Configure iSCSI ports
If your controller includes an iSCSI host connection, you can configure the iSCSI port settings from the System page.
Configure iSCSI authentication
For extra security in an iSCSI network, you can set authentication between controllers (targets) and hosts (initiators). System Manager uses the Challenge Handshake Authentication Protocol (CHAP) method, which validates the identity of targets and initiators during the initial link. Authentication is based on a shared security key called a CHAP secret.
Enable iSCSI discovery settings
You can enable settings related to the discovery of storage devices in an iSCSI network. The Target Discovery Settings allow you to register the storage array's iSCSI information using the Internet Storage Name Service (iSNS) protocol, and also determine whether to allow unnamed discovery sessions.
View iSCSI sessions
You can view detailed information about the iSCSI connections to your storage array. iSCSI sessions can occur with hosts or remote storage arrays in an asynchronous mirror relationship.
End iSCSI session
You can end an iSCSI session that is no longer needed. iSCSI sessions can occur with hosts or remote storage arrays in an asynchronous mirror relationship.
Configure iSER over InfiniBand ports
If your controller includes an iSER over InfiniBand port, you can configure the network connection to the host.
View iSER over InfiniBand statistics
If your storage array's controller includes an iSER over InfiniBand port, you can view data about the host connections.