Documente Academic
Documente Profesional
Documente Cultură
Administrators Guide
This manual contains information that is proprietary to SANRAD. No part of this publication may be reproduced in any
form whatsoever without prior written approval by SANRAD.
Right, title and interest, all information, copyrights, patents, know-how, trade secrets and other intellectual property or
other proprietary rights relating to this manual and to the StoragePro Management System and any software components
contained therein are proprietary products of SANRAD protected under international copyright law and shall be and
remain solely with SANRAD.
StoragePro Management System is a registered trademark of SANRAD. No right, license, or interest to such trademark
is granted hereunder, and you agree that no such right, license, or interest shall be asserted by you with respect to such
trademark.
Brocade, the Brocade B weave logo, Secure Fabric OS, and SilkWorm are registered trademarks and Tapestry is a
trademark of Brocade Communications Systems, Inc., in the United States and/or in other countries. All other brands,
products, or service names are or may be trademarks or service marks of, and are used to identify, products or services of
their respective owners.
Notice: The information in this document is provided AS IS, without warranty of any kind, including, without
limitation, any implied warranty of merchantability, noninfringement or fitness for a particular purpose. Disclosure of
information in this material in no way grants a recipient any rights under Brocade's patents, copyrights, trade secrets or
other intellectual property rights. Brocade reserves the right to make changes to this document at any time, without
notice, and assumes no responsibility for its use.
The authors and Brocade Communications Systems, Inc. shall have no liability or responsibility to any person or entity
with respect to any loss, cost, liability, or damages arising from the information contained in this book or the computer
programs that accompany it.
Export of technical data contained in this document may require an export license from the United States Government.
Asia-Pacific Headquarters
Brocade Communications Singapore Pte. Ltd.
9 Raffles Place
#59-02 Republic Plaza 1
Singapore 048619
Tel: +65-6538-4700
Fax: +65-6538-0302
Email: apac-info@brocade.com
Document History
Document Title
Publication Number
Summary of Changes
Publication
Date
53-1000203-01 Rev. A
New document
March 2006
Table of Contents
Introduction to Brocade iSCSI Gateway Manager .................................1-1
Brocade iSCSI Gateway Topology ............................................................................. 1-1
iSCSI Overview ..........................................................................................................1-2
iSCSI Initiator and Targets............................................................................................ 1-2
Portals............................................................................................................... 1-2
Targets and LUNs ............................................................................................. 1-2
Discovery Methods ...................................................................................................... 1-3
iSCSI Discovery ................................................................................................ 1-3
SLP .................................................................................................................... 1-3
iSNS .................................................................................................................. 1-3
iSCSI Security................................................................................................................ 1-4
Access Rights.................................................................................................... 1-7
Target and Initiator Authentication ................................................................ 1-8
Brocade iSCSI Gateway Cluster ................................................................................1-11
Maintaining Cluster Communications .......................................................................1-14
Synchronizing a Cluster ..............................................................................................1-14
Brocade iSCSI Gateway Manager Overview ............................................................ 1-14
Managing the Brocade iSCSI Gateway....................................................................... 1-15
Brocade iSCSI Gateway Manager Icons .....................................................................1-16
List of Figures
Figure 1-1.
Figure 1-2.
Figure 1-3.
Figure 1-4.
Figure 1-5.
Figure 1-6.
Figure 1-7.
Figure 1-8.
Figure 1-9.
Figure 1-10.
Figure 2-1.
Figure 2-2.
Figure 2-3.
Figure 2-4.
Figure 2-5.
Figure 2-6.
Figure 2-7.
Figure 2-8.
Table of Contents
Publication Number: 53-1000203-01
iii
Figure 2-9.
Figure 2-10.
Figure 2-11.
Figure 3-1.
Figure 3-2.
Figure 3-3.
Figure 3-4.
Figure 3-5.
Figure 3-6.
Figure 3-7.
Figure 3-8.
Figure 3-9.
Figure 3-10.
Figure 3-11.
Figure 3-12.
Figure 3-13.
Figure 3-14.
Figure 3-15.
Figure 3-16.
Figure 3-17.
Figure 3-18.
Figure 3-19.
Figure 3-20.
Figure 3-21.
Figure 3-22.
Figure 3-23.
Figure 3-24.
Figure 3-25.
Figure 3-26.
Figure 3-27.
Figure 3-28.
Figure 3-29.
Figure 3-30.
Figure 3-31.
Figure 3-31.
Figure 3-32.
Figure 3-33.
Figure 3-34.
Figure 3-35.
Figure 4-1.
Figure 4-2.
Figure 4-3.
Figure 4-4.
Figure 4-5.
Figure 4-6.
Figure 4-7.
Figure 4-8.
Figure 4-9.
Figure 4-10.
Figure 4-11.
Figure 4-12.
Figure 4-13.
Figure 4-14.
iv
Figure 4-15.
Figure 4-16.
Figure 4-17.
Figure 4-18.
Figure 4-19.
Figure 4-20.
Figure 4-21.
Figure 4-22.
Figure 4-23.
Figure 4-24.
Figure 4-25.
Figure 4-26.
Figure 4-27.
Figure 5-1.
Figure 5-2.
Figure 5-3.
Figure 5-4.
Figure 5-5.
Figure 5-6.
Figure 5-7.
Figure 5-8.
Figure 5-9.
Figure 5-10.
Figure 5-11.
Figure 5-12.
Figure 5-13.
Figure 5-14.
Figure 5-15.
Figure 5-16.
Figure 5-17.
Figure 5-18.
Figure 5-19.
Figure 5-20.
Figure 5-21.
Figure 6-1.
Figure 6-2.
Figure 6-3.
Figure 6-4.
Figure 6-5.
Figure 6-6.
Figure 6-7.
Figure 6-8.
Figure 6-9.
Figure 6-10.
Figure 6-11.
Figure 6-12.
Figure 6-13.
Figure 6-14.
Figure 6-15.
Figure 6-16.
Figure 6-17.
Table of Contents
Publication Number: 53-1000203-01
List of Tables
Table 3-1. Brocade iSCSI Gateway Management Parameters............................................................ 3-5
Table 3-2. General Tab ......................................................................................................................... 3-7
Table 3-3. Network Port Parameters...................................................................................................3-10
Table 3-4. Portal Parameters ............................................................................................................... 3-12
Table 3-5: IP Routing Parameters........................................................................................................ 3-13
Table 3-6. SNMP Tab Parameters ...................................................................................................... 3-23
Table 4-1. General Target Properties ................................................................................................. 4-10
Table 4-2. Target Details..................................................................................................................... 4-10
Table 6-1: Brocade iSCSI Gateway Manager Alarms ......................................................................... 6-11
vi
Chapter 1
Introduction to Brocade iSCSI Gateway Manager
This chapter provides an overview of the Brocade iSCSI Gateway, its topology and features.
