KernSafe Tutorials - iStorage Server Overview

KernSafe Tutorials - iStorage Server Overview


KernSafe is proud to announce the first tutorial from upcoming Tutorial Series.

In this tutorial we will focus on iStorage Server. We will explain what iSCSI is, for what you can use iStorage Server, how to create iSCSI Target and finally how to connect to it.

You can learn more about iStorage Server on our website here:
http://www.kernsafe.com/product/istor...

You can download FREE TRIAL version here:
http://www.kernsafe.com/download.aspx

If you have any questions, please feel free to ask them in comments below or post them on our forum: http://www.kernsafe.com/forum

Facebook:
http://www.facebook.com/profile.php?i...

Twitter:
http://twitter.com/KernSafe

LinkedIn:
http://twitter.com/KernSafe

Blog:
http://kernsafe.blog.com

KernSafe is global leader in storage virtualization and data security solutions from desktop to the data center. Our costumers vary from individuals, through middle size firms and finishing at big multinational companies. We are dedicated to produce the highest quality software possible and, at the same time, provide the outstanding customer support. As one of the fastest-growing public software organizations, KernSafe is producing software that is easy to use but can also benefit in professional solutions. You can check KernSafe products offer on our website www.KernSafe.com
Closed Caption:

hello I'm here with a cosic technologies
and in this
first tutorial all the upcoming tutorial
series
I would love to cover up all over the
main features
of ice or so but before I will do it
I would like to explain lot I sconces
and people are or what you can use it
for I discuss
ninth floor internet small computer
system interface
and it is an IP based storage networking
standard
not the issues foreign key data storage
facilities
for example you can make ice get started
all your partition home server machine
using
I stirs server so without lying you
think
ice gas initiator K easily connect to it
and use that partition as its own our
show how to do it later in this tutorial
main benefits of Icecast
are dot ice gas can be run over long
distances
using already existing network
infrastructure
simplified storage management
easy edited television low-cost car the
requirements because you will use how
are you already her
therefore you don't need to buy any
special hardware
to use Icecast scalability and
flexibility
produced time management training
requirements because every network
administrator
will know how to manage Icecast network
ability to create San
from XD think directly attached or
sellers typically
I've got it also comparable in
performance to Fibre Channel
because many the bottom Mike is I over
this not been great
of network itself and
of course security because you can use
IP & Shop organization therefore
no one will know the proper right can
access the target you
already created
let me move to I saw the server itself I
stutter stutter
is currently I Scott targets of I
started server
has been recipe updated version 2.3 and
support
features like hi ability snapshot net
what it did
and more it came change literally
and a device like printer optical drive
they've devised
e2 on ice gets pounded therefore
you can use it in many scenarios and not
be limited
to what can or cannot be ice get started
you can use it
in almost any Windows operating system
and it kept he made it Italian version
you can download
33 on from our website
as you can see interface of I sort is a
very friendly for user
everything can be very easy access on
top
we have on me from where we can access
or other than
functions you know dot we have gotten
dot allow us to quickly create a new
target
starts observer or change that
on the left like fun we've
officials like targets applications IP
filters
using group and of course logs we can
also access does options by using to
start
in the main window of my sister
before I went 3-8 eyes get started at
the first caller
op or device type ice or server can use
to create
ice get started
in hard disk type you can create ice
custard
devised by using physical disk partition
standard image file orville to our hard
disc image file you can create a blank
fine or use and exist defiant to store
is
data around space
in this type you can treat veered toward
is and store
dig deeper into memory which of course
cause heights on for Speed
much all data will be lost after
completing its shutdown or reboot
security measures I love it senior
to image style because all images
our individual additionally imagine
skimpy encrypt it with
shop user secret therefore no one we
know
password cannot them this partition
is different from the eyeball because he
will use your existing storage device
partition
such as the RD try to create ice custard
physical disk in this fight
you can use your existing disk storage
device such as
AB or C studies ice custard
and cd/dvd devised
you can create I sky started by using
physical optical drive
or cd/dvd units file and cd/dvd
missile you can create target using
image files like easel beam
MDS and so on to share your cd/dvd
images to your client
in physical drive you can use your
existing
optical storage device such as DVD ROM
us on ice custard generics company
in this type you may map genetic study
devices
your initiator such as USB storage
data device off because Connor to use
ice custard now at me create
I just started using standard image file
to do it
please click on hard disk and press Next
button
from this Lease shoes
image file and press Next here
sellick standout image
if I am and Press next button again and
it's been no
we can specify if we want to use
existing
image file or create a new one Indies
tutorial our create new each file
and I will also change its size
we may also choose select option use
their spine
on NTFS file system if we will check it
it with a safe are hard disk space by
expanding image via depending on it
content used
after you finish press Next button again
and it's been ok we may choose
authorization mechanism anti-theft for
mechanism to choose from
and I miss chop IP filters
and me in and I'm with Nick Cannon
all initiators when the kid access
permission
when out any others Asian acquired chop
challenge handshake authorization
protocol
all initiate or need to specify I chop
user
and secret to connect dodd in Ippo this
mechanism
all initiators will be others I by
the incoming IP address defined by I P
her to the roles makes security policy
is determined by both
shop and I senators in this tutorial
I will choose and I'm mechanism
in this window you may choose the name
for your ice custard
you may also select two options
day first official is report
of Marie only device when the initiator
cannot get it right
axes if you will select this option
system when keep client I report when
she will want to load
card we know it and you're right axes
second option
and enable more people initiator with
for access
connected soaring in class 3
its main use for clusters because then
multiple initiators can get before right
access to the target device press Finish
button
to finish creating your ice custard as
we can see
we successfully created ice custard
now let me connect with the ice custard
we just created by using Microsoft
initiator
weekend porn on
Microsoft initiator just by click link
on Start button and starting typing
initiator then
leak on the initiator I come and main
window of initiator will appear
speech to be discovered up
leak on D discover portal button
and type IP address all the server
and click OK
later sweet to the target stop to check
if your target was successfully discover
as we can see might touch it was
successfully start
and I can connect to it by clicking on
Connect button
depending on if you specify I chop
username
and guarded secret click on the Advanced
button
and please provide your child username
and guarded secret bad thing
I didn't do it are just leavitt Antec
after dark please click on OK button
now weaker successfully connected to the
ice costar the devise
bad as we can see it in appear in Mike
computer
because same ask Norma hard drive
it need to be four months before you
will use it so please
said to disk management you can access
it
by leaking own start button a ride
peak on my computer and shoes
manage
after Computer Management window appear
from the left side on sure this
management and
weaned away initiator disc with appear
just click
on anchi artist will become
online but its need to be four months so
please click
right mouse button on it and
choose a new simple volume then just
follow without instructions
now are partisan is being former so we
need to wait for it to finish
as we can see
are you try appeared in my computer and
we can now
he acted like it was I'm normal
local hard drive
thank you for your attention goddess all
I have to be paid for today
and 30 ism

