Verifying the Migration

This topic discusses the steps that you can use to verify that the migration successfully completed.

Verifying the destination server configuration

To verify that the destination server has been properly configured after migration, you can verify the listening endpoints and connectivity and run a scan with the Best Practices Analyzer.

Verify the listening endpoints

On the iSCSI Software Target server, you can validate that the target portals have been configured as desired by using the following Windows PowerShell command:

PS > & netstat.exe -nao | findstr 3260 | findstr LISTENING
  TCP    10.121.26.107:3260     0.0.0.0:0              LISTENING       1560
  TCP    10.121.26.126:3260     0.0.0.0:0              LISTENING       1560
  TCP    [2001:4898:0:fff:0:5efe:10.121.26.126]:3260  [::]:0                 LISTENING       1560
  TCP    [2001:4898:f0:1001:f063:8fc5:52e6:2310]:3260  [::]:0                 LISTENING       1560

The list of IP addresses and port pairs in the listening state needs to match the desired set of target portals.

Note

If ports other than the default 3260 are being used, the command needs to be altered to reflect the alternate IP ports.

Verify the basic connectivity

To validate that the iSCSI Software Target server is reachable from other computers on the network, from a computer that has the Telnet Client feature installed, use the following Windows PowerShell command:

PS > telnet.exe <iSCSI Software Target machine name or IP> 3260

If there is a successful connection, Telnet Client will show a blinking cursor at the top of the window. Press any key to close Telnet Client.

Perform a Best Practices Analyzer scan

To verify that Microsoft iSCSI Software Target 3.3 is optimally configured on Windows Server 2008 R2 after migration, we recommend that you run a Best Practices Analyzer (BPA) scan on the role.

BPA is a server management tool that is available in Windows Server 2008 R2. After the migration of Microsoft iSCSI Software Target 3.3 to Windows Server 2008 R2 is complete, BPA can help you ensure that your server is configured according to best practices. You can use the Server Manager console UI or Windows PowerShell to perform BPA scans and view results. For detailed information about how to scan your role and view results, see the Best Practices Analyzer Help (https://go.microsoft.com/fwlink/?LinkId=122786).

Verifying the configuration of other computers in the enterprise

Validating the migration of Microsoft iSCSI Software Target 3.3 to the destination server includes ensuring that the iSCSI initiators can discover and fully access all features of the iSCSI protocol.

Verify that the iSCSI initiators can discover iSCSI Software Target

To verify that Microsoft iSCSI Software Target 3.3 is able to discover the iSCSI targets that are exposed by the server to the initiators, use the following Windows PowerShell commands:

PS > & iscsicli AddTargetPortal <ip-address> 3260
PS > & iscsicli.exe ListTargets

If the commands execute without errors, the initiator is capable of discovering the targets that are offered by the server.

Verify that the iSCSI initiators can log on

The second step is to verify that the iSCSI initiators are able to log on to the iSCSI targets that are exposed by the server. This can be accomplished by using the following Windows PowerShell command:

PS > & iscsicli.exe  LoginTarget <target IQN> T <ip address> 3260 Root\ISCSIPRT\0000_0 * * * * * * * * * * * * *

Note

If you are using CHAP and Reverse CHAP authentication, you may need to specify more parameters. For more information, consult the documentation in the iscsicli.exe.

If the command executes without errors, the iSCSI initiator has successfully logged on to the target, and the disks are exposed to the iSCSI Software Target server.