Deployment Guide: Dell Powervault Md3600I and Md3620I Storage Arrays
Deployment Guide: Dell Powervault Md3600I and Md3620I Storage Arrays
____________________
Information in this publication is subject to change without notice.
© 2010 Dell Inc. All rights reserved.
Reproduction of these materials in any manner whatsoever without the written permission of Dell Inc.
is strictly forbidden.
Trademarks used in this text: Dell™, the DELL logo, and PowerVault™ are trademarks of Dell Inc.
Intel® and Pentium® are registered trademarks of Intel Corporation in the U.S. and other countries.
Microsoft®, Windows®, and Windows Server® are either trademarks or registered trademarks of
Microsoft Corporation in the United States and/or other countries. Red Hat Enterprise Linux® and
Enterprise Linux® are registered trademarks of Red Hat, Inc. Novell® is a registered trademark and
SUSE™ is a trademark of Novell Inc. in the United States and other countries. VMware® is a registered
trademark of VMWare, Inc. in the United States or other countries.
Other trademarks and trade names may be used in this publication to refer to either the entities claiming
the marks and names or their products. Dell Inc. disclaims any proprietary interest in trademarks and
trade names other than its own.
1 Introduction . . . . . . . . . . . . . . . . . . . . . . . . 7
System Requirements . . . . . . . . . . . . . . . . . . . 7
Management Station Requirements . . . . . . . . . 7
2 Hardware Installation . . . . . . . . . . . . . . . 11
Storage Configuration Planning . . . . . . . . . . . . . 11
3 Software Installation . . . . . . . . . . . . . . . . 29
Installing MD Storage Software . . . . . . . . . . . . . 29
Contents 3
5 Uninstalling Software . . . . . . . . . . . . . . 55
Uninstalling From Microsoft Windows . . . . . . . . . 55
A Appendix—Manual Configuration
of iSCSI . . . . . . . . . . . . . . . . . . . . . . . . . . 57
Step 1: Discover the Storage Array
(Out-of-band Management Only) . . . . . . . . . . . . 58
4 Contents
Contents 5
C Appendix—Load Balancing . . . . . . . . . . 81
Load Balance Policy . . . . . . . . . . . . . . . . . . . 81
Round Robin With Subset . . . . . . . . . . . . . . 81
Least Queue Depth With Subset . . . . . . . . . . 82
Least Path Weight With Subset. . . . . . . . . . . 82
Changing Load Balance Policies on the
Windows Server 2008 Operating System . . . . . . 82
Increasing Bandwidth With Multiple
iSCSI Sessions . . . . . . . . . . . . . . . . . . . 83
6 Contents
System Requirements
Before installing and configuring the MD3600i Series hardware and software,
ensure that the minimum system requirements are met, and the supported
operating system is installed. For more information, see the Dell PowerVault
Support Matrix available on support.dell.com/manuals.
Introduction 7
8 Introduction
Introduction 9
Hardware Installation 11
12 Hardware Installation
Hardware Installation 13
Server 1 Server 2
Storage array
Corporate, public,
or private network
14 Hardware Installation
Server
Storage array
Corporate, public,
or private network
Hardware Installation 15
Storage array
Corporate, public,
or private network
16 Hardware Installation
Hardware Installation 17
Server 1 Server 2
Storage array
Corporate, public,
or private network
18 Hardware Installation
Storage array
Corporate, public,
or private network
Hardware Installation 19
20 Hardware Installation
Up to 64 hosts
Switch
Storage array
Corporate, public,
or private network
Hardware Installation 21
Up to 64 hosts
Storage array
Corporate, public,
or private network
22 Hardware Installation
Up to 64 hosts
1G NICs
1G Switches
10G Uplinks
10G Switch
Storage array
Hardware Installation 23
Up to 64 hosts
1G NICs
1G Switches
10G Uplinks
10G Switches
24 Hardware Installation
Hardware Installation 25
26 Hardware Installation
Hardware Installation 27
28 Hardware Installation
Software Installation 29
30 Software Installation
Software Installation 31
Silent Installation
This option allows you to install the software in an unattended mode. To run
silent installation in a Windows system, perform the following steps:
1 To begin the installation with all the default options, navigate to the
windows folder on the resource media and run the following command:
md36xxi_install -i silent
2 To specify which features are to be installed silently, modify the
custom_silent.properties file located in the same directory and copy it to a
writable location on the host server. This file contains a list of supported
features and their descriptions. To utilize the modified
custom_silent.properties file, run the command:
md36xxi_install -f
C:\path\to\custom_silent.properties
32 Software Installation
Software Installation 33
Term Definition
CHAP (Challenge Handshake An optional security protocol used to control
Authentication Protocol) access to an iSCSI storage system by restricting
use of the iSCSI data ports on both the host
server and storage array. For more information
on the types of CHAP authentication
supported, see "Understanding CHAP
Authentication" on page 66.
