Documenti di Didattica
Documenti di Professioni
Documenti di Cultura
This manual contains information that is proprietary to SANRAD. No part of this publication may be reproduced in any
form whatsoever without prior written approval by SANRAD.
Right, title and interest, all information, copyrights, patents, know-how, trade secrets and other intellectual property or
other proprietary rights relating to this manual and to the StoragePro Management System and any software components
contained therein are proprietary products of SANRAD protected under international copyright law and shall be and
remain solely with SANRAD.
StoragePro Management System is a registered trademark of SANRAD. No right, license, or interest to such trademark
is granted hereunder, and you agree that no such right, license, or interest shall be asserted by you with respect to such
trademark.
Brocade, the Brocade B weave logo, Secure Fabric OS, and SilkWorm are registered trademarks and Tapestry is a
trademark of Brocade Communications Systems, Inc., in the United States and/or in other countries. All other brands,
products, or service names are or may be trademarks or service marks of, and are used to identify, products or services of
their respective owners.
Notice: The information in this document is provided AS IS, without warranty of any kind, including, without
limitation, any implied warranty of merchantability, noninfringement or fitness for a particular purpose. Disclosure of
information in this material in no way grants a recipient any rights under Brocade's patents, copyrights, trade secrets or
other intellectual property rights. Brocade reserves the right to make changes to this document at any time, without
notice, and assumes no responsibility for its use.
The authors and Brocade Communications Systems, Inc. shall have no liability or responsibility to any person or entity
with respect to any loss, cost, liability, or damages arising from the information contained in this book or the computer
programs that accompany it.
Export of technical data contained in this document may require an export license from the United States Government.
Asia-Pacific Headquarters
Brocade Communications Singapore Pte. Ltd.
9 Raffles Place
#59-02 Republic Plaza 1
Singapore 048619
Tel: +65-6538-4700
Fax: +65-6538-0302
Email: apac-info@brocade.com
Document History
Document Title
Publication Number
Summary of Changes
Publication
Date
53-1000204-01 Rev. A
New document
March 2006
Table of Contents
Chapter 1 Introduction to Brocade iSCSI Gateway ................................... 1-1
iSCSI Gateway Topology ................................................................................................. 1-1
iSCSI Overview ............................................................................................................... 1-2
iSCSI Initiator and Targets.................................................................................................. 1-2
Portals..................................................................................................................... 1-2
Targets and LUNs ................................................................................................... 1-2
Discovery Methods .............................................................................................................1-3
iSCSI Discovery .......................................................................................................1-3
SLP ...........................................................................................................................1-3
iSNS .........................................................................................................................1-3
iSCSI Security...................................................................................................................... 1-4
Access Rights...........................................................................................................1-7
Target and Initiator Authentication ...................................................................... 1-8
iSCSI Gateway Cluster ................................................................................................... 1-11
Maintaining Cluster Communications ............................................................................. 1-14
iii
ft update............................................................................................................................. 5-11
ft upload ............................................................................................................................5-12
info .....................................................................................................................................5-12
interface details .................................................................................................................5-12
interface set .......................................................................................................................5-12
interface show ...................................................................................................................5-13
interface statistics show ....................................................................................................5-13
interface statistics details ..................................................................................................5-13
ip config remove ...............................................................................................................5-13
ip config set .......................................................................................................................5-13
ip config show .................................................................................................................. 5-14
ip isns add......................................................................................................................... 5-14
ip isns remove .................................................................................................................. 5-14
ip isns show ...................................................................................................................... 5-14
ip radius add..................................................................................................................... 5-14
ip radius remove ...............................................................................................................5-15
ip radius set........................................................................................................................5-15
ip radius show ...................................................................................................................5-15
ip route add .......................................................................................................................5-15
ip route default................................................................................................................. 5-16
ip route remove................................................................................................................ 5-16
ip route show.................................................................................................................... 5-16
ip statistics icmp show ..................................................................................................... 5-16
ip statistics ip show............................................................................................................5-17
iscsi portal create ..............................................................................................................5-17
iscsi portal remove ............................................................................................................5-17
iscsi portal show ................................................................................................................5-17
iscsi rinitiator list................................................................................................................5-17
iscsi rinitiator show........................................................................................................... 5-18
iscsi rinitiator statistics show............................................................................................ 5-18
iscsi session connection details....................................................................................... 5-18
iscsi session connection show......................................................................................... 5-18
iscsi session details........................................................................................................... 5-18
iscsi session show............................................................................................................. 5-18
iscsi session statistics........................................................................................................ 5-18
iscsi target alias ................................................................................................................. 5-19
iscsi target create.............................................................................................................. 5-19
iscsi target details ............................................................................................................. 5-19
iscsi target remove ........................................................................................................... 5-19
iscsi target set....................................................................................................................5-20
iscsi target show ...............................................................................................................5-20
lu details............................................................................................................................5-20
lu remove...........................................................................................................................5-21
lu show...............................................................................................................................5-21
lu statistics show................................................................................................................5-21
neighbor add.....................................................................................................................5-21
Table of Contents
Publication Number: 53-1000204-01
neighbor set.......................................................................................................................5-21
neighbor show ................................................................................................................. 5-22
neighbor details ............................................................................................................... 5-22
neighbor remove ............................................................................................................. 5-22
ping ................................................................................................................................... 5-22
scsi target port statistics ................................................................................................... 5-23
snmp manager add .......................................................................................................... 5-23
snmp manager remove .................................................................................................... 5-23
snmp manager set ............................................................................................................5-24
snmp manager show ........................................................................................................5-24
storage alias ......................................................................................................................5-24
storage blink abort ...........................................................................................................5-24
storage blink start ............................................................................................................. 5-25
storage details .................................................................................................................. 5-25
storage discovery ............................................................................................................. 5-25
storage disk set ................................................................................................................. 5-25
storage disk show ............................................................................................................. 5-25
storage expose .................................................................................................................5-26
storage remove.................................................................................................................5-26
storage set.........................................................................................................................5-26
storage show..................................................................................................................... 5-27
storage unexpose ............................................................................................................. 5-27
system boot ...................................................................................................................... 5-27
system hardware show .................................................................................................... 5-27
system reset ......................................................................................................................5-28
system reset_default_factory ...........................................................................................5-28
tcp connection show .......................................................................................................5-28
tcp statistics show.............................................................................................................5-28
traceroute .........................................................................................................................5-28
udp listeners show ...........................................................................................................5-29
udp statistics show ...........................................................................................................5-29
Index ..........................................................................................................I-1
List of Figures
Figure 1-1.
Figure 1-2.
Figure 1-3.
Figure 1-4.
Figure 1-5.
Figure 1-6.
Figure 1-7.
vi
Figure 1-8.
Figure 1-9.
Figure 2-1.
List of Tables
Table 2-1:
Table 2-2:
Table 2-3:
Table 2-4:
Table 2-5:
Table 2-6:
Table 2-7:
Table 3-1:
Table 3-2:
Table 3-3:
Table 3-4:
Table 3-5:
Table 3-6:
Table 3-7:
Table 3-8:
Table 4-1:
Table 4-2:
Table 4-3:
Table 4-4:
Table 4-5:
Table 4-6:
Table 4-7:
Table 4-8:
Table 4-9:
Table 4-10:
Table 4-11:
Table 4-12:
Table 4-13:
Table 4-14:
Table 4-15:
Table 4-16:
Table 4-17:
Table 4-18:
Table 4-19:
Table 4-20:
Table 4-21:
Table 5-1:
Table of Contents
Publication Number: 53-1000204-01
vii
viii
Chapter 1
Introduction to Brocade iSCSI Gateway
This chapter provides an overview of the iSCSI Gateway, its topology and features.
The iSCSI Gateway in the center connects to the storage elements in the back-end while
connecting to the IP network on the front-end.
The iSCSI Gateway enables hosts to access attached storage using IP-SAN protocol
iSCSI. For more information, refer to iSCSI.
Tower
Hostbox
Tower
Hostbox
Tower
Hostbox
Cloud
IP Network
iSCSI Gateway
10236b
FC
Cloud
Network
FC RAID
Figure 1-1.
RAID
RAID
RAID
1-1
iSCSI Overview
iSCSI transmits native SCSI commands and data over the TCP/IP protocol stack. iSCSI
transfers and stores SCSI commands and data at any iSCSI enabled storage location with
access to a LAN, MAN, WAN or the Internet. iSCSI enables the creation of high performance
IP-SANs.
iSCSI has many benefits including:
z
iSCSI initiators and targets have a World Wide Unique Identifier (WWUI) of up to 223
free form characters, e.g. www.brocade.switch1.target1.
Portals
To enable iSCSI communications over TCP, the system administrator must configure portals
during the initial iSCSI Gateway configuration. A portal is comprised of both an IP address
and its assigned TCP port. Each configured portal automatically becomes an iSCSI access
point to each target that exists in the iSCSI Gateway. Typically, there are few portals and
many targets.
1-2
(IP2, 3260)
iSCSI Target 1
wwui1
iSCSI Target 2
wwui2
iSCSI Target 3
wwui3
Disk 1
Disk 2
Disk 3
Disk 4
LU0
LU0
LU0
LU1
10124b
iSCSI Gateway
Figure 1-2.
Discovery Methods
The iSCSI Gateway supports three types of discovery: iSCSI Discovery, SLP and iSNS.
iSCSI Discovery
In an iSCSI discovery session the user administrator configures an IP and port of the iSCSI
target in the initiator. The initiator discovers all applicable targets and LUNs.
SLP
SLP (Service Location Protocol) is a common broadcast-based discovery mechanism that
uses agents. The iSCSI Gateway acts as an SLP Service Agent (SA) and advertises its iSCSI
service. The initiator identifies the iSCSI Gateway and discovers the iSCSI Gateways targets.
iSNS
iSNS is a client/server protocol designed for compatibility with FCs Simple Name Server
(SNS). Once an iSNS server is located (either through DHCP or SLP), discovery can take
place without the need for broadcasts. iSNS enables iSCSI initiators in the IP-SAN to locate
the iSCSI Gateway targets automatically.
