Previous Next


1 
Introduction
This chapter provides an overview of the Nexsan iSeries.
iSCSI Overview
iSCSI transmits native SCSI commands and data over the TCP/IP protocol stack. iSCSI transfers and stores SCSI commands and data at any iSCSI enabled storage location with access to a LAN, MAN, WAN or the Internet. iSCSI enables the creation of high performance IP-SANs.
iSCSI has many benefits including:
Can use existing Ethernet cabling and existing network elements.
Uses common TCP/IP for global connectivity.
Leverages the existing expertise of network administrators, integrators and support services.
iSCSI Initiator and Targets
iSCSI initiators establish TCP connections with iSCSI targets. Data can be transferred via iSCSI when an iSCSI initiator establishes a TCP connection with an iSCSI target.
The iSCSI initiator resides in the host computer.
The iSCSI target resides in the Nexsan iSeries.
iSCSI initiators and targets have a World Wide Unique Identifier (WWUI) of up to 223 free form characters, e.g. www.brocade.switch1.target1.
Portals
To enable iSCSI communications over TCP, the system administrator must configure portals during the initial Nexsan iSeries configuration. A portal is comprised of both an IP address and its assigned TCP port. Each configured portal automatically becomes an iSCSI access point to each target that exists in the Nexsan iSeries. Typically, there are few portals and many targets.
Targets and LUNs
An iSCSI initiator can access, read and write to a disk only after the disk is “exposed”. An exposed disk is a disk that has been attached to a target and assigned a LUN (Logical Unit Number). An exposed disk can be accessed by any iSCSI initiator unless ACL restrictions are configured.
When creating iSCSI targets, the user administrator assigns an alias and name for each one. The alias is an internal identifier for the system administrator. The name is the WWUI used to connect initiators to the target.
Note:
When creating targets, keep in mind that:
Each target can have multiple LUNs.
Each target should be exposed by only one Nexsan iSeries in a cluster.
Each target can be accessed by multiple hosts.
 
There are two ways to expose a disk:
1.
Create a new target and assign a LUN in the same process. For more information see Exposing Disks and Creating a New Target in Chapter 4.
2.
Assign LUNs to previously created targets. For more information, see Creating a New Stand-Alone Target in Chapter 4.
Example:
In Figure ‎1-1 Vol 1 is exposed via Target 1 and is accessible to any iSCSI initiator via either portal (IP1, 3260) or (IP2, 3260). Likewise, Vol 2 is exposed via Target 2, Vol 3 and Vol 4 are exposed via Target 3.
Figure ‎1-1. iSCSI Target Access
Discovery Methods
The Nexsan iSeries supports three types of discovery: iSCSI Discovery, SLP and iSNS.
iSCSI Discovery
In an iSCSI discovery session the user administrator configures an IP and port of the iSCSI target in the initiator. The initiator discovers all applicable targets and LUNs.
SLP
SLP (Service Location Protocol) is a common broadcast-based discovery mechanism that uses agents. The Nexsan iSeries acts as an SLP Service Agent (SA) and advertises its iSCSI service. The initiator identifies the Nexsan iSeries and discovers the Nexsan iSeries targets.
iSNS
iSNS is a client/server protocol designed for compatibility with FC’s Simple Name Server (SNS). Once an iSNS server is located (either through DHCP or SLP), discovery can take place without the need for broadcasts. iSNS enables iSCSI initiators in the IP-SAN to locate the Nexsan iSeries targets automatically.
iSCSI Security
No matter what discovery method is used, ACL (Access Control List) allows only those targets that are defined as available to be accessed. To allow selective iSCSI initiator access to iSCSI target disks, the Nexsan iSeries uses identities to define pools of initiators. An identity is a user-defined list of iSCSI initiators. Attaching an identity to a target restricts its access to the list of initiators defined by that identity.
Note:
When planning and creating identities, keep in mind that:
Each identity can contain one or more iSCSI initiators.
Each identity can be assigned one or both login authentication methods (CHAP, SRP).
Each identity can be attached to more than one target.
Each target is first automatically coupled to a default read-write un-authenticated access identity and therefore can be accessed by everyone.
Each target can have more than one identity. The order of the identities is important. The first match is used, not the best match.
 
Note:
If you are working with an iSNS server, all hosts are able to see all targets but only those hosts with access rights are able to connect to the authorized targets.
 
