SANtricity 11 Manuals (CA08872-010)
Get started
System Manager setup
System Manager
Main interface
System Manager interface overview
View performance data
Performance graphs and guidelines
View graphical performance data
Manage interface settings
FAQs
What are the supported browsers?
What are the keyboard shortcuts?
How do performance statistics for individual volumes relate to the total?
Why does data display as zero in the graphs and table?
What does the Latency graph show?
What does the IOPS graph show?
What does the MiB/s graph show?
What does the Headroom graph show?
Where can I find more information about display preferences?
Pools and volume groups
Configure storage
Manage storage
Modify pool and group settings
Change configuration settings for a pool
Change configuration settings for a volume group
Enable or disable resource provisioning (existing volumes)
Manage SSD cache
Manage reserved capacity
Change capacity for snapshot group
Change capacity for snapshot volume
Change capacity consistency group member volume
FAQs
What are the differences between pools and volume groups?
Why would I want to manually configure a pool?
Why are capacity alerts important?
Why can’t I increase my preservation capacity?
Is there a limit on the number of drives I can remove from a pool?
What media types are supported for a drive?
Why are some drives not showing up?
How do I maintain shelf/drawer loss protection?
What is the optimal drive positioning for pools and volume groups?
What RAID level is best for my application?
What is secure-capable (Drive Security)?
What do I need to know about increasing reserved capacity?
Why can’t I choose another amount to decrease by?
Why do I need reserved capacity for each member volume?
How do I view and interpret all SSD Cache statistics?
What is optimization capacity for pools?
What is optimization capacity for volume groups?
What is resource provisioning capable?
What do I need to know about the resource-provisioned volumes feature?
Volumes and workloads
Manage volumes
Manage settings
FAQs
How does my selected workload impact volume creation?
Why aren’t these volumes associated with a workload?
Why can’t I delete the selected workload?
How do application-specific workloads help me manage my storage system?
How does providing this information help create storage?
What do I need to do to recognize the expanded capacity?
Why don’t I see all my pools and/or volume groups?
What is preferred controller ownership?
Hosts and host clusters
Configure host access
Manage hosts and clusters
Manage settings
Snapshots
Concepts
Workflow for creating snapshot images and volumes
Base volumes, reserved capacity, and snapshot groups
Create snapshots and snapshot objects
Manage snapshot images
Start snapshot image rollback for base volume
Start snapshot image rollback for snapshot consistency group member volumes
Resume snapshot image rollback
Manage snapshot consistency groups
Manage snapshot volumes
Convert snapshot volume to read-write mode
Mirroring
Async concepts
Sync concepts
Manage async mirror consistency groups
Suspend or resume synchronization
Re-sync mirror consistency group
Manage async mirrored pairs
Remove async mirror relationship
Change reserved capacity for mirrored pair volume
Complete mirrored pair for primary volumes created on legacy system
Manage sync mirrored pairs
Async FAQs
How does asynchronous mirroring differ from synchronous mirroring?
Why can’t I access my chosen mirroring feature?
What do I need to know before creating a mirror consistency group?
Asynchronous mirroring - What do I need to know before creating a mirrored pair?
What do I need to know before increasing my reserved capacity on a mirrored pair volume?
Why can’t I increase reserved capacity with my requested amount?
Why would I change this percentage?
Why do I see more than one reserved capacity candidate?
Why do I see Not Available values displayed in the table?
Why don’t I see all of my pools and volume groups?
Asynchronous mirroring - Why don’t I see all my volumes?
Asynchronous mirroring - Why don’t I see all the volumes on the remote storage system?
Sync FAQs
How does synchronous mirroring differ from asynchronous mirroring?
Synchronous mirroring - Why don’t I see all my volumes?
Synchronous mirroring - Why don’t I see all the volumes on the remote storage system?
Synchronous mirroring - What do I need to know before creating a mirrored pair?
What impact does synchronization priority have on synchronization rates?
Why is it recommended to use a manual synchronization policy?
Remote storage
Manage remote storage
Manage progress of remote storage imports
FAQs
What do I need to know before creating a remote storage connection?
Why am I being prompted to remove my remote volumes?
Why don’t I see all my volumes on my destination array?
What do I need to know about the remote volume in an import?
What do I need to know before starting a remote storage import?
Hardware components
Manage shelf components
Switch between front and back views
Manage controllers
Considerations for assigning IP addresses
Configure NTP server addresses
Configure DNS server addresses
Manage iSCSI ports
Configure iSCSI authentication
Enable iSCSI discovery settings
View iSCSI statistics packages
Manage drives
Controller FAQs
What is IPv6 stateless address auto-configuration?
Which do I choose — DHCP or manual configuration?
How do I configure my DHCP server?
Why do I need to change the controller network configuration?
Where do I get the network configuration?
When should I refresh the port configuration?
iSCSI FAQs
What happens when I use an iSNS server for registration?
Which registration methods are automatically supported for iSCSI?
How do I interpret iSER over InfiniBand statistics?
