Академический Документы
Профессиональный Документы
Культура Документы
With reference to
Table of Contents
Preface .................................................................................................................................................... 2 Document Conventions .......................................................................................................................... 2 Introduction ............................................................................................................................................ 3 System Requirements ............................................................................................................................. 3 Introduction to iSCSI Setup ..................................................................................................................... 3 Configuring dedicated storage NIC in Xen Server ................................................................................... 4 Configuring iSCSI AMS2300 Storage ...................................................................................................... 7 Create iSCSI Target ........................................................................................................................ 7 ISCSI Target security ...................................................................................................................... 8 Create CHAP user .......................................................................................................................... 8 iSCSI Target authentication ......................................................................................................... 10 Adding iSCSI Storage LUNs to Citrix XENServer ................................................................................... 11
Page 1
Preface
This document provides guidelines on how to configure iSCSI in Citrix XenServer with reference to XenServer 5.6 Feature Pack 1 and also provides information about configuration of iSCSI AMS 2000 series storage and creation of Storage Repository (SR) in Citrix XenServer. Configuration methods are mostly described with screenshots.
Document Conventions
This document uses the following conventions to draw your attention to certain information. Bold - Indicates text on a window, including window title, menus, menu options, buttons, fields, and labels. Example: Click OK. - Indicates a variable, which is a placeholder for actual text provided by the user or system. Example: copy source-file target-file.
Italic
Page 2
Introduction
Citrix XenServer is a server virtualization platform. It supports both Windows and Linux virtual servers, with all the capabilities required to create and manage a virtual infrastructure. XenServer runs directly on server hardware without requiring an additional underlying operating system. XenServer works by virtualizing the hardware. Hardware virtualization abstracts characteristics, such as hard drives, resources, or ports, of the system from the hardware and allocates it to the virtualized computer(s) running on it. These virtualized "computers," are known as virtual machines (VMs). XenServer can be managed through XenCenter, a Windows administration tool, or via a command line interface (CLI) running on Linux or Windows.
System Requirements
XenServer requires at least two separate physical x86 computers: one to be the XenServer host, and the other to run the XenCenter application. The XenServer host machine is dedicated entirely to the task of hosting VMs and is not used for other applications. To support VMs running Windows, an Intel VT or AMD-V 64-bit x86-based system with one or more CPUs is required. To run Windows VMs, hardware support for virtualization must be enabled on the XenServer host. This option is available in the BIOS. The remote XenCenter application for managing the XenServer host can be installed and run on any Windows Server 2003, Windows Server 2008, Windows XP or Windows Vista machine. For details on system requirement, refer Citrix XenServer documents.
LAN Switch - 1
Xen Server 5.6 Features Pack 1 10G NIC Card (Management) 10G NIC Card (Stoarge), IP 192.168.10.13 10G NIC Card (Storage), IP 192.169.10.35
LAN Switch - 2
Fugure-1
Page 3
Page 4
7.
NIC configuration can be verified from XenClient. Connect to XenServer using XenClient Select Server on Server View Click Network Tab. This will display network configuration.
Fugure-2
Page 5
8.
Make note of initiator IQN. Select Server from XenClient application click on General Tab and note iSCSI IQN. This will be required during iSCSI Target setup.
Fugure-3
Page 6
iSCSI Target No.: Select default or enter an available number. Alias: Select default or enter a meaningfull name iSCSI Name: Select default value for iSCSI name. Hosts: On the Hosts tab select required host initiator from the detected Hosts or enter initiator name manually as noted previously. (f) Logical Units: Select Logical Units tab and add LUNs to be assigned to iSCSI initiator. (g) Options: Click on Options tab and set Platform: Linux
Fugure-4
Page 7
2.
Set iSCSI Target security Click on Groups iSCSI Targets then click on iSCSI Target Security tab Select the Ports and then click on Change iSCSI Target Security to enable iSCSI Target Security.
Fugure-5
3.
Create CHAP user: Click on Groups iSCSI Targets then click on CHAP Users tab Click on Create CHAP User. This will open a Popup window.
Figure-6
Page 8
4.
Create CHAP user: In Create CHAP User window, enter a name for CHAP user and enter password for the CHAP user. Select appropriate storage ports.
Figure-7
5.
Create CHAP user: Assign iSCSI Target to CHAP user. Click on Groups iSCSI Targets then click on CHAP Users tab Click on Edit CHAP User This will open a Popup window. Select iSCSI target for the CHAP user.
Figure-8
Page 9
6.
Set an authetication method for the iSCSI Target. Click on Groups iSCSI Targets Select iSCSI Target tab Select already created iSCSI Target and click on Edit Authentication. Select CHAP as authentication method.
Figure-9
Page 10
Figure-10
2.
Figure-11
Page 11
3.
Enter iSCSI storage information in Enter a name and path for new iSCSI storage window. Name: Enter a suitable name for iSCSI storage LUN Target Host: Enter IP Address and tcp/ip port number of the target host. Authentication method : If CHAP authentication is used, select Use CHAP, then enter User and Password information which were created at iSCSI storage. Target IQN : Click on Discover IQNs button, it will list all the IQNs discovered. Select the Target IQN which was created at iSCSI stoarge. Target LUN : Click on Discover LUNs, it will discover all the LUNs assigned in the Target IQN. Select a LUN to add as an SR (Storage Repository) in Xen Server. Click on Finish to complete the addition of new LUNs and SR. Click on Yes to confirm format of the Hard Disk. SR will be created and will be listed under Storage Repositories. To add more SR to Xen Server from available LUNs follow the above steps 1, 2 and 3.
Figure-12
Page 12
Corporate Headquarters 750 Central Expressway, Santa Clara, California 95050-2627 USA Contact Information: + 1 408 970 1000 www.hds.com / info@hds.com Asia Pacific and Americas 750 Central Expressway, Santa Clara, California 95050-2627 USA_ Contact Information: + 1 408 970 1000 www.hds.com / info@hds.com Europe Headquarters Sefton Park, Stoke Poges, Buckinghamshire SL2 4HD United Kingdom Contact Information: + 44 (0) 1753 618000 www.hds.com / info.uk@hds.com
Hitachi is a registered trademark of Hitachi, Ltd., and/or its affiliates in the United States and other countries. Hitachi Data Systems is a registered trademark and service mark of Hitachi, Ltd. In the United States and other countries. Microsoft is a registered trademark of Microsoft Corporation. Hitachi Data Systems has achieved Microsoft Competency in Advanced Infrastructure Solutions. All other trademarks, service marks, and company names are properties of their respective owners. Notice : This document is for informational purposes only, and does not set forth any warranty, express or limited, concerning any equipment or service offered or to be offered by Hitachi Data Systems. This document describes some capabilities that are conditioned on a maintenance contract with Hitachi Data Systems being in effect, and that may be configurationdependent, and features that may not be currently available. Contact your local Hitachi Data Systems sales office for information on feature and product availability. Hitachi Data Systems sells and licenses its products subject to certain terms and conditions, including limited warranties. To see a copy of these terms and conditions prior to purchase or license, please go to http://www.hds.com/corporate/legal/index.html or call your local sales representatives to obtain a printed copy. If you purchase or license the product, you are deemed to have accepted the terms and conditions. Hitachi Data Systems Corporation 2009. All Rights Reserved
Page 13