuilding and DG will disappear VG will become complete one Tips The list box doesn t exist if there is no VG or only VG of RAID 0 JBOD Because user cannot set dedicated spare disk for these RAID levels sometimes rebuild is called recover these two have the same meaning The following table is the relationship between RAID levels and rebuild Disk mirroring over 2 disks RAID 1 allows one hard drive fails or unplugging Need one new hard drive to insert to the system and rebuild to be completed Extension to RAID 1 level It has N copies of the disk N way mirror allows N 1 hard drives fails or unplugging otriping with parity on the dedicat
71. hyst 0 0 high 60 0 C Core Processor 46 0 C hyst 0 0 C high 75 0 C3 Location 1 Backplane 29 0 C hyst 0 0 high 45 0 Location 2 Backplanae 29 0 C hyst 0 0 C high 45 0 C Location 3 429 5 C hyst 0 0 C high 45 0 PSU1 Backplane good PSU Backplane good FAN1 Backplana good FAN2 Backplana good FAN3 Backplana good Auto shutdown Figure 3 7 2 1 If Auto shutdown has been checked the system will shutdown automatically when voltage or temperature is out of the normal range For better data protection please check Auto Shutdown For better protection and to avoid single short period of high temperature triggering Auto shutdown IS16GL use multiple condition judgments for Auto shutdown below is the detail of when the Auto shutdown will be triggered 1 There are 3 sensors placed on controllers for temperature checking on core processor on PCI X bridge and on daughter board IS16GL will check each sensor every 30 seconds When one of these sensors is over the high temperature value for continuous 3 minutes the Auto shutdown will be triggered immediately 2 The core processor temperature limit is 850 The PCI X bridge temperature limit is 800 The daughter board temperature limit i is 80 the high temperature situation doesn t last for minutes IS16GL will not do auto shutdown 3
72. ime txt E g log IS16GL A00021 20061011 114718 txt Press Clear button will clear event log Press Mute button will stop alarm if system alerts System config Event log ds e Download Mute Clear amp Figure 3 4 10 1 For customizing your own display of event logs there are total three display methods on Web Ul Console event log page popup windows on Web UI and on LCM The default setting of these three displays is WARNING and ERROR event logs enabled on Web UI and LCM The popup is default disabled System config Event log Filter Show events INFO LI WARNING ERROR Pop up events INFO WARNING L ERROR LI Show on LCM INFO LI WARNING ERROR Figure 3 4 10 2 The event log is displayed in reverse order which means the latest event log is on the first page The event log is actually saved in the first four hard drives each hard drive has one copy of event log For one controller there are four copies of event logs to guarantee users can check event log most of the time when there is are failed disk s 3 5 ISCSI config ISCSI config selection is for the setup of Entity Property NIC Node Session and CHAP account 33 iSCSI config Node Session ISCSI entity property iSCSI portal configuration iSCSI node configuration ISCSI session information Add Remove account for iSCSI node CHAP account Figure 3 5 1 3 5 1 Entity property Select E
73. ing the following items 1 Host Initiator Name security Protocol TCP Port Number Error Recovery Level Error Recovery Count Detail of Authentication status and Source IP port number EO IS iSCSI config Session No Host TPGT Error recovery level Error recovery count 0 iqn 1991 05 com microsoft demo 0 0001 0 0 Figure 3 5 4 1 3 5 5 CHAP account Enter CHAP account function to create a CHAP account for authentication 27 iSCSI config CHAP account iy Create Delete a Create Delete a Figure 3 5 5 1 iSCSI config CHAP account Create User max 223 Secret min 12 max 31 Confirm min 12 max 31 Figure 3 5 5 2 3 6 Volume configuration Volume config selection is for the setup of volume configurations including Physical disk Volume group User data volume Cache volume and Logical unit functions Volume config Physical disk Hard disks to store data Volume group Sets af physical disks with RAID functions User data volume Slices of volume groups Cache volume Dedicated or global cache space for user data volume Logical unit Target volumes for hosts access Figure 3 6 1 3 6 1 Volume relationship diagram The below diagram describes the relationship of RAID components One VG Volume Group consists of a set of UDVs User Data Volume and owns one RAID level attribute Each VG can be divided into several UDVs The UDVs from one VG share the s
74. ition Basic NTFS Healthy 19 53 GB H a Event Viewer Soa TOOLS Partition Basic 2 Healthy 15 88 GB Shared Folders E3WwINDOWSZO0U3 D Partition Basic FATS Healthy Boot 19 52 GB Local Users and Groups 3 windows 2000 C Partition Basic NTFS Healthy System 19 53 GB 1 4 Performance Logs and Alert a Device Manager EDS Storage o HIMEN Removable Storage Disk Defragmenter Disk Management 1 gt Services and Applications Disk 0 z Basic Windows WINDOW E 74 50 GB 19 53 GB W 19 53 GBF Online Healthy Sy B Healthy Br ZPDisk 1 Basic 152 87 GB 152 87 GB Online Unallocated 4 Unallocated Primary partition ll Extended partition a Logical drive p Figure E 21 101 F MPIO and MC S setup instructions Here is the step by step to setup MPIO There are 2 kinds of scenarios for MPIO Please see Figure F 1 IS16GL suggests using scenario 2 for better performance Network diagram of MPIO LL CL Wr eT 1 a aATE M SB 3164 G1A3 SB 3164 G1A3 2 Dual poris with MPIO 1 Dual ports with MPIO Via swilches host 7 Direct coanect host has 2 LAN ports read or write in LAN ports read or write in one one UDV Figure F 1 The setup instructions are in the following figures Create a VG with RAID 5 using 3 HDDs Volume config Volume group
75. k Dedicated spares to set as dedicated spare for the selected VG 3 There is a 05 icon shown up at status 1 column 56 Volume config Physical disk Select d Free disks e Global spares e Dedicated spares e Slot WWN pee wa Status 1 2 Speed 1 Good F 2003001378320032 76 VG R5 amm fi RD Unknown 2 Good L x 2016001378 00021 VG R5 mmi B RD 1 5Gb 3 Good C 2018001378 00021 VG R5 RD 1 5Gb 4 Good LI 200c001378a20032 111 5 am fi RD 1 5Gb 2 Good L T 2017001378a00021 38 VG R5 a B ps 1 5Gb Good C 2004001378 20032 76 FR Unknown 7 Good M 2015001378200021 3B FR 1 5Gb 8 Good C 200b001378a20032 111 FR 1 5Gb Auto spindown Disabled Select K Free disks e Global spares e Dedicated spares e Figure 3 6 7 13 Figure 3 6 7 13 Slot 5 has been set as dedicated spare disk of VG named VG R5 Step 6 Done The PDs can be used as iSCSI disks Delete UDVs VG please follow the steps Step 7 Detach LUN from UDV Please refer to Step 6 of Example 1 to detach LUN Step 8 Delete UDV User Data Volume Please refer to Step 7 of Example 1 to delete UDV Step 9 Delete VG User Data Volume Please refer to Step 8 of Example 1 to delete VG Step 10 Free dedicated spare disk To free dedicated spare disks please follow the procedures 1 Select Volume config Physical disk 57 2 Select the dedicated spar
