Select Page

How to setup a SAN cluster by configuring target portals?

SAN image

SAN clusters share storage resources and enhance efficiency and cost effectiveness. Clustering SAN appliances also improves data availability. By clustering SAN appliances, a number of challenges are easily overcome. StoneFly’s SCVM™ software facilitates SAN clustering via target portals.

Target Portals are an iSCSI term for a communications portal between two iSCSI devices. This article is meant to guide you through the setup process of target portals in order to configure a SAN cluster between two SAN appliances.

Target Portals

The StoneFusion operating system features an iSCSI initiator that enables the Storage Concentrator to communicate with other iSCSI devices. Currently, the only iSCSI device supported using a target portal is another Storage Concentrator. To set up a target portal, use the steps that follow:

  1. Navigate to SAN >Target Portals> Summary. The Target Portal screen appears.
SAN clusters
  1. Select Add New Target Portal. The Add New Target Portal screen appears.
Clustering SAN appliances
  1. Enter the IP Address of the Storage Concentrator to be used as a Secondary Storage Concentrator.
  2. The default setting for Port is 3260, the iSCSI listening port.
  3. Enter the security settings for the Target Portal, including specifying a CHAP secret.
  4. Click on Submit.

To Check the Status of a Target Portal, click on Detail. The Target Portal Detail screen appears.

SCVM™ software
This will setup a target portal and a cluster between two SAN appliances. If users wish to use SAN appliances separately or they wish to undo/delete the target portal, then it can be done by doing the following: To delete a target portal:

  1. Navigate to SAN>Target Portal > Summary. The Target Portal summary screen appears:
Target Portal
  1. Select the Target Portal you wish to delete under Delete Targets.
  2. Click Submit.

 

Learn more about StoneFly’s award winning software defined storage software SCVM™.

Conti Ransomware: In-Depth Technical Breakdown

Conti Ransomware: In-Depth Technical Breakdown

Conti ransomware has earned notoriety, notably for its involvement in the Costa Rican government hack. Operating as a ransomware-as-a-service (RaaS) group, Conti specializes in infiltrating networks, encrypting crucial data, and extorting exorbitant sums of money. In...

Supply Chain Attack: The Achilles’ Heel of Enterprise Security

Supply Chain Attack: The Achilles’ Heel of Enterprise Security

Supply chain attacks have emerged as a formidable threat vector in the landscape of cybercrime, posing significant risks to enterprises of all sizes and industries. Among the various tactics employed by threat actors, ransomware attacks leveraging supply chain...

How to Set Up S3 Object Storage for Veeam Data Platform

How to Set Up S3 Object Storage for Veeam Data Platform

Veeam v12 introduced Direct-to-Object storage, enabling S3 object storage as the primary backup repository. Prior to this, S3 object storage integration relied on Veeam's Scale-Out Backup Repository (SOBR), using a performance tier and a capacity tier, which extended...

Watering Hole Attacks Unveiled: A Comprehensive Cyberthreat Overview

Watering Hole Attacks Unveiled: A Comprehensive Cyberthreat Overview

Watering hole attacks, akin to their namesake in the natural world where predators strategically position themselves near watering holes to intercept prey, have become a significant peril in the digital realm. In the vast landscape of cybersecurity, understanding the...

Man-in-the-Middle Attack: Cyberthreat Amidst Data Streams

Man-in-the-Middle Attack: Cyberthreat Amidst Data Streams

In the fast-paced arena of enterprise-level digital operations, the looming threat of cyber vulnerabilities demands our undivided attention. Among these threats, the Man-in-the-Middle (MitM) attack emerges as a silent, yet formidable, adversary capable of infiltrating...

You May Also Like

Subscribe To Our Newsletter

Join our mailing list to receive the latest news, updates, and promotions from StoneFly.

Please Confirm your subscription from the email