Controller Management

3.4.1Monitoring User Logins

The AUDIT function continuously monitors logins to the controller and provides alerts in the event of unauthorized login attempts (Figure 3–47).

Host Int 15:04:07 User Logout Client1, port:4 S_ID:000004

Host Int 15:04:47 Authenticated Login Client10, port:3 S_ID:000002

Figure 3–47User Login Messages

USER AUDIT=ONOFF enables/disables the user auditing function. When enabled, the system will display a message when a user logs in or out. Default is OFF.

USER CONNECTIONS displays a list of all the currently connected users and the host port to which the user is connected (Figure 3–48).

Figure 3–48User Connections Screen

3.4.2Zoning (Anonymous Access)

This type of configuration provides the first-level protection. The LUN identification scheme can be customized for each host port. Any unauthorized user accessing the controller will be considered “anonymous” and granted the zoning rights for the host port to which they are connected.

The ZONING command will display the current settings for the host ports. The LUN Zoning chart indicates which internal LUNs the users will be able to access (with Read-only and Read/Write privileges) and where the internal LUN will appear to the users. In Figure 3–49,only internal LUN 1 can be accessed and it is read-only. It will appear as LUN 0 to the users.

Figure 3–49Current Zoning Configuration Screen

ZONING EDIT lets you change the settings for the host ports. You will be asked to select a host port to change and enter the mapping for each LUN (Figure 3–50).The default configuration is to deny access to all the LUNs.

ZONING DEFAULT restores the zoning of a host port back to its default settings.

007-5510-002

73

Page 87
Image 87
APC 15000 RAID manual Monitoring User Logins, Zoning Anonymous Access