The gateway in the center connects to the storage elements in the back-end while
connecting to the IP network on the front-end.
The gateway enables hosts to access attached storage using IP-SAN protocol iSCSI. For
more information, refer to iSCSI.
Tower
Hostbox
Tower
Hostbox
Tower
Hostbox
Cloud
IP Network
iSCSI Gateway
10236b
FC
Cloud
Network
FC RAID
Figure 1-1.
RAID
RAID
RAID
1-1
iSCSI Overview
iSCSI transmits native SCSI commands and data over the TCP/IP protocol stack. iSCSI
transfers and stores SCSI commands and data at any iSCSI enabled storage location with
access to a LAN, MAN, WAN or the Internet. iSCSI enables the creation of high performance
IP-SANs.
iSCSI has many benefits including:
z
iSCSI initiators and targets have a World Wide Unique Identifier (WWUI) of up to 223
free form characters, e.g. www.brocade.switch1.target1.
Portals
To enable iSCSI communications over TCP, the system administrator must configure portals
during the initial gateway configuration. A portal is comprised of both an IP address and its
assigned TCP port. Each configured portal automatically becomes an iSCSI access point to
each target that exist in the gateway. Typically, there are few portals and many targets.
1-2
Each target should be exposed by only one Brocade iSCSI Gateway in a cluster.
(IP2, 3260)
iSCSI Target 1
wwui1
iSCSI Target 2
wwui2
iSCSI Target 3
wwui3
Disk 1
Disk 2
Disk 3
Disk 4
LU0
LU0
LU0
LU1
10124b
iSCSI Gateway
Discovery Methods
The Brocade iSCSI Gateway supports three types of discovery: iSCSI Discovery, SLP and
iSNS.
iSCSI Discovery
In an iSCSI discovery session the user administrator configures an IP and port of the iSCSI
target in the initiator. The initiator discovers all applicable targets and LUNs.
SLP
SLP (Service Location Protocol) is a common broadcast-based discovery mechanism that
uses agents. The gateway acts as an SLP Service Agent (SA) and advertises its iSCSI service.
The initiator identifies the gateway and discovers the gateways targets.
iSNS
iSNS is a client/server protocol designed for compatibility with FCs Simple Name Server
(SNS). Once an iSNS server is located (either through DHCP or SLP), discovery can take
place without the need for broadcasts. iSNS enables iSCSI initiators in the IP-SAN to locate
the gateway targets automatically.
1-3
iSCSI Security
No matter what discovery method is used, ACL (Access Control List) allows only those
targets that are defined as available to be accessed. To allow selective iSCSI initiator access
to iSCSI target disks, the Brocade iSCSI Gateway uses identities to define pools of initiators.
An identity is a user-defined list of iSCSI initiators. Attaching an identity to a target restricts
its access to the list of initiators defined by that identity.
Note:
Each identity can be assigned one or both login authentication methods (CHAP,
SRP).
Each target can have more than one identity. The order of the identities is
important. The first match is used, not the best match.
Note:
If you are working with an iSNS server, all hosts are able to see all targets but only those hosts
with access rights are able to connect to the authorized targets.
1-4
Example:
In Figure 1-3 identities are coupled with iSCSI targets to limit iSCSI initiator access to a
targets underlying disks. An identity can be used with more than one target and each
target can have more than one identity.
Disk 1
iSCSI Target 1
wwui21
wwui2
wwui3
Ident A
Disk 2
wwui4
iSCSI Target 2
wwui22
Disk 3
wwui5
Ident B
wwui6
Disk 4
iSCSI Target 3
wwui23
wwui8
wwui9
Ident C
iSCSI Target 4
wwui24
Disk 5
Disk 6
wwui10
10151b
wwui7
1-5
Example:
In Figure 1-4, the default identities for Target 1 and Target 2 have been modified to not
accessible (NA) for all initiators.
Target 1 is coupled with Identity A with read-write (RW) access to Identity As list of
iSCSI initiators (WWUI1).
Target 2 is coupled with Identity B with read-write (RW) access to Identity Bs list of
iSCSI initiators (WWUI2).
When iSCSI initiator WWUI1 logs in to Target 1, the gateway first scans Identity A and
finds the initiator listed there. The scan stops and the initiator is granted read-write
access to Target 1s underlying disk, Disk 1.
If iSCSI initiator WWUI1 tries to login to Target 2, the gateway first scans Identity B. It
does not find the initiator listed so it continues to scan the next identity, the default
identity. The default identity implicitly lists all iSCSI initiators, including WWUI1.
However, the scan stops and the initiator is denied access to Target 2s underlying disks
(Disk 2 and Disk 3), since the default identity is configured as not accessible.
iSCSI
initiator
iSCSI
initiator
Tower
box
wwui2
Tower
box
wwui1
Disk 1
Disk 2
RW
RW
Disk 3
RW
IPCloud
SAN
iSCSI Gateway
Identity A
Target 1
Identity B
Target 2
Def Ident
Def Ident
Ident A
wwui1
Ident B
wwui2
RW
RW
Default
all
Default
all
NA
NA
iSCSI Target 1
wwui3
iSCSI Target 2
wwui4
Disk 2
Disk 3
LU0
LU0
LU1
10156b
Disk 1
1-6
Access Rights
When you couple an identity and a target, you assign access rights: read-write (RW), readonly (RO) or not accessible (NA). The access rights are per identity-target pair.
z
An identity can be coupled with multiple targets, each time with different access rights.
A target can have multiple identities, each with different access rights.
Note:
If you add or modify Identities on a target after its disks have been exposed, the access
rights will take effect only at the next login for each iSCSI initiator.
Example:
In Figure 1-5 Identity A is coupled with both Target 1 and Target 2.
The pair Identity A Target 1 is assigned iSCSI initiator read-write access to Target 1
disks.
However, the pair Identity A Target 2, is assigned iSCSI initiator read-only access
to Target 2 disks.
wwui1
Disk 1
wwui2
wwui3
Ident A
wwui4
rite
d-W
Rea
Re
ad
-O
nly
iSCSI Target 1
wwui21
Disk 2
iSCSI Target 2
wwui22
Disk 3
wwui5
Re
ad
-W
rite
wwui7
wwui8
wwui9
Ident C
Rea
d-W
ri
te
Disk 4
iSCSI Target 3
wwui23
iSCSI Target 4
wwui24
wwui10
Disk 5
Disk 6
10152b
Ident B
wwui6
1-7
CHAP
CHAP is a protocol that is used to authenticate the peer of a connection and is based upon
the peers sharing a secret (a security key that is similar to a password). The target and the
initiator authenticate each other.