Host or host server A server connected to the storage array using
iSCSI ports.
Host server port SCSI port on the host server used to connect
it to the storage array.
Term Definition
iSCSI initiator The iSCSI-specific software installed on the
host server that controls communications
between the host server and the storage array.
iSCSI host port The iSCSI port (two per controller) on the
storage array.
iSNS (Microsoft Internet Storage An automated discovery, management and
Naming Service) configuration Storage Naming Service) tool
used by some iSCSI devices.
Management station The system from which you manage your
host server/storage array configuration.
Storage array The enclosure containing the storage data
accessed by the host server.
Target An iSCSI port on the storage array that
accepts and responds to requests from the
iSCSI initiator installed on the host server.
If you need additional space for more than one host server, use an additional sheet.
Subnet
A Static IP address (host server) (should be different for each NIC) Default gateway
iSCSI port 1 ___ . ___ . ___ . ___ ___ . ___ . ___ . ___ ___ . ___ . ___ . ___
iSCSI port 2 ___ . ___ . ___ . ___ ___ . ___ . ___ . ___ ___ . ___ . ___ . ___
Management port ___ . ___ . ___ . ___ ___ . ___ . ___ . ___ ___ . ___ . ___ . ___
Management port ___ . ___ . ___ . ___ ___ . ___ . ___ . ___ ___ . ___ . ___ . ___
Target CHAP
B
PowerVault MD36x0i
If you need additional space for more than one host server, use an additional sheet.
Host iSCSI port 1 Host iSCSI port 2
A Link local IP address ___ . ___ . ___ . ___ Link local IP address ___ . ___ . ___ . ___
Routable IP address ___ . ___ . ___ . ___ Routable IP address ___ . ___ . ___ . ___
Subnet prefix ___ . ___ . ___ . ___ Subnet prefix ___ . ___ . ___ . ___
Gateway ___ . ___ . ___ . ___ Gateway ___ . ___ . ___ . ___
B
iSCSI controller 0, In 0
Routable IP address 1 ____ : ____ : ____ : ____ : ____ : ____ : ____ : ____
Routable IP address 2 ____ : ____ : ____ : ____ : ____ : ____ : ____ : ____
Router IP address ____ : ____ : ____ : ____ : ____ : ____ : ____ : ____
iSCSI controller 0, In 1
Routable IP address 1 ____ : ____ : ____ : ____ : ____ : ____ : ____ : ____
Routable IP address 2 ____ : ____ : ____ : ____ : ____ : ____ : ____ : ____
Router IP address ____ : ____ : ____ : ____ : ____ : ____ : ____ : ____
Routable IP address 1 ____ : ____ : ____ : ____ : ____ : ____ : ____ : ____
Routable IP address 2 ____ : ____ : ____ : ____ : ____ : ____ : ____ : ____
Router IP address ____ : ____ : ____ : ____ : ____ : ____ : ____ : ____
iSCSI controller 1, In 1
Routable IP address 1 ____ : ____ : ____ : ____ : ____ : ____ : ____ : ____
Routable IP address 2 ____ : ____ : ____ : ____ : ____ : ____ : ____ : ____
Router IP address ____ : ____ : ____ : ____ : ____ : ____ : ____ : ____
Automatic Selection
NOTE: The contents in this section do not apply to Microsoft Windows Server 2003.
