Dell EqualLogic PS6210XS EqualLogic Group Manager Administrator s Guide PS Ser - Page 114

About Multihost Access to Targets, Allow or Disallow Multihost Volume Access

Page 114 highlights

About Multihost Access to Targets In a shared storage environment, you must control computer access to iSCSI targets (volumes and snapshots), because multiple computers writing to a target in an uncoordinated manner will result in volume corruption. When an initiator tries to log in to a target, the group uses access control policies to determine if access should be authorized. However, access control policies do not prevent multiple initiators, either on the same computer or different computers, from accessing the same target. By default, the group disables multihost (shared) access to a target. Therefore, only one iSCSI qualified name (IQN) can connect to a target at one time. Restriction: If all group members are not running PS Series firmware version 5.0 or later, the group allows multihost access to targets. If you disable multihost access to a volume, when an initiator tries to log in to the volume: • If an iSCSI initiator is not connected to the volume, the group uses access control policies to determine whether to authorize access. • If an initiator is connected to the volume, the group compares the IQN of the current connection to the IQN of the incoming connection. If the IQNs are not the same, access is denied. If the IQNs are the same, the group uses access control policies to determine whether to authorize access. However, some environments might need multihost access to a target. You can enable multihost access to a target if you meet one of the following conditions: • Your cluster environment gives the initiators on each cluster computer a different IQN, and the environment can manage multiple connections to a target. For example, the environment uses a Distributed Lock Manager or SCSI reservations. • Your multipathing solution does not use the same IQN on all initiators, and you cannot modify the names to be the same. • You use an environment, such as a virtual server, that can manage multiple connections to the same iSCSI target (for example, through SCSI reservations). • Initiators on a single computer do not use the same IQN. In all cases, use access control policies as the primary method of protecting iSCSI targets in a group. You can enable or disable multihost access when creating a volume. You can also modify a volume or snapshot and enable or disable multihost access. Allow or Disallow Multihost Volume Access In a shared storage environment, you must control computer access to iSCSI targets (volumes and snapshots), because multiple computers writing to a target in an uncoordinated manner will result in volume corruption. You can allow or disallow multihost (shared) access to a volume. If you disallow multihost access to a volume, only one iSCSI qualified name (IQN) can connect to the volume at one time. However, if you have a certain environment, you might want to allow multihost access to a volume. NOTE: Before disallowing multihost access to a volume, disconnect all initiators from the volume except one, unless the initiators have the same IQN. If multiple initiators with different IQNs have connections to the volume, you cannot disallow multihost access. To allow or disallow multihost access to a volume: 1. Click Volumes. 2. Expand Volumes and then select the volume name. 3. Click Set access type to open the Set Access Type dialog box. 4. Choose to allow or disallow multihost access. 5. Click OK. 114 About Volume-Level Security