76. k Create B o 3 Input a UDV name choose a VG Name select Dedicated cache which is created at Step 1 and input the size for the UDV decide the stripe height block size read write mode and set priority finally click Confirm Ba 4 Done A UDV using dedicated cache has been created 55 Volume config User data volume Attach 5 Snapshot e Create Delete a Size R Snapshot VG No Name GB Status 1 2 RAID LUN x MB 1 WDV R5 1 50 A we BHI 0 00 0 00 Online panne RAIDS 1 eH 679 79 2 UDV R5 2 54 Hur 0 00 0 00 Onl i m _ 5 RAIDS 0 VGR5 20 Attach Snapshot Create Delete Figure 3 6 7 11 Figure 3 6 7 11 UDV named UDV R5 1 uses global cache volume 40MB and UDV R5 2 uses dedicated cache volume 20MB UDV R5 2 is initializing about 5 Volume config Cache volume Create 5 Delete e Size UDV name 1 40 Ej Global 2 20 x UDV R5 2 Free 60 MB Create 5 Delete Figure 3 6 7 12 Figure 3 6 7 12 In Volume config Cache volume UDV named UDV R5 2 uses dedicated cache volume 20MB Step 4 Attach LUN to UDV Please refer to Step 3 of Example 1 to attach LUN Step 5 Set dedicated spare disk To set dedicated spare disks please follow the procedures 1 Select Volume config Physical disk select a VG from the list box then select the free disk s clic
77. l be muted automatically when the error situation is resolved E g when RAID 5 is degraded and alarm rings immediately after user changes adds one physical disk for rebuilding and when the rebuilding is done the alarm will be muted automatically 295 Chapter 3 Web GUI guideline 3 1 IS16GL GUI hierarchy The below table is the hierarchy of IS16GL GUI CS gt System name gt IP address gt Language gt Login config gt Password gt Date gt Mail gt SNMP gt System log server gt Event log gt 15 5 config Entity Property gt NIC gt Node gt Session gt CHAP account gt Volume config Physical disk gt Volume group gt User data gt Volume Cache volume gt Logical unit gt SES config gt Hardware monitor gt S M A R T gt UPS gt Maintenance Step 1 Step 2 Step Confirm System name DHCP Static HTTP port HTTPS port SSH port Language Auto logout Login lock Old password Password Confirm Date Time Time zone Daylight saving NTP Mail from address Mail to address SMTP relay Authentication Send test mail Send events SNMP trap address Community Server IP Port Facility Event level Filter Download Mute Clear Entity name iSNS Link aggregation or Multi homed IP settings Default gateway Set MTU MAC address Node name CHAP Authentication iSCSI sessions and connections Create Delete CHAP accoun
78. l unit Attach e Detach F Host LUN Permission UDV name Session 0 Read write UDV R5 1 1 Fi iqn 1981 05 com microsoft demo 1 Read write UDWV R5 2 0 Attach Detach m Figure 3 6 6 2 47 Figure 3 6 6 2 UDV 01 is attached to LUN 0 with every host can access UDV 02 is attached to LUN 1 with only initiator node named iqn 1991 05 com microsoft demo can access e LUN operations description ATTACH Attach a logical unit number to a user data volume DETACH Detach a logical unit number from a user data volume The matching rules of access control are from top to down by sequence For example there are 2 rules for the same UDV one is LUN 0 the other is iqn host1 LUN 1 The other host iqn host2 can login because it matches the rule 1 The access will be denied when there is no matching rule 3 6 7 Examples The followings are examples for creating volumes Example 1 is to create two UDVs sharing the same CV global cache volume and set a global spare disk Example 2 is to create two UDVs One shares global cache volume the other uses dedicated cache volume Set a dedicated spare disk e Example 1 Example 1 is to create two UDVs in one VG each UDV uses global cache volume Global cache volume is created after system boots up automatically So no action is needed to set CV Then set a global spare disk The last delete all of them Step 1 Create VG Volume Group To create the volu
79. l usage There will be 2 numbers in Snapshot GB column 74 These numbers mean Free snapshot space and Total snapshot space 4 Choose a UDV by clicking the checkbox of the row and then click Snapshot 5 snapshot UDV is created with the date and time taken snapshot of the chosen UDV The snapshot UDV size is the same as the chosen UDV no matter the actual snapshot UDV data occupies 6 Attach LUN to UDV please refer to section 3 6 6 Logical unit number for more detail f Done lt can be used as a disk Volume config User data volume Attach Snapshot e Create Delete 5 Size R Snapshot VG CV No Name Status 1 2 3 RAID LUN name 1 UpNv RO 1 we H HI 10 00 10 00 Onl mE 5 RAIDO 1 ar VG RO 100 2 UDV R 1713 10 02 14 17 13 35 Online A C a n amm no ui RAID 0 0 42 VG RO 100 Attach Snapshot e Create Delete Figure 4 4 1 1 Figure 4 4 1 1 No 1 is a RAID 0 UDV Set snapshot space to 10GB And now its space is free to snapshot No 2 is a snap UDV taken on 02 14 17 13 35 onapshot has some constraints as the following 1 Minimum RAM size of enabling snapshot function is 512MB For performance concern and future rollback the system saves snapshot with names in sequences For example three snapshots has been taken and named snap1 first snap2 and last When deleting snap2 both of snap1 and snap2 will
80. lobal cache is OK ee idle NN Failed lt name gt Info VG Rename Info VG lt name gt has been renamed as ee aa Spare Disks dedicated spare disk Disks UDV Read Only Info UDV lt name gt is a read only volume Info WRBK Cache Info Use the write back cache policy for UDV Policy name Info WRTHRU Cache Info Use the write through cache policy for UDV Policy name Ermor PD configuration Error PD slot Iba lt gt length lt gt config 87 read write error read write failed bul PD read write error Error PD lt gt Iba lt gt length read write error UDV recoverable Error UDV name stripe lt gt PD lt gt lt gt read write error length lt gt lt read write gt recoverable Fret temdmeemor length lt unrecoverablo _ read write error length lt gt lt read write gt unrecoverable Start fail succeed bitmap BITMAP started failed finished gt e Snapshot events Level Type Description ns RR ere aaa Memes Lo Mem Failed UDV lt name gt Space Failed UDV lt name gt Testo name gt hae been reached i _ Threshold name has been reached Info Snapshot Delete Info The snapshot of UDV lt name gt has been deleted Info Snapshot replaced Info The oldest snapshot version of UDV uu oe mew e Snapshot lt number gt