The Brocade iSCSI Gateway supports two way CHAP authentication. The target
authenticates the initiator and the initiator can authenticate the target (it is up to the initiator
to request target authentication). A separate secret can be set for each target and for each
initiator in the storage area network (SAN).
Note:
An authentication method is assigned per identity and not per iSCSI initiator.
z
When an iSCSI initiator logs in to a target, its WWUI is checked against the identity initiator
list. After the iSCSI initiator passes the identity stage, if credentials are configured, the iSCSI
initiator must authenticate itself. The credentials list is checked for the iSCSI initiators user
name + password. The list can contain:
z
Note:
There is no strict link between an initiator from the initiator names in the identity and a
specific username + password from the credentials of the identity.
1-8
Example:
In Figure 1-6 there are:
Only four user name + password credentials. Certain initiators have the same user
name + password configured on them.
Ident B
Credentials
wwui3
CHAP
SRP
wwui4
Sarah C6H12O6
Dinos RockOn
wwui6
Dinos RockOn
Albert energy
10155
Initiators
wwui7
wwui8
wwui9
1-9
Example:
In Figure 1-7, a CHAP authentication challenge is sent to the Brocade iSCSI Gateway.
The gateway first checks if the user name is set for RADIUS authentication.
If it is not, the user name and password are compared against the pairs configured
in the gateway.
iSCSI
initiator
iSCSI
initiator
Tower box
iqn.1991-05.microsoft:steven.brocade
iqn.com.brocade.steven
Tower box
iqn.1991-05.microsoft:wilbur.brocade
CHAP Authentication
steven
isatwork
IPCloud
SAN
Tower box
RADIUS
Server
Yes
iSCSI Gateway
RADIUS
Authentication?
No
brocade.steven
accounting
steven
ilovecookies
microsoft:steven
Default
all
finance
brocade.billing
10261b
NA
1-10
When one Brocade iSCSI Gateway goes off-line, the remaining gateway activates its
neighbors IP addresses. The hosts continue to access disk targets through the same IP
address without sensing that their regular gateway has gone offline or noticing any impact
on storage performance.
Note:
All LUNs in a RAID controller must be simultaneously exposed through all ports connected to
both gateways.
1-11
Example
In Figure 1-8, two gateways are connected to one FC JBOD. From the four physical disks, two
disks have been exposed and are equally accessible to both gateways.
Brocade iSCSI Gateways are both fully operational in a cluster. No gateway must sit in standby mode.
Both Brocade iSCSI Gateways are also connected to two hosts via the IP SAN. Disk 1 is
exposed via Brocade iSCSI Gateway 1 to Host 1, represented by the orange dashed line. Disk
2 is exposed via Brocade iSCSI Gateway 2 to Host 2, represented by the purple dotted line.
Disk 1
IP1,Target 1
iSCSI
initiator
Disk 2
iSCSI
initiator
Tower
Hostbox
1
Tower
Hostbox
2
IP2,Target 2
IPCloud
SAN
IP1-active
IP2-inactive
IP2-active
IP1-inactive
iSCSI Gateway 1
iSCSI Gateway 2
iSCSI Target 1
wwui1
iSCSI Target 2
wwui2
Disk 1
Disk 2
LU0
LU0
FC JBOD
Disk 2
Disk 3
Disk 4
10228b
Disk 1
1-12
Example
In Figure 1-9, Brocade iSCSI Gateway 1 has gone off-line. Brocade iSCSI Gateway 2 activates
Brocade iSCSI Gateway 1s IP address and takes over exposure of Disk 1 to Host 1,
represented by the orange dashed line.
Host 1 continues to access Disk 1 through the same IP address as it did before its gateway
went off-line. Host 1 has no way of knowing that its regular gateway is off-line.
Disk 1
IP1,Target 1
iSCSI
initiator
Disk 2
iSCSI
initiator
Tower
Hostbox
1
Tower
Hostbox
2
IP2,Target 2
IPCloud
SAN
IP1-active
IP2-inactive
IP2-active
IP1-active
iSCSI Gateway 1
iSCSI Gateway 2
iSCSI Target 1
wwui1
iSCSI Target 2
wwui2
Disk 1
Disk 2
LU0
LU0
FC JBOD
Disk 2
Disk 3
Disk 4
10229b
Disk 1
Figure 1-9. Re-Routing Storage Access with Off-line Brocade iSCSI Gateway
1-13
Synchronizing a Cluster
If disks or targets are created on one Brocade iSCSI Gateway operating alone, when another
gateway is added, its database must be synchronized to the first gateways database. This
can happen in three situations:
1. A new gateway is added to a configured and functioning gateway to form a cluster.
2. An offline gateway in a cluster comes back online.
3. CLI is used to make an isolated configuration change in one gateway.
Note:
You should rediscover a cluster any time that CLI is used while Brocade iSCSI Gateway
Manager is open.
When an element is not synchronized, a yellow exclamation mark appears to the left of it
instead of a green check mark and the alarm Object not redundant is displayed.
Synchronization is possible at every level of the gateway manager: Cluster, Brocade iSCSI
Gateway, Target and Disk.
Synchronization is carried out from the selected level down. Synchronization at the cluster
level will synchronize the gateways and their disks. You cannot synchronize IP addresses or
IP routes.
1-14
It automatically synchronizes parameters in both devices when they are part of a cluster.
It provides detailed alarm reporting including email notification and alarm propagation.
In-band
The management terminal (Telnet, SSH, SP server) connects to the gateways Eth1 port.
The Eth1 port is used by the gateway for management as well as by the hosts for
accessing data accessing storage data (refer to B, Figure 1-10).
RS232
The console connects to the Brocade iSCSI Gateways RS232 port in a direct connection
(refer to A, Figure 1-10). The RS232 port is used mainly for initial configuration: setting up
the management IP, Mask and gateway name. For more information on RS232 Serial
Connection refer to RS232 Serial Connection in Chapter 3.
Telnet Station
In-Band Management
IP
IPCloud
Cloud
Cloud
RS232 port
10223b
Clients
1-15
1-16
Icon
Icon
cluster
delete
help
Brocade iSCSI
Gateway
1 gateway
close
disk
warning alarm
move down
target
minor alarm
move up
LU
major Alarm
tape
exit
critical alarm
read/write
capabilities
ACL
Alarm
read only
capabilities
external
current alarms
attach
detach
no read/write
capabilities
(no access)
Chapter 2
Installation Operations
Brocade iSCSI Gateway Manager installation runs on Win32 and Linux platforms and works
on a client-server model with the following access options:
z
Client and server installed remotely with the remote client accessing the local server
with a Web browser as a JAVA applet.
