Dell EqualLogic PS6210XS EqualLogic Group Manager Administrator s Guide PS Ser - Page 103

Study 3: Change the CHAP/Initiator/IP Address, Study 2: Apply an existing policy to a volume

Page 103 highlights

Study 2: Apply an existing policy to a volume Scenario: A user wants to grant access to a volume using a previously specified access policy (or policy group), without having to reenter the IP address, initiator name, and CHAP user name. Solution: If the volume has not been created yet: 1. Run the Create volume wizard to define the parameters of the new volume. Complete wizard steps 1 and 2. 2. When the Define iSCSI Access Points step is reached, select Select or define access control policies. 3. Specify the access policies that you want to associate with the new volume and finish the wizard as usual. The new volume will be created with the specified access policies enabled. If the volume already exists: 1. Click Group → Group Configuration. 2. Click the Access Policies tab. 3. In the Access Policies panel, select the access policy or policy group that you want to use. 4. Go to the Targets panel and click Add. 5. Select the name of the volume to which you want to grant access and click OK. Study 3: Change the CHAP/Initiator/IP Address Scenario: The group administrator has granted a host access to a set of volumes by associating an access policy for the host to a set of volumes. Now the admin wants to change the CHAP user name (or the initiator name or the IP address) without reconfiguring the access policies for each volume. Solution: 1. Create an access policy for host A that is populated with all of the host's details. 2. Associate that policy with the volumes to which access is granted. 3. To change the host details, modify this single access policy with the new information. The changes are automatically carried across each volume to which the policy is associated. Study 4: Grant a cluster shared volume access to all nodes in the cluster Scenario: The group administrator wants to grant access so that all nodes in the cluster can see the set of cluster-shared volumes. Solution: Create an access policy for each node in the cluster to describe the node's access attributes. 1. Build an access policy group that includes all of the access policies. 2. With the access policy group selected, go to the Targets panel and click Add. 3. Select the name of the cluster volumes to which you want to grant access and click OK. Study 5: Add or remove a new node from a group assigned to multiple volumes Scenario: The group administrator has configured a set of volumes to be accessible from cluster A. If a new node is added or removed from the cluster, the group administrator should be able to configure this node without adding or removing access policies for each of the volumes. Solution: 1. Create an access policy group for cluster A that associates it to the volumes that the cluster nodes can access. 2. To add a new node to cluster A, define a new access policy for the node and associate it with the group policy. This association instantly makes the new node part of the group. About Volume-Level Security 103

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • 148
  • 149
  • 150
  • 151
  • 152
  • 153
  • 154
  • 155
  • 156
  • 157
  • 158
  • 159
  • 160
  • 161
  • 162
  • 163
  • 164
  • 165
  • 166
  • 167
  • 168
  • 169
  • 170
  • 171
  • 172
  • 173
  • 174
  • 175
  • 176
  • 177
  • 178
  • 179
  • 180
  • 181
  • 182
  • 183
  • 184
  • 185
  • 186
  • 187
  • 188
  • 189
  • 190
  • 191
  • 192
  • 193
  • 194
  • 195
  • 196
  • 197
  • 198
  • 199
  • 200
  • 201
  • 202
  • 203
  • 204
  • 205
  • 206
  • 207
  • 208
  • 209
  • 210
  • 211
  • 212
  • 213
  • 214
  • 215
  • 216
  • 217
  • 218
  • 219
  • 220
  • 221
  • 222
  • 223
  • 224
  • 225
  • 226
  • 227
  • 228
  • 229
  • 230
  • 231
  • 232
  • 233
  • 234
  • 235
  • 236
  • 237
  • 238
  • 239
  • 240
  • 241
  • 242
  • 243
  • 244
  • 245
  • 246
  • 247
  • 248
  • 249
  • 250
  • 251
  • 252
  • 253
  • 254
  • 255
  • 256
  • 257
  • 258
  • 259
  • 260
  • 261
  • 262
  • 263
  • 264
  • 265
  • 266
  • 267
  • 268
  • 269
  • 270
  • 271
  • 272
  • 273
  • 274
  • 275
  • 276
  • 277
  • 278
  • 279
  • 280
  • 281
  • 282
  • 283
  • 284
  • 285
  • 286
  • 287
  • 288
  • 289
  • 290
  • 291
  • 292
  • 293
  • 294
  • 295
  • 296
  • 297
  • 298
  • 299
  • 300
  • 301
  • 302
  • 303
  • 304
  • 305
  • 306
  • 307
  • 308
  • 309
  • 310
  • 311
  • 312
  • 313
  • 314
  • 315
  • 316
  • 317
  • 318
  • 319
  • 320
  • 321
  • 322
  • 323
  • 324
  • 325
  • 326
  • 327
  • 328
  • 329
  • 330
  • 331
  • 332
  • 333
  • 334
  • 335
  • 336
  • 337
  • 338
  • 339
  • 340
  • 341
  • 342
  • 343
  • 344
  • 345
  • 346
  • 347
  • 348
  • 349
  • 350
  • 351
  • 352
  • 353
  • 354
  • 355

Study 2: Apply an existing policy to a volume
Scenario: A user wants to grant access to a volume using a previously
specified
access policy (or policy group), without having to
reenter the IP address, initiator name, and CHAP user name.
Solution:
If the volume has not been created yet:
1.
Run the
Create volume
wizard to
define
the parameters of the new volume. Complete wizard steps 1 and 2.
2.
When the
Define
iSCSI Access Points step is reached, select
Select or
define
access control policies
.
3.
Specify the access policies that you want to associate with the new volume and
finish
the wizard as usual. The new volume will
be created with the
specified
access policies enabled.
If the volume already exists:
1.
Click
Group
Group
Configuration
.
2.
Click the
Access Policies
tab.
3.
In the Access Policies panel, select the access policy or policy group that you want to use.
4.
Go to the Targets panel and click
Add
.
5.
Select the name of the volume to which you want to grant access and click
OK
.
Study 3: Change the CHAP/Initiator/IP Address
Scenario: The group administrator has granted a host access to a set of volumes by associating an access policy for the host to a set
of volumes. Now the admin wants to change the CHAP user name (or the initiator name or the IP address) without
reconfiguring
the access policies for each volume.
Solution:
1.
Create an access policy for host A that is populated with all of the host’s details.
2.
Associate that policy with the volumes to which access is granted.
3.
To change the host details, modify this single access policy with the new information. The changes are automatically carried
across each volume to which the policy is associated.
Study 4: Grant a cluster shared volume access to all nodes in the cluster
Scenario: The group administrator wants to grant access so that all nodes in the cluster can see the set of cluster-shared volumes.
Solution:
Create an access policy for each node in the cluster to describe the node's access attributes.
1.
Build an access policy group that includes all of the access policies.
2.
With the access policy group selected, go to the Targets panel and click
Add
.
3.
Select the name of the cluster volumes to which you want to grant access and click
OK
.
Study 5: Add or remove a new node from a group assigned to multiple volumes
Scenario: The group administrator has
configured
a set of volumes to be accessible from cluster A. If a new node is added or
removed from the cluster, the group administrator should be able to
configure
this node without adding or removing access policies
for each of the volumes.
Solution:
1.
Create an access policy group for cluster A that associates it to the volumes that the cluster nodes can access.
2.
To add a new node to cluster A,
define
a new access policy for the node and associate it with the group policy. This association
instantly makes the new node part of the group.
About Volume-Level Security
103