81. lume group DELETE Delete a volume group 43 3 6 4 User data volume Enter User data volume function to view the status of each user data volume Volume config User data volume Attach Snapshot Create a Delete a Size R Snapshot VG CV No Name GB Status 1 2 3 oj RAID LUN GB name MB 1 UDV 01 30 10 00 10 00 Online we HI 2 gt z E RAID 0 1 e E VG RO 116 2 UDV 02 60 10 00 10 00 Online we HI E x 2 a 5 23 6 1 z T VG Ro 116 Attach Snapshot Create 6 Delete Figure 3 6 4 1 Figure 3 6 4 1 Create named UDV 01 related to VG RO0 size is 30GB status is online write back high priority related to 1 LUN with cache volume 116MB 10GB snapshot space The other UDV is named UDV 02 initializing to 23 e UDV column description Number of this user data volume The blue square button in below to the UDV No is More Information Indication It shows the details of the User data volume Name of this user data volume The blue square button in below to the UDV Name is Rename function Size GB Total capacity of this user data volume The blue square button in below to the size is Extend function The status of this user data volume Online user data volume is online Fail gt user data volume is failed 44 WT gt Write Through WB gt Write Back The blue square button i
82. m PD capacity Old VG s minimum PD capacity Caution VG Migration cannot be executed during rebuild or UDV extension 4 3 UDV Extension To extend UDV size please follow the procedures 1 2 3 select Volume config User data volume Decide which UDV to be extended click the blue square button gt jn the Size column next the number Change the size The size must be larger than the original then click confirm to start extension Extension starts If UDV needs initialization it will display an I in Status 3 and complete percentage of initialization in ET Volume config User data volume Extend Size 10 Free 71 GB lt Back e confirm g Figure 4 3 1 Volume config User data volume Attach Snapshot Create Delete a Size R Snapshot VG CV Mo Name CB Status 1 2 3 ae RAID LUN aame 3 Lpv RO 10 3 0 00 0 00 _ uS MHI Qi 58 RAIDS 0 o VG RO 100 Attach Snapshot Create Delete e Figure 4 3 2 Figure 4 3 2 Extend UDV RO from 5GB to 10GB Vd Tips XU The size of UDV extension must be larger than original _ Caution UDV Extension cannot be executed during rebuild or migration 4 4 Snapshot Rollback IS16GL Snapshot on the box captures the instant state of data in the target volume in a logical sense The underlying logic is Copy on Write moving out the to be written data to certai
83. me group please follow the procedures Volume config Volume group Create Name VG R5 RAID Level RAIDS RAID PD slot 1234 Select PD Figure 3 6 7 1 48 1 Select Volume config Volume group 2 Click Create 3 Input a VG Name choose a RAID level from the picklist press i Select PD to choose the RAID PD slot s then press 4 Check the outcome Confirm correct 5 Done A VG has been created Volume config Volume group if all setups are Create 1 No Name nm pss PD UDV Status 1 VG R5 Online 114 114 4 0 ame Create 5 Figure 3 6 7 2 Delete e RAID 5 Tm Em Delete Figure 3 6 7 2 Creating a RAID 5 with 4 physical disks named VG R5 The total size is 114GB Because of no related UDV there free size still remains 114GB Step 2 Create UDV User Data Volume To create a user data volume please follow the procedures Volume config User data volume Create Mame UDV R5 1 VG name VG R5 E CV No Global 120 MB Ed Capacity GB 50 Stripe height KB 64 Ed Block size B 512 Ed Read Write O write through cache write back cache Priority High priority Middle priority O Low priority lt lt Back a Figure 3 6 7 3 1 Select Volume config User data volume 49 confirm 5 2 Click Create 3 Input a UDV name choose a VG Name and inpu
84. n Windows Make sure MPIO device is available Then the disk can be tested performance by IOMETER 111 ne Bis ca gma Comes Management Local Uu Sahn i Compute pen Messer drives j Shared Folders ww 55 51 04 01 DE Local Leer and Group du pros eid ST k Device Parlermanee Logs andi alert c 51 69 01 P Dirk Disa _ B Device Manager dae WOC WDGSECSEMU IAD Sui Storage 1 0 DVE CD ROM diver Dk Ded rouge nter e dek miio Management 2 Flopoy dives Pernice sod application c EE ATATATAPA conr omie 4 cm Mice and other pointing devices a Menace Pisos Dehar ee soy Pots COM x 4 m Procescors Sound video and gare controllers situm deviopn s j renal Serial Bur controllers Figure F 23 The MC S setup instructions are very similar to MPIO detail steps are in the following figures For the target side setting the steps are exactly the same as MR Please refer to Figure F 1 to Figure F 9 Create a VG with RAID 5 using 3 HDDs Create a UDV by using RAID 5 VG Run Microsoft iSCSI initiator 2 03 and check the Initiator Node Name Attaching LUN to R5 UDV Input the Initiator Node Name in Host field The volume config setting is done Check iSCSI settings The IP address of iSCSI data port 1 is 192 168 11 22
85. n below to the status1 is Set read write mode function gt High priority gt priority LO gt LOw priority The blue square button in below to the status2 is Set Priority function I gt user data volume is doing initializing gt user data volume is doing rebuilding Snapshot GB The user data volume size that used for snapshot The blue square button next to the snapshot is Resize function to decide the snapshot space The blue Square button next to the resize function is Auto snapshot function to setup the frequency of taking snapshots The number means Free snapshot space Total snapshot space If the snapshot UDV has been created this column will be the creation time QCopy Remote replication function VGname The VG name of the user data volume CV MB The cache volume of the user data volume e operations description 45 ATTACH LUN Attach to a LUN SNAPSHTOT Choose a UDV to execute snapshot CREATE Create a user data volume function DELETE Delete a user data volume function 3 6 5 Cache volume Enter Cache volume function to view the status of cache volume The global cache volume is a default cache volume which is created after power on automatically and cannot be deleted The size of global cache is based on the RAM size It is total memory size minus the system usage F1 Volume
