Page131) From the command line, type in ‘iscsi-ls’This will list all the iSCSI devices that have sessions opened. Look for the duplicate Drive and Libraryentries. (i.e., if you have four entries, two might be the tape drive (spi.1.0.0), and two might be for thelibrary (spi.1.0.1)Each entry will have a unique Host ID associated with it (i.e., Host ID 65 might be for the firstspi.1.0.0, while Host ID 66 might be for the second spi.1.0.0 entry)2) Select one of the Host ID’s that is associated for the drive, and one of the Host ID’s that isassociated for the libraries. (i.e., if the drive has Host ID 65 and 66, note ID 66; if the library hasHost ID’s 67 and 68, note ID 68From the Linux command line, type ‘iscsi-kill-session –i 66From the Linux command line, type ‘iscsi-kill-session –i 68If you run the ‘iscsi-ls’ again, you should only see a single instance for the drive, and a single instancefor the library.Note: every time you restart the iscsi services, all the sessions will be opened back up again. Also, thesession ID’s change, so it will be necessary to go back thru the steps above to kill the new iscsi sessions.Avoiding duplicate iSCSI devices discovered by RH4To avoid logging in to multiple devices that were identified in a iSCSI Discovery (i.e., when starting theiSCSI services), make the following changes to your RedHat 4 iscsi.conf file located in the /etc directory.Make sure you restart the service after making these changes.# --------------------------# Discovery Address Category# --------------------------DiscoveryAddress=192.168.1.133:3260DiscoveryAddress=192.168.2.133:3260Specify the IP address(s) and corresponding ports of the target devices that you want to discover.Note: Even though you only specify these target devices, other devices might be discovered whenstarting the service. An exclusion of everything that you do not want will be done next.ENABLE/DISABLE TARGETS# ----------------------TargetName=iqn.1988-11.com.dell.2005c5:spi.0.0.0Enabled=noTargetName=iqn.1988-11.com.dell.2005c5:spi.0.0.1Enabled=noThe iscsi.conf statements above will disable the individual targets that you do not want to log in to. In theexample above, the target that contains spi.0.0.0 is an LT04 tape drive, while the target that contains0.0.1 is the device that represents the Medium Changer.To verify that the correct target devices are removed (and the correct ones remain), ensure your iscsiservices are running, and enter ‘iscsi-ls’. It will provide you a listing of all the devices that were discoveredand enabled.Viewing the status of your iSCSI connectionsIn ISCSI Web Manager interface, click the iSCSI connections, the Host Ports will show the status of eachiSCSI port you attempted to connect and the configuration state of all IP addresses. If connections are notpresent, Check the following:• Are all cables securely attached to each port on the host server and iSCSI to SAS bridge?• Is TCP/IP correctly configured on all target host ports?• Is CHAP set up correctly on both the host server and the iSCSI to SAS bridge?