1-3
iSCSI Security
No matter what discovery method is used, ACL (Access Control List) allows only those
targets that are defined as available to be accessed. To allow selective iSCSI initiator access
to iSCSI target disks, the iSCSI Gateway uses identities to define pools of initiators. An
identity is a user-defined list of iSCSI initiators. Attaching an identity to a target restricts its
access to the list of initiators defined by that identity.
Note:
When planning and creating identities, keep in mind that:
z
Each target is first automatically coupled to a default read-write unauthenticated access identity and therefore can be accessed by everyone.
Each target can have more than one identity. The order of the identities is
important. The first match is used, not the best match.
Note:
If you are working with an iSNS server, all hosts are able to see all targets but only those hosts
with access rights are able to connect to the authorized targets.
1-4
Example:
In Figure 1-3 identities are coupled with iSCSI targets to limit iSCSI initiator access to a
targets underlying disks. An identity can be used with more than one target and each
target can have more than one identity.
Disk 1
iSCSI Target 1
wwui21
wwui2
wwui3
Ident A
Disk 2
wwui4
Disk 3
iSCSI Target 2
wwui22
wwui5
Ident B
wwui6
Disk 4
iSCSI Target 3
wwui23
wwui8
wwui9
Ident C
iSCSI Target 4
wwui24
Disk 5
Disk 6
wwui10
Figure 1-3.
10151b
wwui7
When you assign an identity to a target, you give the identity a position. A position is an
identitys rank in the iSCSI Gateway scan for an iSCSI initiator identity match. When the
iSCSI Gateway scans the list of identities coupled with a target, it starts with the highest
position and stops with the first match. After matching, the initiator is granted the identitys
access rights.
An identity can be connected to more than one target to provide the same pre-defined list
of initiators for each target.
1-5
Example:
In Figure 1-4, the default identities for Target 1 and Target 2 have been modified to not
accessible (NA) for all initiators.
Target 1 is coupled with Identity A with read-write (RW) access to Identity As list of
iSCSI initiators (WWUI1).
Target 2 is coupled with Identity B with read-write (RW) access to Identity Bs list of
iSCSI initiators (WWUI2).
When iSCSI initiator WWUI1 logs in to Target 1, the iSCSI Gateway first scans Identity A
and finds the initiator listed there. The scan stops and the initiator is granted read-write
access to Target 1s underlying disk, Disk 1.
If iSCSI initiator WWUI1 tries to login to Target 2, the iSCSI Gateway first scans Identity
B. It does not find the initiator listed so it continues to scan the next identity, the
default identity. The default identity implicitly lists all iSCSI initiators, including
WWUI1. However, the scan stops and the initiator is denied access to Target 2s
underlying disks (Disk 2 and Disk 3), since the default identity is configured as not
accessible.
iSCSI
initiator
iSCSI
initiator
Tower
box
wwui2
Tower
box
wwui1
Disk 1
Disk 2
RW
RW
Disk 3
RW
IPCloud
SAN
iSCSI Gateway
Identity A
Target 1
Identity B
Target 2
Def Ident
Def Ident
Ident A
wwui1
Ident B
wwui2
RW
RW
Default
all
Default
all
NA
NA
iSCSI Target 1
wwui3
iSCSI Target 2
wwui4
Disk 2
Disk 3
LU0
LU0
LU1
10156b
Disk 1
Figure 1-4.
1-6
Default Identities
Access Rights
When you couple an identity and a target, you assign access rights: read-write (RW), readonly (RO) or not accessible (NA). The access rights are per identity-target pair.
z
An identity can be coupled with multiple targets, each time with different access rights.
A target can have multiple identities, each with different access rights.
Note:
If you add or modify Identities on a target after its disks have been exposed, the access rights
will take effect only at the next login for each iSCSI initiator.
Example:
In Figure 1-5 Identity A is coupled with both Target 1 and Target 2.
The pair Identity A Target 1 is assigned iSCSI initiator read-write access to Target 1
disks.
However, the pair Identity A Target 2, is assigned iSCSI initiator read-only access
to Target 2 disks.
wwui1
Disk 1
wwui2
Ident A
wwui3
rite
d-W
Rea
Re
ad
wwui4
-O
nly
iSCSI Target 1
wwui21
Disk 2
iSCSI Target 2
wwui22
Disk 3
wwui5
Re
ad
-W
rite
wwui7
wwui8
Ident C
wwui9
Rea
d
-Wr
i
te
Disk 4
iSCSI Target 3
wwui23
iSCSI Target 4
wwui24
wwui10
Figure 1-5.
Disk 5
Disk 6
10152b
Ident B
wwui6
1-7
CHAP
CHAP is a protocol that is used to authenticate the peer of a connection and is based upon
the peers sharing a secret (a security key that is similar to a password). The target and the
initiator authenticate each other.
The iSCSI Gateway supports two way CHAP authentication. The target authenticates the
initiator and the initiator can authenticate the target (it is up to the initiator to request target
authentication). A separate secret can be set for each target and for each initiator in the
storage area network (SAN).
Note:
An authentication method is assigned per identity and not per iSCSI initiator.
z
When an iSCSI initiator logs in to a target, its WWUI is checked against the identity initiator
list. After the iSCSI initiator passes the identity stage, if credentials are configured, the iSCSI
initiator must authenticate itself. The credentials list is checked for the iSCSI initiators user
name + password. The list can contain:
z
Note:
There is no strict link between an initiator from the initiator names in the identity and a specific
username + password from the credentials of the identity.
1-8
Example:
In Figure 1-6 there are:
Only four user name + password credentials. Certain initiators have the same user
name + password configured on them.
Ident B
Credentials
wwui3
CHAP
SRP
wwui4
Sarah C6H12O6
Dinos RockOn
wwui6
Dinos RockOn
Albert energy
10155
Initiators
wwui7
wwui8
wwui9
Figure 1-6.
1-9
Example:
In Figure 1-7, a CHAP authentication challenge is sent to the iSCSI Gateway.
The iSCSI Gateway first checks if the user name is set for RADIUS authentication.
If it is not, the user name and password are compared against the pairs configured
in the iSCSI Gateway.
iSCSI
initiator
iSCSI
initiator
Tower box
iqn.1991-05.microsoft:steven.brocade
iqn.com.brocade.steven
Tower box
iqn.1991-05.microsoft:wilbur.brocade
CHAP Authentication
steven
isatwork
IPCloud
SAN
Tower box
RADIUS
Server
Yes
iSCSI Gateway
RADIUS
Authentication?
No
brocade.steven
accounting
steven
ilovecookies
microsoft:steven
Default
all
NA
Figure 1-7.
1-10
10261b
finance
brocade.billing
When one iSCSI Gateway goes off-line, the remaining iSCSI Gateway activates its neighbors
IP addresses. The hosts continue to access disk targets through the same IP address without
sensing that their regular iSCSI Gateway has gone offline or noticing any impact on storage
performance.
Note:
All LUNs in a RAID controller must be simultaneously exposed through all ports connected to
both iSCSI Gateways.
1-11
Example
In Figure 1-8, two iSCSI Gateways are connected to one FC JBOD. From the four physical disks,
two disks have been exposed and are equally accessible to both iSCSI Gateways.
iSCSI Gateways are both fully operational in a cluster. No iSCSI Gateway must sit in stand-by
mode.
Both iSCSI Gateways are also connected to two hosts via the IP SAN. Disk 1 is exposed via iSCSI
Gateway 1 to Host 1, represented by the orange dashed line. Disk 2 is exposed via iSCSI
Gateway 2 to Host 2, represented by the purple dotted line.
Disk 1
IP1,Target 1
iSCSI
initiator
Disk 2
iSCSI
initiator
Tower
Hostbox
1
Tower
Hostbox
2
IP2,Target 2
IPCloud
SAN
IP1-active
IP2-inactive
IP2-active
IP1-inactive
iSCSI Gateway 2
iSCSI Gateway 1
iSCSI Target 1
wwui1
iSCSI Target 2
wwui2
Disk 1
Disk 2
LU0
LU0
FC JBOD
Disk 2
Disk 3
Disk 4
10228b
Disk 1
Figure 1-8.
1-12
Example
In Figure 1-9, iSCSI Gateway 1 has gone off-line. iSCSI Gateway 2 activates iSCSI Gateway 1s IP
address and takes over exposure of Disk 1 to Host 1, represented by the orange dashed line.
Host 1 continues to access Disk 1 through the same IP address as it did before its iSCSI Gateway
went off-line. Host 1 has no way of knowing that its regular iSCSI Gateway is off-line.
Disk 1
IP1,Target 1
iSCSI
initiator
Disk 2
iSCSI
initiator
Tower
Hostbox
1
Tower
Hostbox
2
IP2,Target 2
IPCloud
SAN
IP1-active
IP2-inactive
IP2-active
IP1-active
iSCSI Gateway 1
iSCSI Gateway 2
iSCSI Target 1
wwui1
iSCSI Target 2
wwui2
Disk 1
Disk 2
LU0
LU0
FC JBOD
Disk 2
Disk 3
Disk 4
10229b
Disk 1
Figure 1-9.
1-13
1-14
Chapter 2
iSCSI Gateway Operations
Initial iSCSI Gateway Configuration
After powering up the iSCSI Gateway, the first thing you must do is to configure its
management parameters. This can be done via telnet or via a console or dumb terminal to
open a direct connection with the iSCSI Gateways RS232 console port.
The iSCSI Gateway has a default IP Address of 10.11.12.123. This allows you to set initial
startup parameters via a telnet session.
Management IP Address
The management IP address can be set via:
z
RS-232 port
Telnet session
Telnet/SSH Connection
You will be asked to accept or change the default values for the following:
z
management IP Address
management IP Mask
device name
2-1
Connect the cable to the appropriate port on the management server, and open a
Terminal session. Set the following parameters in the terminal:
Parameter
System Requirement
115200
Data Bits
Parity
none
Stop Bits
Flow Control
none
Emulation
Auto detect
Figure 2-1.