86. n list of iSCSI HBA s in Appendix A OS native initiators or other software initiators use the standard TCP IP stack and Ethernet hardware while iSCSI HBA s use their own iSCSI and TCP IP stacks on board Hardware iSCSI HBA s would provide its initiator tool Please refer to the vendors HBA user manual Microsoft Linux and Mac provide software iSCSI initiator driver Below are the available links 1 Link to download the Microsoft iSCSI software initiator http www microsoft com downloads details aspx FamilylID 12cb3c1a 15d6 4585 b385 befd1319f825 amp DisplayLang en Please refer to Appendix D for Microsoft iSCSI initiator installation procedure 2 Linux iSCSI initiator is also available For different kernels there are different ISCSI drivers Please check Appendix A for software iSCSI initiator certification list and OS Initiator List pdf for latest update and detail information If you need the latest Linux iSCSI initiator please visit Open iSCSI project for most update information Linux iSCSl sfnet and Open iSCSI projects merged in April 11 2005 Open iSCSI website http www open iscsi org Open iSCSI README http www open iscsi org docs README Features http www open iscsi org cgi bin wiki pl Roadmap Support Kernels http www open iscsi org cgi bin wiki pl Supported Kernels Google groups http groups google com group open iscsi threads qvc 2 http groups google com group open iscsi topics Op
87. n location whenever a write action occurs since the time of data capture The certain location named as snap UDV is essentially a new UDV which can be attached to a LUN thus provisioned to a host as a disk just like other ordinary UDVs in the system Rollback function restores the data back to the state of any point in time previously captured for whatever By ace unfortunate reason it might be e g virus attack data corruption human errors and so on Snap UDV is allocated within the same VG in which the snapshot is taken we suggest to reserve 20 of VG size or more for snapshot space Please refer to Figure 4 4 1 for snapshot concept SB 3164 G1A3 Figure 4 4 1 Caution N onapshot rollback features need 512MB RAM at least Please also refer to RAM certification list in Appendix A 4 4 1 Create snapshot volume To take a snapshot of the data please follow the procedures 1 Select Volume config User data volume Choose a UDV to do snapshot by clicking the blue square button in the Snapshot GB column it will direct to a setup page The maximum snapshot space is 2TB which user can setup the space no bigger than 2048GB 3 Setup the size for snapshot The size is suggested to be 20 of UDV size at least then click confirm t will go back to the UDV page and the size will show in snapshot column It may not be the same as the number entered because some is reserved for snapshot interna
88. ntity property to view the the entity name of the IS16GL and setup ISNS IP for iSNS service ISNS is the abbreviation of Internet Storage Name Service Add an iSNS server IP address to the iSNS servers list which iSCSI initiator service can send queries iSCSI config Entity property Entity name ign 1997 05 tw com proware sbh 3164 g1a3 000a200ed ISNS IP Figure 3 5 1 1 3 5 2 select NIC to change IP addresses of iSCSI data ports There are two gigabit LAN ports to transmit data Each of them must be assigned to one IP address in multi homed mode unless the link aggregation or trunking mode has been selected If they are set in link aggregation or trunking mode the second line will not show in the screen iSCSI contig Port Aggregation DHCP IP address Netmask Gateway MTU MAC address na na 1500 1 LANL t 192 168 1 1 299 255 255 192 158 1 254 00 13 9 00 03 90 na na 182 168 2 254 1500 2 192 168 2 1 295 255 255 l1 00 13 8 00 03 91 Entity iIqn 1997 05 tw com proware sh 3164 g1la3 000a200ed Figure 3 5 2 1 34 Figure 3 5 2 1 Each of iSCSI data ports is set to static IP MTU is 1500 User can change IP address by clicking the blue square button in the DHCP column There are 2 selections DHCP Get IP address from DHCP server or static IP iSCSI config NIC IP address gt DHCP Static Address 192 168 1 1
89. olume group Create e Delete e No Name Free amp PD UDV Status 1 2 3 RAID 1 VG RO F z A 76 46 7 1 Online 2 VG R6 oe N 76 16 4 1 Online a Create o Delete e Figure 3 6 3 1 Figure 3 6 3 1 There is a RAID 0 with 2 physical disks named VG RO total size is 76GB free size is 46GB related to 1 UDV Another is a RAID 6 with 4 physical disks named VG R6 Number of volume group The blue square button next to the No is More Information indication It shows 42 the details of the volume group Volume group name The blue square button next to the Name is Rename function Total GB Total capacity of this volume group Free GB Free capacity of this volume group The number of physical disks of the volume group The number of user data volumes related to the volume group The status of volume group Online volume group is online Fail gt volume group is fail DG gt DeGraded mode This volume group is not completed The reason could be lack of one disk or failure of disk R 2 Rebuild This volume group is doing rebuilding M Migration This volume group is doing migration The RAID level of the volume group The blue square button next to the RAID level is Migrate function Click Migrate can add disk s to do expansion or change the RAID level of the Volume group VG operations description CREATE Create a vo
90. ompleted VG set or hot plug of this disk in the running time In order to protect the data in the disk the status changes to reserve It can be reused after setting it to FR manually gt Rebuild The hard drive is doing rebuilding Migration The hard drive is doing migration 3 0G From SATA ATAPI standard if the disk can support ATAPI IDENTIFY PACKET DEVICE command and the speed can achieve Serial ATA Gen 2 signaling speed 3 0Gbps 1 5G From SATA ATAPI standard if the disk can support ATAPI IDENTIFY PACKET DEVICE command and the speed can achieve Serial ATA Gen 1 signaling speed 1 5Gbps Unknown The disk doesn t support above command so the speed is defined as unknown e PD operations description FREE DISC Make the selected hard drive to be free for use GLOBAL set the selected hard drive s to global spare of all SPARES VGs DEDICATED Set hard drive s to dedicated spare of selected VGs SPARES 41 In this page IS16GL also provides HDD auto spin down function to save power The default value is disabled User can set up in physical disk page too Auto spindown Disabled N Dedicated spares e Free disks Global spares e Figure 3 6 2 2 5 8 Volume config Physical disk Auto spindown Auto spindown Figure 3 6 2 3 3 6 3 Volume group Enter Volume group to view the status of each volume group VG column description Volume config V
