7

Volume Exposure & Security

IN THIS

CHAPTER

INTRODUCTION TO

VOLUME EXPOSURE &

SECURITY

CREATING AN ISCSI TARGET

CHANGING THE

DEFAULT IDENTITY

CREATING AN IDENTITY

ADDING INITIATORS TO AN IDENTITY

ASSIGNING IDENTITY CREDENTIALS

CONNECTING AN

IDENTITY AND TARGET

EXPOSING AN ISCSI TARGET AND LUN

After you have created your virtual volumes and storage hierarchies, you want to expose them securely to hosts using the iSCSI protocol. Up to this point, all volumes created are invisible and inaccessible to network hosts.

This chapter explains how to create iSCSI targets; assign LUNs to volumes and attach LUNs to iSCSI targets. This enables hosts with installed iSCSI initiators to view and access the exposed volumes.

This chapter also explains how to create identities, assign access rights and enable authentication methods to control iSCSI initiator access to exposed volumes.

Chapter 7: Volume Exposure and Security

107

Page 113
Image 113
SANRAD V-Switch manual Volume Exposure & Security, Volume Exposure and Security 107