Example:
In Figure ‎1-2 identities are coupled with iSCSI targets to limit iSCSI initiator access to a target’s underlying disks. An identity can be used with more than one target and each target can have more than one identity.
Identity A is coupled with both Targets 1 and 2.
Identity B is coupled with Target 3.
Identity C is coupled with Target 4.
As a result, each iSCSI initiator has access to the following disks:

Figure ‎1-2. Identities Coupled with Targets
 
When you assign an identity to a target, you give the identity a position. A position is an identity’s rank in the Nexsan iSeries scan for an “iSCSI initiator – identity match”. When the Nexsan iSeries scans the list of identities coupled with a target, it starts with the highest position and stops with the first match. After matching, the initiator is granted the identity’s access rights.
An identity can be connected to more than one target to provide the same pre-defined list of initiators for each target.
Example:
In Figure ‎1-3, the default identities for Target 1 and Target 2 have been modified to not accessible (NA) for all initiators.
Target 1 is coupled with Identity A with read-write (RW) access to Identity A’s list of iSCSI initiators (WWUI1).
Target 2 is coupled with Identity B with read-write (RW) access to Identity B’s list of iSCSI initiators (WWUI2).
When iSCSI initiator WWUI1 logs in to Target 1, the Nexsan iSeries first scans Identity A and finds the initiator listed there. The scan stops and the initiator is granted read-write access to Target 1’s underlying disk, Disk 1.
If iSCSI initiator WWUI1 tries to login to Target 2, the Nexsan iSeries first scans Identity B. It does not find the initiator listed so it continues to scan the next identity, the default identity. The default identity implicitly lists all iSCSI initiators, including WWUI1. However, the scan stops and the initiator is denied access to Target 2’s underlying disks (Vol 2 and Vol 3), since the default identity is configured as not accessible.
Figure ‎1-3. Default Identities
Access Rights
When you couple an identity and a target, you assign access rights: read-write (RW), read-only (RO) or not accessible (NA). The access rights are per identity-target pair.
An identity can be coupled with multiple targets, each time with different access rights.
A target can have multiple identities, each with different access rights.
Note:
If you add or modify Identities on a target after its disks have been exposed, the access rights will take effect only at the next login for each iSCSI initiator.
 
Example:
In Figure ‎1-4 Identity A is coupled with both Target 1 and Target 2.
The pair Identity A – Target 1 is assigned iSCSI initiator read-write access to Target 1 disks.
However, the pair Identity A – Target 2, is assigned iSCSI initiator read-only access to Target 2 disks.
Figure ‎1-4. Access Rights per Identity-Target Pair
Target and Initiator Authentication
The Nexsan iSeries supports the authentication methods CHAP and SRP for the iSCSI initiator. The credentials for CHAP and SRP are the combination of user name + password.
CHAP
CHAP is a protocol that is used to authenticate the peer of a connection and is based upon the peers sharing a secret (a security key that is similar to a password). The target and the initiator authenticate each other.
The Nexsan iSeries supports two way CHAP authentication. The target authenticates the initiator and the initiator can authenticate the target (it is up to the initiator to request target authentication). A separate secret can be set for each target and for each initiator in the storage area network (SAN).
Note:
An authentication method is assigned per identity and not per iSCSI initiator.
An identity can be assigned an additional authentication method.
If no authentication method is assigned, all listed iSCSI initiators in an identity will have un-authenticated login access rights.
 
When an iSCSI initiator logs in to a target, its WWUI is checked against the identity initiator list. After the iSCSI initiator passes the identity stage, if credentials are configured, the iSCSI initiator must authenticate itself. The credentials list is checked for the iSCSI initiator’s user name + password. The list can contain:
A separate user name + password for each initiator.
Note:
There is no strict link between an initiator from the initiator names in the identity and a specific username + password from the credentials of the identity.
 