Windows Platform
The following section is for Win32 platform only. If you are using Linux, refer to Linux
Platform.
If you have a previous version of the gateway manager installed, you must remove the
previous version before upgrading your gateway manager system.
To install and run the gateway manager, you must have the JAVA Runtime Environment
(JRE) installed. If you have both a server and client installed, you need to install the JRE
in both places.
Brocade iSCSI Gateway Manager will not run if the correct version of the JRE is not
properly installed on the host machine. The correct version of Java is included on the
installation CDROM. Additionally, the JRE can be downloaded from
http://java.sun.com.
To install Brocade iSCSI Gateway Manager on a Windows platform:
1. Double click on the iSCSI_Gateway_Manager_X.X.X.X_Setup.exe file in the iSCSI
Gateway Manager folder on the CD shipped with the Brocade iSCSI Gateway.
Note:
If you install the gateway manager client as a stand-alone client, you will still need a
gateway manager server installed at some point in your network to be able to
communicate with your Brocade iSCSI Gateway(s) via the client.
To install only the client:
z
Double click on the iSCSI_Gateway_Manager_client_X.X.X.X_Setup.exe file in the
iSCSI Gateway Manager folder on the CD shipped with the Brocade iSCSI Gateway.
2-1
2-2
If the Brocade iSCSI Gateway Manager user will be accessing the application through a
Web browser, the gateway manager must be installed under your systems Web server
documents root.
4. Click Next.
Installation Operations
Publication Number: 53-1000203-01
2-3
2-4
Installation Operations
Publication Number: 53-1000203-01
2-5
2-6
2. In the system tray, right click on the Tool icon and select Network Configuration...
Installation Operations
Publication Number: 53-1000203-01
2-7
When accessing Brocade iSCSI Gateway Manager through a Web browser, it must be
installed under your systems Web server documents root. The gateway manager URL is
in the form:
http://ip of host terminal or host name/Brocade iSCSI Gateway
Manager/index.html
If the gateway manager client is located on a different host server from the gateway
manager server, you must enter the gateway manager server host name and server port
to enable communication between the client and server.
3. If necessary, enter Server Host and Server Port.
4. Click OK.
2-8
Installation Operations
Publication Number: 53-1000203-01
2-9
Linux Platform
The following section is for Linux platform only. If you are using Win32, refer to Windows
Platform.
If you have a previous version of the gateway manager installed, you must remove the
previous version before upgrading your gateway manager system.
To install and run gateway manager, you must have the JAVA Runtime Environment
(JRE) installed on the management station. The JRE is can be downloaded from the
Internet: http://java.sun.com. Brocade iSCSI Gateway Manager will not run if the
correct version of the JRE is not properly installed on the host machine.
When accessing gateway manager through a Web browser, gateway manager must be
installed under your systems Web server documents root. The gateway manager URL is
in the form:
http://ip of host terminal or host name/ iSCSI Gateway Manager /index.html
To install gateway manager on a Linux platform:
1. Copy the zip file iSCSI_Gateway_Manager_X.X.X.X.zip to the destination directory,
referred to as <dest_directory>.
2. Go to the <dest_directory> and unpack the zip file using the command:
unzip iSCSI_Gateway_Manager_X.X.X.X.zip
3. Set Java environment variable SP_JAVA_HOME to be the location of your JAVA runtime
environment (JRE) or SDK package.
4. In RedHat, add the following two lines to /etc/profile:
NMS_JAVA_HOME=/root/Java/jre-1_5_06# my Java home dir. . .
export NMS_JAVA_HOME
5. Log Out.
6. Log In.
2-10
Installation Operations
Publication Number: 53-1000203-01
2-11
2-12
Chapter 3
Brocade iSCSI Gateway Operations
Brocade iSCSI Gateway Manager communicates with the gateway via the gateway
management port IP address. The gateway communicates with hosts via iSCSI portals which
are configured via the gateway manager. Brocade iSCSI Gateway Manager automatically
discovers all disks and LUNs connected to the gateway storage ports. The gateway manager
enables multi-cluster management.
RS-232 port
Telnet session
Telnet/SSH Connection
To initialize the gateway via telnet/SSH session:
1. Change your computers IP Address to anything on the same subnet 10.11.12.*
2. Connect to the management port on the gateway.
3. Telnet to 10.11.12.123.
4. Enter Username and Password: admin.
You will be asked to accept or change the default values for:
1. IP Address.
2. IP Mask.
3. Management port (eth1).
4. Default gateway name. This name will appear in the Brocade iSCSI Gateway Manager
Navigation Pane. If you dont enter a name, gateway manager will use the IP address.
This name can be changed later via the Brocade iSCSI Gateway Properties tab if there is
only one gateway present.
3-1
Once you add a user profile, the default username and password is erased.
3-2
3-3
Note:
This section details the steps necessary for configuring a single, stand-alone gateway.
When additional steps must be taken for cluster configuration, they are noted.
Definition
IP address of the management interface configured on gateway during
initial setup.
IP mask for the management interface
UDP port on which SNMP manager-agent communications run
UDP port on which the SNMP agent will issue traps
Defined group granted read access to data
Defined group granted write access to data
Time in milliseconds before an SNMP session is considered closed.
Number of times to try to re-establish an active SNMP session
SNMP protocol version being used to establish gateway manager
communications with the specified gateway
3. The new gateway appears in the Navigation pane and is represented by two entities:
a virtual entity and a physical entity. The menu options differ for the two different
types of entities. The virtual entity is referred to as cluster level.
3-5
3-6
Alarms are time-stamped according to the computer clock that is running the Brocade
iSCSI Gateway Manager server.
To set Brocade iSCSI Gateway date and time:
1. In the Navigation pane, right click on the Brocade iSCSI Gateway on which you want to
add a network port IP address and select Properties
The gateway Properties dialog box opens (Figure 3-9).
Table 3-2. General Tab
Parameter
Name
Contact
Location
Mgmt IP Address
Mgmt Mask
Last Reset
Date
Definition
Name of the gateway
Contact person for technical support
Location of the contact person
IP address of the gateway management interface
IP mask for the management interface
Date and time since the last gateway reset
Local date
3-7
Parameter
Time
Status
Description
Definition
Local time
Connection status of the gateway
Description of gateway hardware and software
IP Address
To enable a host to communicate with the Brocade iSCSI Gateway using iSCSI protocol, an
IP address must be assigned to the device. After adding an IP address, configure an iSCSI
portal on the IP address (see Portals).
3-8
Note:
If you are adding a network port IP address in a cluster, assign the IP address as active on
one gateway and inactive on the second gateway. In the event of a gateway failover, the
second gateway will activate its inactive IP addresses and begin exposing the IP address'
target LUNs.
