Home Page Icon
Home Page
Table of Contents for
Front cover
Close
Front cover
by Anuj Chandra Jonathan Burton Jordan Fincher, Kushal Patel, Torsten Rothenwaldt,
iSCSI Implementation and Best Practices on IBM Storwize Storage Systems
Front cover
Notices
Trademarks
Preface
Authors
Now you can become a published author, too!
Comments welcome
Stay connected to IBM Redbooks
Summary of changes
October 2017, Second Edition
Part 1 iSCSI overview
Chapter 1. Use cases for iSCSI virtualization
1.1 Consolidating iSCSI storage consolidation
1.2 Removing capacity silos from data centers
1.3 Improving the performance of iSCSI storage systems
Chapter 2. Introduction to iSCSI in IBM Storwize storage systems
2.1 What iSCSI is
2.2 iSCSI sessions
2.2.1 Components of an iSCSI session
2.2.2 The three phases of iSCSI login
2.3 iSCSI adapters
2.3.1 Ethernet card (network interface card)
2.3.2 TCP offload engine
2.3.3 iSCSI offload engine
2.4 iSCSI routing
2.5 Ethernet for iSCSI
2.5.1 Data Center Bridging
2.5.2 The future of Ethernet and its impact on iSCSI
2.6 Fibre Channel: FCoE terms and their iSCSI equivalents
2.6.1 Fibre Channel zoning
2.6.2 Virtual SAN
2.6.3 Buffer-to-Buffer credit
2.6.4 Worldwide name
2.6.5 Fabric name server
2.7 Comparison of iSCSI and FCoE
2.8 Why use iSCSI
2.8.1 iSCSI is cost-effective
2.8.2 No distance limitations
2.8.3 Good interoperability
2.8.4 Bandwidth usage and Converged Enhanced Ethernet benefits
2.8.5 Security
Chapter 3. External virtualization and host connectivity interface options for the IBM Storwize family
3.1 Connectivity options for the IBM Storwize V5000 Gen2 storage system
3.1.1 Connectivity options for the IBM Storwize V5010 storage system
3.1.2 Connectivity options for the IBM Storwize V5020 storage system
3.1.3 Connectivity options for IBM Storwize V5030 and IBM Storwize V5030F storage systems
3.1.4 IBM Storwize V5010, IBM Storwize V5020, and IBM Storwize V5030 HIC options at a glance
3.2 Connectivity options for the IBM Storwize V7000 storage system
3.2.1 External connectivity options for the IBM Storwize V7000 Gen2+
3.2.2 External connectivity options for the IBM Storwize V7000 Gen2
3.3 The IBM Storwize V7000 Unified storage system
3.4 SAN Volume Controller SV1 storage systems
3.5 Hardware terminology for the IBM Storwize disk systems
3.5.1 Control enclosures, nodes, and I/O groups
3.5.2 Expansion enclosures
3.5.3 IBM Storwize cluster system
3.5.4 IBM Storwize virtualization
Chapter 4. Planning considerations
4.1 General considerations
4.2 Network topology
4.2.1 Network topology with one Ethernet switch
4.2.2 Network topology with two VLANs
4.2.3 Network topology with four VLANs
4.2.4 Link aggregation between switches
4.2.5 iSCSI that uses a Layer 3 network topology
4.2.6 IP replication network topology
4.3 Planning for host access
4.3.1 Planning for IBM AIX
4.3.2 Planning for Linux
4.3.3 Planning for VMware
4.3.4 Planning for Windows
4.4 Planning considerations for external virtualization
4.4.1 Network security
4.4.2 iSCSI Protocol-specific considerations
4.4.3 Controller migration considerations
4.5 IBM Storwize family and iSCSI limits
4.5.1 Version 7.8 configuration limits and restrictions for the IBM Storwize V3500 storage system
4.5.2 Version 7.8 configuration limits and restrictions for the IBM Storwize V3700 storage system
4.5.3 Version 7.8 configuration limits and restrictions for the IBM Storwize V5000 storage system
4.5.4 Version 7.8 configuration limits and restrictions for the IBM Storwize V7000 storage system
4.5.5 Version 7.8 configuration limits and restrictions for the SAN Volume Controller storage system
Chapter 5. iSCSI storage connection security
5.1 iSCSI security model
5.1.1 iSCSI network security
5.2 Configuring CHAP for an IBM Storwize storage system
5.2.1 Configuring CHAP for the IBM Storwize storage system by using the GUI
5.2.2 Configuring CHAP for the IBM Storwize storage system by using the CLI
5.3 Configuring CHAP authentication for the host
5.3.1 Setting up authentication for Linux hosts
5.3.2 Setting up authentication for Microsoft Windows hosts
5.3.3 Setting up authentication for AIX hosts
5.3.4 Setting up authentication for VMware hosts
5.4 iSCSI security
5.5 Mandatory security in real-world situations