A few user name + password pairs common to a few initiators
A single user name + password for all initiators in the identity.
Example:
In Figure ‎1-5 there are:
Six iSCSI initiators in Identity B
Only four user name + password credentials. Certain initiators have the same user name + password configured on them.
Figure ‎1-5. Identity with iSCSI Initiators and Credentials
 
Configuring a RADIUS Server
When a RADIUS Server exists in the network, you can use it to manage the Nexsan iSeries. When CHAP user names and passwords are configured on the network in a RADIUS server, the RADIUS server can be configured on the Nexsan iSeries to direct a CHAP challenge to the RADIUS server and eliminate the need to configure all user name + password pairs on the Nexsan iSeries. This decreases configuration time and increase overall network security.
Example:
In Figure ‎1-6, a CHAP authentication challenge is sent to the Nexsan iSeries.
The Nexsan iSeries first checks if the user name is set for RADIUS authentication.
If it is, the CHAP challenge is passed on to the RADIUS server.
If it is not, the user name and password are compared against the pairs configured in the Nexsan iSeries.
Figure ‎1-6. Sending a CHAP Authentication Challenge
 
Nexsan iSeries Cluster
A cluster is made from two Nexsan iSeries that are attached to the same storage element(s). In a cluster, the Nexsan iSeries interact in a peer-to-peer fashion with the other neighbor Nexsan iSeries. In this active-active configuration, neither Nexsan iSeries is configured to act as the master Nexsan iSeries. All disks are accessible to each Nexsan iSeries and can be exposed on either Nexsan iSeries. This allows you to split the load between the two Nexsan iSeries. Clusters provide high availability in the event of Nexsan iSeries failover.
Each network port on the Nexsan iSeries is configured with its own:
active, or functioning, IP addresses
inactive, or dormant, neighbor IP addresses.
When one Nexsan iSeries goes off-line, the remaining Nexsan iSeries activates its neighbor’s IP addresses. The hosts continue to access disk targets through the same IP address without sensing that their ‘regular’ Nexsan iSeries has gone offline or noticing any impact on storage performance.
Note:
All LUNs in a RAID controller must be simultaneously exposed through all ports connected to both Nexsan iSeries.
 
 
Example
In Figure ‎1-7, two Nexsan iSeries are connected to one FC JBOD. From the four physical disks, two virtual disks have been created, both equally accessible to both Nexsan iSeries.
Nexsan iSeries are both fully operational in a cluster. No Nexsan iSeries must sit in stand-by mode.
Both Nexsan iSeries are also connected to two hosts via the IP SAN. The disk exposure of the two virtual disks is balanced equally between the two Nexsan iSeries for best resource utilization. Vol 1 is exposed via Nexsan iSeries 1 to Host 1, represented by the orange dashed line. Vol 2 is exposed via Nexsan iSeries 2 to Host 2, represented by the purple dotted line.
Figure ‎1-7. Nexsan iSeries Cluster Configuration
 
Example
In Figure ‎1-8, Nexsan iSeries 1 has gone off-line. Nexsan iSeries 2 activates Nexsan iSeries 1’s IP address and takes over exposure of Disk 1 to Host 1, represented by the orange dashed line.
Host 1 continues to access Disk 1 through the same IP address as it did before its Nexsan iSeries went off-line. Host 1 has no way of knowing that its regular Nexsan iSeries is off-line.
Figure ‎1-8. Re-Routing Storage Access with Off-line Nexsan iSeries
Maintaining Cluster Communications
Once a Nexsan iSeries is configured as a cluster, it begins sending out a regular keep alive signal to its neighbor. The Nexsan iSeries also begins listening for the keep alive signal from its neighbor. The keep alive signal is transmitted through all connecting paths between each neighbor. Thus, if one path fails, the remaining path(s) will still carry the keep alive signal.
If a specified time period passes without a keep alive signal from the neighbor, a suspicious interval, measured in seconds, is entered. The Nexsan iSeries suspects that its neighbor has gone off-line and begins preparing to activate the neighbor IP addresses to take over disk exposure.
If a keep alive signal is received during the suspicious interval, the timer is reset and the Nexsan iSeries continues to function as usual. If a keep alive signal is not received by the end of the suspicious interval, a faulty interval is entered. At the end of the faulty interval, the neighboring Nexsan iSeries is considered off-line, the failover process is initiated and the on-line Nexsan iSeries actives the neighbor IP addresses and takes over disk exposure.
Synchronizing a Cluster
If disks or targets are created on one Nexsan iSeries operating alone, when another Nexsan iSeries is added, its database must be synchronized to the first Nexsan iSeries database. This can happen in three situations:
1.
A new Nexsan iSeries is added to a configured and functioning Nexsan iSeries to form a cluster.
2.
An offline Nexsan iSeries in a cluster comes back online.
3.
CLI is used to make an isolated configuration change in one Nexsan iSeries.
When an element is not synchronized, a yellow exclamation mark appears to the left of it instead of a green check mark and the alarm Object not redundant is displayed. Synchronization is possible at every level of Nexsan iSeries Manager: Cluster, Nexsan iSeries, Target and Disk.
Synchronization is carried out from the selected level down. Synchronization at the cluster level will synchronize the Nexsan iSeries and their disks. You cannot synchronize IP addresses or IP routes as well as CHAP/SRP passwords.
Virtualization
The Nexsan iSeries allows you to perform volume virtualization. The Nexsan iSeries “sees” a collection of storage devices. Each device can be either a physical disk (part of a JBOD) or a LUN (part of RAID).
With the Nexsan iSeries, you can:
Take a resource and attach it via the iSCSI network to the host.
Build virtual volumes at the network layer.
Volumes Types
Nexsan iSeries Manager enables you to configure physical volumes into the following types of virtual volumes:
Transparent
Concatenated
Mirrored
Striped
Mirrored over Concatenated
Mirrored over Striped (RAID 0 +1)
Striped over Mirrored (RAID 10)
There are several ways to create volumes:
1.
Take a full disk and expose it as one volume.
2.
Create volumes by partitioning disk into subdisks.
3.
Create a volume by spanning multiple physical disks or subdisks (e.g. take two disks/subdisks and create mirror).
Transparent Volumes
The primary use for transparent volumes is for attaching tape devices directly to the Nexsan iSeries. You can take a physical disk/tape and convert it to a transparent volume ready for direct host exposure. For more information, see Transparent Volumes in Chapter 4.
 