91. opy so the node name is different for distinguishing QCopy to disk device 80 4 6 Disk roaming Physical disks can be re sequenced in the same system or move whole physical disks from system 1 to system 2 This is called disk roaming Disk roaming has some constraints as described in the following 1 Check the firmware of two systems first Its better that both have same firmware version or newer 2 Whole physical disks of related VG should be moved from system 1 to system 2 together The configuration of both VG and UDV will be kept but LUN configuration will be cleared to avoid conflict with system 2 4 Support Microsoft MPIO and MC S MPIO Multi Path Input Output and MC S Multiple Connections per Session both use multiple physical paths to create logical paths between the server and the storage device In the case which one or more of these components fails causing the path to fail multi path logic uses an alternate path for I O so that applications can still access their data Microsoft iSCSI initiator supports multi path function Please follow the procedures to use MPIO feature 1 A host with dual LAN ports connects cables IS16GL 2 Create a VG UDV attach this UDV to the host 3 When installing Microsoft iSCSI initiator please install MPIO driver at the same time 4 Logon to target separately on each port When logon to target check Enable multi path Please refer to Appendix D ste
92. over the member RAID 5 volumes RAID 50 needs at least six hard drives RAID 60 Striping over the member RAID 6 volumes RAID 60 needs at least eight hard drives JBOD The abbreviation of Just a Bunch Of Disks JBOD needs at least one hard drive Chapter 2 Getting started 2 1 Before starting Before starting prepare the following items Check the Certification list in Appendix A to confirm the hardware setting is fully supported Read the latest release notes before upgrading Release notes accompany with release firmware A server with a NIC or iSCSI HBA CAT 5e or CAT 6 network cables for management port and iSCSI data ports Recommend CAT 6 cables for best performance Prepare storage system configuration plan Management and iSCSI data ports network information When using static IP please prepare static IP addresses subnet mask and default gateway Gigabit LAN switches Recommended or Gigabit LAN switches with VLAN LACP Trunking functions Optional CHAP security information including CHAP usernames and secrets Optional Setup the hardware connection before power up servers and IS16GL Connect console cable management port cable and iSCSI data port cables first 2 2 Unpacking the Subsystem Before we continue you need to unpack the subsystem and verify that the contents of the shipping carton are all there and in good condition Before removing the subsystem from the shipping carton you sho
93. p 6 9 MPIO mode can be selected on Targets Details Devices Advanced 6 Rescan disk 7 There will be one disk running MPIO For detailed setup steps please refer to Appendix F MPIO and MC S setup instructions MC S setup steps are very similar to MPIO please also refer to Appendix F 81 Appendix A Certification list e RAM RAM Spec 184pins DDR333 PC2700 Reg register or UB Unbufferred ECC or Non ECC from 64MB to 1GB 32 bit or 64 bit data bus width x8 or x16 devices 9 to 11 bits column address Vendor y O eS Da aaa nem Unigen UG732D6688KN DH 256MB DDR333 UNBUFFERED with Hynix Unigen UG732D6688KS DH 256MB DDR333 UNBUFFERED LOW PROFILE with Hynix Unigen UG732D7588KZ DH 256MB DDR333 REG ECC with Elpida Unigen UG764D6688LS DH 512MB DDR333 UNBUFFERED LOW PROFILE with Hynix Unigen UG764D7588KZ DH 512MB DDR333 REG ECC with Elpida Unigen UG7128D7588LZ DH 1GB DDR333 REG ECC with Hynix Unigen UG7128D7488LN GJF 1GB DDR400 ECC with Hynix Unigen UG7128D7588LZ GJF 1GB DDR400 ECC REG with Hynix Unigen UG718D6688LN GJF 1GB DDR400 Non ECC with Hynix Unigen UG718D688LN GJF 1GB DDR400 Non ECC with Elpida ATP AG28L72T8SHCAS 1GB DDR400 ECC with Samsung ATP AG28L64T8SHC4S 1GB DDR400 Non ECC with Samsung ATP AG64L72T8SQC4S 512MB DDR400 ECC with Samsung iSCSI Initiator Software os SSoftware Releese N
94. please setup 512B for QCopy In the current design QCopy supports 512B block size only for both source and target side Caution Before executing QCopy it is better to dismount target file system for avoiding any inconsistent data IO SB 3164 G1A3 controller also send pop up message when user checks QCopy function Sure to QCopy Replicate snapshot UDV name source UDV capacity to target system data port IP address 3260 LUN number target UDV capacity Tips If QCopy access control is needed on the target system when user doesn t want any other system connecting to this target UDV user can setup source system s node name to target UDV LUN Please go to source system iSCSI config Entity property find the entity name node name add refinitiator 001 after entity name for target UDV LUN The QCopy Node Name is displayed in Volume config User data volume page E g the source system entity name node name is iqn 2004 08 tw com proware sb 3164 g1a3 000a0001f Then this source system s QCopy node name is as follows iqn 2004 08 tw com proware sb 3164 g1a3 000a0001f refinitiator 001 You may wonder why QCopy node name is different from the node name you see from host server iscsi initiator e g iqn 2004 08 tw com proware sb 3164 g1a3 000a0001f default target When doing QCopy the source system is acting like a host server copying its data to target system The source system is not a disk device in QC
95. r the UDV s on this VG must be deleted first 3 Click Delete There will pop up a confirmation page 4 Choose OK 5 Done The VG has been deleted Tips The action of deleting one VG will succeed only when all of the related UDV s are deleted in this VG Otherwise it will have an error when deleting this VG Step 9 Free global spare disk To free global spare disks please follow the procedures 53 1 Select Volume config Physical disk 2 Select the global spare disk by clicking the checkbox of the row then click Free disks to free disk Step 10 Done all volumes have been deleted e Example 2 Example 2 is to create two UDVs in one VG One UDV shares global cache volume the other uses dedicated cache volume First dedicated cache volume should be created it can be used in creating UDV The last delete them Each UDV is associated with one specific CV cache volume to execute the data transaction Each CV could have different cache memory size If there is no special request in UDVs it uses global cache volume Or user can create a dedicated cache for indivifual UDV manually Using dedicated cache volume the performance would not be affected by the other UDV s data access The total cache size depends on the RAM size and set all to global cache automatically To create a dedicated cache volume first step is to cut down global cache size for the dedicated cache volume Please follow
