Dell EqualLogic PS6210XS EqualLogic Group Manager Administrator s Guide PS Ser - Page 113

Delete an iSNS server, Prevent Discovery of Unauthorized Targets, iSCSI Access Requirements

Page 113 highlights

5. Click OK. 6. Click Save all changes. Delete an iSNS server To delete the IP address for an iSNS server to remove the server from the configuration: 1. Click Group → Group Configuration. 2. Click the iSCSI tab. 3. In the iSCSI Discovery panel, select the server's IP address. 4. Click Delete. 5. When prompted to confirm the decision, click Yes. Prevent Discovery of Unauthorized Targets By default, iSCSI initiators that use discovery try to log in to group targets protected by CHAP, even if they do not have the correct access credentials. These attempts can result in a large number of events logged in the group and is not an efficient use of resources. You can prevent computers from discovering unauthorized targets by enabling the iSCSI discovery filter. If you enable the iSCSI discovery filter, initiators discover only those targets for which they have the correct access credentials. iSCSI Access Requirements To access an iSCSI target (for example, a volume or snapshot), an iSCSI initiator must meet the security requirements identified in Table 22. Access Requirements for iSCSI Targets. Table 22. Access Requirements for iSCSI Targets Security Condition Description Network access To discover targets, the initiator must have network access to the group IP address. Initiator access controls (Optional) If the initiator enabled target authentication (sometimes called mutual authentication), the target authentication credentials in the group must match the credentials that were configured in the initiator. These credentials apply to all group targets. Target access controls The initiator must meet all the conditions in one access control policy for the target. (See About Multihost Access to Targets.) Enable the iSCSI Discovery Filter To enable the iSCSI discovery filter: 1. Click Group → Group Configuration. 2. Click the iSCSI tab. 3. In the iSCSI Discovery panel, select Prevent unauthorized hosts from discovering targets. Disable the iSCSI Discovery Filter To disable the iSCSI discovery filter: 1. Click Group → Group Configuration. 2. Click the iSCSI tab. 3. In the iSCSI Discovery panel, clear Prevent unauthorized hosts from discovering targets. About Volume-Level Security 113

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • 148
  • 149
  • 150
  • 151
  • 152
  • 153
  • 154
  • 155
  • 156
  • 157
  • 158
  • 159
  • 160
  • 161
  • 162
  • 163
  • 164
  • 165
  • 166
  • 167
  • 168
  • 169
  • 170
  • 171
  • 172
  • 173
  • 174
  • 175
  • 176
  • 177
  • 178
  • 179
  • 180
  • 181
  • 182
  • 183
  • 184
  • 185
  • 186
  • 187
  • 188
  • 189
  • 190
  • 191
  • 192
  • 193
  • 194
  • 195
  • 196
  • 197
  • 198
  • 199
  • 200
  • 201
  • 202
  • 203
  • 204
  • 205
  • 206
  • 207
  • 208
  • 209
  • 210
  • 211
  • 212
  • 213
  • 214
  • 215
  • 216
  • 217
  • 218
  • 219
  • 220
  • 221
  • 222
  • 223
  • 224
  • 225
  • 226
  • 227
  • 228
  • 229
  • 230
  • 231
  • 232
  • 233
  • 234
  • 235
  • 236
  • 237
  • 238
  • 239
  • 240
  • 241
  • 242
  • 243
  • 244
  • 245
  • 246
  • 247
  • 248
  • 249
  • 250
  • 251
  • 252
  • 253
  • 254
  • 255
  • 256
  • 257
  • 258
  • 259
  • 260
  • 261
  • 262
  • 263
  • 264
  • 265
  • 266
  • 267
  • 268
  • 269
  • 270
  • 271
  • 272
  • 273
  • 274
  • 275
  • 276
  • 277
  • 278
  • 279
  • 280
  • 281
  • 282
  • 283
  • 284
  • 285
  • 286
  • 287
  • 288
  • 289
  • 290
  • 291
  • 292
  • 293
  • 294
  • 295
  • 296
  • 297
  • 298
  • 299
  • 300
  • 301
  • 302
  • 303
  • 304
  • 305
  • 306
  • 307
  • 308
  • 309
  • 310
  • 311
  • 312
  • 313
  • 314
  • 315
  • 316
  • 317
  • 318
  • 319
  • 320
  • 321
  • 322
  • 323
  • 324
  • 325
  • 326
  • 327
  • 328
  • 329
  • 330
  • 331
  • 332
  • 333
  • 334
  • 335
  • 336
  • 337
  • 338
  • 339
  • 340
  • 341
  • 342
  • 343
  • 344
  • 345
  • 346
  • 347
  • 348
  • 349
  • 350
  • 351
  • 352
  • 353
  • 354
  • 355

5.
Click
OK
.
6.
Click
Save all changes
.
Delete an iSNS server
To delete the IP address for an iSNS server to remove the server from the
configuration:
1.
Click
Group
Group
Configuration
.
2.
Click the
iSCSI
tab.
3.
In the
iSCSI Discovery
panel, select the server’s IP address.
4.
Click
Delete
.
5.
When prompted to
confirm
the decision, click
Yes
.
Prevent Discovery of Unauthorized Targets
By default, iSCSI initiators that use discovery try to log in to group targets protected by CHAP, even if they do not have the correct
access credentials. These attempts can result in a large number of events logged in the group and is not an
efficient
use of
resources.
You can prevent computers from discovering unauthorized targets by enabling the iSCSI discovery
filter.
If you enable the iSCSI
discovery
filter,
initiators discover only those targets for which they have the correct access credentials.
iSCSI Access Requirements
To access an iSCSI target (for example, a volume or snapshot), an iSCSI initiator must meet the security requirements
identified
in
Table 22. Access Requirements for iSCSI Targets
.
Table 22. Access Requirements for iSCSI Targets
Security Condition
Description
Network access
To discover targets, the initiator must have network access to the group IP address.
Initiator access controls
(Optional) If the initiator enabled target authentication (sometimes called mutual authentication),
the target authentication credentials in the group must match the credentials that were
configured
in the initiator. These credentials apply to all group targets.
Target access controls
The initiator must meet all the conditions in one access control policy for the target. (See
About
Multihost Access to Targets
.)
Enable the iSCSI Discovery Filter
To enable the iSCSI discovery
filter:
1.
Click
Group
Group
Configuration
.
2.
Click the
iSCSI
tab.
3.
In the iSCSI Discovery panel, select
Prevent unauthorized hosts from discovering targets
.
Disable the iSCSI Discovery Filter
To disable the iSCSI discovery
filter:
1.
Click
Group
Group
Configuration
.
2.
Click the
iSCSI
tab.
3.
In the iSCSI Discovery panel, clear
Prevent unauthorized hosts from discovering targets
.
About Volume-Level Security
113