24-37
Cisco MDS 9000 Fabric Manager Switch Configuration Guide
OL-7753-01
Chapter 24 Configuring IP Storage
Configuring iSCSI
By default, static virtual iSCSI targets are not accessible to any iSCSI host. You must explicitly configure
accessibility to allow a virtual iSCSI target to be accessed by all hosts. The initiator access list can
contain one or more initiators. Each initiator is identified by one of the following:
•
iSCSI node names
•
IP addresses
•
IP subnets
Enforcing Access Control
IPS modules use both iSCSI node name-based and Fibre Channel zoning-based access control lists to
enforce access control during iSCSI discovery and iSCSI session creation.
•
iSCSI discovery--When an iSCSI host creates an iSCSI discovery session and queries for all iSCSI
targets, the IPS module returns only the list of iSCSI targets this iSCSI host is allowed to access
based on the access control policies discussed in the previous section.
•
iSCSI session creation--When an IP host initiates an iSCSI session, the IPS module verifies if the
specified iSCSI target (in the session login request) is a static mapped target, and if true, verifies if
the IP host’s iSCSI node name is allowed to access the target. If the IP host does not have access, its
login is rejected.
The IPS module, then creates a Fibre Channel virtual N port (the N port may already exist) for this IP
host and does a Fibre Channel name server query for the FCID of the Fibre Channel target pWWN that
is being accessed by the IP host. It uses the IP host virtual N port’s pWWN as the requester of the name
server query. Thus, the name server does a zone-enforced query for the pWWN and responds to the
query.
If the FCID is returned by the name server, then the iSCSI session is accepted. Otherwise, the login
request is rejected.
iSCSI User Authentication
The IPS module supports the iSCSI authentication mechanism to authenticate iSCSI hosts that request
access to storage. When iSCSI authentication is enabled, the iSCSI hosts must provide user name and
password information each time an iSCSI session is established.
Only the Challenge Handshake Authentication Protocol (CHAP) authentication method is supported.If
no authentication is configured, local authentication is used. You can use RADIUS authentication or
authentication.
Configuring an Authentication Mechanism
During an iSCSI login, both the iSCSI initiator and target have the option to authenticate each other. By
default, the IPS module allows either CHAP authentication or no authentication from iSCSI hosts.
Note
The authentication for a Gigabit Ethernet interface or subinterface configuration overrides the
authentication for the global interface configuration.
To configure an authentication method for iSCSI, follow these steps:
Содержание DS-C9216I-K9
Страница 26: ...Contents xxvi Cisco MDS 9000 Fabric Manager Switch Configuration Guide OL 7753 01 ...
Страница 42: ...xlii Cisco MDS 9000 Fabric Manager Switch Configuration Guide OL 7753 01 New and Changed Information ...
Страница 128: ...10 8 Cisco MDS 9000 Fabric Manager Switch Configuration Guide OL 7753 01 Chapter 10 Managing System Hardware ...