Terminal Properties
2-2
Definition
Type
Values/Remarks
-c
optional
-d
local date
optional
dd/mm/yyyy
0, 1*
*each iSCSI Gateway must have a
different ID
ASCII string
-id
optional
-if
optional1
-im
optional1
IP network mask
255.255.255.0
-ip
optional1
-loc
optional
ASCII string
-n
optional1
ASCII string
-p
-rcom
IP address
optional
read community
optional
y (yes)
n (no)
161
ASCII string (maximum 80
characters)
public
-rld
optional
-t
local time
optional
hh:mm
-telnet
optional
23
-temperature_units
optional
c(elcius), f(ahrenheit)
optional
-wcom
write community
private
Dependencies
optional1: at least one of the switches is mandatory
2-3
Example:
The iSCSI Gateway alias is reset to iSCSI Gateway 1; the IP address for iSCSI Gateway management
functions is changed to 212.199.43.47. The date is set to the 21st of July, 2002 and the time to 1:30
p.m. Anna Levin is named as the contact person and she can be reached at the internal office
extension 4838.
device set n iSCSIGateway1 ip 212.199.43.47 d 21/07/2002 t 13:30 c
AnnaLevin loc ext4838
You can now connect to the iSCSI Gateway 1 Gb Ethernet port and begin managing the iSCSI
Gateway operations and the attached SAN.
Parameter
Value
Name
iSCSIGateway1
Description
ID
-1
Contact
Anna Levin
Location
Ext. 4838
Status
OK
Object ID
Mgmt IP Address
212.199.43.47
161
21/04/02 13:33
Telnet Port
23
Eth
Up
FC
Up
Read Community
Public
Write Community
Private
Example:
The port 1597 is programmed as the Telnet communications port.
device set -telnet 1597
Use the CLI command info to check the iSCSI Gateways designated Telnet port.
Definition
Type
Values/Remarks
-ip
manager IP address
mandatory
IP address
-p
optional
-rcom
read community
optional
-trap
optional
y (send),
n (do not send)
-wcom
write community
optional
2-5
Example:
An SNMP manager is added on IP address 212.199.43.96. It receives traps through port 162. The
manager receives information through the public community and writes information through the
private community.
snmp manager add ip 212.199.43.96 p 162 rcom public wcom private
trap yes
Definition
Type
Values/Remarks
1
-c
optional
-d
local date
optional1
-id
optional
0, 1*
*each iSCSI Gateway must have a
different ID
-if
optional1
-im
optional
ASCII string
dd/mm/yyyy
IP network mask
255.255.255.0
-rcom
read community
optional
-wcom
optional1
write community
Definition
Type
Values/Remarks
-ip
manager IP address
mandatory
IP address
-p
mandatory
The user name can have from one to twenty characters. The user password can have from
six to twelve characters. Both fields are case sensitive and accept all characters, including
spaces.
admin add
Switch
Definition
Type
Values/Remarks
-pw
user password
mandatory
ASCII string
6-11 characters
-un
user name
mandatory
ASCII string
119 characters
Example:
admin add un Joe Cool pw 123456
Definition
Type
Values/Remarks
-un
user name
mandatory
ASCII string
119 characters
Example:
admin remove un Joe Cool
2-7
Table 2-2:
Type
Name
Description
Alias
Phys Address
RS232
cons
RS232
Management Int
cons
000000000000
ETHERNET
eth1
Fast Ethernet
Manage
eth1
000000000000
FibreChannel
Fc1
FC MMF
fc1
000000000000
FibreChannel
Fc2
FC MMF
fc2
000000000000
ETHERNET
eth1
Gigabit Ethernet
Net
eth1
00081a000110
ETHERNET
eth2
Gigabit Ethernet
Net
eth2
00081a000112
WWPN
Connect Mode
Oper Type
Speed
fc1
20:00:00:20:38:1
1:34:78
Private
NlPort
1Gbs
fc2
20:00:00:20:38:
00:10:64
Private
NlPort
1Gbs
2-8
Switch
Definition
Type
Values/Remarks
-if
storage port
mandatory
-cm
connection mode
optional
fab (fabric),
pul (publicloop),
prl (privateloop)
-sp
FC communication speed
optional
0: auto
1: 1 Gb
2: 2 Gb
Example:
fc set if fc2 sp 1 cm prl
iSCSI Gateway1
Description
WWNN
20:00:20:10:58:00:10:46
Function
Gateway
Definition
Type
Values/Remarks
-if
mandatory
-na
new alias
mandatory
2-9
Example:
The storage interface, fc1 is renamed to Storage 1.
interface set if fc1 na Storage1
Definition
Type
Values/Remarks
-ip
mandatory
IP address
-act
activity status
if IP address is active to expose
volumes. use inactive status to
allow failover.
optional
1 (active),
-if
optional
-im
IP network mask
optional
IP network mask
2 (inactive)
relevant only in cluster
255.255.255.0
Example:
IP address 212.199.43.57 is added to interface eth1 for a total of two IP addresses assigned to
interface eth1.
ip config set if eth1 ip 212.199.43.57
2-10
Switch
Definition
Type
Values/Remarks
-ip
mandatory
IP address
Example:
The second IP address, 212.199.43.70, on the network interface eth2 is removed.
ip config removeip 212.199.43.70
Show IP Configuration
After setting the management and network port IP addresses, you can use the CLI command
ip config show to access the IP Configuration Table and view all assigned port IP
addresses.
ip config show
Table 2-3:
If Name
IP Address
Net Mask
Activity
mgmt
212.199.43.46
255.255.255.0
Active
eth1
212.199.43.56
255.255.255.0
Active
eth1
212.199.43.57
255.255.255.0
Inactive
eth2
212.199.75.66
255.255.255.0
Active
eth2
212.199.12.70
255.255.255.0
Inactive
Configuring IP Routing
To enable communications between the iSCSI Gateway and IP networks located outside the
iSCSI Gateway LAN, you must configure IP routing paths for each external network port.
The IP route begins with a specified network port on the iSCSI Gateway and ends at the
external network IP address. Just as each IP address is unique, each IP routing path is
unique. There can be only one IP route to a given external network IP address per iSCSI
Gateway.
Note:
You can configure only one IP route to a given external network on your iSCSI Gateway.
Add an IP Route
You can enable communications to networks outside of your LAN by configuring an IP
routing path. This allows volume access to hosts located on external networks. Use the CLI
command ip route add to add an IP routing path to your iSCSI Gateway. If you are
working in an iSCSI Gateway cluster, you must configure the IP route on both iSCSI
Gateways in the iSCSI Gateway cluster. For more information on iSCSI Gateway clusters, see
Configuring an iSCSI Gateway Cluster.
ip route add
Switch
Definition
Type
Values/Remarks
-dip
destination IP
mandatory
IP address
-gw
mandatory
IP address
2-11
Switch
Definition
Type
Values/Remarks
-if
interface alias
mandatory
-dmask
optional
255.255.255.255
Dependencies
optional1:
Example:
An IP routing path to Network D, IP 10.10.20.0, and (IP mask 255.255.255.0) is mapped from
network port Eth2 through router gateway 30.30.20.20.
ip route add dip 10.10.20.0 dmask 255.255.255.0 gw 30.30.20.20 if
eth2
Definition
Type
Values/Remarks
-gw
mandatory
IP address
-if
interface alias
optional
eth1
Check IP Routes
After creating an IP routing path, you can ping any IP-connected device from the iSCSI
Gateway ETH interface to check that the routing is configured correctly. Use the CLI
command ping to ping an IP address from the iSCSI Gateway. Make sure that the route is
defined on the other side as well.
ping
Switch
Definition
Type
Values/Remarks
-ip
IP address to ping
mandatory
IP address
-if
optional
Example:
Ping ETH1 port on device 172.17.200.69.
ping ip 172.17.200.69 if ETH1
Use the CLI command traceroute to track packet routes. Traceroute is similar to NetBSD
2-12
Traceroute
This command tracks packet routes. Traceroute is similar to NetBSD however, the switches
are different.
traceroute
Switch
Definition
Type
Values/Remarks
-ip
destination IP address
mandatory
IP address
-firstttl
optional
1..255
-icmp
optional
-if
optional
ASCII string
-length
optional1
40
-maxttl
optional
1..30..255
-nofrag
optional
-noroute
optional
-numprobe
optional
-port
optional
0..33434..65535
-probemtu
optional
-showttl
optional
-src
optional
-timeout
optional
5 seconds
2-13
Switch
-gw
Definition
Type
Values/Remarks
optional
IP address
Dependencies
optional1 : cannot be set if using -probemtu
optional2 :
Example:
traceroute host 172.17.200.69
Show IP Routes
After creating an IP routing path to an external network, you can view it and any other
configured IP routing path. Use the CLI command ip route show to view an iSCSI
Gateways routing table.
ip route show
Table 2-4:
Dest IP Address
Dest Mask
Interface
Gateway
10.10.20.20
255.255.255.0
Eth2
30.30.20.20
10.12.40.40
255.255.255.0
Eth3
20.22.11.11
TOS
Remove an IP Route
You can remove unwanted IP routing paths from your iSCSI Gateway. Use the CLI
command ip route remove to remove an IP routing path. If you are working in an iSCSI
Gateway cluster, the IP route must be removed from both iSCSI Gateway databases. For
more information on iSCSI Gateway clusters, see Configuring an iSCSI Gateway Cluster.
ip route remove
Switch
Definition
Type
Values/Remarks
-dip
mandatory
IP address
-dmask
optional
IP network mask
255.555.255.255
-gw
optional
IP address
Example:
The routing path to destination network IP 10.12.40.0 (IP mask 255.255.255.0) is removed from
network port Eth2.
ip route remove dip 10.12.40.0 dmask 255.255.255.0 if eth2
You have now configured all basic iSCSI Gateway parameters. If you are creating an iSCSI
Gateway cluster, continue with Configuring an iSCSI Gateway Cluster.
