Mastering Windows Server 2016 Hyper-V

(Romina) #1
5 . Enter   the size    for the new VHDX    file,   which   will    be  the size    available   for the iSCSI
target. Note, as shown in Figure 4.17, that all the types of VHDX are available for
the iSCSI target, including the option to zero out the content of the disk when
creating a fixed-size VHDX to ensure that no old data would be exposed. Notice
also that the option to create a differencing VHDX file is available, which is useful
if you have a VHDX with existing content that you wish to make available as part
of the new iSCSI target without copying all the content.
While this is not iSCSI specific, it is vital that if you use any dynamic storage, such
as dynamic or differencing, you have monitoring and processes in place to ensure
that the underlying storage does not run out of space, which would cause problems
for any services using the target. Click Next.
6 . For the iSCSI target name, which is a unique name for each target, select New
iSCSI Target (or an existing target could be selected) and click Next.
7 . Enter a name for the new target. While the iSCSI target name syntax is complex,
you only need to enter a unique name that represents how you wish to identify the
new target (for example, ProjectOne). The wizard will take care of using the name
you enter within the full iSCSI target name. Enter your unique portion of the new
target name and an optional description and click Next.
8 . The next step is to grant permission to the various iSCSI Initiator names (the
clients, known as the IQN) that should be allowed to connect to the new iSCSI
target you are creating. Click the Add button to add each target. If you know the
IQN of the iSCSI Initiator, select Enter A Value For The Selected Type, and enter
the value (the IQN for a client can be viewed via the Configuration tab of the iSCSI
Initiator Control Panel applet on the client).
An easier way is to select the Query Initiator Computer For ID option and enter the
computer’s name, which allows the wizard to scan the remote machine and find
the correct IQN. That method works on Windows Server 2012 and later. Click OK.
Once all the IQNs are added, click Next.
9 . In the Enable Authentication section, leave all the options blank, and click Next.

10 . On the confirmation screen, verify all options, and click Create. Once the target is
created, click Close.

Free download pdf