Step | Reference |
---|---|
Review Microsoft iSCSI Software Target concepts. |
|
Verify the Windows Firewall port exceptions and restrict the network adapters that Microsoft iSCSI Software Target uses to service storage requests. |
|
Implement authentication and encryption for communication between iSCSI initiators and iSCSI targets. |
|
If implementing failover clustering, create a highly available instance (resource group) for iSCSI storage. |
|
Use the Create iSCSI Target Wizard to set up an iSCSI target and specify iSCSI initiator access. |
|
Use the Create Virtual Disk Wizard to create a virtual disk or use the Import Virtual Disk Wizard to import an existing virtual disk, and assign the virtual disk to an iSCSI target to provide storage on an iSCSI subsystem. |
|
Specify one or more iSNS servers to manage access to iSCSI initiators and iSCSI targets. |
|
Manage backup and recovery using snapshots of virtual disks and providing local access to virtual disks and snapshots. |