A list of initial setup tasks is available on the Setup tab. The list of initial setup tasks shows you how to set up a . If you use the steps outlined in the list of initial setup tasks, you can make sure that the basic steps to set up the storage
subsystem are completed.
Use the Initial Setup Tasks list the first time that you set up a storage subsystem to perform these tasks:
Locate the storage subsystem – Find the physical location of the storage subsystem on your network. The storage subsystem can be identified with a label.
Give a new name to the storage subsystem –Use a unique name that identifies each storage subsystem.
Set a storage subsystem password – A password prevents manipulation of the storage subsystem that is not approved. An example is deleting a . Set a password for these functions.
Configure iSCSI Host Ports – Configure network parameters for each iSCSI host port automatically or specify the configuration information for each iSCSI
host port. (If you are not using an iSCSI controller, you can ignore this task.)
Configure the storage subsystem – Create arrays, logical drives, and hot spare disk drives.
Map Logical Drives – Map logical drives to hosts or host groups.
Save Configuration – Save the configuration parameters in a file that you can use to restore the configuration, or reuse the configuration on
another storage subsystem.
After you complete the basic steps for configuring your storage subsystem, you can perform these optional tasks:
Manually Define Hosts – Define the hosts and host port identifiers that are connected to the storage subsystem. Use this option only if the host
is not automatically recognized and shown in the Mappings tab.
Configure Ethernet Management Ports – Configure the network parameters for the Ethernet management ports on the controllers if you are managing the storage subsystem
by using connections.
View or start
– Your might include premium features. View the premium features that are available and the premium features that are already started.
You can start available premium features that are currently stopped.
Manage additional iSCSI Settings – If you are not using an iSCSI controller, you can ignore this task. If you are using an iSCSI controller, you can configure
iSCSI settings for authentication, identification, and discovery.