2-14
Definition
Type
Values/Remarks
-ip
mandatory
IP address
-p
optional
Example:
An iSCSI portal is created using the default TCP port 3260 for the IP address 212.199.43.66.
iscsi portal create ip 212.199.43.66
iSCSI Portals
Protocol
Address Type
Address
Port
ipv 4
212.199.43.56
3260
ipv 4
212.199.43.57
3260
ipv 4
212.199.43.66
5003
ipv 4
212.199.43.67
5003
Protocol 6 is the transport protocol for iSCSI. Address type IPv 4 designates a four byte IP
address.
2-15
Definition
Type
Values/Remarks
-ip
mandatory
IP address
-p
mandatory
Definition
report lun discovery
Type
Values/Remarks
optional
y (yes)
n (no)
See Device Set, for the full list of switch parameters for the CLI command device set.
2-16
Definition
Type
Values/Remarks
-s
mandatory
-info
optional1
ASCII string
-na
optional
Dependencies
optional1 : at least one of the switches is mandatory
Example:
The disk, Stor_1, is renamed to RAID1 and a note is made for the storage manager that disk was
exposed on JAN 12.
storage set s Stor_1 na RAID1 info Exposed_JAN_12
Definition
Type
Values/Remarks
-s
mandatory
Example:
Disk named Stor_1 is removed from the iSCSI Gateway database.
storage remove s Stor_1
2-17
Definition
Type
Values/Remarks
-fn
mandatory
ASCII string
-ip
server IP address
mandatory
IP address
-ft
optional
db : data base
log : log file
Example:
Upload the file v1_9dat as a database file to the tftp server at 212.199.43.70.
ft upload ip 212.199.43.70 fn iSCSIGateway/v1_9/v1_9database ft db
2-18
ft download
Switch
Definition
Type
Values/Remarks
-fn
mandatory
ASCII string
-ip
mandatory
IP address
-ft
optional
Example:
Download the file v1_9database as a database file from the tftp server at 212.199.43.70.
ft download ip 212.199.43.70 fn iSCSIGateway/v1_9/v1_9database ft db
2-19
Note:
When working with RAID controllers, it is imperative that all LUNs in the RAID controller are
simultaneously exposed through all ports connected to both iSCSI Gateways for the iSCSI
Gateways to provide high availability during an iSCSI Gateway failover.
Definition
Type
Values/Remarks
-id
optional
0, 1*
*each iSCSI Gateway must have a
different ID
Example:
There are two iSCSI Gateways in a cluster. In iSCSI Gateway 1 the ID is set to 1.
device set id 1
In iSCSI Gateway 2 the ID is set to 0.
device set id 0
Add Neighbor
Note:
All CLI names and aliases are case sensitive. When you configure a cluster, you must tell each
iSCSI Gateway that it has a neighbor and how to contact its neighbor. Use the CLI command
neighbor add to inform each iSCSI Gateway of its neighbor.
You must inform each iSCSI Gateway of its neighbor in a cluster.
You must tell iSCSI Gateway 1 that its neighbor is iSCSI Gateway 2 and iSCSI Gateway 2 that
its neighbor is iSCSI Gateway 1.
When creating a cluster, first ensure that you have configured all IP addresses in the correct
active/inactive phase as well as portals and IP routes on both iSCSI Gateways.
neighbor add
2-20
Switch
Definition
Type
Values/Remarks
-ip
mandatory
IP address
-nb
mandatory
Example:
iSCSIGateway 1 is informed that it has a neighbor, iSCSIGateway2, and that it can establish
communication with iSCSIGateway2 via IP address 212.199.43.75.
neighbor add nb iSCSIGateway2 ip 212.199.43.75
Note:
All iSCSI Gateway database configurations must be replicated in both iSCSI Gateways when
creating an iSCSI Gateway cluster.
KeepAlive Int(s)
Susp Int(s)
Dead Int(s)
10
Example:
Every 2 seconds iSCSI Gateway 1 sends out a keep alive signal. If, after 6 seconds from the last keep
alive signal, iSCSI Gateway 1 does not receive another keep alive signal from its neighbor, it enters a
suspicious interval. If, after 10 seconds from the last keep alive signal, iSCSI Gateway 1 enters a dead
interval and begins activating the failover process.
2-21
IP Address
iSCSIGateway2
212.199.43.75
161
SNMP # of Retries
Use the CLI command neighbor details to list the details of a neighbor in a cluster.
neighbor details
2-22
Switch
Definition
Type
Values/Remarks
-nb
mandatory
Table 2-7:
Neighbor Details
Neighbor Name
iSCSIGateway2
IP Address
212.199.43.75
Status
Alive
Lock Status
srOpen
iSCSI Gateway Command Reference Manual
Publication Number: 53-1000204-01
A neighbors status can be alive, suspicious or dead. The lock status can be open, master
lock or slave lock. The lock status is not currently configurable and the default status is
open.
Managing a Cluster
If you modify an iSCSI Gateway alias or management IP address, you must implement the
updates in the neighboring iSCSI Gateway. Use the CLI command neighbor set to
update an iSCSI Gateway regarding changes in its neighbor.
neighbor set
Switch
Definition
Type
Values/Remarks
-ip
mandatory
IP address
-nb
mandatory
Use the CLI command neighbor remove to remove a neighbor from a cluster.
neighbor remove
Switch
Definition
Type
Values/Remarks
-nb
mandatory
Use the CLI command cluster set to modify the default keep alive intervals.
cluster set
Switch
Definition
Type
Values/Remarks
-fint
failover interval
time when suspicious interval is
exceeded
optional1
-kai
optional1
-sint
suspicious interval
time from when a signal was
expected but not received
optional
Dependencies
optional1:
2-23
Definition
Type
Values/Remarks
-fn
mandatory
ASCII string
-ip
mandatory
IP address
Example:
Update firmware for version X_Y, patch W, build Z
ft update ip 212.199.43.46 fn brocade/update/v3_2/firmware_X_Y_W_Z.fw
After upgrading the firmware, the iSCSI Gateway must be reset for the new firmware to
begin functioning. Use the CLI command reset to reset the iSCSI Gateway.
reset
Use the CLI command info to view the firmware version to confirm that the firmware has
successfully upgraded.
Safe Mode
The iSCSI Gateway operating status includes the ability to enter into safe mode in the event
of booting problems or in an attempt to clear significant amounts of an iSCSI Gateway
configuration. There are two ways to enter safe mode:
z
2-24
Definition
Type
Values/Remarks
-ip
server IP address
mandatory
IP address
-fd
optional
Example
The suspicious database is exported to the directory Corrupted_DB at IP address 212.199.43.70.
ft export problem ip 212.199.43.70 fd Corrupted_DB
Definition
Type
Values/Remarks
-sm
mandatory
0: normal
1: last good configuration
2: default database
3: default factory system
2-25
2-26
Chapter 3
Storage Exposure & Security
Identifying and Configuring Storage Devices
All disks are named automatically during the auto-discovery process. For FC, this name
includes FC disks World Wide Unique Identifier (WWUI) serial number.
Note:
The iSCSI Gateway supports a maximum of 512 disks.
Use the CLI command storage show to show the available storage devices and their
corresponding aliases needed to configure disks
storage show
Table 3-1:
Storage Devices
Alias
Entity Name
LUN
Oper. Status
Type
In Use
Stor_1
500507606058c900
Enabled
entire
yes
Stor_2
2000002037f88fb8
Enabled
entire
yes
Stor_3
2000002037c32b1f
Enabled
entire
no
Stor_4
2000002037c32450
Enabled
entire
no
Storage is missing denotes that a storage device was previously registered and has since
lost its connection to the iSCSI Gateway.
Invalid denotes a storage device that was connected, removed and reconnected with a
different storage size.
Unknown denotes that a storage device is connected but is issuing parameters not
understandable to the iSCSI Gateway.
Note:
If a tape is attached to the iSCSI Gateway the timeout of the FC drivers should be changed using
the following command :
Device advance set param
StorageDrivers.FC.Tachyon.FCPort.Config.io.TimeoutSec val 300
The iSCSI Gateway automatically generates and assigns storage aliases as each device is
discovered. Use the CLI command storage blink start to identify the actual physical
device for an alias.
Storage Exposure & Security
Publication Number: 53-1000204-01
3-1
Definition
Type
Values/Remarks
-s
mandatory
-t
optional
1..3600 sec
0: forever
Example:
The storage device, Stor_1, is set to blink for two minutes (one hundred and twenty seconds) to allow
it to be identified.
storage blink start s Stor_1 t 120
Use the CLI command storage blink abort to stop the blinking before the end of the
set time.
storage blink abort
Switch
Definition
Type
Values/Remarks
-s
mandatory
Example:
Stop blinking on storage device, Stor_1
storage blink abort s Stor_1
Once a storage device has been identified, use the CLI command storage set to change
the device alias or include helpful information on the device.
storage set
Switch
Definition
Type
Values/Remarks
-s
mandatory
-info
optional
-na
optional1
ASCII string
ASCII string (maximum 10
characters)
Dependencies
optional1 : at least one of the switches is mandatory
Example:
The alias of Stor_1 is changed to Disk2JBOD5 for easier identification and it is noted to save the disk
for the Exchange Log.
storage set s Stor_1 na Disk2JBOD5 info Exchange_Log
The iSCSI Gateway supports write cache enabling for increased performance. Use the CLI
3-2
Definition
Type
Values/Remarks
-d
disk device
mandatory
-alloc
optional
yes,
no
-wce
optional
true,
false
The iSCSI Gateway also recognizes all write-protected storage devices. Use the CLI
command storage details to view a devices details, including if it is write-protected.