Video Length: 12:58
Uploaded By: kernsafe
View Count: 2,903

Related Software Products
iStorage Server
iStorage Server

Published By:
ZsysTeam Studio

Description:
KernSafe iStorage Server is an advanced and powerful, full-featured iSCSI Target software that makes any x86, x64 or even Itanium Windows machine into an iSCSI Target. This new release, iStorage Server has added support for Microsoft Virtual Disk File (VHD) and VHD snapshots. BRBeing an advanced and powerful, full-featured software-only iSCSI Target for Microsoft Windows (both commercial and free versions are available), it allows you quickly export existing storages such disk images, ...

KernSafe iSCSI Target
KernSafe iSCSI Target

Published By:
ZsysTeam Studio

Description:
KernSafe iStorage Server is an advanced and powerful, full-featured software-only iSCSI Target Server for Microsoft Windows (both commercial and free versions).BRiStorage Server is IP SAN solution and allows you quickly export an existing storage such physical disk, partition, CD/DVD-ROM, generaic SCSI device and even a variety of popular CD/DVD images (such as: .iso, .bin, .mdf, .cdi, .b5i, .nrg, .ccd, .sub, .img, .raw.) to all the clients, that delivers immediate benefits allowing storage ...

KernSafe Free iSCSI Target
KernSafe Free iSCSI Target

Published By:
KernSafe Technologies, Inc.

Description:
KernSafe iStorage Server is an advanced and powerful, full-featured software-only iSCSI Target Server for Microsoft Windows (both commercial and free versions).BRiStorage Server is IP SAN solution and allows you quickly export an existing storage such physical disk, partition, CD/DVD-ROM, generaic SCSI device and even a variety of popular CD/DVD images (such as: .iso, .bin, .mdf, .cdi, .b5i, .nrg, .ccd, .sub, .img, .raw.) to all the clients, that delivers immediate benefits allowing storage ...


