Adaptec 5325302057 User Guide - Page 83

Controlling Access to Your IP SAN, Limiting Discovery of iSCSI Targets with Auto-discovery Control

Page 83 highlights

Chapter 7 Controlling Access to Your IP SAN This chapter describes how to use Adaptec Storage Manager to restrict and control access to your IP SAN and iSCSI targets (logical devices) with auto-discovery control lists, authentication, and the Security Manager. Limiting Discovery of iSCSI Targets with Auto-discovery Control Lists If you want to limit which iSCSI initiators can discover an iSCSI target (logical device), you can create an auto-discovery control list which will allow one or more specified iSCSI initiators to discover an iSCSI target while preventing other iSCSI initiators from discovering it, as illustrated in this figure. iSCSI Target iSCSI Auto-discovery control list allows Initiator A to discover target Auto-discovery control list denies discovery to Initiator B iSCSI Initiator A iSCSI Initiator B Each iSCSI target can have its own auto-discovery control list, with specified iSCSI initiators that are permitted to discover it. Note Auto-discovery control lists don't prevent iSCSI initiators from logging into iSCSI targets that aren't on their control lists. If you are using iSNS to discover iSCSI targets and want to control which logical devices are logged into by which iSCSI initiators, you must set CHAP authentication. Without CHAP authentication, all iSCSI initiators will be able to log in to all iSCSI targets. See "Controlling Access to Your IP SAN with Authentication" on page 79 for more information. Snap Server 700i Series User's Guide 77

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • 148
  • 149
  • 150
  • 151
  • 152
  • 153
  • 154
  • 155
  • 156
  • 157
  • 158
  • 159
  • 160
  • 161
  • 162
  • 163
  • 164
  • 165
  • 166
  • 167
  • 168
  • 169
  • 170
  • 171
  • 172
  • 173
  • 174
  • 175
  • 176
  • 177
  • 178
  • 179
  • 180
  • 181
  • 182
  • 183
  • 184
  • 185
  • 186
  • 187
  • 188
  • 189
  • 190
  • 191
  • 192
  • 193
  • 194
  • 195
  • 196
  • 197
  • 198
  • 199
  • 200
  • 201
  • 202
  • 203
  • 204
  • 205
  • 206
  • 207
  • 208
  • 209
  • 210
  • 211
  • 212
  • 213
  • 214
  • 215
  • 216
  • 217
  • 218
  • 219
  • 220
  • 221
  • 222
  • 223
  • 224
  • 225
  • 226
  • 227
  • 228
  • 229
  • 230
  • 231
  • 232
  • 233
  • 234
  • 235
  • 236

Snap Server 700i Series User’s Guide
77
Chapter 7
Controlling Access to Your IP SAN
This chapter describes how to use Adaptec Storage Manager to restrict and control
access to your IP SAN and iSCSI targets (logical devices) with auto-discovery
control lists, authentication, and the Security Manager.
Limiting Discovery of iSCSI Targets with Auto-discovery
Control Lists
If you want to limit which iSCSI initiators can discover an iSCSI target (logical
device), you can create an auto-discovery control list which will allow one or more
specified iSCSI initiators to discover an iSCSI target while preventing other iSCSI
initiators from discovering it, as illustrated in this figure.
Each iSCSI target can have its own auto-discovery control list, with specified iSCSI
initiators that are permitted to discover it.
Note
Auto-discovery control lists don’t prevent iSCSI initiators from logging into
iSCSI targets that aren’t on their control lists. If you are using iSNS to discover iSCSI
targets and want to control which logical devices are logged into by which iSCSI
initiators, you must set CHAP authentication. Without CHAP authentication, all
iSCSI initiators will be able to log in to all iSCSI targets. See “Controlling Access to
Your IP SAN with Authentication” on page 79 for more information.
iSCSI
Auto-discovery control
list denies discovery to
Initiator B
Auto-discovery control list
allows Initiator A to
discover target
iSCSI Initiator A
iSCSI Initiator B
iSCSI Target