Note:
Transparent volumes cannot be used in further volume hierarchies.
 
Subdisks (LUN Carving)
You can partition a disk to create a subdisk that can be accessed as a separate virtual volume. You can create one or more subdisks on a physical disk. The subdisks can be used for creating concatenated, striped and mirrored virtual volumes. A subdisk has a start block and end block address within the disk in hexadecimal form. For more information see Creating Subdisks (LUN Carving) in Chapter 4.
Example:
In Figure ‎1-9, the disk is partitioned into subdisks.
Figure ‎1-9. Concatenated Volume Block Distribution
Concatenated Volumes
To accommodate large volumes of data or to best utilize small volumes spread over several disks, you can concatenate physical volumes or subdisks across storage devices to create a larger virtual volume. Concatenated volumes can also be created on virtual volumes as part of a volume hierarchy. For more information see Concatenated Volumes in Chapter 4.
Example:
In Figure ‎1-10, the volume is divided into two equitable chunks to be mapped across two disks.
Data blocks 1 – 4 are mapped to Disk 1, sectors 13 – 16.
Data blocks 5 – 8 are mapped to Disk 2, sectors 13 – 16.
Figure ‎1-10. Concatenated Volume Block Distribution
 
Striped Volumes
A striped volume has data written equitably across two or more identical size disks, subdisks or virtual volumes to provide higher read/write rates. For more information see Striped Volumes in Chapter 4.
Note:
Subdisks within a striped volume need to be on different disks to realize the benefits of striping.
 
Example
In Figure ‎1-11, data block 1 is mapped to sector 1 of Disk 1; data block 2 is mapped to sector 1 of Disk 2. Each subsequent data block is then written alternately between sectors on Disks 1 and 2. The striped unit size in this example is one block.
Figure ‎1-11. Striped Volume Block Distribution
Mirrored Volumes
A mirrored volume is synchronously written into multiple identical size volumes. The read load is balanced between each copy. Mirrored volumes can be created from two to four disks, subdisks or virtual volumes of equal block size. The size of the mirror is determined by its smallest child volume. For more information see Mirrored Volumes in Chapter 4.
 
Note:
Mirrored volumes must be located on different physical disks.
To achieve higher availability, Nexsan recommends configuring mirrored volumes onto different storage systems.
 