To add network IP addresses:
1. In the Navigation pane, right click on the Brocade iSCSI Gateway on which you want to
add a network port IP address and select Properties
The gateway Properties dialog box opens (Figure 3-9).
2. Toggle to the IP tab.
3. Click Add.
4. The Add IP dialog box opens (Figure 3-11).
5. Enter the network port IP values and click OK.
The new network port IP address is listed in the IP tab.
6. Click OK.
Cluster Note:
If you are working in a cluster, another Add IP dialog box will open, this time for the
second Brocade iSCSI Gateway.
z
3-9
Description
IP address of interface
IP mask of interface
activity status of IP address
Interface alias
Portals
A portal is the combination of an interface IP address and a TCP port. You must assign iSCSI
portals to enable iSCSI communication between an iSCSI initiator and iSCSI target.
Note:
z
In a cluster, you must assign TCP ports for each of the Brocade iSCSI Gateway
IP addresses.
If an inactive IP address does not have an assigned TCP port, the IP address
will not function during gateway failover.
When you add an iSCSI portal to a Brocade iSCSI Gateway in a cluster, you need to add
the portal to the second gateway as well. In the event of a gateway failover, this allows
the second gateway to begin exposing the failed gateways target LUNs through the
portal.
3-11
Description
User-assigned IP address of an interface
TCP port through which the iSCSI protocol passes (usually 3260)
IP Routing
To enable communications between the gateway and IP networks located outside the
gateway LAN, you must configure IP routing paths for each external network port.
z
Each Brocade iSCSI Gateway can have only one IP route designated to a specific
external network, even if there is more than one possible physical path to that network.
Cluster Note:
In a cluster, an IP route must be added to both iSCSI Gateways. In the event of a gateway
failover, the second gateway will be able to establish communications through the route
and expose the failed gateways target LUNs.
3-12
To add an IP route:
1. In the Navigation pane, right click on the Brocade iSCSI Gateway and select Properties.
The gateway Properties dialog box opens (Figure 3-9).
2. Toggle to the IP Route tab.
3. Click Add.
The Add IP Route dialog box opens.
Description
IP address of destination network
Use the IP address 0.0.0.0 to create a default gateway
IP mask of destination network
IP address of gateway router
Network interface to open route through
3-13
Cluster Note:
If you are working in a cluster, a second Add IP Route dialog box opens for the second
gateway. The destination IP address and mask as well as the gateway are already listed
cannot be changed. Only the network interface port is editable.
In the event of a gateway failover, the second gateway will be able to establish
communications through the route and expose the failed gateways target LUNs.
z
Click OK to add the route to the second gateway or Cancel to exclude the
route from the second gateway in the cluster.
3-14
The gateway will be listed in the gateway manager navigation pane with an
orange exclamation mark (major alarm) and the Last 10 Alarms pane will display
the alarm gateways are not neighbors. For the gateway manager to create a
cluster, you need to rename the second gateway via the gateway properties.
2. Synchronize the new gateway by following the steps outlined in Synchronizing a Cluster.
3. Define the gateway parameters for the second gateway (V2) as follows:
z
IP of V1 as passive
Portals of V1
Routing of V1
4. Manually configure the CHAP and Password from the Identities level (refer to Assigning
Identity Credentials).
3-15
Synchronizing a Cluster
If targets are created on one Brocade iSCSI Gateway operating alone, when another
gateway is added, its database must be manually synchronized to the first gateways
database. This can happen in three situations:
1. A new gateway is added to a configured and functioning gateway to form a cluster.
2. An offline gateway in a cluster comes back online.
3. The CLI is used to make an isolated configuration change in one gateway.
When an element is not synchronized, a yellow exclamation mark appears to the left of it
instead of a green check mark and the alarm Object not redundant is displayed.
To synchronize an element:
1. Select the element to synchronize: cluster or target.
2. Right click and select Cluster Sync from the open menu.
Synchronization is instantaneous. During synchronization, the yellow exclamation
marks at the selected element's level (and below ) are converted to green check marks
. The green check marks indicate that synchronization has completed.
3-16
3-17
Breaking a Cluster
You can break a cluster by removing one of its neighbors (Brocade iSCSI Gateway). A
gateway can be deleted from a cluster only after it is offline and Brocade iSCSI Gateway
Manager recognizes it as offline.
Cluster Note:
z If you remove a gateway from a cluster, all of its configurations will be
automatically transferred to its neighbor. However, the activity of the IP
addresses will be active and not switched.
z
If the removed gateway is re-added, the IP addresses will not failback to the
re-added gateway. The IP addresses and their exposed targets will be
exposed on both gateways.
If you want to re-add the gateway to the gateway manager, first return the
gateway to the default factory settings. See the Brocade iSCSI Gateway
Installation and Operation Guide for procedures on resetting an gateway to
factory default settings.
To break a cluster:
1. From the Navigation pane, right click on the Brocade iSCSI Gateway and select
Properties
2. Disconnect (turn off) the gateway from the system.
The offline gateway is marked with a red exclamation mark .
3. The remaining gateway is marked with a blue exclamation mark to show that it has
taken over exposing the offline gateways targets.
4. Right click on the offline Brocade iSCSI Gateway and select Delete.
6. Brocade iSCSI Gateway Manager begins removing the offline gateway from the gateway
manager database. The status bar displays Ready when the gateway has been removed
from the cluster.
7. The Navigation pane displays the remaining gateway in the cluster.
3-19
iSNS Configuration
The Brocade iSCSI Gateway supports Internet Storage Name Service (iSNS) protocol for
advertising its targets and portals on the iSNS server. This enables iSCSI initiators in the IPSAN to locate the gateway targets automatically. Targets defined by the gateways Access
Control List (ACL) as having controlled access are accessible only to those servers defined as
having access to the target.
To add an iSNS server:
1. In the Navigation pane, right click on desired Brocade iSCSI Gateway and select iSNS
The iSNS Servers dialog box opens.
3-20
3-21
3-22
SNMP Configuration
SNMP and trap port configurations are editable from this tab.
Definition
UDP port on which SNMP manager-agent communications run
UDP port on which the SNMP agent will issue traps
defined group granted read access to data
defined group granted write access to data
time in milliseconds before an SNMP session is considered closed
number of times to re-establish an active SNMP session
SNMP protocol version being used to establish gateway manager
communications with the specified gateway
3-23
From the Navigation pane, select Brocade iSCSI Gateway. Right click and select Telnet.
3-24
Figure 3-29. Advanced Properties - Setting Telnet Port, Report LUNs Discovery
5. A message box opens stating that you must reset the gateway for the new Telnet port
properties to take effect. Click OK.