96. s and cabling solutions have three indicators at the top right corner Figure 3 2 2 24 x 1 EL light Green means RAID works well Red represents RAID failure happening 2 EL oes light Green is normal Red represents abnormal temperature 3 E light Green is normal Red represents abnormal voltage status 4 Hn light Green is normal Red represents abnormal UPS status light Green is normal Red represents abnormal fan status 6 oM light Green is normal Red represents abnormal power status 3 3 Quick install It is easy to use Quick install function to create a volume Depend on how many physical disks or how many residual spaces on created VGs are free the system will calculate maximum spaces on RAID levels 0 1 3 5 6 Quick install function will occupy all residual VG space for one UDV and it has no space for snapshot and spare If snapshot function is needed please create volumes by manual and refer to section 4 4 for more detail IS16GL Quick Install function has a smarter policy When the system is full inserted with 16 HDD and all HDD are in the same size IS16GL Quick Install function lists all possibilities and sizes among different RAID levels IS16GL Quick Install will use all available HDD for the RAID level which user decides But when the system is inserted with different sizes of HDD e g 8 200G HDD and 8 80G IS16GL also lists all possibilities and combinations of dif
97. s no no 1500 1 T 132 1568 11 2298 259 295 255 192 168 11 254 x g0 13 78 00 03 50 na na 192 168 12 254 1500 eo LAN P 197 166 12 229 g0 13 78 00 03 51 Entity name Iqn 1997 05 tw com prow are sbh 3164 g1a3 000a200ed Figure E 7 Select Trunking If LACP is needed please see Figure E 12 iSCSI config NIC Aggregation Aggregation Trunking ze Back Confirm a Figure E 8 95 Now the setting is in Trunking mode iSCSI config NIC Mo Port Aggregation DHCP IP address Netmask Gateway MTU MAC address Trunking 1500 1 2 P x 192 166 11 229 255 255 255 0 182 158 11 254 gn i13 78 00 03 50 Entity name iqn 1997 05 tw com proware sh 3164 gla3 000a200ed Figure E 9 A Enable switch Trunking function of port 21 and 23 Below is an example of Dell PowerConnect 5324 Go to Figure E 14 for next step E Dell OpenManage Switch Administrator Microsoft Internet Explorer 10 x File Edit view Favorites Tools Help Q A Search gt Favorites 2 a gt Address http 1 192 168 10 252 0 Dell OpenManage Switch Administrator Support Help About Log Out 19216840282 LAG Membershie O LAG Membership 53 24 system Be AE i witch Network Securit RIS Parts Address Tables DE GARP oe LAG Membr
98. t Free disc Global spares Dedicated spares More information Auto Spindown Create Delete More information Rename Migrate Expand Create Delete Attach LUN Snapshot More information Rename Extend Set read write mode Set priority Resize Snapshot space Auto Snapshot QCopy Create Delete More information Resize Dedicated cache Attach Detach Enable Disable Status Auto shutdown S M A R T for physical disks UPS Type Shutdown Battery Level Shutdown Delay Shutdown UPS M om Upgrade gt Browse the firmware to upgrade Export config Info gt System information Reset to default gt Reset to factory default Config import amp export gt Controller configuration import and export function Shutdown gt Reboot Shutdown 3 2 Login IS16GL supports graphic user interface GUI to operate the system Be sure to connect the LAN cable The default IP setting is DHCP open the browser and enter http 192 168 10 50 Please check the DHCP address first on LCM Click any function at the first time it will pop up a dialog for authentication Login name admin Default password 00000000 After login you can choose the function blocks on the left side of window to do configuration Quick install System config iSCSI config Volume config Enclosure management Maintenance Logout Figure 3 2 1 There are six indicators at the top right corner for backplane solution
99. t a size to the UDV decide the stripe high block size read write mode and set priority finally click T Confirm 6 4 Done A UDV has been created 5 Doone more time to create another UDV Volume config User data volume Attach Snapshot Create e Delete Size R Snapshot VG No Name GB Status 1 2 3 E RAID LUN GB name MB 1 UDV R5 1 5 ws HI 0 00 0 00 2 s m RAID5 0 gt VERS 120 2 Uupwv R5 2 64 we HI 0 00 0 00 mm 4 RAIDS 0 e YGRS 120 Attach Snapshot e Create Delete Figure 3 6 7 4 Figure 3 6 7 4 Create UDVs named UDV R5 1 and UDV R5 2 related to VG R5 the size of UDV R5 1 is 50GB the size of UDV R5 2 is 64GB The status of these UDVs are online write back high priority with cache volume 120MB UDV R5 2 is initializing about 4 There is no LUN attached Step 3 Attach LUN to UDV There are 2 methods to attach LUN to UDV 1 In Volume config User data volume press Attach B 2 In Volume config Logical unit press mf The procedures are as follows Volume config Logical unit Attach UDV UDV R5 1 50GB Host LUN o B Permission Oecd only Resd wate lt lt Back o Confirm Figure 3 6 7 5 50 Select a UDV Input Host which is an initiator node name for access control or fill in wildcard which means ev
100. t100 Login name admin Default password 00000000 2 8 3 Remote control secure shell SSH secure shell is required for 151661 to remote login The SSH client software is available at the following web site SSHWinClient WWW http www ssh com Putty WWW http www chiark greenend org uk Host name 192 168 10 50 Please check your DHCP address for this field Login name admin 19 Default password 00000000 Tips SB 3164 G1A3 Series only support SSH for remote control For using SSH the IP address and the password is required for login 2 9 Enclosure 2 9 1 LCM There are four buttons to control IS16GL LCD Control Module including A up down EXIT Escape and Enter After booting up the system the following screen shows management port IP and model name 192 168 10 50 IS16GL lt Press EXIT the LCM functions Alarm Mute Reset Shutdown Quick Install View IP Setting Change IP Config and Reset to Default will rotate by pressing 4 up and w down When there is WARNING or ERROR level of event happening the LCM shows the event log to give users more detail from front panel too The following table is function description Mute alarm when error occurs Reset Shutdown Reset or shutdown controller Quick three steps to create a volume Please refer to section 3 3 for operation in web Ul View IP Setting Display current IP address subnet mask an
