7
Volume Exposure & Security
IN THIS
CHAPTER
INTRODUCTION TO
VOLUME EXPOSURE &
SECURITY
CREATING AN ISCSI TARGET
CHANGING THE
DEFAULT IDENTITY
CREATING AN IDENTITY
ADDING INITIATORS TO AN IDENTITY
ASSIGNING IDENTITY CREDENTIALS
CONNECTING AN
IDENTITY AND TARGET
EXPOSING AN ISCSI TARGET AND LUN
After you have created your virtual volumes and storage hierarchies, you want to expose them securely to hosts using the iSCSI protocol. Up to this point, all volumes created are invisible and inaccessible to network hosts.
This chapter explains how to create iSCSI targets; assign LUNs to volumes and attach LUNs to iSCSI targets. This enables hosts with installed iSCSI initiators to view and access the exposed volumes.
This chapter also explains how to create identities, assign access rights and enable authentication methods to control iSCSI initiator access to exposed volumes.
Chapter 7: Volume Exposure and Security | 107 |