Example
In Figure ‎1-12, data block 1 is mapped to both sector 5 on Disk 1 and sector 9 on Disk 2. Data block 2 is mapped to both sectors 6 on Disk 1 and sectors 10 on Disk 2.
Figure ‎1-12. Mirrored Volume Block Distribution
RAID 10 & RAID 0+1
You can combine different volume types to create hierarchies. Combining stripe and mirror volumes gives the advantage of both high performance and data redundancy.
RAID 10 is striped over mirror
Create mirrored volumes and then create striped volumes of the mirrored volumes. For more information see Creating a Stripe over Mirrored Volumes in Chapter 4.
RAID 0+1 is mirror over striped
Create striped volumes and then create mirrored volumes of the striped volumes. For more information see Creating a Mirror over Striped Volumes in Chapter 4.
 
Example
In Figure ‎1-13, in the first mirrored volume, data block 1 is mapped to both block 1 on Disk 1 and block 1 on Disk 2. Data blocks 3, 5 and 7 are mapped to blocks 2, 3 and 4 on both Disks 1 and 2.
In the second mirrored volume, data block 2 is mapped to both block 1 on Disk 3 and block 1 on Disk 4. Data blocks 4, 6 and 8 are mapped to blocks 2, 3 and 4 on Disks 3 and 4.
Data blocks 1 and 2 are then compiled in a striped pattern, along with blocks 3 – 8.
Figure ‎1-13. RAID 10 Volume Block Distribution
Advanced Volume Configurations
The Nexsan iSeries supports several advanced volume operations. Each has its own advantages so it is important to understand their differences to best choose the function most appropriate for your SAN.
Copy Operations
Data can be replicated both offline and online. Offline replication is faster than online replication but both the source and destination volumes must be taken off-line which can create an interruption of service to the volume host(s).
Offline Copy
Offline copy is used to copy any source volume to any destination volume. This is done offline while both the source and destination volumes are unexposed. For more information see Offline Copy in Chapter 4.
Online Copy or Volume Migration
Online data replication allows the source volume to remain online with no interruption of service to the volume host(s). Online copy is performed by adding a child to a mirror and breaking it:
1.
Adding a Child to a Mirror
You can perform online data copy, either by increasing the number of children in a mirrored volume (Figure ‎1-14) or creating a mirrored copy of any other type of volume (Figure ‎1-15).
Since this is online data copy, the source volume does not need to be taken offline and write operations to the source volume can continue while the mirror is being created. Any data written to the volume will be included in the added child(ren). For more information see Migrating Volumes or Online Copy in Chapter 4.
Note:
The added child can be any type of volume, except transparent or snapshot, and it must be the same size or greater than the accessible capacity of the source volume.
 
Example
In Figure ‎1-14, a mirrored volume with two children has another child added. The mirrored volume stays at the head of the hierarchy.
Figure ‎1-14. Adding Another Child to a Mirror
 
Example
In Figure ‎1-15, a concatenated volume becomes one child of a new mirrored volume. This adds a level to the hierarchy. The new mirrored volume becomes the head of the volume hierarchy. The new mirrored volume automatically assumes the LUN from the concatenated volume.
Figure ‎1-15. Creating a Mirror to Add Data Redundancy
 
2.
Breaking Mirror Child
Breaking a child from a mirror enables the volume to be used independently. The removed child is a fully functional volume and can be exposed to any host (Figure ‎1-16). For more information see Breaking a Mirror in Chapter 4.
 
Note:
The mirror volume cannot be broken while it is in the process of synchronization.
 
Example
In Figure ‎1-16, a child is removed from a mirrored volume with two children. This breaks the mirror. If the mirrored volume is exposed or attached to a LUN, the source volume retains the LUN. There is no need to reassign a LUN to the remaining source volume. All read-write operations will be executed without a break in service.
Figure ‎1-16. Breaking a Mirror
Snapshot Operations
Snapshots can be used for serverless backup, reducing the load on the application server. The backup copy from a snapshot is a full copy of the source volume at the time of the snapshot and adequate size must be allocated for the backup volume.
You can create a snapshot, a point-in-time copy, of any volume. A snapshot does not create a full copy of its source volume. It is a dynamic and dependent volume that records only changes to the source volume from the time of the snapshot’s creation. For more information see Snapshot Operations in Chapter 4.
Online Copy versus Snapshot
A mirrored volume copy is a full, complete volume copy. A snapshot is only a record of changes to a volume. Because of this, its capacity can be smaller than a mirrored volume copy. Both a mirrored volume copy and a snapshot can be exposed to a host like any other volume. However, unlike a mirrored copy, a snapshot is nonfunctional if its source volume goes off-line.
 
