A P P E N D I X  A

Configuring iSCSI on the Sun StorageTek 2510 Array

This appendix describes initial configuration of iSCSI on the Sun StorageTek 2510 Array. It contains the following sections:


Configuring iSCSI Overview

The following overview lists the major steps to configure the data host and target storage after setting up the array and installing the management software.

For the full procedure go to Configuring iSCSI - Detailed

1. Configure an iSCSI port for each controller on the storage array.

2. On the data host:

a. Note its iSCSI Qualified Name (IQN) of the host.

b. Configure static discovery of the target ports.

3. In the Sun StorageTek Common Array Manager software:

a. Configure an initiator with the data host IQN.

b. Create a volume

c. Map the volume to the initiator through the host or host group.

4. On the data host:

a. Link the initiator and target volume, if needed.

b. Verify that you see the created volume.

5. Use system administration commands in the OS to mount/read/write to the volume.


iSCSI Concepts

Configuring iSCSI requires an understanding of the following concepts.

A NIC is an input/output (I/O) adapter that connects a host to a computer network. The host central processing unit (CPU) must process the Small Computer System Interface (SCSI) information in Ethernet frames.

Ethernet NICs require a software initiator. The iSCSI initiator runs on the data host and converts SCSI commands into iSCSI commands to send and receive data over the Ethernet connection to a target storage system. iSCSI initiators are operating system specific. Examples are provided for configuring initiators in Solaris and Windows. Consult your operating system documentation for Linux.


Configuring iSCSI - Detailed

The following sections detail the steps in planning, cabling, and configuring iSCSI:

The first two sections contain tables listing each step in configuring iSCSI:

You can use the procedures in conjunction with examples for Solaris and Windows.

For an example of configuring iSCSI on a Solaris host, go to iSCSI Configuration Example Using Solaris.

For an example of configuring iSCSI on a Windows host, go to iSCSI Configuration Example Using Windows.

For an example of configuring iSCSI on a Linux host, consult your Linux OS documentation.

The RDAC driver for LINUX supports the Sun StorageTek 2510 Array. To download:

1. Go to www.sun.com

2. Select Download

3. Select View by Category

4. Select Systems Administration >> Storage Management, and scroll down to the StorageTek 2500 Series offerings.


Preparing for iSCSI and Installing Hardware

This section details the steps to prepare for iSCSI and complete the hardware installation before beginning configuration.

 

TABLE A-1 iSCSI Preparation and Hardware Steps

Step

For more Information, refer to:

1. Identify the required OS, iSCSI software packages, and patches.

OS documentation.
Sun StorageTek 2500 Series Array Release Notes, 6.1 or higher. Download from http://docs.sun.com/app/docs/coll/st2500arrays

2. Select a topology and if a network topology, provide a suitable Ethernet network.

Connecting Data Hosts to the 2510 Array

3. Set up the storage array, trays, cabling, and networking, as noted in earlier chapters.

.

Installing Trays

Connecting the Management Host

Connecting Data Hosts to the 2510 Array

4. Power on the storage array.

Powering On the Array

5. If needed, change the array management default IP addresses using the serial port interface.

Configuring IP Addressing

6. Install the Sun StorageTek Common Array Manager software.

7. In the software, register the storage array and perform the basic administration setup.

Note: for storage array configuration, use the iSCSi steps that follow.

Refer to Sun StorageTek Common Array Manager Software Installation Guide

(sent with the controller tray).

Table showing the iSCSI preparation and hardware steps, as well as related information.


Configuring iSCSI Tasks

This section describes the steps to configure iSCSI on the data host and in the Common Array Manager software. It contains the following sections:

For an example of configuring iSCSI on a Solaris host, go to iSCSI Configuration Example Using Solaris.

For an example of configuring iSCSI on a Windows host, go to iSCSI Configuration Example Using Windows.