What else do I need to do to configure or diagnose iSER over InfiniBand?
Alerts
Manage SNMP alerts
Manage syslog alerts
Array settings
Configure array settings
Turn on storage system locator lights
Synchronize storage system clocks
Save storage system configuration
Configure add-on features
Drive security
Manage security keys
Switch from external to internal key management
Edit key management server settings
FAQs
What do I need to know before creating a security key?
Why do I need to define a pass phrase?
Why is it important to record security key information?
What do I need to know before backing up a security key?
What do I need to know before unlocking secure drives?
What is read/write accessibility?
What do I need to know about validating the security key?
What is the difference between internal security key and external security key management?
Access management
Concepts
Use directory services
FAQs
What do I need to know before adding a directory server?
What do I need to know about mapping to storage system roles?
Which external management tools may be affected by this change?
What do I need to know before configuring and enabling SAML?
What types of events are recorded in the audit log?
What do I need to know before configuring a syslog server?
The syslog server is no longer receiving audit logs. What do I do?
Certificates
Support
Collect diagnostic data
Manage AutoSupport
Workflow for the AutoSupport feature
Enable or disable AutoSupport features
Configure AutoSupport delivery method
Schedule AutoSupport dispatches
Manage upgrades
FAQs
What does unreadable sectors data show me?
What do the AutoSupport features do?
What type of data is collected through the AutoSupport feature?
How do I configure the delivery method for the AutoSupport feature?
What do I need to know before upgrading the SANtricity OS Software?
What do I need to know before suspending IOM auto-synchronization?
Why is my firmware upgrade progressing so slowly?
Unified Manager
Main interface
Storage systems
Settings import
Use batch imports
Upgrades
Upgrade software and firmware
Mirroring
FAQs
What do I need to know before creating a mirror consistency group?
What do I need to know before creating a mirrored pair?
Why would I change this percentage?
Why do I see more than one reserved capacity candidate?
Why don’t I see all my volumes?
Why don’t I see all the volumes on the remote storage system?
What impact does synchronization priority have on synchronization rates?
Why is it recommended to use a manual synchronization policy?
Configure iSCSI authentication
For extra security in an iSCSI network, you can set authentication between controllers (targets) and hosts (initiators).
SANtricity System Manager uses the Challenge Handshake Authentication Protocol (CHAP) method, which validates the identity of targets and initiators during the initial link. Authentication is based on a shared security key called a CHAP secret.
You can set the CHAP secret for the initiators (iSCSI hosts) either before or after you set the CHAP secret for the targets (controllers). Before you follow the instructions in this task, you should wait until the hosts have made an iSCSI connection first, and then set the CHAP secret on the individual hosts. After the connections are made, the IQN names of the hosts and their CHAP secrets are listed in the dialog box for iSCSI authentication (described in this task), and you do not need to manually enter them.
You can select one of the following authentication methods:
-
One-way authentication
Use this setting to allow the controller to authenticate the identity of the iSCSI hosts (uni-directional authentication). -
Two-way authentication
Use this setting to allow both the controller and the iSCSI hosts to perform authentication (bi-directional authentication). This setting provides a second level of security by enabling the controller to authenticate the identity of the iSCSI hosts; and in turn, the iSCSI hosts to authenticate the identity of the controller.
The iSCSI settings and functions only display on the Settings page if your storage system supports iSCSI. |
-
Select Settings > System.
-
Under iSCSI Settings, click Configure Authentication.
The Configure Authentication dialog box appears, which shows the currently set method. It also shows if any hosts have CHAP secrets configured.
-
Select one of the following:
-
No authentication
If you do not want the controller to authenticate the identity of iSCSI hosts, select this option and click Finish. The dialog box closes, and you are done with configuration. -
One-way authentication
To allow the controller to authenticate the identity of the iSCSI hosts, select this option and click Next to display the Configure Target CHAP dialog box. -
Two-way authentication
To allow both the controller and the iSCSI hosts to perform authentication, select this option and click Next to display the Configure Target CHAP dialog box.
-
-
For one-way or two-way authentication, enter or confirm the CHAP secret for the controller (the target). The CHAP secret must be between 12 and 57 printable ASCII characters.
If the CHAP secret for the controller was configured previously, the characters in the field are masked. If necessary, you can replace the existing characters (new characters are not masked).
-
Do one of the following:
-
If you are configuring one-way authentication, click Finish. The dialog box closes, and you are done with configuration.
-
If you are configuring two-way authentication, click Next to display the Configure Initiator CHAP dialog box.
-
-
For two-way authentication, enter or confirm a CHAP secret for any of the iSCSI hosts (the initiators), which can be between 12 and 57 printable ASCII characters. If you do not want to configure two-way authentication for a particular host, leave the Initiator CHAP Secret field blank.
If the CHAP secret for a host was configured previously, the characters in the field are masked. If necessary, you can replace the existing characters (new characters are not masked).
-
Click Finish.
Authentication occurs during the iSCSI login sequence between the controllers and iSCSI hosts, unless you specified no authentication.