Dell EqualLogic PS6210XS EqualLogic Group Manager Administrator s Guide PS Ser - Page 102

About Access Policies, Access Policies: Use Cases

Page 102 highlights

Different access methods are available depending on the needs of your environment: • An access policy consists of a set of extended access points. Each extended access point enables users to provide a set of access attributes describing the endpoints, such as an IQN initiator name, CHAP name, and IP addresses. After an access policy is associated with a volume, all the endpoints described by the extended access points will have access to the volume. • An access policy group is a set of access policies that can be associated to a volume. When an access policy group is associated with a volume, all endpoints described within those access policies have access to the volume. • A basic access point provides the traditional direct method for connecting a single endpoint to a single volume. Basic access points cannot be reused, transferred, or shared with other volumes. They are associated directly with the volume to which they provide access, and if that volume is deleted, the basic access point is also deleted. All of these access methods can be used with each other to fulfill the particular needs of your computing environment. The main distinction between access policies and basic access points is that access policies exist independent of the volumes to which they provide access. This flexibility offers the following significant advantages over traditional basic access points: • Access policy reuse - A single access policy can now be associated with multiple volumes and all the access attributes are specified only once, requiring less manual configuration and less possibility of data entry errors. • Single point of change - Changes to access attributes, IP address, initiator IQN name, or CHAP user name are all specified at one place and not repeated across volumes. You can now change these attributes at one place, and the changes are instantly propagated to all volumes using those access policies. About Access Policies In earlier versions of the PS Series firmware, security protection was accomplished by individually configuring an access control record for each volume to which you wanted to secure access. Each volume supported up to 16 different access control records, which together constituted an access control list (ACL). However, this approach did not work well when large numbers of volumes were present. To address that issue, Group Manager incorporates access policies and access policy groups that can be applied to one or more volumes. Each access policy lets you specify one or more of the following authentication methods: • CHAP user name (Challenge Handshake Authentication Protocol) • IP address • iSCSI initiator name When you create a volume, you can assign it to an existing access policy, which determines which hosts will have access to that volume. In addition, you can allow or disallow volume access from multiple initiators, depending on your configuration needs. An access policy can apply to the volume, its snapshots, or both. For example, you can authorize computer access to a volume and its snapshots or only to the volume. Access Policies: Use Cases The following use cases show different ways of working with access policies. Study 1: Grant volume access to a single host using its iSCSI Initiator Name or IP address Scenario: A group administrator wants to grant volume access to a host that is using a software iSCSI initiator. The admin wants to define access using either the iSCSI initiator name or IP addresses. Solution: 1. Click Group → Group Configuration. 2. Click the Access Policies tab. In the Access Policies panel, create an access policy for the host. 3. Add an access point to the access policy that specifies either the initiator name or a list of IP addresses for each of the interfaces on the host. 4. With the access policy selected, go to the Targets panel and click Add. 5. Select the name of the volume to which you want to grant access and click OK. 102 About Volume-Level Security

