Adaptec iSA1500 User Guide - Page 73

Using Access Control Lists

Page 73 highlights

Controlling Access and Adding Security 2 Under Options beside the User Name: ■ Click the Lock icon to change the user's password. ■ Click the Trash Can icon to delete the user. 3 Follow the on-screen instructions to edit or delete the authentication user account. All authentication user account changes take effect immediately. Using Access Control Lists When you create an iSCSI target, you can enable Access Control Lists (ACL) to control which initiators can access an iSCSI target. (See Creating an iSCSI Target on page 4-11 for more information.) ACLs restrict target access to just one initiator and prevent other initiators from logging in, as shown in the example below. Initiator A Server Initiator B ACL Allows Initiator A Storage Enclosure Server ACL Denies Initiator B Each iSCSI target can have its own ACL. When a specific target has ACL enabled, only initiators on the ACL are permitted to access that target. ACLs take precedence over CHAP (see page 5-5). ! Caution: To avoid abruptly losing your connection to your data, do not modify ACL settings. 5-7

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • 148
  • 149
  • 150
  • 151
  • 152
  • 153
  • 154
  • 155
  • 156
  • 157
  • 158
  • 159
  • 160
  • 161
  • 162
  • 163
  • 164
  • 165
  • 166
  • 167
  • 168
  • 169
  • 170
  • 171
  • 172
  • 173
  • 174
  • 175
  • 176
  • 177
  • 178
  • 179
  • 180
  • 181
  • 182
  • 183
  • 184
  • 185
  • 186
  • 187
  • 188
  • 189
  • 190
  • 191
  • 192
  • 193
  • 194
  • 195
  • 196
  • 197
  • 198
  • 199
  • 200
  • 201
  • 202
  • 203
  • 204
  • 205
  • 206
  • 207
  • 208
  • 209
  • 210
  • 211
  • 212
  • 213
  • 214
  • 215
  • 216
  • 217
  • 218

5-7
Controlling Access and Adding Security
2
Under Options beside the User Name:
Click the
Lock
icon to change the user’s password.
Click the
Trash Can
icon to delete the user.
3
Follow the on-screen instructions to edit or delete the
authentication user account.
All authentication user account changes take effect
immediately.
Using Access Control Lists
When you create an iSCSI target, you can enable Access Control
Lists (ACL) to control which initiators can access an iSCSI target.
(See
Creating an iSCSI Target
on page 4-11
for more information.)
ACLs restrict target access to just one initiator and prevent other
initiators from logging in, as shown in the example below.
Each iSCSI target can have its own ACL. When a specific target has
ACL enabled, only initiators on the ACL are permitted to access
that target.
ACLs take precedence over CHAP (see
page 5-5
).
Caution:
To avoid abruptly losing your connection to your
data,
do not
modify ACL settings.
Server
Server
Storage Enclosure
Initiator A
Initiator B
ACL Allows Initiator A
ACL Denies Initiator B
!