Adaptec 5325302053 User Guide - Page 89

Controlling Access to Your IP SAN, Limiting Discovery of iSCSI Targets with Discovery Control Lists

Page 89 highlights

Chapter 7 Controlling Access to Your IP SAN This chapter describes how to use Adaptec Storage Manager to restrict and control access to your IP SAN and iSCSI targets (logical devices) with auto-discovery control lists, authentication, and the Security Manager. Limiting Discovery of iSCSI Targets with Discovery Control Lists If you want to limit which iSCSI initiators can discover an iSCSI target (logical device), you can create a discovery control list which will allow one or more specified iSCSI initiators to discover an iSCSI target while preventing other iSCSI initiators from discovering it, as illustrated in this figure. iSCSI Target iSCSI Discovery control list allows Initiator A to discover target Discovery control list denies discovery to Initiator B iSCSI Initiator A iSCSI Initiator B Each iSCSI target can have its own auto-discovery control list, with specified iSCSI initiators that are permitted to discover it. Note Discovery control lists don't prevent iSCSI initiators from logging into iSCSI targets that aren't on their control lists. If you are using iSNS to discover iSCSI targets and want to control which logical devices are logged into by which iSCSI initiators, you must set CHAP authentication. Without CHAP authentication, all iSCSI initiators will be able to log in to all iSCSI targets. See "Controlling Access to Your IP SAN with Authentication" on page 85 for more information.

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • 148
  • 149
  • 150
  • 151
  • 152
  • 153
  • 154
  • 155
  • 156
  • 157
  • 158
  • 159
  • 160
  • 161
  • 162
  • 163
  • 164
  • 165
  • 166
  • 167
  • 168
  • 169
  • 170
  • 171
  • 172
  • 173
  • 174
  • 175
  • 176
  • 177
  • 178
  • 179
  • 180
  • 181
  • 182
  • 183
  • 184
  • 185
  • 186
  • 187
  • 188
  • 189
  • 190
  • 191
  • 192
  • 193
  • 194
  • 195
  • 196
  • 197
  • 198
  • 199
  • 200
  • 201
  • 202
  • 203
  • 204
  • 205
  • 206
  • 207
  • 208
  • 209
  • 210
  • 211
  • 212
  • 213
  • 214
  • 215
  • 216
  • 217
  • 218
  • 219
  • 220
  • 221
  • 222
  • 223
  • 224
  • 225
  • 226
  • 227
  • 228
  • 229
  • 230
  • 231
  • 232
  • 233
  • 234
  • 235
  • 236
  • 237
  • 238

Chapter 7
Controlling Access to Your IP SAN
This chapter describes how to use Adaptec Storage Manager to restrict and control
access to your IP SAN and iSCSI targets (logical devices) with auto-discovery
control lists, authentication, and the Security Manager.
Limiting Discovery of iSCSI Targets with Discovery Control
Lists
If you want to limit which iSCSI initiators can discover an iSCSI target (logical
device), you can create a discovery control list which will allow one or more
specified iSCSI initiators to discover an iSCSI target while preventing other iSCSI
initiators from discovering it, as illustrated in this figure.
Each iSCSI target can have its own auto-discovery control list, with specified iSCSI
initiators that are permitted to discover it.
Note
Discovery control lists don’t prevent iSCSI initiators from logging into iSCSI
targets that aren’t on their control lists. If you are using iSNS to discover iSCSI
targets and want to control which logical devices are logged into by which iSCSI
initiators, you must set CHAP authentication. Without CHAP authentication, all
iSCSI initiators will be able to log in to all iSCSI targets. See “Controlling Access to
Your IP SAN with Authentication” on page 85 for more information.
iSCSI
Discovery control list
denies discovery to
Initiator B
Discovery control list allows
Initiator A to discover target
iSCSI Initiator A
iSCSI Initiator B
iSCSI Target