6. Reset the gateway (see Reset ).
7. Check that the new Telnet port was applied by checking the Advanced tab in the
gateway Properties dialog box (Figure 3-29).
3-25
When working with devices that do not support the SCSI command REPORT LUNS, To
discover these devices, the REPORT LUNs command must be disabled.
If certain devices in the SAN are not being discovered by the gateway, disable or re-enable
device discovery using REPORT LUNs.
To disable/enable report LUNs command:
1. In the Navigation pane, right click on the Brocade iSCSI Gateway and select Properties.
The gateway Properties dialog box opens (Figure 3-9).
2. Toggle to the Advanced tab (Figure 3-29).
3. Disable (uncheck) or re-enable (check) Report LUNs Discovery.
3-27
In the case of a cluster, Reset will cause the second gateway to take over.
To reset an gateway:
1. In the Navigation pane, select the Brocade iSCSI Gateway.
2. Right click on the gateway and select Reset.
3-28
If the reset gateway is part of a cluster, you may have to synchronize the cluster. See
Synchronizing a Cluster.
3-29
3-30
Chapter 4
Storage Exposure & Security
This chapter describes the disk operations enabled by Brocade iSCSI Gateway Manager
based on the physical storage attached to the gateway unit.
Disk Operations
Disk operations are performed from the Storage View window (Figure 4-1).
To display the storage view:
z
Click on Storage in the left hand side of the gateway manager main window.
The Available Storage Devices panel appears in the main window.
4-1
3. The fields Disk Alias, Information, and Write Cache Enabled are editable. Enter new
parameters, if desired and click OK.
4-2
4-3
Note:
A target name is the WWUI of the target and for external use when connecting
to an initiator and cannot be modified.
A target alias and name can be the same but must be unique in the system.
7. Click OK.
The New Target dialog box closes and the new target appears in the Expose dialog
box (Figure 4-6). Because this is a new target, the selected disk is automatically
assigned LU0.
Note:
4-4
4-5
Targets can be created without a disk associated with it. These targets will have no initial
associated LUNs and will not be exposed to hosts when first created.
To create a new stand-alone target:
1. From the Navigation pane, right click the desired Cluster.
4-6
A target name is the WWUI of the target and for external use when connecting
to an initiator and cannot be modified.
A target alias and name can be the same but must be unique in the system.
4-7
4-8
Target Alias, Brocade iSCSI Gateway Exposed, Default Access (General tab)
4-9
Description
Target Alias
Target Name
Status
Number of LUs
Brocade iSCSI Gateway
Exposed On
Default Access
4-10
Description
Number of Login attempts that failed
Time of last failed login attempt
Type of login failure
options: other; redirect; authorize; authenticate; negotiate
Name of last initiator that failed to login
IP address of last initiator that failed to login
4-11
Note:
Removing LU0 from a target, when LU0 is the only LU, will inactivate the target.
4-12
Disk Security
Target Authentication
The Brocade iSCSI Gateway supports the authentication methods CHAP and SRP for the
iSCSI initiator.
Identities
An identity is a user-defined list of iSCSI initiators. The gateway uses identities to define
pools of initiators. This enables selective iSCSI initiator access to iSCSI targets. An identity
can contain from one to multiple initiators, with each initiator having a unique WWUI. If a
host has more than one iSCSI initiator installed, both initiators can be included in the
identity.
Note:
z
If you are working with an iSNS server, all hosts are able to see the target but
only those hosts with access rights are able to connect to the target.
If you add or modify Identities on a target after its disks have been exposed,
the access rights will take effect only at the next login for each iSCSI initiator.
Creating Identities
If you want to limit host (iSCSI initiator) access to targets, you must create an identity that is
more discriminate than the default identity. For a more detailed explanation refer to iSCSI
Overview.
Note:
To create identities:
1. In the Navigation pane, right click in Identities and select New Identity
The New Identity dialog box opens (Figure 4-19).
4-13
4-14
4-15
3. Click Add.
If a host has more than one iSCSI initiator installed, both initiators can be
included in the identity and given authentication methods.
The user name and password do not need to be the same for different
initiators on the same host.
4-16
If you add or modify Identities on a target after its disks have been exposed, the access
rights will take effect only at the next login for each iSCSI initiator.
4-17
When an identity is attached to a target, it is also given a position in the target identity list.
The position of the identity determines its place in the gateway access rights evaluation.
z
The first identity in the list is the first identity evaluated when an initiator tries to access a
disk.
If the initiator meets the profile of the identity, it is granted that identitys access rights. If
not, the gateway continues to the next position. The gateway does not scan all identities
to determine which most specifically fits the host.
An identity can be connected to more than one target to provide the same pre-defined
list of initiators for each target.
4-18
4-19
4-20
Chapter 5
Monitoring & Statistics
The Brocade iSCSI Gateway enables RFC standards compliant health, interface and session
monitoring and statistics reporting of all gateway interfaces. For specific details on a
monitoring or statistic parameter, consult RFC standard 2863.
Health Monitoring
You can monitor the status of gateway hardware.
To view gateway hardware status:
z
In the Navigation pane, right click on the Brocade iSCSI Gateway and select Hardware.
5-1
5-2
5-3
2. Hold down the left mouse button and select the area to zoom in on.
5-4
2. Place the cursor in the graph. Right click and open the context menu.
3. Select to zoom in or out and along which axes.
5-5
In the Navigation pane, select the Brocade iSCSI Gateway, right click and select
Statistics > Interfaces.
Figure 5-8. Interface Statistics Selected from Brocade iSCSI Gateway Menu
The Interface Statistics window opens.
5-6
5-7
TCP/IP
To view TCP/IP counters:
z
In the Navigation pane, select the Brocade iSCSI Gateway, right click and select
Statistics > IP.
The IP Statistics window opens.
ICMP
To view ICMP statistics:
1. In the Navigation pane, select the Brocade iSCSI Gateway, right click and select Statistics
> ICMP.
The ICMP Statistics window opens.
5-8
5-9
TCP
To view TCP statistics:
z
In the Navigation pane, select the Brocade iSCSI Gateway, right click and select
Statistics > TCP.
The TCP Statistics window opens.
5-10
UDP
To view UDP statistics:
z
In the Navigation pane, select the Brocade iSCSI Gateway, right click and select
Statistics > UDP.
The UPD Statistics window opens.
5-11
iSCSI Statistics
You can monitor iSCSI sessions including:
z
5-12
In the Navigation pane, select the Brocade iSCSI Gateway, right click and select iSCSI >
Info (Figure 5-14).
The iSCSI Information window opens.