storage details
Switch
Definition
Type
Values/Remarks
-s
storage alias
mandatory
Table 3-2:
Storage Details
Alias:
Disk2JBOD5
Entity Name:
2000002037a9551e
0000000000000000
Vendor Name:
SEAGATE
Additional Info:
Transport type:
Fiber Channel
Oper. Status:
Enabled
SCSI Version:
Revision Level:
0002ST336704FC
Product Id:
ST336704FC
Serial Number:
3CD0FHA400002108XYGLXYGL
Number Of Blocks:
71687369
Block Size:
512
true
Write Protected
false
3-3
Alias:
Disk2JBOD5
Storage
sim
Definition
Type
Values/Remarks
-s
mandatory
-ta
mandatory
-new
mandatory
-tn
mandatory
-device
optional
-lun
lun
optional1
Dependencies
3-4
mandatory 1 :
optional1:
optional2:
Example:
Expose Stor_1 on new target Tar_1 with alias Tar_1, LUN 1 and WWUI
www.company.com/SAN/MusicBox
storage expose s Stor_1 new Tar_1 ta Tar_1 lu 1 tn
www.company.com/SAN/MusicBox
The command storage unexpose unexposes a disk.
storage unexpose
Switch
Definition
Type
Values/Remarks
-s
mandatory
Example:
Unexpose stor_1 from target Tar_1
storage unexpose sx Stor_1
Note:
The command storage unexpose does not delete the target. To remove the target, use the
command: iscsi target remove
Example 1:
The target finance already exists. The WWUI of finance has already been assigned to the target. The
disk Vol1 is assigned LU0 and attached to the target finance. The exposing device is iSCSIGateway1.
storage expose device Vol1 ta finance lun 0
Example 2:
The target musicbox is created. The WWUI of musicbox is brocade.musicbox. The disk Concat1 is
automatically assigned LU0 and attached to the target musicbox on iSCSIGateway1.
storage expose -new device Concat1 ta musicbox -tn brocade.musicbox
device iSCSIGateway1
Viewing LUNs
You can view all created LUNs using the CLI command lu show.
lu show
Table 3-3:
LUN
Tgt Alias
Storage
Oper Status
pilote
xxx
Active
3-5
LUN
Tgt Alias
Storage
Oper Status
spirou
yyy
Active
pilote
Mir1
Active
lucky
zzz
Active
Definition
Type
Values/Remarks
-ta
mandatory
Example:
iscsi target remove ta musicbox
iSCSI Targets
Target Alias
Target Name
# of LUs
Exposed On:
finance
brocade.billing
Not exposed
musicbox
musicbox.brocade
iSCSIGateway1
3-6
Switch
Definition
Type
Values/Remarks
-ta
mandatory
Table 3-5:
Target Alias:
nms153
Target Name:
eui.00081affff012345
brocade
iSCSI Gateway Command Reference Manual
Publication Number: 53-1000204-01
Target Alias:
nms153
Status:
OK
Number of Ports:
Port Name:
eui.00081affff012345,t,0
Number of LUs:
# Login Failures:
10/12/04 15:30
Authentication Error
Plony
1.2.3.4
Definition
Type
Values/Remarks
-id
identity alias
mandatory
-ta
mandatory
-acc
optional
optional
-pos
rw, ro, na
Dependencies
optional 1: one of the optional switches is mandatory when changing
3-7
Example
The default access rights for the target finance are changed to not accessible meaning a non-specific
host is not allowed access to the target finance.
acl set ta finance id def_all acc na
Create Identity
Note:
If you are working with an iSNS server, all hosts are able to see the target but only those hosts
with access rights are able to connect to the target.
If you want to limit host, meaning iSCSI initiator, access to targets, you must create an
identity that is more discriminate than the default identity. Use the CLI command acl
identity create to name and describe an identity.
When creating identities, keep in mind that:
z
Definition
Type
Values/Remarks
-alias
identity alias
mandatory
-info
identity information
optional
ASCII string
Example
An identity, accounting, is created for those accountants allowed read-write access to the
accounting records.
acl identity create alias accounting info accountants allowed readwrite access to accounting records
3-8
Target
Position
Identity
Access
finance
DEF_ALL
read-write
Target
Position
Identity
Access
musicbox
DEF_ALL
not accessible
musicbox
musicdept
read-write
Definition
Type
Values/Remarks
-id
identity alias
mandatory
-name
WWUI of initiator
mandatory
Example
The host, steven, is added to the identity accounting according to his iSCSI initiator wwui, iqn.199105.microsoft:steven.brocade.
acl identity add name id accounting name iqn. 1991-05.microsoft:
steven.brocade
If a host has more than one iSCSI initiator installed, both initiators can be included in the identity.
acl identity add name id accounting name iqn.com.brocade.steven
3-9
Add CHAP
If you are working with a Microsoft initiator and configuring target authentication, note that
the iSCSI Gateway exchanges the final character in the password with a zero. Therefore, do
not configure initiator passwords with a zero as the final character. CHAP passwords must
be between twelve to sixteen characters in length.
acl identity add chap
Switch
Definition
Type
Values/Remarks
-id
identity alias
mandatory
-radius
RADIUS server
optional 1
flag
-un
host name
optional
-pw
host password
optional1
ASCII string
ASCII string [6-20 characters]
Dependencies
optional1:
when using -radius:
when not using -radius: -id, -un, -pw are mandatory, -radius is not an option
Example
The user name, steven, with user password, isatwork, is assigned CHAP credential verification in the
identity accounting.
acl identity add chap id accounting us steven pw isatwork
If a host has more than one iSCSI initiator installed, both initiators can be included in the identity
and given authentication methods. The user name and password do not need to be the same for
different initiators on the same host.
acl identity add chap id accounting us steven pw ilovecookies
Identity Details
After assigning iSCSI initiators and assigning credentials to an identity, use the CLI command
acl identity details to view the list of iSCSI initiators.
acl identity details
Switch
Definition
Type
Values/Remarks
-id
identity alias
mandatory
3-10
Identity Details
Accounts allowed read-write access to
accounting records
iSCSI Gateway Command Reference Manual
Publication Number: 53-1000204-01
Description:
Initiators:
iqn.1991-05.microsoft:steven.
brocade
iqn.com.brocade.steven
Credentials:
CHAP
Definition
Type
Values/Remarks
-ip
mandatory
IP address
up to 2 RADIUS servers
-k
mandatory
-p
optional
Example:
The iSCSI Gateway is configured to relay CHAP challenges to the identity, accounting, from the user,
steven, to the RADIUS server. The iSCSI Gateway is configured to communicate with the RADIUS
server through port 1812 to IP address 212.199.43.2. The iSCSI Gateway RADIUS key is
DataTurnsMeOn.
The user password is not configured on the iSCSI Gateway. The RADIUS server authenticates the
user password and sends the results back to the iSCSI Gateway.
acl identity add chap id accounting user steven radius
ip radius add ip 212.199.43.2 p 1812 k DataTurnsMeOn
3-11
ip radius show
Table 3-8: Configured RADIUS IP Addresses
Address
Port
212.199.43.2
1812
212.199.56.134
1812
Definition
Type
Values/Remarks
-ip
mandatory
IP address
-p
optional
3-12
Switch
Definition
Type
Values/Remarks
-id
identity alias
mandatory
-ta
mandatory
-acc
optional
rw, ro, na
-pos
optional
integer 1-2147482646
* the next free position
Example
The identity, accounting, is connected to the target finance. Accounting is the second identity
scanned for an initiator match. Any initiator in the accounting identity is given read-only access.
Later, an administrator identity can be created with read-write access and placed in position 0.
acl add ta finance id accounting acc rw pos 1
iSNS you must add the iSNS server to the iSCSI Gateway iSNS client
Definition
Type
Values/Remarks
-ip
mandatory
IP address
up to 2 isns servers
Example:
Add iSNS server 212.199.43.1 to iSCSI Gateway iSNS client.
ip isns add ip 212.199.43.1
3-13
ip isns show
Definition
Type
Values/Remarks
-ip
mandatory
IP address
Example:
Remove iSNS server 212.199.43.1 from the iSCSI Gateway iSNS client.
ip isns remove ip 212.199.43.1
3-14
Chapter 4
Monitoring & Statistics
The iSCSI Gateway enables RFC standards compliant health, interface and session
monitoring of all iSCSI Gateway interfaces.
For specific details on a monitoring parameter, consult the RFC standard 2863.
Health Monitoring
You can monitor the health of the iSCSI Gateway hardware for fan malfunctions that could
lead to overheating as well as power supply malfunctions both of which can nullify high
availability and lead to iSCSI Gateway failover.
System Hardware
PS Status:
1 working
Fan Status:
2 working
59
OK
33
OK
You can change the default temperature scale to Fahrenheit using the CLI command
device set temperature_units f.
Interface Statistics
You can monitor interface traffic and errors for each iSCSI Gateway interface to aid in system
diagnostics. The interface monitoring has two components: the interface configuration and
the counters.