Note:
A snapshot volume cannot be used to build virtual volumes.
 
Example
Figure ‎1-17, shows a source volume with its snapshot when the snapshot is first created. Initially, a snapshot is empty because there has not yet been a change in its source volume. Only when a write operation is performed on the source volume will the snapshot begin to fill up.
Figure ‎1-17. 1st Snapshot Created
 
Example
Figure ‎1-18 shows the same source and snapshot volume after a write operation to sector 1. The snapshot recorded the original data from sector 1 and then the new data is written to the source volume.
Figure ‎1-18. 1st Write to Source and Update to 1st Snapshot
 
Example
Figure ‎1-19, shows the creation of a second snapshot and a second write operation to the source volume.
Figure ‎1-19. 2nd Snapshot Created, Write to Source & Update to 1st Snapshot
 
Example
Figure ‎1-20, shows the creation of a third snapshot and a third write operation to the source volume. Both Snapshot 1 and Snapshot 2 are updated with the changes to the source volume.
The more active the write operations are to a source volume, the larger its snapshots will need to be. Nexsan requires a beginning snapshot volume of at least one percent of the size of its source volume. A snapshot volume can be resized to accommodate a growing capacity need. When a snapshot volume’s predefined load threshold is exceeded, an alert is set to resize the volume. When exposed, a snapshot must be exposed on the same Nexsan iSeries as its source volume.
Figure ‎1-20. 3rd Snapshot Created, Write to Source & Update to 1st & 2nd Snapshot
Volume Resize
You can expand any virtual volume by expanding its child volumes.
Example
In Figure ‎1-21, Mir is a mirrored volume with an allocated capacity of one terabyte (1T). We want to ‘Resize’ the mirror to two terabytes. This is done as follows:
A: A simple volume of 1 terabyte is added to CH2 and the two volumes are concatenated (XSim2).
B: A simple volume of 1 terabyte is added to CH1 and the two volumes are concatenated (XSim1).
C: The original mirror volume is resized to 2 terabytes.
Note:
Until the original mirror volume Mir is ‘resized’ to two terabytes, the accessible volume remains unchanged (as shown in B).
Figure ‎1-21. Resizing a Volume
 
 
Nexsan iSeries Manager Overview
Nexsan iSeries Manager is a network management system for the Nexsan iSeries.
Nexsan iSeries Manager centrally manages multiple Nexsan iSeries.
Automatically synchronizes parameters in both devices when they are part of a cluster.
Nexsan iSeries Manager manages virtualization processes (e.g. creating, expanding, exposing volumes).
Nexsan iSeries Manager manages advanced volume operations (e.g. copying, snapshots, replicating volumes).
Nexsan iSeries Manager provides performance monitoring for advanced diagnostics.
Nexsan iSeries Manager provides detailed alarm reporting including email notification and alarm propagation.
Managing the Nexsan iSeries
After powering up the Nexsan iSeries, the first thing you must do is to configure its management parameters. This can be done via telnet, SSH, using the Nexsan iSeries LCD panel (for Nexsan iSeries 3000 only) or via a console or dumb terminal to open a direct connection with the Nexsan iSeries RS232 console port.
The Nexsan iSeries can be managed in one of three different ways. Each way requires a different configuration.
In-band
The management terminal (Telnet, SSH, SP server) connects to the Nexsan iSeries Eth1 port. The Eth1 port is used by the Nexsan iSeries for management as well as by the hosts for accessing data accessing storage data (refer to B, Figure ‎1-22).
RS232
The console connects to the Nexsan iSeries RS232 port in a direct connection (refer to C, Figure ‎1-22). The RS232 port is used mainly for initial configuration: setting up the management IP, Mask and Nexsan iSeries name. For more information on RS232 Serial Connection refer to RS232 Serial Connection in Chapter 3.
Out-of-band (certain versions only)
The management terminal (Telnet, SSH, SP server) connects to the Nexsan iSeries dedicated 10/100 management port via a fast Ethernet network (refer to A, Figure ‎1-22). The Nexsan iSeries default IP (10.11.12.123) can be used to connect to the Nexsan iSeries from remote (via telnet). For more information on Telnet/SSH connection refer to Telnet/SSH Connection in Chapter 3.
 
Figure ‎1-22. Nexsan iSeries Management Options

Previous Next