101. tal Free AT No Name cB PD UDV Status 1 2 3 RAID 1 VG RO Onl RAID 5 76 Ti 3 1 Create e Delete Figure 4 2 2 Figure 4 2 2 A RAID 0 with 2 physical disks migrates to RAID 5 with 3 physical disks Volume config User data volume Attach a Snapshot e Create a Delete a Size R Snapshot VG CV No Name GB Status 1 2 3 a RAID LUN name 1 d we furi 0 00 0 00 Onl x S UM 12 RAIDS 0 YGRO 100 Attach a Snapshot e Create a Delete a Figure 4 2 3 Figure 4 2 3 A RAID 0 migrates to RAID 5 complete percentage is 12 1 Tips To do migration expansion the total size of VG must be larger or equal to the original VG It does not allow expanding the same RAID level with the same hard disks of original VG During setting migration if user doesn t setup correctly controller will pop up warning messages Below is the detail of messages Invalid VG ID Source VG is invalid Degrade VG not allowed Source VG is degraded Initializing rebuilding operation s going Source VG is initializing or rebuilding Migration operation s going Source VG is already in migration Invalid VG raidcell parameter Invalid configuration E g New VG s capacity Old VG s capacity New VG s stripe size lt Old VG s stripe size Or New VG s configuration Old VG s configuration Invalid PD capacity New VG s minimu
102. tatus Capacity EL 1 system Tools E ES Partition Basic NTFS Healthy 19 53 GB Enel Event Viewer EA TOOLS F Partition Basic FAT32 Healthy 15 88 GB a Folders EJWIMDOWS2003 D Partition Basic FAT32 Healthy Boot 19 52 GB OMA Local Users and Groups windows 2000 C Partition Basic NTFS Healthy System 19 53 GB Logs and Alert Removable Storage ju d Disk ai rj t ae Services ge s Windows WINDOW f E QA TOOLS 19 53 19 55 GBF 19 53 con 15 90 GB F Healthy 5y f Healthy Es Healthy lt 4 Healthy Basic 152 87 GB 152 87 GB Online Unallocated 4 Unallocated Primary partition ll Extended partition a Logical drive Figure G 9 H Installation Steps for Large Volume TB Introduction IS16GL are capable to support large volumes gt 2TB on all product lines When connecting IS16GL to 64bit OS installed host server the host server is inherently capable for large volumes from the 64bit address On the other side if the host server is installed with 32bit OS user has to change the block size to 1KB 2KB or 4KB to support volumes up to 4TB 8TB or 16TB for the 32bit host server is not LBA Logical Block Addressing 64bit supported For detail installation steps please check below Before starting prepare the following items 1 IS16GL 2 Referto User Manual for certification list of RAM iS CSI Initiator Software NIC or iSCS
103. uld visually inspect the physical condition of the shipping carton Exterior damage to the shipping carton may indicate that the contents of the carton are damaged If any damage is found do not remove the components contact the dealer where you purchased the subsystem for further instructions The package contains the following items iSCSI RAID subsystem unit Two power cords Three Ethernet LAN cables One external null modem cable Installation Reference Guide Spare screws etc If any of these items are missing or damaged please contact your dealer or sales representative for assistance 10 2 3 Identifying Parts of the subsystem The illustrations below identify the various features of the subsystem Get yourself familiar with these terms as it will help you when you read further in the following sections 2 3 1 Front View vere Slot 16 Slot 1 Green LED indicates power is on and hard drive status is good for this slot If hard drive defected in this slot or the hard drive is failure the LED is orange HDD Status LEDs HDD access LEDs These LED will blink blue when the hard drive is being accessed 11 2 HDD trays 1 16 From right to left 3 Smart Function Panel Function Keys Access LED Blue blinking LED indicates data is being accessed 4 LCD display panel 5 Smart Function Panel Function Keys for RAID configuration The smart LCD panel is where you
104. ull System maintenance events ee GERNE Se ae eee Upgraded Fre Upgsdedeled ne Upgraded Failed System reboot Info System has been rebooted System shutdown Info System has been shutdown System Init OK Info System has been initialized OK System Init Failed Error System cannot be initialized in the last boot up LVM events MERECE VG Created OK Info VG name has been created 86 Warning VG Created Fail Warning Fail to create VO name Warning UDV Created Fail Warning Fail to create UDV lt name gt Warning UDV Attached Fail Warning Fail to attach LUN to UDV lt name gt Wening VDV esee Fal imper SCSL ID number LUN numbec _ number SCSI ID number LUN number Started Finished mee Fa bung Fail rebuilding Started Info UDV_OP Migrate Info UDV lt name gt completes migration me Fnehed Se Warning VG Degraded Warning VG lt name gt is under degraded mode UDV Degraded Warning UDV name is under degraded mode Momina name gt Initialization initialization UDV IO Fault Error IO failure for stripe number number in me rere eee AS Warning VG Failed Error Fail to access VG lt name gt Warning UDV Failed Error Fail to access UDV lt name gt Global CV Error Fail to adjust the size of the global cache Adjustment Failed Global Cache Info The g
105. umber si hs ES Sa EM Microsoft Microsoft iSCSI Software Initiator Version 2 03 Windows System Requirements 1 Windows XP Professional with SP2 2 Windows 2000 Server with SP4 Windows Server 2003 with SP 1 4 Windows Server 2003 R2 The iSCSI Initiators are different for different Linux Kernels 1 For Redhat Linux 9 Kernel 2 4 install linux iscsi 3 6 3 tar 2 For Red Hat Enterprise Linux 3 Kernel 2 4 install linux iscsi 3 6 3 tar 3 For Red Hat Enterprise Linux4 Kernel 2 6 use the build in ISCSI initiator in kernel 2 6 9 34 Elsmp Mac XTEND 2 0x SAN Mac iSCSI Initiator 82 System Requirements Mac OS X v10 3 5 or later For ATTO initiator it is not free Please contact your local distributor for ATTO initiator Tips Please check OS Initiator List pdf for the latest update and detail information of iSCSI initiator iSCSI HBA card ee Adaptec 7211C Gigabit 1 port TCP IP offload iSCSI offload QLogic QLA4010C Gigabit 1 port TCP IP offload iSCSI offload Qlogic QLA4052C Gigabit 2 port TCP IP offload iSCSI offload For detailed setup steps of Qlogic QLA4010C please refer to Appendix G QLogic QLA4010C setup instructions Tips Please check OS Initiator List pdf for the latest update and detail information of iSCSI HBA Bios version and driver version Vendor y Intel PWLA8490MT Gig