4-1
Alias
In Octets
Out Octets
In Errors
cons
mgmt
42040
129772
fc3
647295438498
390488847341
fc4
eth1
535709973551
857473339209
eth2
eth3
4-2
Switch
Definition
Type
Values/Remarks
-if
interface alias
mandatory
Table 4-3:
Alias:
eth1
Discontinuity:
In/Out Octets:
535709973551
857473339209
In/Out Discards:
0/0
In/Out Errors:
0/0
96251/0
403010/0
TCP/IP Statistics
ip statistics ip show
This command shows all IP counters.
ip statistics ip show
Table 4-4:
IP Statistics
In Receives:
161853270
In Header Errors:
683
In Address Errors:
65177
In Unknown Protos:
In Discards:
In Delivers:
161200809
Out Requests:
162958810
Out Discards:
Out No Routes:
3596
Reasm. Failures:
Fragments OK:
Failed to Fragment:
Routing Discards:
ICMP Statistics
13/4
Errors In / Out:
0/0
0/0
4-3
13/4
0/0
0/0
0/0
Redirect In / Out:
0/0
Echos In / Out:
4/0
0/4
0/0
0/0
0/0
0/0
Local Port
Remote
Address
Remote Port
State
0.0.0.0
23
0.0.0.0
listen
0.0.0.0
427
0.0.0.0
listen
10.0.0.110
23
10.0.0.26
4943
established
11.11.11.110
3260
0.0.0.0
listen
11.11.11.110
3260
11.11.11.26
2176
established
22.22.22.110
3260
0.0.0.0
listen
4-4
TCP Statistics
#Current Connections:
Active Open:
#Current Connections:
Passive Open:
Attempt Failures:
Reset Establishments:
Segments Received:
16078975
Segments Sent:
162950234
Segments Retransmitted:
3794
Errors Received:
50
Reset Sent:
Local Port
0.0.0.0
427
0.0.0.0
17185
0.0.0.0
56789
0.0.0.0
65532
10.0.0.110
161
127.0.0.1
65538
408815
Errors Datagrams
18681
Datagrams Sent
78999
4-5
Initiator
ISID
Target
TSIH
1.1.1
iqn.199*~
400001370000
nms151
b701
1.2.1
iqn.199*~
400001370000
nms151
7701
1.3.1
iqn.199*~
400001370000
nms154
3b01
1.4.1
iqn.199*~
400001370000
nms155
5701
Definition
Type
Values/Remarks
-id
iSCSI session ID
mandatory
ID
-adv
optional
4-6
Initiator Alias:
nms153
Initiator Name:
iqn.1991-05.com.microsoft:QA-2.qa.test.com
ISID:
400001370000
Target Alias:
nms154dr
Target Name:
nms154dr
TSIH:
b701
Type:
Normal
iSCSI Gateway Command Reference Manual
Publication Number: 53-1000204-01
Initiator Alias:
nms153
Authentication
DEF_ALL
Connection ID:
State:
Full (2)
Local Address:
11.11.11.110
Local Port:
3260
Remote Address:
11.11.11.26
Remote Portal:
2178
False
Immediate Data
True
65536
262114
Number of Connections
Sequence In Order
True
PDU In Order
True
Definition
Type
Values/Remarks
-ta
mandatory
-type
initiator type
mandatory
Example:
List the statistics of all iSCSI sessions for the target finance to initiator iqn.199105.microsoft:steven.brocade type crp.
iscsi session statistics ta finance -initiator iqn.199105.microsoft:steven.brocade type crp
4-7
Initiator
ISID
TSIH
nms153
400001370000 b701
Cmd PDUs
Rsp PDUs
36941394
36938928
Initiator
ISID
TSID
Tx Octets
Rx Octets
nms153
4000013700
00
b701
2513649168
227187
Initiator
ISID
TSIH
Digests Err
Timeout Err
nms153
4000013700
00
b701
Cid
1.1.1
State
Local Address
Port
Remote Address
Port
11.11.11.110
3260
11.11.11.26
2178
1.2.1
11.11.11.110
3260
11.11.11.26
2176
1.3.1
11.11.11.110
3260
11.11.11.26
2177
4-8
Definition
Type
Values/Remarks
-id
iSCSI connection ID
mandatory
-adv
advanced parameters
optional
State:
Full
Local Address:
11.11.11.110
Local Port:
3260
Remote Address:
11.11.11.26
Remote Port:
2178
65536
65536
Header Integrity
Data Integrity
Port
Trans
In Commands
Read MB
Written MB
nms154dr
42929
iSCSI
230845
244372
mns155dr
42929
iSCSI
3863197
2498873
4-9
The CLI has a twenty-character display limit for initiator WWUIs. Use iSCSI Gateway
Manager to view a WWUI longer than twenty characters.
Initiator Alias
Initiator Name
nms154dr
iqn.1991-05.com.micr
iqn.1991-05.com.micr
nms155dr
iqn.1991-05.com.micr
iqn.1991-05.com.micr
Definition
Type
Values/Remarks
-ta
target alias
mandatory
4-10
Name
Alias
ISID
iqn.1991*~
iqn.1991*~
40001370000
Initiator
Attached Times
Out Commands
Written MB
Read MB
ta1
iqn.199*~
4848612
7382819
ta2
iqn.199*~
3914422
8773472
ta3
iqn.199*~
146699
399844
Target
Commands
Read (MB)
Written (MB)
In Resets
OutTask
SetFull
ta1
36938947
2308445
77
ta1
32638777
407972
ta2
199543
203571
22314
222
ta2
3209004
1661175
415591
4-11
4-12
Chapter 5
Command Line Interface Reference
The CLI is available via:
z
The CLI is used to implement all iSCSI Gateway management functions, including switching
and security.
Note:
All CLI commands must be entered in lower case. Inputted data is case sensitive and can include
upper and lowercase letters.
The CLI command prompt is >.
All CLI commands in this chapter are listed first with the basic command followed by a table
of command switches; their explanations and status (mandatory or optional). Default
values are listed as bold and underlined.
The CLI supports the use of the following hot keys for the listed functions:
Table 5-1:
Hot Keys
Command
Description
esc
tab
5-1
-Aacl add
Use the command acl add to link an identity to a target.
acl add
Switch
Definition
Type
Values/Remarks
-id
identity alias
mandatory
-ta
mandatory
-acc
optional
rw, ro, na
-pos
optional
integer 1-2147482646
* the next free position
acl details
This command shows the access control for a target.
acl details
Switch
Definition
Type
Values/Remarks
-ta
mandatory
acl remove
This command removes an identity from the access control list of a specific target.
acl rem
5-2
Switch
Definition
Type
Values/Remarks
-id
identity alias
mandatory
-ta
mandatory
acl set
Use the command acl set to modify a targets access rights and identity position.
acl set
Switch
Definition
Type
Values/Remarks
-id
identity alias
mandatory
-ta
mandatory
-acc
optional
-pos
optional 1
rw, ro, na
Dependencies
optional 1: one of the optional switches is mandatory when changing
acl show
This command shows all target access per identity for the iSCSI Gateway.
acl show
Definition
Type
Values/Remarks
-id
identity alias
mandatory
-radius
RADIUS server
optional
optional
optional
-un
-pw
host name
host password
flag
ASCII string
ASCII string [6-20 characters]
Dependencies
optional1:
when using -radius:
when not using -radius: -id, -un, -pw are mandatory, -radius is not an option
5-3
Definition
Type
Values/Remarks
-id
identity alias
mandatory
-name
WWUI of initiator
mandatory
Definition
Type
Values/Remarks
-id
identity alias
mandatory
-pw
host password
mandatory
-un
host name
mandatory
Definition
Type
Values/Remarks
-alias
identity alias
mandatory
-info
identity information
optional
ASCII string
Definition
Type
Values/Remarks
-id
identity alias
mandatory
Definition
Type
Values/Remarks
-id
identity alias
mandatory
Definition
Type
Values/Remarks
-id
identity alias
mandatory
-un
host name
optional
Dependencies
optional1: mandatory if not using RADIUS
Definition
Type
Values/Remarks
-id
identity alias
mandatory
-name
host name
mandatory
Definition
Type
Values/Remarks
-id
identity alias
mandatory
-un
host name
mandatory
5-5
Definition
Type
Values/Remarks
-id
identity alias
mandatory
-info
identity information
optional
ASCII string
-na
optional
-radius
optional
flag
admin add
This command adds a user name to the list of valid user login names for the iSCSI Gateway.
A user name can be from 1 to 19 characters long, including spaces. A password can be from
6 to 11 characters long, including spaces.
admin add
Switch
Definition
Type
Values/Remarks
-pw
user password
mandatory
ASCII string
6-11 characters
-un
user name
mandatory
ASCII string
119 characters
admin password
This interactive command enables a user to change their login password for their user name
on the iSCSI Gateway. You can only change the password of the current active user.
admin password
admin remove
This command deletes a user name from the list of valid user login names for the iSCSI
Gateway. Any user name, except the logged in user name, can be deleted.
5-6
admin remove
Switch
Definition
Type
Values/Remarks
-un
user name
mandatory
ASCII string
119 characters
admin show
This command shows all valid user login names for the iSCSI Gateway.
admin show
cluster set
This command allows you to modify a clusters parameters.
cluster set
Switch
Definition
Type
Values/Remarks
-fint
failover interval
time when suspicious interval is
exceeded
optional
-kai
optional
-sint
suspicious interval
time from when a signal was
expected but not received
optional1
5-7
Dependencies
optional1:
cluster show
This command shows the keep alive parameters of a cluster.
cluster show
-Ddebug
This command is used for advanced troubleshooting operations and requires a password
from Technical Support.
Note:
Do not use this command unless instructed to do so by technical support.
debug
Definition
Type
Values/Remarks
-param
mandatory
ASCII string
-val
mandatory
ASCII string
5-8
Switch
Definition
Type
Values/Remarks
-param
mandatory
ASCII string
device set
Use the CLI command device set to add or change management parameters. This
command will not appear in the CLI menu until the iSCSI Gateway is initialized.
device set
Switch
Definition
Type
Values/Remarks
-c
optional
-d
local date
optional
dd/mm/yyyy
0, 1*
*each iSCSI Gateway must have a
different ID
eth1: (default for iSCSI Gateways)
-id
optional
-if
optional
-im
optional1
ASCII string
IP network mask
255.255.255.0
-ip
optional1
-loc
optional
ASCII string
-n
optional1
ASCII string
-p
optional
read community
optional
y (yes)
n (no)
hh:mm
-rcom
IP address
-rld
optional
-t
local time
optional
-telnet
optional1
-temperature_units
optional
c(elcius), f(ahrenheit)
optional
-wcom
write community
23
private
Dependencies
optional1: at least one of the switches is mandatory
5-9
-Eexit
This command closes the Telnet/SSH session. It is not available when connected via RS-232
connection.
exit
fc node show
This command shows the iSCSI Gateway World Wide Node Name (WWNN).
Note:
This command is available only when an FC interface is present.
fc node show
fc set
This command allows you to set the speed of the FC communication.