Related Videos
KernSafe Tutorials - TotalMounter Starters Guide
KernSafe Tutorials - TotalMounter Starters Guide

In this tutorial we will focus on TotalMounter, only free software that allows you to create virtual burner to burn ISO files! Such feature is great if you want to store files in ISO. You may use any burning program of your choice. Except for that unique feature, you can mount almost any file type (.iso, .cdi, .bin, .mds, .mdf, .img, .raw, .ccd, .nrg.) including virtual disk files .img and .vhd. Aside from mounting those files, you may create new virtual disk files and ...
Video Length: 12:18
Uploaded By: kernsafe
View Count: 13,102

KernSafe Tutorials - High Availability iSCSI SAN for VMware ESXi Server
KernSafe Tutorials - High Availability iSCSI SAN for VMware ESXi Server

In this tutorial we will focus on building High Availability platform for VMware ESXi Server. Combining ESXi with iStorage Server will be very profitable for any user that wishes to create a high available platform that will characterize with minimum downtime. High availability is the implementation of technology so that if a component fails, another can take over for it. By using highly available platforms, the downtime for a system can be reduced, and, in many cases, it can be ...
Video Length: 15:12
Uploaded By: kernsafe
View Count: 9,500

KernSafe Tutorials - Bulding iSCSI SAN for Citrix XenServer
KernSafe Tutorials - Bulding iSCSI SAN for Citrix XenServer

In this tutorial we will focus on building iSCSI SAN for Citrix XenServer. Combining Citrix with iStorage Server will allow for much easier expanding storage of your virtualized server. On top of that you will be able to directly use storage devices of existing Windows server in Citrix XenServer. Citrix XenCenter: http://www.citrix.com/English/ss/downloads/index.asp You can learn more about iStorage Server on our website here: br ...
Video Length: 13:27
Uploaded By: kernsafe
View Count: 7,363

KernSafe Tutorials - iStorage Server 2.50 Overview
KernSafe Tutorials - iStorage Server 2.50 Overview

In this tutorial we will focus on new features available in iStorage Server 2.50. One of the most interesting in them is virtual CD/DVD-RW burner that allows to export virtual burner as a iSCSI target (server don't need to be equipped with any physical burner) to be able to burn directly to an ISO file. It also supports auto-mount feature which allows to automatically mount new blank image after burning process is finished. It is perfect solution for creating backups. Version 2.50br ...
Video Length: 06:47
Uploaded By: kernsafe
View Count: 4,254

KernSafe Tutorials - Using FREE mobile iSCSI Initiator with iStorage Server
KernSafe Tutorials - Using FREE mobile iSCSI Initiator with iStorage Server

In this tutorial we will focus on using first in the world, free mobile iSCSI Initiator for Windows Mobile and Embedded systems. KernSafe WinCE iSCSI Initiator is our newest product which is and will remain free. It allow user to connect to iSCSI target using mobile device. It is first such software in the world! KernSafe is a pioneer in entering mobile iSCSI market. Thanks to it, expanding storage in users device never was so easy, first user need to create an iSCSI SAN (Can ...
Video Length: 08:03
Uploaded By: kernsafe
View Count: 2,419

KernSafe Tutorials - iStorage Server Security Images with CHAP Authorization
KernSafe Tutorials - iStorage Server Security Images with CHAP Authorization

In this tutorial we will focus on creating iSCSI target using encrypted Security Images with CHAP Authorization. Thanks to this option every employee can have its own private encrypted space where he/she can store data that can't be accessed by anyone else. You can learn more about iStorage Server on our website here: http://www.kernsafe.com/product/istor... You can download FREE TRIAL version here: http://www.kernsafe.com/download.aspx If you have any ...
Video Length: 07:23
Uploaded By: kernsafe
View Count: 583

KernSafe Tutorials - iStorage Server Remote Burning to CD/DVD
KernSafe Tutorials - iStorage Server Remote Burning to CD/DVD

In this tutorial we will focus on remote burning to CD/DVD via iSCSI. The benefit of that is you don't need to have an optical drive to do it, you can use one remotely. It saves you time and money because every client can use the same optical drive. You can learn more about iStorage Server on our website here: http://www.kernsafe.com/product/istor... You can download FREE TRIAL version here: http://www.kernsafe.com/download.aspx Detailed White Paper ...
Video Length: 05:29
Uploaded By: kernsafe
View Count: 454

Copyright © 2025, Ivertech. All rights reserved.