Chapter 6. IBM Storwize performance
6.1 Jumbo frames
6.2 VLAN separation
6.2.1 VLAN
6.2.2 Advantages of VLANs
6.2.3 VLAN and iSCSI performance
6.3 Subnetting
6.3.1 Network subnetting
6.3.2 Subnetting and iSCSI performance
6.4 Quality of service and traffic prioritization
6.5 iSCSI protocol digests and performance
Part 2 iSCSI host attachment
Chapter 7. Configuring the IBM Storwize storage system and hosts for iSCSI
7.1 Configuring the IBM Storwize storage system for iSCSI
7.1.1 Setting the IBM Storwize iSCSI IP address
7.1.2 Setting optional iSCSI settings on IBM Storwize storage systems
7.2 Configuring initiators for iSCSI
7.2.1 iSCSI discovery mechanisms
7.2.2 iSCSI operational parameters
7.2.3 Considerations for enabling TSO for host network adapters
7.2.4 Host configuration maximums for iSCSI with IBM Storwize storage systems
7.3 Configuring iSCSI on AIX 7.1
7.3.1 Ethernet network configuration
7.3.2 Selecting the discovery policy
7.3.3 Working with the IBM Storwize storage volume
7.4 Configuring iSCSI for SUSE Linux Enterprise Server
7.4.1 Prerequisites for mapping the iSCSI volume
7.4.2 Ethernet network configuration
7.4.3 Discovering and logging in to the iSCSI targets
7.4.4 Understanding iSCSI sessions for software-based initiators
7.4.5 Working with the IBM Storwize storage volume
7.5 Configuring iSCSI for Windows 2012
7.5.1 Prerequisites
7.5.2 Ethernet network configuration on Windows hosts
7.5.3 iSCSI target discovery for Windows hosts
7.6 Configuring iSCSI for VMware ESXi hosts
7.6.1 Configuring the Ethernet network on the VMware host
7.7 iSNS server configuration
7.7.1 Enabling ISNS server in Windows 2012
7.7.2 Configuring the iSNS server address on an IBM Storwize storage system
7.7.3 Configuring the iSCSI initiator with iSNS server details
7.8 Configuring Priority Flow Control for the IBM Storwize storage system
7.8.1 Requirements for PFC
7.8.2 Configuring Priority Flow Control on Brocade VDX
7.8.3 Verifying Priority Flow Control from the IBM Storwize storage system
7.9 Configuring the iSCSI host for the HyperSwap cluster
7.9.1 What HyperSwap is
7.9.2 Host site assignment
7.9.3 Working with HyperSwap volumes
Chapter 8. IBM Spectrum Virtualize and IBM Storwize performance monitoring
8.1 Manually gathering performance statistics
8.1.1 Statistics file naming
8.2 Real-time performance monitoring
8.2.1 Real-time performance monitoring with the CLI
8.2.2 Real-time performance monitoring with the GUI
8.3 Performance data collection with IBM tools
8.3.1 IBM Spectrum Control
8.3.2 IBM Spectrum Control Storage Insights
Chapter 9. IBM Spectrum Virtualize and IBM Storwize storage systems on the OpenStack platform
9.1 Introduction to OpenStack components
9.2 Integrating the Cinder driver with IBM Spectrum Virtualize and IBM Storwize storage systems
9.2.1 Volume creation and host attachment with OpenStack
9.2.2 Volume attachment from Nova
Chapter 10. Troubleshooting
10.1 Storage tools on an IBM Storwize storage system
10.1.1 Management GUI
10.1.2 Service Assistant GUI
10.1.3 Command-line interface
10.1.4 Service CLI
10.1.5 USB
10.1.6 Visual indicators (Ethernet port LED status)
10.2 Storage logs that are used for analysis
10.2.1 Support Package on the IBM Storwize cluster
10.2.2 Event log on the IBM Storwize cluster
10.2.3 Audit log on the IBM Storwize cluster
10.2.4 Ethernet logs and statistics on IBM Storwize nodes
10.2.5 iSCSI logs on IBM Storwize nodes
10.3 Different IP addresses on the IBM Storwize storage system
10.3.1 Path failover mechanisms in iSCSI on an IBM Storwize storage system
10.3.2 iSCSI IP failover
10.4 Problem determination
10.4.1 Problem determination: Obtaining a basic configuration overview
10.4.2 Problem determination: Checking the network configuration
10.4.3 Problem determination: Checking the IBM Storwize configuration
10.4.4 Problem determination: Checking authentication
10.4.5 Problem determination: Checking active sessions from the IBM Storwize storage system
10.4.6 Problem determination: Checking a host configuration
10.4.7 Problem determination: Checking for performance problems
Part 3 iSCSI virtualization
Chapter 11. iSCSI virtualization overview
11.1 Planning considerations for iSCSI virtualization
11.1.1 Fibre Channel versus iSCSI virtualization