5-13
In the Navigation pane, select the Brocade iSCSI Gateway, right click and select iSCSI >
Sessions > Show (Figure 5-14).
The iSCSI Sessions window opens.
5-14
In the Navigation pane, select the Brocade iSCSI Gateway, right click and select iSCSI >
Sessions > Statistics (Figure 5-14).
The iSCSI Sessions Statistics window opens.
5-15
In the Navigation pane, select the Brocade iSCSI Gateway, right click and select iSCSI >
Connections > Statistics (Figure 5-14).
The iSCSI Connections window opens.
In the Navigation pane, select the Brocade iSCSI Gateway, right click and select iSCSI >
Connected Initiators > Show (Figure 5-14).
The iSCSI Connected Initiators window opens.
5-16
In the Navigation pane, select the Brocade iSCSI Gateway, right click and select iSCSI >
Connected Initiators > Statistics.
5-17
5-18
Chapter 6
Troubleshooting
The Brocade iSCSI Gateway generates traps while encountering specific events. Upon
receiving the event notification, the Brocade iSCSI Gateway Manager triggers an alarm
report.
The alarms are viewable and can be sorted. The last ten unacknowledged alarms generated
are displayed in the bottom pane of the gateway manager.
Alarm Operations
Brocade iSCSI Gateway Manager supports alarm messages for real-time tracking and
monitoring of both gateway manager and Brocade iSCSI Gateway configurations and
activity. Alarms are time-stamped according to the SP server date and time.
Troubleshooting
Publication Number: 53-1000203-01
6-1
2. Select each alarm for which you want to receive email notification.
3. Click OK.
Email is sent only at the time when an alarm is generated. If an alarm entry already exists during
the Email notification configuration, an Email notification will not be sent.
Troubleshooting
Publication Number: 53-1000203-01
6-3
The Propagated Alarms window lists all the specific alarms of a selected element as
well as all the selected element derived alarms.
6-4
From the standard gateway manager toolbar, click Alarms > History or click the
History button
.
Troubleshooting
Publication Number: 53-1000203-01
6-5
From the standard gateway manager toolbar, click Alarms > Current
6-6
Acknowledging an Alarm
An acknowledged alarm still exists but its severity will not propagate to higher levels.
However, the alarm will still be listed in the Current Alarms window, along with the name of
the user who acknowledged the alarm.
Note:
If an alarm is listed in the Last 10 Alarms pane, after being acknowledged it is removed
from the pane.
To acknowledge an alarm:
1. Select the alarm to acknowledge.
2. Do one of the following:
z
OR
z
Troubleshooting
Publication Number: 53-1000203-01
6-7
Closing an Alarm
Once an alarm occurs, it remains in the current alarm list till the situation that caused it
ceases. However, it can be removed from the current alarm list and moved to the History
Alarm list.
If the event that generated the alarms occurs again, another alarm will be generated and
added to the current alarm list.
To close an alarm:
1. Select the alarm to close. Right click and select Close.
6-8
Alarm Severity
Alarm Name
Source Name
Source Type
Date Opened
Category
Probable Cause
Alarm Text
Troubleshooting
Publication Number: 53-1000203-01
6-9
Alarm Severity
Brocade iSCSI Gateway Manager supports four types of alarms:
z
Warning alarms: may be temporary but the administrator should be notified of.
Warning alarms are marked with a blue exclamation mark .
Major alarms: may cause service interruption and clearly indicated problems in the
gateway or gateway manager operation. Major alarms are marked with an orange
exclamation mark .
Critical alarms: represent service interruption. Critical alarms are marked with a
red exclamation mark .
6-10
Name
ID
Troubleshooting
Storage is missing
0101
Storage Invalid
0102
Reconnect.
Storage has been disconnected.
The administrator can reconnect the
storage.
A storage known by the system is configured Delete.
differently.
The administrator can delete the storage.
Action
Name
ID
Troubleshooting
0301
Troubleshooting
Publication Number: 53-1000203-01
Action
Expose LU
Fan is not
working.
Call Tech
Support.
Turn off gateway.
Reconnect
Wait.
Wait.
Synchronize.
Configure.
Delete and
synchronize.
Configure.
Delete and
expose.
6-11
Name
ID
Target disk
inconsistency
Delete.
An object is exposed on a different target
on two gateways of the cluster.
Delete one of the LU and synchronize the
other one.
Wait.
0514 Brocade iSCSI Gateway has taken over its
neighbor.
Reconnecting the second gateway will
solve this alarm condition.
0515 ACL configuration is different within the
Reconfigure ACL.
cluster.
Configure.
0518 The switches are not configured as being
neighbors. Try to rediscover your cluster.
Select cluster, right click and select
Rediscover.
0519 A target is inconsistently exposed among the Configuration.
cluster.
The administrator should change the
exposure of the target.
0525 ACL entry is not defined at the same target in Activate
each gateway in the cluster.
Synchronization.
0103 The gateway doesnt know the state of the Select cluster
storage.
level and
Rediscover.
Reconnect
0901 Brocade iSCSI Gateway Manager lost
connection with a gateway. Check the
network.
Reconnecting the gateway will close the
alarm.
You can check also that the server's IP
address is defined in the switch as manager
by using the CLI command: SNMP manager
show. If it is not, please add it by using the
CLI command: SNMP manager add -ip <IP
address>
0902 Brocade iSCSI Gateway trap port is already Configuration.
in use. Change the trap port via gateway
->Properties ->SNMP to receive traps from
this gateway.
This trap port is where Brocade iSCSI
Gateway Manager listens from. The trap port
must also be changed in the CLI. This trap
port is where the gateway sends from.
1001 An interface stopped functioning.
Reconnect.
Check that the cable is plugged in correctly.
