IOMEGA IX4-200d - How to add Multiple iSCSi Initiator Sessions

Posted on 2014-08-03
Last Modified: 2014-08-17

I have an Iomega ix4-200d storage device.  I carved out 1 TB under the iSCSi section.  I add the Target Device IP in the iSCSi Initiator on a Windows 7 machine for example and it adds the 1 TB of storage from the IOMEGA.  I have to format the 1 TB in the Device Manager Storage Section, and it then is able to add an extra 1 TB to my computer.  I add a couple files to this new 1 TB location.

Now when I'm on another computer (different Windows 7), I open the iSCSi Initiator and add the Target Device IP of the IOMEGA to be able to connect to the 1 TB of storage from the IOMEGA.  It adds successfully and I can see the content inside that was initially added from the first windows 7 machine.

Now here's my issue, when I try to add something new to the 1 TB storage from the IOMEGA on lets say the first windows 7 machine, it adds the content successfully.  But when I go over to the second windows 7 machine and check the content of the 1 TB storage from the IOMEGA it doesn't show the new content.

It's like it's not updating on each side.

Are there certain settings in the iSCSi Initiator section that have to be configured so that 2 windows 7 machines for example can connect to the 1 TB IOMEGA Storage at the same time with everything updating?

Question by:Lumious
    LVL 12

    Accepted Solution

    Are you using this setup for file share storage between 2 computers?
    iSCSI target is not the right option.
    You need to create a share on storage and access it using \\ixstorage\foldername and map it as a network drive on both machines.

    Author Comment


    I'm guessing you aren't able to have multiple connections to the iSCSi target so that everything updates accordingly?

    So the better option would be to create a shared folder on the storage device and map that as a network drive on both machines?


    Featured Post

    Top 6 Sources for Identifying Threat Actor TTPs

    Understanding your enemy is essential. These six sources will help you identify the most popular threat actor tactics, techniques, and procedures (TTPs).

    Join & Write a Comment

    We all have limited time to study long and complicated information about RAID theories, but you may be interested as to how RAID 5 works. We made it simple for you by providing the shortest and easiest explanation ever.   First we need to remind …
    Ever notice how you can't use a new drive in Windows without having Windows assigning a Disk Signature?  Ever have a signature collision problem (especially with Virtual Machines?)  This article is intended to help you understand what's going on and…
    This tutorial will walk an individual through the process of installing the necessary services and then configuring a Windows Server 2012 system as an iSCSI target. To install the necessary roles, go to Server Manager, and select Add Roles and Featu…
    This Micro Tutorial will teach you how to reformat your flash drive. Sometimes your flash drive may have issues carrying files so this will completely restore it to manufacturing settings. Make sure to backup all files before reformatting. This w…

    733 members asked questions and received personalized solutions in the past 7 days.

    Join the community of 500,000 technology professionals and ask your questions.

    Join & Ask a Question

    Need Help in Real-Time?

    Connect with top rated Experts

    20 Experts available now in Live!

    Get 1:1 Help Now