Dell EqualLogic PS6210XS EqualLogic Group Manager Administrator s Guide PS Ser - Page 101

About Volume-Level Security, Connect Initiators to iSCSI Targets, Access Control Methods

Page 101 highlights

7 About Volume-Level Security To secure your data, you must prevent access by unauthorized iSCSI initiators. By controlling access to your iSCSI targets, you can secure access to individual volumes. Group Manager provides several ways to control access to your volumes. You can use these security measures in tandem with group-level and NAS-level security to provide the required level of security for your data. • You can specify a CHAP user name, IP address, or iSCSI initiator name. This information is used by the access method that applies to a volume and its snapshots. You can then use a CHAP account on an external RADIUS authentication server to authenticate iSCSI targets in a PS Series group. • You can allow or disallow initiators with different iSCSI qualified names (IQN) access to a volume and its snapshots. • You can use an iSNS (Internet Storage Name Service) server for initiator discovery of iSCSI targets. • You can set permissions for a volume as either read-write (default) or read-only. Connect Initiators to iSCSI Targets To access iSCSI targets (volumes and snapshots) in a PS Series group, you must install an industry-standard iSCSI initiator on a computer. An example of an industry-standard iSCSI initiator is the one that is built in to Microsoft Windows. NOTE: Access to iSCSI targets is through TCP port 3260 (the standard iSCSI port). See your initiator documentation for the exact procedure for logging in to an iSCSI target. In general, to log in: 1. Specify the group IP address as the discovery address or target portal in the iSCSI initiator configuration interface. If you are using iSNS, the initiator automatically discovers targets from the iSNS server that you configured in the group. The initiator displays a list of iSCSI targets from the group. 2. Log in to a target. The initiator must match at least one of the target's access control policies. As part of the login procedure, you might need to enter a CHAP user name and password (secret) and target authentication credentials. After the initiator logs in to the iSCSI target, the computer sees the target as a disk that you can format using the usual operating system utilities. You can then partition the disk and create a file system as needed. NOTE: • In some file systems, volumes and snapshots must have read-write permission even if the file system is read-only. • Both hardware and software iSCSI initiators are available from a variety of vendors. Install and configure an initiator using the vendor-supplied instructions. See the Dell EqualLogic PS Series Storage Arrays iSCSI Initiator and Operating System Considerations document for more information about iSCSI initiator configuration or contact Dell Technical Support. Access Control Methods Access control methods determine which hosts and clusters can connect to which volumes while simultaneously preventing unauthorized access to iSCSI target volumes and snapshots. Access methods restrict access to iSCSI target volumes and snapshots to specified initiators, restricted by CHAP user name, iSCSI initiator name, or IP address. The access method can contain one or more of these restrictions. About Volume-Level Security 101