Brocade iSCSI
Gateway takeover
Inconsistent ACL
Brocade iSCSI
Gateways are not
neighbors
Target exposed
inconsistency
Brocade iSCSI
Gateway
disconnected
Link Down
6-12
Troubleshooting
Action
0513
Index
A
Add
iSCSI Portal ............................................ 3-11
iSNS .......................................................3-20
User Profile ............................................. 3-2
Address masks............................................. 5-8
Address masks reply ................................... 5-8
Alarm
Closing ....................................................6-8
Current....................................................6-6
History.....................................................6-6
Propagated ............................................. 6-5
Properties ...............................................6-9
Severity.................................................. 6-10
specific ....................................................6-4
Alarm ID
0101 ........................................................ 6-11
0102........................................................ 6-11
0301........................................................ 6-11
0401 ....................................................... 6-11
0402....................................................... 6-11
0404....................................................... 6-11
0405 ....................................................... 6-11
0406....................................................... 6-11
0407 ....................................................... 6-11
0408....................................................... 6-11
0502 ....................................................... 6-11
0504 ....................................................... 6-11
0504 ....................................................... 6-11
0505 ....................................................... 6-11
0506.......................................................6-12
0507 .......................................................6-12
0508.......................................................6-12
0512 ........................................................6-12
0513 ........................................................6-12
0514 ........................................................6-12
0515 ........................................................6-12
0518........................................................6-12
0519........................................................6-12
0525........................................................6-12
0901 .......................................................6-12
0902.......................................................6-13
Index
Publication Number: 53-1000203-01
1001........................................................ 6-13
1003 ....................................................... 6-12
Authentication
target........................................................ 1-8
B
Brocade iSCSI Gateway
management .......................................... 1-15
Offline.................................................... 3-18
Resetting............................................... 3-28
Brocade iSCSI Gateway Cluster..................1-11
Brocade iSCSI Gateway Properties ............3-6
Date & Time ............................................3-7
IP Address................................................3-8
C
CHAP
double authentication ..........................4-11
Cluster ..........................................................1-11
Configure
IP Routing .............................................. 3-12
iSCSI........................................................ 3-11
Connections
current number..................................... 5-10
open active............................................ 5-10
open passive ......................................... 5-10
Current Alarms ........................................... 6-6
D
Datagrams
errors ...................................................... 5-11
received.................................................. 5-11
sent ......................................................... 5-11
wrong port.............................................. 5-11
Date and Time .............................................3-7
Delete..........................................................4-11
LU............................................................4-11
Delivers ........................................................5-8
I-1
E
Errors
datagrams .............................................. 5-11
in address................................................ 5-8
in header................................................. 5-8
in/out ...................................................... 5-8
received ................................................ 5-10
Exclamation Mark ...................................... 1-14
F
Failback.......................................................3-18
Faulty interval ............................................. 1-14
Firewall ...................................................... 3-25
Interval
faulty .......................................................1-14
keep alive ...............................................1-14
suspicious...............................................1-14
IP
Active.......................................................1-11
Inactive ....................................................1-11
Neighbor .................................................1-11
IP Address ............................................3-8, 3-11
IP Route
Configuring ........................................... 3-12
iSCSI ............................................................ 3-11
Portal ...................................................... 3-11
Target...................................................... 3-11
iSCSI connection statistics ........................ 5-16
iSCSI session statistics ............................... 5-12
iSNS ........................................................... 3-20
K
Keep alive interval......................................1-14
Keep alive signal.........................................1-14
L
LU ........................................................ 4-8, 4-11
LUNs discovery......................................... 3-26
I
Icons
Critical Alarm......................................... 6-11
Major Alarm........................................... 6-11
Minor Alarm ......................................... 6-10
Warning Alarm ..................................... 6-10
In
address errors......................................... 5-8
delivers.................................................... 5-8
destination unreachable ....................... 5-8
discards ................................................... 5-8
echo reply............................................... 5-8
echos....................................................... 5-8
header errors .......................................... 5-8
parameter problems .............................. 5-8
receives ................................................... 5-8
redirect.................................................... 5-8
search quench ........................................ 5-8
time exceeds .......................................... 5-8
In-band ....................................................... 1-15
Interface statistics........................................ 5-6
Internet Storage Name Service ................3-20
I-2
M
Messages......................................................5-8
Monitoring
health....................................................... 5-1
N
NAT...............................................................2-7
Neighbor
Removing .............................................. 3-18
Network topology ........................................ 1-1
Network Translation Environment.............2-7
Number of connections............................ 5-10
O
Offline
Brocade iSCSI Gateway........................ 3-18
Open
active connections................................ 5-10
passive connections ............................. 5-10
iSCSI Gateway Manager Administrators Guide
Publication Number: 53-1000203-01
Out
destination unreachable ....................... 5-8
discards ................................................... 5-8
echo reply............................................... 5-8
echos....................................................... 5-8
no routes................................................. 5-8
parameter problems .............................. 5-8
redirect.................................................... 5-8
requests................................................... 5-8
search quench ........................................ 5-8
time exceeds .......................................... 5-8
Out-of-band ............................................... 1-15
P
Password ..................................................... 3-2
Portal........................................................... 3-11
Propagated Alarms ..................................... 6-5
R
Read Community...................................... 3-23
Received
address masks......................................... 5-8
address masks reply ............................... 5-8
datagrams .............................................. 5-11
errors..................................................... 5-10
messages................................................. 5-8
segments............................................... 5-10
timestamps ............................................. 5-8
timestamps reply.................................... 5-8
Re-Discover............................................... 3-26
Rediscover gateway or Cluster ................ 3-26
Rediscovering Storage Devices ............... 3-26
Remove
Exposed Volume ................................... 4-11
LU0......................................................... 4-11
Neighbor................................................3-18
Report LUNs .............................................. 3-26
Reset establishments ................................ 5-10
Reset sent .................................................. 5-10
Retries ........................................................ 3-23
RS232 .......................................................... 1-15
S
Scroll Function ............................................ 5-2
Segments
received ................................................ 5-10
retransmitted ........................................ 5-10
sent........................................................ 5-10
Index
Publication Number: 53-1000203-01
Sent
address masks .........................................5-8
datagrams............................................... 5-11
messages .................................................5-8
reset ....................................................... 5-10
segments ............................................... 5-10
timestamps..............................................5-8
timestamps reply ....................................5-8
Service Agent ............................................... 1-3
Service Location Protocol........................... 1-3
SNMP
Configuration........................................3-23
Version ..................................................3-23
Specific alarms............................................ 6-4
Statistics
interface...................................................5-6
iSCSI connections................................. 5-16
iSCSI sessions ........................................ 5-12
TCP......................................................... 5-10
TCP/IP Counters.....................................5-8
UDP ........................................................ 5-11
Suspicious interval .....................................1-14
Synchronize ........................................1-14, 3-11
T
Target ..................................................3-11, 4-11
Alias ........................................................ 4-8
authentication................................ 1-8, 4-16
Name ...................................................... 4-8
Properties ............................................... 4-8
TCP/IP Counters .........................................5-8
Telnet .................................................1-15, 3-25
Telnet Session, Opening...........................3-24
Time stamps.................................................5-8
Timeout......................................................3-23
TRAP UDP Port ..........................................3-23
U
UDP listeners .............................................. 5-11
UDP Port ....................................................3-23
UDP statistics .............................................. 5-11
Unexpose
Exposed Volume....................................4-11
User Password .............................................3-2
User Profile ..................................................3-2
V
View.................................................... 3-23, 4-8
I-3
Z
Zoom Functions ..........................................5-2
quick zoom .............................................5-4
zoom in/out............................................5-5
I-4