Note:
This command is available only when an FC interface is present.
fc set
Switch
Definition
Type
Values/Remarks
-if
storage port
mandatory
-cm
connection mode
optional
fab (fabric),
pul (publicloop),
prl (privateloop)
-sp
FC communication speed
optional
0: auto
1: 1 Gb
2: 2 Gb
5-10
ft download
This command downloads a iSCSI Gateway database configuration file from the local TFTP
server.
ft download
Switch
Definition
Type
Values/Remarks
-fn
mandatory
ASCII string
-ip
mandatory
IP address
-ft
optional
ft export problem
This command exports three files: configuration file, last good database and the corrupted
database file for examination.
You can only export after the iSCSI Gateway reboots in safe mode.
ft export problem
Switch
Definition
Type
Values/Remarks
-ip
server IP address
mandatory
IP address
-fd
optional
ft show
This command displays the configuration for file transfer.
ft show
ft update
This command uploads firmware to the iSCSI Gateway.
ft update
Switch
Definition
Type
Values/Remarks
-fn
mandatory
ASCII string
-ip
mandatory
IP address
5-11
ft upload
This command uploads a iSCSI Gateway database file from the iSCSI Gateway to the local
TFTP server.
ft upload
Switch
Definition
Type
Values/Remarks
-fn
mandatory
ASCII string
-ip
server IP address
mandatory
IP address
-ft
optional
db : data base
log : log file
-Iinfo
This command displays the current iSCSI Gateway configuration, including whom to contact
in the event of technical difficulties.
info
interface details
This command lists the interface details of a specified interface.
interface details
Switch
Definition
Type
Values/Remarks
-if
mandatory
interface set
This command renames the specified interface alias.
interface set
5-12
Switch
Definition
Type
Values/Remarks
-if
mandatory
-na
new alias
mandatory
interface show
This command shows the iSCSI Gateway interfaces (ports) and their parameters.
interface show
Definition
Type
Values/Remarks
-if
interface alias
mandatory
ip config remove
This command removes an IP address from an interface.
ip config remove
Switch
Definition
Type
Values/Remarks
-ip
mandatory
IP address
ip config set
This command configures a new IP address or edits an existing one.
ip config set
Switch
Definition
Type
Values/Remarks
-ip
mandatory
IP address
-act
activity status
if IP address is active to expose
volumes. use inactive status to
allow failover.
optional
1 (active),
optional
-if
2 (inactive)
relevant only in cluster
eth1, eth2 (for new configuration)
5-13
Switch
Definition
Type
Values/Remarks
-im
IP network mask
optional
IP network mask
255.255.255.0
ip config show
This command displays the iSCSI Gateway IP configurations.
ip config show
ip isns add
This command adds an iSNS servers IP address to the iSCSI Gateway iSNS client.
ip isns add
Switch
Definition
Type
Values/Remarks
-ip
mandatory
IP address
up to 2 isns servers
ip isns remove
This command removes an iSNS servers IP address from the iSCSI Gateway iSNS client.
ip isns remove
Switch
Definition
Type
Values/Remarks
-ip
mandatory
IP address
ip isns show
This command shows all iSNS servers configured on the iSCSI Gateway.
ip isns show
ip radius add
This command adds a RADIUS server IP address to the iSCSI Gateway RADIUS client.
ip radius add
Switch
Definition
Type
Values/Remarks
-ip
mandatory
IP address
up to 2 RADIUS servers
-k
5-14
mandatory
Switch
Definition
Type
Values/Remarks
-p
optional
ip radius remove
This command removes a RADIUS server IP address from the iSCSI Gateway RADIUS client.
ip radius remove
Switch
Definition
Type
Values/Remarks
-ip
mandatory
IP address
-p
optional
ip radius set
This command allows changes to a RADIUS server configuration on the iSCSI Gateway
RADIUS client.
ip radius set
Switch
Definition
Type
-ip
mandatory
-k
-p
Values/Remarks
optional
optional
IP address
ASCII string
minimum 16 characters
integer in range 0..65535
1812
Dependencies
optional1: at least one of the switches is mandatory
ip radius show
This command shows all IP addresses for RADIUS servers configured on the iSCSI Gateway
RADIUS client.
ip route add
This command adds an IP route to a network port.
ip route add
Switch
Definition
Type
Values/Remarks
-dip
destination IP
mandatory
IP address
5-15
Switch
Definition
Type
Values/Remarks
-gw
mandatory
IP address
-if
interface alias
mandatory
-dmask
optional
255.255.255.255
Dependencies
optional1:
ip route default
This command sets a default IP route to a network port.
ip route default
Switch
Definition
Type
Values/Remarks
-gw
mandatory
IP address
-if
interface alias
optional
eth1
ip route remove
This command removes an IP route from a network port.
ip route remove
Switch
Definition
Type
Values/Remarks
-dip
mandatory
IP address
-dmask
optional
IP network mask
255.555.255.255
-gw
optional
IP address
ip route show
This command shows all IP routes on a iSCSI Gateway.
ip route show
5-16
ip statistics ip show
This command shows all IP counters.
ip statistics ip show
Definition
Type
Values/Remarks
-ip
mandatory
IP address
-p
optional
Definition
Type
Values/Remarks
-ip
mandatory
IP address
-p
mandatory
Definition
Type
Values/Remarks
-ta
target alias
mandatory
5-17
Definition
Type
Values/Remarks
-id
iSCSI connection ID
mandatory
-adv
advanced parameters
optional
Definition
Type
Values/Remarks
-id
iSCSI session ID
mandatory
ID
-adv
optional
5-18
Definition
Type
Values/Remarks
-ta
mandatory
-type
initiator type
mandatory
Definition
Type
Values/Remarks
-ta
mandatory
tn
mandatory
device
optional
ASCII string
relevant only in cluster
Definition
Type
Values/Remarks
-ta
mandatory
5-19
Definition
Type
Values/Remarks
-ta
mandatory
Definition
Type
Values/Remarks
-ta
mandatory
device
optional
ASCII string
-na
optional
-chappw
optional
ASCII string
-chapun
optional
ASCII string
Dependencies
optional1: mandatory with CHAP username
optional2: mandatory with CHAP password
-Llu details
This command shows the details of an LU in the database.
lu details
5-20
Switch
Definition
Type
Values/Remarks
-ta
target alias of LU
mandatory
Switch
Definition
Type
Values/Remarks
-lun
optional
lu remove
This command removes the LU from its target. The LU must be inactive before being
removed. This command is the opposite of storage expose.
lu remove
Switch
Definition
Type
Values/Remarks
-ta
target alias of LU
mandatory
-lun
optional
lu show
This command shows all LUNs defined in the database.
lu show
lu statistics show
This command shows all statistics for configured LUs on the iSCSI Gateway.
lu statistics show
-Nneighbor add
This command adds a neighbor to a cluster.
neighbor add
Switch
Definition
Type
Values/Remarks
-ip
mandatory
IP address
-nb
mandatory
neighbor set
This command resets a neighbor IP address in a cluster.
5-21
neighbor set
Switch
Definition
Type
Values/Remarks
-ip
mandatory
IP address
-nb
mandatory
neighbor show
This command lists the neighbor(s) in a cluster.
neighbor show
neighbor details
This command lists the details of a neighbor in a cluster.
neighbor details
Switch
Definition
Type
Values/Remarks
-nb
mandatory
neighbor remove
This command removes a iSCSI Gateway from a cluster.
neighbor remove
Switch
Definition
Type
Values/Remarks
-nb
mandatory
-Pping
This command pings any IP-connected device from the iSCSI Gateway port.
ping
5-22
Switch
Definition
Type
Values/Remarks
-ip
IP address to ping
mandatory
IP address
-if
optional
Definition
Type
Values/Remarks
-ip
manager IP address
mandatory
IP address
-p
optional
-rcom
read community
optional
-trap
optional
y (send),
n (do not send)
-wcom
write community
optional
Definition
Type
Values/Remarks
-ip
manager IP address
mandatory
IP address
-p
mandatory
5-23
Definition
Type
Values/Remarks
-ip
manager IP address
mandatory
IP address
-p
mandatory
-np
optional1
-rcom
read community
optional1
-trap
optional1
y (send),
n (do not send)
-wcom
write community
optional1
Dependencies
optional1: at least one of the switches is mandatory
storage alias
This command allows you to view all storage aliases in full. The command storage show
has a ten-character display limit so storage aliases may be ambiguous in the storage show
table.
storage alias
5-24
Switch
Definition
Type
Values/Remarks
-s
mandatory
Definition
Type
Values/Remarks
-s
mandatory
-t
optional
1..3600 sec
0: forever
storage details
This command shows all storage devices attached to the iSCSI Gateway.
storage details
Switch
Definition
Type
Values/Remarks
-s
storage alias
mandatory
storage discovery
This command resets the Fiber Channel loop and reregisters all attached storage devices. In
most cases, the iSCSI Gateway automatically discovers new storage. Use this command after
adding or removing storage devices from the iSCSI Gateway topography if it is not
automatically discovered. Because this command resets the FC loop, it may cause a failure
of any I/O operations being executed when the command is invoked.
storage discovery
Definition
Type
Values/Remarks
-d
disk device
mandatory
-alloc
optional
yes,
no
-wce
optional
true,
false
5-25
storage expose
This command exposes storage on a new or existing target.
storage expose
Switch
Definition
Type
Values/Remarks
-s
mandatory
-ta
mandatory
-new
mandatory
-tn
mandatory 1
-device
optional 2
-lun
lun
optional
integer
Dependencies
mandatory 1 :
optional1:
optional2:
storage remove
This command removes a storage device from the database only if the storage device state is
defined as StorageIsMissing.
storage remove
Switch
Definition
Type
Values/Remarks
-s
mandatory
storage set
This command allows you to edit storage device parameters.