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • 148
  • 149
  • 150
  • 151
  • 152
  • 153
  • 154
  • 155
  • 156
  • 157
  • 158
  • 159
  • 160
  • 161
  • 162
  • 163
  • 164
  • 165
  • 166
  • 167
  • 168
  • 169
  • 170
  • 171
  • 172
  • 173
  • 174
  • 175
  • 176
  • 177
  • 178
  • 179
  • 180
  • 181
  • 182
  • 183
  • 184
  • 185
  • 186
  • 187
  • 188
  • 189
  • 190
  • 191
  • 192
  • 193
  • 194
  • 195
  • 196
  • 197
  • 198
  • 199
  • 200
  • 201
  • 202
  • 203
  • 204
  • 205
  • 206
  • 207
  • 208
  • 209
  • 210
  • 211
  • 212
  • 213
  • 214
  • 215
  • 216
  • 217
  • 218
  • 219
  • 220
  • 221
  • 222
  • 223
  • 224
  • 225
  • 226
  • 227
  • 228
  • 229
  • 230
  • 231
  • 232
  • 233
  • 234
  • 235
  • 236
  • 237
  • 238
  • 239
  • 240
  • 241
  • 242
  • 243
  • 244
  • 245
  • 246
  • 247
  • 248
  • 249
  • 250
  • 251
  • 252
  • 253
  • 254
  • 255
  • 256
  • 257
  • 258
  • 259
  • 260
  • 261
  • 262
  • 263
  • 264
  • 265
  • 266
  • 267
  • 268
  • 269
  • 270
  • 271
  • 272
  • 273
  • 274
  • 275
  • 276
  • 277
  • 278
  • 279
  • 280
  • 281
  • 282
  • 283
  • 284
  • 285
  • 286
  • 287
  • 288
  • 289
  • 290
  • 291
  • 292
  • 293
  • 294
  • 295
  • 296
  • 297
  • 298
  • 299
  • 300
  • 301
  • 302
  • 303
  • 304
  • 305
  • 306
  • 307
  • 308
  • 309
  • 310
  • 311
  • 312
  • 313
  • 314
  • 315
  • 316
  • 317
  • 318
  • 319
  • 320
  • 321
  • 322
  • 323
  • 324
  • 325
  • 326
  • 327
  • 328
  • 329
  • 330
  • 331
  • 332
  • 333
  • 334
  • 335
  • 336
  • 337
  • 338
  • 339
  • 340
  • 341
  • 342
  • 343
  • 344
  • 345
  • 346
  • 347
  • 348
  • 349
  • 350
  • 351
  • 352
  • 353
  • 354
  • 355

About Multihost Access to Targets
In a shared storage environment, you must control computer access to iSCSI targets (volumes and snapshots), because multiple
computers writing to a target in an uncoordinated manner will result in volume corruption.
When an initiator tries to log in to a target, the group uses access control policies to determine if access should be authorized.
However, access control policies do not prevent multiple initiators, either on the same computer or
different
computers, from
accessing the same target. By default, the group disables multihost (shared) access to a target. Therefore, only one iSCSI
qualified
name (IQN) can connect to a target at one time.
Restriction: If all group members are not running PS Series
firmware
version 5.0 or later, the group allows multihost
access to targets.
If you disable multihost access to a volume, when an initiator tries to log in to the volume:
If an iSCSI initiator is not connected to the volume, the group uses access control policies to determine whether to authorize
access.
If an initiator is connected to the volume, the group compares the IQN of the current connection to the IQN of the incoming
connection. If the IQNs are not the same, access is denied. If the IQNs are the same, the group uses access control policies to
determine whether to authorize access.
However, some environments might need multihost access to a target. You can enable multihost access to a target if you meet one
of the following conditions:
Your cluster environment gives the initiators on each cluster computer a
different
IQN, and the environment can manage multiple
connections to a target. For example, the environment uses a Distributed Lock Manager or SCSI reservations.
Your multipathing solution does not use the same IQN on all initiators, and you cannot modify the names to be the same.
You use an environment, such as a virtual server, that can manage multiple connections to the same iSCSI target (for example,
through SCSI reservations).
Initiators on a single computer do not use the same IQN.
In all cases, use access control policies as the primary method of protecting iSCSI targets in a group.
You can enable or disable multihost access when creating a volume. You can also modify a volume or snapshot and enable or disable
multihost access.
Allow or Disallow Multihost Volume Access
In a shared storage environment, you must control computer access to iSCSI targets (volumes and snapshots), because multiple
computers writing to a target in an uncoordinated manner will result in volume corruption.
You can allow or disallow multihost (shared) access to a volume. If you disallow multihost access to a volume, only one iSCSI
qualified
name (IQN) can connect to the volume at one time. However, if you have a certain environment, you might want to allow multihost
access to a volume.
NOTE: Before disallowing multihost access to a volume, disconnect all initiators from the volume except one, unless the
initiators have the same IQN. If multiple initiators with
different
IQNs have connections to the volume, you cannot
disallow multihost access.
To allow or disallow multihost access to a volume:
1.
Click
Volumes
.
2.
Expand
Volumes
and then select the volume name.
3.
Click
Set access type
to open the Set Access Type dialog box.
4.
Choose to allow or disallow multihost access.
5.
Click
OK
.
114
About Volume-Level Security