106. uses the following information to uniquely ins identity this initiator and authenticate targets IP address or DNS name Pork 192 168 11 229 3260 Advanced oed Initiator Mame iqn 1381 D5 eom microsaft demo rename the initiatar node click Change Change To authenticate targets using CHAP click Secret to specify CHAP secret secret ISNS Servers To configure IPSec Tunnel Mode addresses click SERRE Tunnel Remove Refresh Cancel Apply Figure H 13 run MS iSCSI initiator go to Discovery tab add target portal iSCSI data port 126 iSCSI Initiator Properties iSCSI Initiator Properties E X 2 gt es x 7 General Discovery Targets Persistent Targets Bound Volumes Devices Log On to Target Target name Select a target and click Log On to access the storage devices for that target Click details to see information about the sessions connections and devices for that target Automatically restore this connection when the system boots Targets Enable multi path E Only select this option if iSCSI multi path software is already installed on your computer Advanced Cancel atO0 Inactive Details Log On Refresh Details Refresh Cancel Apply Cancel Apply Figure H 14 go to Targets tab click Refresh and then
107. vent level WARNING or higher are logged to var log raid log 1 Flush firewall 2 Add the following line to etc syslog conf Local1 warn var log raid log 3 Send a HUP signal to syslogd process this lets syslogd perform a re initialization All open files are closed the configuration file default is etc syslog conf will be reread and the syslog 3 facility is started again Activate the system log daemon and restart Check the syslog port number e g 10514 Change controllers system log server port number as above Then syslogd will direct the selected event log messages to var log raid log when syslogd receive the messages from RAID subsystem EI For more detail features please check the syslogd and syslog conf manpage e g man syslogd Server side Windows 2003 Windows doesn t provide system log server user needs to find or purchase a client from third party below URL provide evaluation version you may use it for test first http www winsyslog com en 1 Install winsyslog exe 2 Open Interactives Syslog Server 3 Check the syslog port number e g 10514 2139 4 Change controllers system log server port number as above 5 Start logging on Interactives Syslog Server 3 4 10 Event log select Event log to view the event messages Press Filter button to choose the display Press Download button will save the whole event log as text file with file name log ModelName SerialNumber Date T
108. w If you want to downgrade to the previous FW later please export your system config first Figure 3 8 1 2 63 When upgrading there is a progress bar running After finished upgrading the system must reboot manually Notice When upgrading FW IS16GL can only accept the newer version and guarantee the compatibility issue which means if customer changes FW to older version the VG UDV LUN config may be lost 3 8 2 Info Enter Info function will display system type FW number CPU type RAM size and serial number Maintenance Info System information SB 3164 6143 2 2 0 build 200704061700 CPU type Scale lOP80331 rev 10 v5lj Installed system memory ELC DDR 512MB Controller serial no 0013784200ED Figure 3 8 2 1 3 8 3 Reset to default Enter Reset to default function it allows user to reset the controller to the factory default setting Maintenance Reset to default Sure to reset to factory default Confirm Figure 3 8 3 1 3 8 4 Config import amp export Enter Config import amp export function it allows user to save system configurable values export function and to apply all configuration import function For the volume config setting the values are available in export function and not available in import function which can avoid confliction date deleting between two subsystems That says if one controller already has valuable data on the disks
109. will configure the RAID subsystem If you are configuring the subsystem using the LCD panel please press the controller button to configure your RAID subsystem Use the Up or Down arrow keys to go through the information on the LCD screen This is also used to move between each menu when you configure the subsystem Select button This is used to enter the option you have selected Exit button EXIT Press this button to return to the previous menu 6 Environment status An alarm will sound warning of a voltage abnormality LED LED will turn red If temperature irregularity in these systems occurs HDD slot Over temp LED temperature over 45 C this LED will turn red and an alarm will sound Up and Down 44 arrow buttons W Fan fail LED When a fan fails this LED will turn red and an alarm will sound If a redundant power supply fails this LED will turn red and an Power fail LED alarm will sound Power LED Green LED indicates power is on T Tray Lever 8 Tray Latch 12 2 3 2 Rear View Pawer alarm Reset UPS Power 1 switch R Link Power 2 switch LAM 2 Gigabit LAN 1 Gigabit System rs CA lt Eli Power M E Lg a M cm Indicator pnitor 1 NE pn pa dt Fan Fail ER A m Fand Indicator Indicator Fant Fail Fan3 Fail Indicator Fan module 1 2 B Fan module 3 4 AC power input socket 1
110. z Back Confirm Figure H 3 confirm VG settings gt olume config volume group Create Delete Total Free Bi GB GB Status 1 123 RAID 1 Vui Online RAID 6 CE 2793 g 0 Create Delete 123 Figure H 4 a RAID 6 size 2793G VG is created 2 Go to Volume config User data volume create a UDV olume config User data volume Attach Create Delete Size R CV GB Status 1 1 zu RAID LUN niii MB Attach Create Delete Figure H 5 create UDV gt olume config User data volume Create Name 1 VG name voor CV No Global 136 amp Capacity GB 2793 1 Stripe height KB Block size B 512 Read Write wrnte through cache write back cache Priority High priority Middle priority CC Low priority lt Back Contirm Figure H 6 setup capacity stripe height and block size for UDV Notice When the OS is 64bit user can set the block size to any available value If the OS is 32bit user has to change the block size to larger values than 512B There will be a confirmation pop up when UDV size is over 2TB for reminding Microsoft Internet Explorer X LBA 64 support Choose OE if using O8 such az Windows 64 bits Windows Server 2003 SP Linux kernel 2 6 x FreeBSD 5 2 1 or latter Choose Cancel It will change the sector sz
Download Pdf Manuals
Related Search
Related Contents
XenoContiki - School of Computing Science Declaration of Conformity Deklaracja Zgodności Outdoor LP Gas Barbecue Grill Model No. GBT1411G handleiding mode d`emploi gebrauchsanleitung - Primo Progress Lighting P5875-31WB Installation Guide L-1202e System Manual ECUcore-5208 Configurer Gigaset PC Card 54 安全のために必ず守ること 夢 画 の罰 並 丿 ZXP Series 1 and ZXP Series 3 RHEL 6.5 Driver User`s Manual (en) Copyright © All rights reserved.
Failed to retrieve file