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • 148
  • 149
  • 150
  • 151
  • 152
  • 153
  • 154
  • 155
  • 156
  • 157
  • 158
  • 159
  • 160
  • 161
  • 162
  • 163
  • 164
  • 165
  • 166
  • 167
  • 168
  • 169
  • 170
  • 171
  • 172
  • 173
  • 174
  • 175
  • 176
  • 177
  • 178
  • 179
  • 180
  • 181
  • 182
  • 183
  • 184
  • 185
  • 186
  • 187
  • 188
  • 189
  • 190
  • 191
  • 192
  • 193
  • 194
  • 195
  • 196
  • 197
  • 198
  • 199
  • 200
  • 201
  • 202
  • 203
  • 204
  • 205
  • 206
  • 207
  • 208
  • 209
  • 210
  • 211
  • 212
  • 213
  • 214
  • 215
  • 216
  • 217
  • 218
  • 219
  • 220
  • 221
  • 222
  • 223
  • 224
  • 225
  • 226
  • 227
  • 228
  • 229
  • 230
  • 231
  • 232
  • 233
  • 234
  • 235
  • 236
  • 237
  • 238
  • 239
  • 240
  • 241
  • 242
  • 243
  • 244
  • 245
  • 246
  • 247
  • 248
  • 249
  • 250
  • 251
  • 252
  • 253
  • 254
  • 255
  • 256
  • 257
  • 258
  • 259
  • 260
  • 261
  • 262
  • 263
  • 264
  • 265
  • 266
  • 267
  • 268
  • 269
  • 270
  • 271
  • 272
  • 273
  • 274
  • 275
  • 276
  • 277
  • 278
  • 279
  • 280
  • 281
  • 282
  • 283
  • 284
  • 285
  • 286
  • 287
  • 288
  • 289
  • 290
  • 291
  • 292
  • 293
  • 294
  • 295
  • 296
  • 297
  • 298
  • 299
  • 300
  • 301
  • 302
  • 303
  • 304
  • 305
  • 306
  • 307
  • 308
  • 309
  • 310
  • 311
  • 312
  • 313
  • 314
  • 315
  • 316
  • 317
  • 318
  • 319
  • 320
  • 321
  • 322
  • 323
  • 324
  • 325
  • 326
  • 327
  • 328
  • 329
  • 330
  • 331
  • 332
  • 333
  • 334
  • 335
  • 336
  • 337
  • 338
  • 339
  • 340
  • 341
  • 342
  • 343
  • 344
  • 345
  • 346
  • 347
  • 348
  • 349
  • 350
  • 351
  • 352
  • 353
  • 354
  • 355

Different
access methods are available depending on the needs of your environment:
An access policy consists of a set of extended access points. Each extended access point enables users to provide a set of
access attributes describing the endpoints, such as an IQN initiator name, CHAP name, and IP addresses. After an access policy
is associated with a volume, all the endpoints described by the extended access points will have access to the volume.
An access policy group is a set of access policies that can be associated to a volume. When an access policy group is associated
with a volume, all endpoints described within those access policies have access to the volume.
A basic access point provides the traditional direct method for connecting a single endpoint to a single volume. Basic access
points cannot be reused, transferred, or shared with other volumes. They are associated directly with the volume to which they
provide access, and if that volume is deleted, the basic access point is also deleted.
All of these access methods can be used with each other to
fulfill
the particular needs of your computing environment.
The main distinction between access policies and basic access points is that access policies exist independent of the volumes to
which they provide access. This
flexibility
offers
the following
significant
advantages over traditional basic access points:
Access policy reuse — A single access policy can now be associated with multiple volumes and all the access attributes are
specified
only once, requiring less manual
configuration
and less possibility of data entry errors.
Single point of change — Changes to access attributes, IP address, initiator IQN name, or CHAP user name are all
specified
at
one place and not repeated across volumes. You can now change these attributes at one place, and the changes are instantly
propagated to all volumes using those access policies.
About Access Policies
In earlier versions of the PS Series
firmware,
security protection was accomplished by individually
configuring
an access control
record for each volume to which you wanted to secure access. Each volume supported up to 16
different
access control records,
which together constituted an access control list (ACL). However, this approach did not work well when large numbers of volumes
were present. To address that issue, Group Manager incorporates access policies and access policy groups that can be applied to
one or more volumes.
Each access policy lets you specify one or more of the following authentication methods:
CHAP user name (Challenge Handshake Authentication Protocol)
IP address
iSCSI initiator name
When you create a volume, you can assign it to an existing access policy, which determines which hosts will have access to that
volume. In addition, you can allow or disallow volume access from multiple initiators, depending on your
configuration
needs.
An access policy can apply to the volume, its snapshots, or both. For example, you can authorize computer access to a volume and
its snapshots or only to the volume.
Access Policies: Use Cases
The following use cases show
different
ways of working with access policies.
Study 1: Grant volume access to a single host using its iSCSI Initiator Name or IP address
Scenario: A group administrator wants to grant volume access to a host that is using a software iSCSI initiator. The admin wants to
define
access using either the iSCSI initiator name or IP addresses.
Solution:
1.
Click
Group
Group
Configuration
.
2.
Click the
Access Policies
tab. In the Access Policies panel, create an access policy for the host.
3.
Add an access point to the access policy that
specifies
either the initiator name or a list of IP addresses for each of the
interfaces on the host.
4.
With the access policy selected, go to the Targets panel and click
Add
.
5.
Select the name of the volume to which you want to grant access and click
OK
.
102
About Volume-Level Security