
Chapter 7: Volume Exposure and Security
7-1
7
Volume Exposure & Security
IN THIS
CHAPTER
Introduction to
Volume Exposure &
Security
Creating an iSCSI
Target
Changing the
Default Identity
Creating an Identity
Adding Initiators to
an Identity
Assigning Identity
Credentials
Connecting an
Identity and Target
Exposing an iSCSI
Target and LUN
After you have created your virtual volumes and storage
hierarchies, you want to expose them securely to hosts using the
iSCSI protocol. Up to this point, all volumes created are invisible
and inaccessible to network hosts.
This chapter explains how to create iSCSI
targets
; assign
LUNs
to
volumes and attach LUNs to iSCSI targets. This enables hosts with
installed iSCSI initiators to view and access the exposed volumes.
This chapter also explains how to create i
dentities
, assign access
rights and enable
authentication methods
to control iSCSI initiator
access to exposed volumes.
Содержание I3.1.1205
Страница 1: ......
Страница 6: ...SPCLI3 1 1205 SANRAD V Switch CLI User Manual ...
Страница 22: ...xvi SANRAD V Switch CLI User Manual ...
Страница 40: ...2 12 SANRAD V Switch CLI User Manual ...
Страница 80: ...4 28 SANRAD V Switch CLI User Manual ...
Страница 118: ...6 26 SANRAD V Switch CLI User Manual ...
Страница 152: ...7 34 SANRAD V Switch CLI User Manual ...
Страница 186: ...9 8 SANRAD V Switch CLI User Manual ...
Страница 214: ...10 28 SANRAD V Switch CLI User Manual ...
Страница 300: ...12 14 SANRAD V Switch CLI User Manual ...