Dell PowerVault NX1950 Manual de usuario Pagina 11

  • Descarga
  • Añadir a mis manuales
  • Imprimir
  • Pagina
    / 70
  • Tabla de contenidos
  • MARCADORES
  • Valorado. / 5. Basado en revisión del cliente
Vista de pagina 10
Introduction 11
It is a good practice to have two dual-port Network Interface Cards
(NICs), with two ports dedicated for iSCSI. Configure each NIC on a
separate subnet. If you have three or less NICs, it is recommended that you
do not use the corporate/public network (LAN) link for iSCSI traffic. This
helps avoid traffic congestion and to have better performance. Figure 1-1
and Figure 1-2 illustrate redundant NIC configuration for iSCSI path and
best practices.
Secured iSCSI is possible with Challenge-Handshake Authentication
Protocol (CHAP). For more information about CHAP settings, see
"Configuring Secured iSCSI Connections Using Challenge-Handshake
Authentication Protocol" on page 51.
NOTE: You must configure CHAP only if the iSCSI traffic is configured on the
public network.
You can configure Active/Active iSCSI Target in both nodes of a cluster
solution to provide high availability for iSCSI storage.
Table 1-2. Using a PowerVault NX1950 Cluster Solution as a Target
Number of NICs Initiator Refer to Figure
4
(Option 1)
NIC-1 - NIC for public network
NIC-2 - Private network for cluster
heartbeat
NIC-3 - iSCSI dedicated traffic (subnet A)
NIC-4 - iSCSI dedicated traffic (subnet B)
Figure 1-4
4
(Option 2)
NIC-1 and NIC-2 - Teamed NICs for
public network
NIC-3 - Private network for cluster
heartbeat
NIC-4 - iSCSI dedicated traffic
Figure 1-5
Vista de pagina 10
1 2 ... 6 7 8 9 10 11 12 13 14 15 16 ... 69 70

Comentarios a estos manuales

Sin comentarios