11.1.2 Storage port configuration model
11.1.3 Controller considerations
11.1.4 Stretched cluster and HyperSwap topology
11.1.5 Security
11.1.6 Limits and considerations
11.2 iSCSI external virtualization steps
11.2.1 Port selection
11.2.2 Source port configuration
11.2.3 Target port configuration
11.2.4 Host mapping and authentication settings on target controllers
11.2.5 Understanding the storage port model for a back-end controller
11.2.6 Discovering storage ports from the initiator
11.2.7 Viewing the discovery results
11.2.8 Adding sessions to discovered storage ports
11.2.9 Viewing established sessions to storage ports
Chapter 12. External virtualization of IBM Storwize storage systems
12.1 Planning considerations
12.1.1 Limits and considerations
12.1.2 Performance considerations
12.2 Target configuration
12.2.1 System layer
12.2.2 Host mappings
12.2.3 Authentication
12.2.4 Port configuration
12.3 Initiator configuration
12.3.1 Establishing connections and sessions
12.4 Configuration validation
Chapter 13. Virtualization of IBM Spectrum Accelerate storage systems
13.1 Planning considerations
13.1.1 Limits and considerations for IBM XIV, IBM FlashSystem A9000, and IBM Spectrum Accelerate
13.1.2 Performance considerations
13.1.3 Migration considerations
13.2 Target configuration
13.2.1 Port configuration
13.2.2 Host mappings and authentication
13.2.3 Mapping XIV LUNs to the SAN Volume Controller or IBM Storwize system
13.3 Initiator configuration
13.3.1 Overview
13.3.2 Workflow that uses the CLI
13.3.3 Workflow with GUI
13.3.4 Configuration validation
Chapter 14. External virtualization of Dell Equallogic PS Series
14.1 Planning considerations
14.1.1 Dell Equallogic PS Series connection considerations
14.1.2 Migration considerations
14.2 Target configuration
14.2.1 Port configuration
14.2.2 Setting up access policies
14.2.3 Creating volumes and applying access policies
14.2.4 Modifying the settings of existing volumes
14.3 Initiator configuration
14.3.1 GUI workflow
14.3.2 CLI workflows
Chapter 15. Configuration and administration of iSCSI
15.1 Changing the iSCSI port configuration
15.1.1 Changing the iSCSI initiator ports’ IP addresses
15.1.2 Changing the iSCSI target ports’ IP addresses
15.1.3 Enabling or disabling iSCSI on IP ports
15.2 Adding or removing nodes or I/O groups
15.2.1 Adding nodes
15.2.2 Removing nodes from a SAN Volume Controller initiator cluster
15.2.3 Adding ports to the SAN Volume Controller initiator
15.2.4 Removing ports
15.3 Changing the system name or node name
15.3.1 Changing the system name or node name of the initiator (SAN Volume Controller system)
15.4 Changing the CHAP configuration
15.4.1 General considerations
15.4.2 Instructions for a SAN Volume Controller or IBM Storwize initiator system with an IBM Storwize target system
15.5 Changing the number of LUNs, ports, and IQNs in an IBM Storwize system
15.5.1 Adding and removing LUNs exposed from IBM Storwize or XIV controllers
15.5.2 Adding LUNs from a Dell EqualLogic controller
15.5.3 Removing LUNs from a Dell EqualLogic controller
Chapter 16. Troubleshooting iSCSi virtualization
16.1 Troubleshooting iSCSI target discovery
16.1.1 Problems with initial discovery
16.1.2 Problems adding a storage port
16.2 Troubleshooting a degraded or offline status
16.2.1 Restoring an offline MDisk or storage controller
16.2.2 Restoring degraded MDisks or storage controllers
16.3 Performance issues
Related publications
IBM Redbooks
Online resources
Help from IBM
Back cover
Search in book...
Toggle Font Controls
Playlists
Add To
Create new playlist
Name your new playlist
Playlist description (optional)
Cancel
Create playlist
Sign In
Email address
Password
Forgot Password?
Create account
Login
or
Continue with Facebook
Continue with Google
Sign Up
Full Name
Email address
Confirm Email Address
Password
Login
Create account
or
Continue with Facebook
Continue with Google
Next
Next Chapter
Note: Before using this information and the product it supports, read the information in “Notices” on page ix.
Add Highlight
No Comment
..................Content has been hidden....................
You can't read the all page of ebook, please click
here
login for view all page.
Day Mode
Cloud Mode
Night Mode
Reset