TABLE A-2 iSCSI Configuration Steps

Step

For more Information, refer to:

1. In the Common Array Manager software:

A. Go to the Ports Summary page.

B. Verify that the target ports (minimum one for each controller) are up.

C. Note the target IP addresses and ports.

D. Change the port IP addresses from the default, if needed, on the Port Detail page.

Identifying the Target Port IP Address

2. On the data host:

A. Note the iSCSI Qualified Name (IQN) of the initiator on the data host.

B. Set the discovery method of the target as static.

C. Discover the target ports (minimum one for each controller) from the initiator.

D. List and verify the discovered static targets and their iSCSI Qualified Name (IQN).

OS Documentation

-A P P E N D I XiSCSI Configuration Example Using Solaris

iSCSI Configuration Example Using Windows

3. In the Common Array Manager software:

A. Run the Create New Initiator wizard and add the IQN of the initiator as the unique identifier.

B. Add each initiator to a host or host group.

C. Create the volumes.

D. Map each initiator to a volume using the host or host group.

Adding Initiator Information

Refer to the Sun StorageTek Common Array Manager Installation Guide or online help for the configuration of volumes, hosts, and mappings.

4. On the data host:

A. If needed, create a device link. (Example for Solaris: #devfsadm -i iscsi.)

B. Verify that you can see the created volume.

C. Optional - create and mount the file system.

OS Documentation

iSCSI Configuration Example Using Solaris

iSCSI Configuration Example Using Windows


Table showing the iSCSI configuration steps, as well as related information.

Identifying the Target Port IP Address

Step 1 requires you to identify the target ports IP address (minimum one for each controller) on the Port Summary page noted below.


Screenshot showing the Port Summary page within the Sun StorageTek Common Array Manager software.

If you need to configure the iSCSI ports to change the IP address or the listening port, display the Port Summary and select a port to display the Port Details page. Consult the online help for configuration help.


Screenshot showing the Port Details page within the Sun StorageTek Common Array Manager software.

Adding Initiator Information

After creating an initiator on a data host, you need to add information about the initiator to the management software.


 [ D ]

Selecting Create New Initiator launches a wizard.

Add the following information:

(The identifier can also be in EUI or NAA format. See the online help for the syntax of these formats.)

IQN syntax example: iqn.2001-04.com.example:storage:diskarrays-sn-a8675309:

The wizard will allow you to assign the initiator to a host or host group. You use the host or host group to map the initiator to a volume.

You will also have to enter a CHAP secret on the Target Details page.

For more information about authentication, go toConfiguring Mutual Authentication for an iSCSI Session for reference the online help.


Configuring Other iSCSI Features

This section describes additional features for configuring iSCSI on the Sun StorageTek 2510 Array. It contains the following sections:

Additional iSCSI Topics in the Online Help

In addition to the initial iSCSI configuration discussed in this guide, the Common Array Manager has online help to document modifying every feature and the fields on every iSCSI page.

iSCSI topics in the online help include:

Page help in the online help includes:

Configuring Mutual Authentication for an iSCSI Session

In a secure environment, authentication is not required because only trusted initiators can access the targets.

In a less secure environment, the target cannot determine if a connection request is truly from a given host. In that case, the target can authenticate an initiator by using the Challenge-Handshake Authentication Protocol (CHAP).

CHAP authentication uses the notion of a challenge and response, which means that the target challenges the initiator to prove its identity. For the challenge/response method to work, the target must know the initiator's secret key and the initiator must be set up to respond to a challenge.

You can configure mutual authentication for an iSCSI session so that both the iSCSI initiator and iSCSI target use a CHAP secret.

For security purposes, Sun Microsystems recommends that the initiator and CHAP secrets be unique.

You can add CHAP secrets when creating an initiator or add it later to an initiator and target.

To Configure Mutual Authentication

1. Click Sun StorageTek Common Array Manager.

The navigation pane and the Storage System Summary page are displayed.

2. In the navigation pane, expand the storage array you want to work with.

The navigation tree is expanded for that array.

3. Expand Physical Devices and choose Initiators.

The Initiator Summary page is displayed.

4. Select the initiator for which you want to configure mutual authentication.

The Initiator Details page is displayed.

5. In the Authentication field, select CHAP and enter a CHAP secret.

6. Enter the CHAP secret again in the validation field.

7. Click Save.

8. In the navigation pane, expand the storage array you want to work with.

The navigation tree is expanded for that array.

9. Expand Physical Devices and choose iSCSI Target.

The iSCSI Target Details page is displayed.

10. In the iSCSI Target Authentication section, select CHAP and enter the CHAP secret.

11. Click Save.