The utility attempts to automatically find and select the best possible
configuration of host IP address(es) and storage array iSCSI ports for optimal
performance and redundancy.
This automatic selection attempts to ensure that a host IP address (up to two
IP addresses for MD3000i and MD3600i storage arrays and up to four IP
addresses for MD3200i) establishes an iSCSI session with each storage array
controller and that the host IP address is logged in to a maximum of one
iSCSI port per controller. Configuration in this manner ensures redundancy
and load balancing among the multiple host IP addresses (NICs).
Uninstalling Software 55
56 Uninstalling Software
This Step is Performed on the Host Server This Step is Performed on the Storage
Using the Microsoft or Linux iSCSI Initiator Array Using MD Storage Manager
1 Discover the storage array.
Task Purpose
Rename the storage array To provide a more meaningful name than the
software-assigned label, Unnamed.
Set a storage array password To restrict unauthorized access. MDSM may ask
for a password before changing the
configuration or performing a destructive
operation.
Set up alert notifications To notify individuals (by e-mail) and/or storage
Set up e-mail alerts enterprise management consoles, such as Dell
Management Console, (by SNMP) when a
Set up SNMP alerts storage array component degrades or fails, or an
adverse environmental condition occurs.
Configure a storage array To create virtual disks and map them to hosts.
Target CHAP
In target CHAP, the storage array authenticates all requests for access issued
by the iSCSI initiator(s) on the host server using a CHAP secret. To set up
target CHAP authentication, you must enter a CHAP secret on the storage
array, then configure each iSCSI initiator on the host server to send that
secret each time it attempts to access the storage array.
Mutual CHAP
In addition to setting up target CHAP, you can set up mutual CHAP in which
both the storage array and the iSCSI initiator authenticate each other. To set up
mutual CHAP, configure the iSCSI initiator with a CHAP secret that the
storage array must send to the host sever in order to establish a connection. In
this two-way authentication process, both the host server and the storage array
send information that the other must validate before a connection is allowed.
CHAP is an optional feature and is not required to use iSCSI. However, if you
do not configure CHAP authentication, any host server connected to the same
IP network as the storage array can read from and write to the storage array.
NOTE: When using CHAP authentication, you should configure it on both the
storage array (using MDSM) and the host server (using the iSCSI initiator) before
preparing virtual disks to receive data. If you prepare disks to receive data before
you configure CHAP authentication, you lose visibility to the disks once CHAP
is configured.
CHAP Definitions
To summarize the differences between target CHAP and mutual CHAP
authentication, see Table A-3.
Option Description
None This is the default selection. If None is the only selection, the
storage array allows an iSCSI initiator to log on without
supplying any type of CHAP authentication.
None and CHAP The storage array allows an iSCSI initiator to log on with or
without CHAP authentication.
CHAP If CHAP is selected and None is deselected, the storage array
requires CHAP authentication before allowing access.
Appendix—Load Balancing 81
82 Appendix—Load Balancing
Appendix—Load Balancing 83
MD36x0i Controller 0
P0: IP_Addr_C0_P0
P1: IP_Addr_C0_P1
MD36x0i Controller 1
P0: IP_Addr_C1_P0
IP network 1 IP network 2 P1: IP_Addr_C1_P1
TCP Connections
To MD36x0i Controller 0
T01: IP_Addr_If1 / IP_Addr_C0_P0
T02: IP_Addr_If2 / IP_Addr_C1_P1
To MD36x0i Controller 1
T11: IP_Addr_If1 / IP_Addr_C1_P0
T12: IP_Addr_If2 / IP_Addr_C1_P1
iSCSI Sessions
To MD36x0i Controller 0
Session 00: T01
Storage array Session 01: T02
To MD36x0i Controller 1
Session 10: T11
Session 11: T12
84 Appendix—Load Balancing
Appendix—Load Balancing 85