5-26
storage set
Switch
Definition
Type
Values/Remarks
-s
mandatory
-info
optional
ASCII string
-na
optional
Dependencies
optional1 : at least one of the switches is mandatory
storage show
This command shows all storage devices connected to the iSCSI Gateway.
storage show
storage unexpose
This command unexposes a disk.
storage unexpose
Switch
Definition
Type
Values/Remarks
-s
mandatory
system boot
This command forces the iSCSI Gateway to boot in Safe Mode.
system boot
Switch
Definition
Type
Values/Remarks
-sm
mandatory
0: normal
1: last good configuration
2: default database
3: default factory system
5-27
system reset
This command performs a remote soft reset of the iSCSI Gateway. All configuration
databases will be maintained on the iSCSI Gateway, including user names and passwords;
network port aliases; configured volumes and iSCSI targets.
system reset
system reset_default_factory
This command resets the iSCSI Gateway to factory default settings. It is available only when
connected via RS-232.
system reset_default_factory
traceroute
This command tracks packet routes. Traceroute is similar to NetBSD however, the switches
are different.
traceroute
5-28
Switch
Definition
Type
Values/Remarks
-ip
destination IP address
mandatory
IP address
-firstttl
optional
1..255
-icmp
optional
-if
optional
ASCII string
-length
optional1
40
-maxttl
optional
1..30..255
Switch
Definition
Type
Values/Remarks
-nofrag
optional
-noroute
optional
-numprobe
optional
-port
optional
0..33434..65535
-probemtu
optional
-showttl
optional
-src
optional
-timeout
optional
5 seconds
-gw
optional2
IP address
Dependencies
optional1 : cannot be set if using -probemtu
optional2 :
5-29
5-30
Index
A
ACL
add ..................................................3-12, 5-2
details...................................................... 5-2
identity add CHAP ........................ 3-10, 5-3
identity add name ...........................3-9, 5-4
identity add SRP ..................................... 5-4
identity delete ........................................ 5-4
identity remove CHAP........................... 5-5
identity remove name............................ 5-5
identity remove SRP............................... 5-5
identity set .............................................. 5-6
remove.................................................... 5-2
set ..................................................... 3-7, 5-3
show......................................... 3-8, 5-3, 5-6
Add
ACL ..................................................3-12, 5-2
ACL identity CHAP ........................ 3-10, 5-3
ACL identity SRP..................................... 5-4
IP route......................... 2-11, 2-12, 5-15, 5-16
neighbor ...................................... 2-20, 5-21
RADIUS ..................................................5-14
SNMP manager..................................... 5-23
Add name
ACL identity .....................................3-9, 5-4
Admin
password..........................................2-7, 5-6
remove............................................. 2-7, 5-7
show........................................................ 5-7
Advance
device set ................................................ 5-8
device show............................................ 5-8
Alias
disk ........................................................ 5-24
iSCSI target.............................................5-19
storage .................................................. 5-24
Authentication
target ........................................................1-8
B
Blink
Index
Publication Number: 53-1000204-01
C
Celsius ................................................... 2-2, 4-1
Change
password .................................................2-7
user profile ..............................................2-7
CHAP
add ACL identity ............................3-10, 5-3
remove identity.......................................5-5
Check
IP route ......................................... 2-12, 5-22
CLI................................................................. 5-1
Cluster .................................................1-11, 2-19
failover disable......................................2-22
failover enable .............................. 2-22, 5-7
set....................................................2-23, 5-7
show ...............................................2-21, 5-8
Configure
FC storage port........................................2-7
IP routing ................................................2-11
iSCSI....................................................... 2-15
iSCSI Gateway cluster........................... 2-19
iSCSI Gateway cluster. 2-11, 2-14, 2-15, 2-16
Create
iSCSI portal....................................2-15, 5-17
iSCSI target ............................................ 5-19
D
Database
corrupted ......................................2-25, 5-11
download ...................................... 2-19, 5-11
export ............................................2-25, 5-11
upload .......................................... 2-18, 5-12
Dead interval ............................................. 2-21
Debug ..........................................................5-8
Delete
ACL identity.............................................5-4
iSNS........................................................ 3-14
I-1
RADIUS ..................................................3-12
Details
ACL .......................................................... 5-2
disk ................................................. 3-3, 5-25
interface .................................................5-12
interface statistics ...........................4-2, 5-13
iSCSI session .................................. 4-6, 5-18
iSCSI session connection.............. 4-9, 5-18
iSCSI target.................... 3-6, 4-11, 5-19, 5-21
LU ..........................................................5-20
neighbor ......................................2-22, 5-22
storage ........................................... 3-3, 5-25
Device
advance set ............................................. 5-8
advance show......................................... 5-8
set ........................................... 2-3, 2-20, 5-9
set telnet ................................................. 2-5
Disable
cluster failover ...................................... 2-22
Discover
storage .................................................. 5-25
Discover LU................................................2-16
Disk
alias........................................................ 5-24
details............................................. 3-3, 5-25
remove......................................... 2-17, 5-26
set ................................................... 3-3, 5-25
show...................................................... 5-26
Download
software ........................................ 2-19, 5-11
E
Enable
cluster failover ............................... 2-22, 5-7
Exit.............................................................. 5-10
Export
corrupted database...................... 2-25, 5-11
problem ........................................ 2-25, 5-11
Expose
new storage ...................................3-5, 5-26
storage ........................................... 3-5, 5-27
F
Fabric ........................................................... 2-8
Fahrenheit ............................................ 2-2, 4-1
Failover
cluster.................................................... 2-22
disable................................................... 2-22
enable ............................................ 2-22, 5-7
Faulty interval ............................................. 1-14
FC
I-2
H
Hardware temperature ........................ 2-2, 4-1
Hot keys ....................................................... 5-1
I
Identify
storage device................................3-2, 5-25
Identity
ACL add CHAP...............................3-10, 5-3
ACL add name ................................ 3-9, 5-4
ACL remove name ..................................5-5
add SRP....................................................5-4
delete ACL...............................................5-4
remove CHAP .........................................5-5
remove SRP .............................................5-5
set.............................................................5-6
Info ...............................................................2-4
iSCSI Gateway ....................................... 5-12
Interface
details .................................................... 5-12
set....................................................2-9, 5-12
show ............................................... 2-7, 5-13
show FC ................................................. 5-10
Interface statistics ........................................ 4-1
details ............................................. 4-2, 5-13
show ............................................... 4-2, 5-13
Interval
dead....................................................... 2-21
faulty .......................................................1-14
keep alive ...................................... 1-14, 2-21
suspicious...................................... 1-14, 2-21
IP
Brocade iSCSI Gateway GUI User Manual
Publication Number: 53-1000204-01
K
Keep alive interval............................. 1-14, 2-21
Keep alive parameters ................................5-8
Keep alive signal................................ 1-14, 2-21
Key
RADIUS.................................................. 5-14
L
List
iSCSI remote initiator .................. 4-10, 5-17
Logical Unit statistics..................................4-11
LU
details ................................................... 5-20
discovery ............................................... 2-16
remove .................................................. 5-21
show ...................................................... 5-21
statistics ..................................................4-11
statistics show ....................................... 5-21
M
Management Station
ping from iSCSI Gateway............. 2-12, 5-22
N
Name
ACL identity remove...............................5-5
Neighbor
add................................................2-20, 5-21
details .......................................... 2-22, 5-22
remove ................................2-12, 2-23, 5-22
set................................................. 2-23, 5-22
show ............................................ 2-22, 5-22
Network topology ........................................ 1-1
New
storage expose.............................. 3-5, 5-26
Node
show FC ................................................. 5-10
I-3
O
Off-line....................................................... 2-22
P
Ping ................................................... 2-12, 5-22
Private Loop ................................................ 2-8
Public Loop ................................................. 2-8
R
RADIUS
add .........................................................5-14
key ..........................................................5-14
remove...................................................5-15
set ...........................................................5-15
show.............................................. 3-12, 5-15
Remote initiator statistics ......................... 4-10
Remove
ACL .......................................................... 5-2
ACL identity CHAP ................................. 5-5
ACL identity name.................................. 5-5
admin ............................................... 2-7, 5-7
disk ............................................... 2-17, 5-26
IP config ........................................2-10, 5-13
IP route..........................................2-14, 5-16
iSCSI portal ...................................2-16, 5-17
iSCSI target.................................... 3-6, 5-20
LU ...........................................................5-21
neighbor ............................. 2-12, 2-23, 5-22
RADIUS ..................................................5-15
SNMP manager..............................2-6, 5-23
SRP identity............................................. 5-5
storage ......................................... 2-17, 5-26
user profile.............................................. 2-7
Report LUNs ...............................................2-16
Reset .......................................................... 2-24
RS232 ......................................................... 2-25
S
Safe mode.................................................. 2-25
Safe Mode ................................................. 5-27
SCSI
target port statistics .......................4-9, 5-23
SCSI port statistics.......................................4-9
SCSI target
port statistics..................................4-9, 5-23
Service Agent ............................................... 1-3
Service Location Protocol ........................... 1-3
Set
I-4
Index
Publication Number: 53-1000204-01
T
Target
authentication................................ 1-8, 3-10
existing..............................................3-4, 3-5
new ..........................................................3-4
TCP connection
show .............................................. 4-4, 5-28
TCP statistics
show .............................................. 4-4, 5-28
TCP/IP statistics ...........................................4-3
Telnet ................................................... 2-2, 2-4
Temperature scale................................ 2-2, 4-1
U
UDP listeners
show .............................................. 4-5, 5-29
UDP statistics
show ........................................................4-5
Update
software .........................................2-24, 5-11
Upload
software ........................................ 2-18, 5-12
W
World Wide Node Name .......................... 2-9
World Wide Port Name .................... 2-8, 5-10
World Wide Unique Identifier................... 1-2
Write cache
enable.............................................3-3, 5-25
Write-protected .................................3-3, 5-25
WWNN........................................................ 2-9
WWPN ............................................... 2-8, 5-10
WWUI .......................................................... 1-2
I-5
I-6