ISCSI Storage – Part III : Initiator

Share on facebook
Share on google
Share on twitter
Share on linkedin
Share on pinterest
Share on print
Share on email
Table of Contents

Introduction

in Previous part I and Part II  of ISCSI Storage we learned how to create ISCSI Target and how to Create and Configure Virtual Disk 

in this  article in Pioneers LAB we will discuss how to configure ISCSI Initiator and also discuss some security considerations

 

iSCSI network diagram

ISCSI initiator connect to ISCSI Target

now from Mail105 we will use ISCSI Initiator to Connect to ISCSI target on server iscsi103.pioneers.lab 

let us GO 

open disk manager console
list of current disk available
open server manager > tools > select iSCSI initiator
initiator is disabled by default > click to enable
connect to iscsi targt server iscsi103
quick connect
connection to iscsi103 allowed
list of available target
discovery of targt
list of available targets
For Better View > Open Image in different TAB
available devices for this server is ONLY one device from 3

Format VDisk01

Disk is listed in Disk management console diskmgmt.msc 

let’s format it for use  

open disk manager
make disk online
initialize disk
select initialize GPT NOT MBR
create new simple volume
set capacity
label disk any letter
set name volume
formating disk
disk formatted
open disk and start insert data

ISCSI security Consecrations

before complete ISCSI article , it’s worthy to bring your attention to some security consideration points : 

enable CHAP authentication to secure connection between servers [ as ISCSI initiator ] and ISCSI target 

Allow only desired server to access specific SICS target 

in our DEMO above we use the same NIC network card [172.16.100.103 ] for 

  • ISCSI Connection 
  • and also for management 

in Production environment : we highly recommend to use 

  • one NIC for ISCSI Connection with 10GB speed 
  • another NIC  for management 

IP Address between ISCSI initiator and ISCSI target should be different subnet and different VLAN 

 please have a look to suggested diagram below for production environment 

iSCSI diagram with security consideration
Share this post
Share on facebook
Share on google
Share on twitter
Share on linkedin
Share on pinterest
Share on print
Share on email

About Me

Our Power in Numbers

 17 

Courses

321

Articles

3,882

Images
and All configurations images are proudly made in Pioneers Lab

Articles By Course

Recent Articles

Subscribe

Contact us

have a challenge ? don’t hesitate to contact us