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • 148
  • 149
  • 150
  • 151
  • 152
  • 153
  • 154
  • 155
  • 156
  • 157
  • 158
  • 159
  • 160
  • 161
  • 162
  • 163
  • 164
  • 165
  • 166
  • 167
  • 168
  • 169
  • 170
  • 171
  • 172
  • 173
  • 174
  • 175
  • 176
  • 177
  • 178
  • 179
  • 180
  • 181
  • 182
  • 183
  • 184
  • 185
  • 186
  • 187
  • 188
  • 189
  • 190
  • 191
  • 192
  • 193
  • 194
  • 195
  • 196
  • 197
  • 198
  • 199
  • 200
  • 201
  • 202
  • 203
  • 204
  • 205
  • 206
  • 207
  • 208
  • 209
  • 210
  • 211
  • 212
  • 213
  • 214
  • 215
  • 216
  • 217
  • 218
  • 219
  • 220
  • 221
  • 222
  • 223
  • 224
  • 225
  • 226
  • 227
  • 228
  • 229
  • 230
  • 231
  • 232
  • 233
  • 234
  • 235
  • 236
  • 237
  • 238
  • 239
  • 240
  • 241
  • 242
  • 243
  • 244
  • 245
  • 246
  • 247
  • 248
  • 249
  • 250
  • 251
  • 252
  • 253
  • 254
  • 255
  • 256
  • 257
  • 258
  • 259
  • 260
  • 261
  • 262
  • 263
  • 264
  • 265
  • 266
  • 267
  • 268
  • 269
  • 270
  • 271
  • 272
  • 273
  • 274
  • 275
  • 276
  • 277
  • 278
  • 279
  • 280
  • 281
  • 282
  • 283
  • 284
  • 285
  • 286
  • 287
  • 288
  • 289
  • 290
  • 291
  • 292
  • 293
  • 294
  • 295
  • 296
  • 297
  • 298
  • 299
  • 300
  • 301
  • 302
  • 303
  • 304
  • 305
  • 306
  • 307
  • 308
  • 309
  • 310
  • 311
  • 312
  • 313
  • 314
  • 315
  • 316
  • 317
  • 318
  • 319
  • 320
  • 321
  • 322
  • 323
  • 324
  • 325
  • 326
  • 327
  • 328
  • 329
  • 330
  • 331
  • 332
  • 333
  • 334
  • 335
  • 336
  • 337
  • 338
  • 339
  • 340
  • 341
  • 342
  • 343
  • 344
  • 345
  • 346
  • 347
  • 348
  • 349
  • 350
  • 351
  • 352
  • 353
  • 354
  • 355

7
About Volume-Level Security
To secure your data, you must prevent access by unauthorized iSCSI initiators. By controlling access to your iSCSI targets, you can
secure access to individual volumes. Group Manager provides several ways to control access to your volumes. You can use these
security measures in tandem with group-level and NAS-level security to provide the required level of security for your data.
You can specify a CHAP user name, IP address, or iSCSI initiator name. This information is used by the access method that
applies to a volume and its snapshots. You can then use a CHAP account on an external RADIUS authentication server to
authenticate iSCSI targets in a PS Series group.
You can allow or disallow initiators with
different
iSCSI
qualified
names (IQN) access to a volume and its snapshots.
You can use an iSNS (Internet Storage Name Service) server for initiator discovery of iSCSI targets.
You can set permissions for a volume as either read-write (default) or read-only.
Connect Initiators to iSCSI Targets
To access iSCSI targets (volumes and snapshots) in a PS Series group, you must install an industry-standard iSCSI initiator on a
computer. An example of an industry-standard iSCSI initiator is the one that is built in to Microsoft Windows.
NOTE: Access to iSCSI targets is through TCP port 3260 (the standard iSCSI port).
See your initiator documentation for the exact procedure for logging in to an iSCSI target.
In general, to log in:
1.
Specify the group IP address as the discovery address or target portal in the iSCSI initiator
configuration
interface. If you are
using iSNS, the initiator automatically discovers targets from the iSNS server that you
configured
in the group.
The initiator displays a list of iSCSI targets from the group.
2.
Log in to a target. The initiator must match at least one of the target’s access control policies.
As part of the login procedure, you might need to enter a CHAP user name and password (secret) and target authentication
credentials.
After the initiator logs in to the iSCSI target, the computer sees the target as a disk that you can format using the usual operating
system utilities. You can then partition the disk and create a
file
system as needed.
NOTE:
In some
file
systems, volumes and snapshots must have read-write permission even if the
file
system is read-only.
Both hardware and software iSCSI initiators are available from a variety of vendors. Install and
configure
an initiator
using the vendor-supplied instructions. See the
Dell EqualLogic PS Series Storage Arrays iSCSI Initiator and
Operating System Considerations
document for more information about iSCSI initiator
configuration
or contact Dell
Technical Support.
Access Control Methods
Access control methods determine which hosts and clusters can connect to which volumes while simultaneously preventing
unauthorized access to iSCSI target volumes and snapshots. Access methods restrict access to iSCSI target volumes and snapshots
to
specified
initiators, restricted by CHAP user name, iSCSI initiator name, or IP address. The access method can contain one or
more of these restrictions.
About Volume-Level Security
101