Dell EqualLogic PS6210XS EqualLogic Group Manager Administrator s Guide PS Ser - Page 115

About Snapshot Access Controls, About Multihost Snapshot Access

Page 115 highlights

About Snapshot Access Controls Online snapshots are seen on the network as iSCSI targets. It is important to protect your snapshots from unauthorized and uncoordinated access by iSCSI initiators. NOTE: When a snapshot is online and accessible, a user or application can change the contents of the snapshot. If the content changes, the snapshot no longer represents a point-in-time copy of a volume and has limited use for data recovery. All iSCSI target security mechanisms apply to snapshots, including access control policies, which prevent unauthorized iSCSI initiator access to a volume and its snapshots. About Multihost Snapshot Access In a shared storage environment, you must control computer access to iSCSI targets (volumes and snapshots), because multiple computers writing to a target in an uncoordinated manner can result in volume corruption. You can allow or disallow multihost (shared) access to a snapshot. If you disallow multihost access to a snapshot, only one iSCSI qualified name (IQN) can connect to the snapshot at one time. However, if you have a certain environment, you might want to allow multihost access to a snapshot. See About Multihost Access to Targets. NOTE: To disable multihost access to a snapshot, first disconnect all initiators from the snapshot except one. If multiple initiators have connections when you try to disable multihost access, the operation fails unless the initiators have the same IQN. Allow or Disallow Multihost Snapshot Access To enable or disable multihost access to a snapshot: 1. Click Volumes. 2. Expand Volumes and then expand the volume name. 3. Select the snapshot timestamp. 4. In the Activities panel, click Set access type to open the Set Access Type dialog box. 5. To allow multiple initiators to access the target, select the Allow simultaneous connections from initiators with different IQNs checkbox. (By default, this checkbox is not selected.) 6. Click OK. About NAS Container Security You control access to your NAS containers through volume-level and group-level security. Windows and UNIX operating systems use different mechanisms for user identification, authentication, and resource access control. The file security style controls the type of operations that are permitted in the NAS container. When you create a NAS container, the NAS cluster applies the NAS clusterwide default file security style. When a file or directory is created, the default NAS container security style, which controls the permissions and ownership, is applied. You can modify a NAS container to change the file security style. The modification will affect only those files and directories that are created after the modification. A NAS cluster supports the following security styles: • UNIX - Controls file access using UNIX permissions in all protocols. A client can change a permission only by using the chmod and chown commands on the NFS mount point. You can specify UNIX permissions for files and directories created in the NAS container by Windows clients. About Volume-Level Security 115

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • 148
  • 149
  • 150
  • 151
  • 152
  • 153
  • 154
  • 155
  • 156
  • 157
  • 158
  • 159
  • 160
  • 161
  • 162
  • 163
  • 164
  • 165
  • 166
  • 167
  • 168
  • 169
  • 170
  • 171
  • 172
  • 173
  • 174
  • 175
  • 176
  • 177
  • 178
  • 179
  • 180
  • 181
  • 182
  • 183
  • 184
  • 185
  • 186
  • 187
  • 188
  • 189
  • 190
  • 191
  • 192
  • 193
  • 194
  • 195
  • 196
  • 197
  • 198
  • 199
  • 200
  • 201
  • 202
  • 203
  • 204
  • 205
  • 206
  • 207
  • 208
  • 209
  • 210
  • 211
  • 212
  • 213
  • 214
  • 215
  • 216
  • 217
  • 218
  • 219
  • 220
  • 221
  • 222
  • 223
  • 224
  • 225
  • 226
  • 227
  • 228
  • 229
  • 230
  • 231
  • 232
  • 233
  • 234
  • 235
  • 236
  • 237
  • 238
  • 239
  • 240
  • 241
  • 242
  • 243
  • 244
  • 245
  • 246
  • 247
  • 248
  • 249
  • 250
  • 251
  • 252
  • 253
  • 254
  • 255
  • 256
  • 257
  • 258
  • 259
  • 260
  • 261
  • 262
  • 263
  • 264
  • 265
  • 266
  • 267
  • 268
  • 269
  • 270
  • 271
  • 272
  • 273
  • 274
  • 275
  • 276
  • 277
  • 278
  • 279
  • 280
  • 281
  • 282
  • 283
  • 284
  • 285
  • 286
  • 287
  • 288
  • 289
  • 290
  • 291
  • 292
  • 293
  • 294
  • 295
  • 296
  • 297
  • 298
  • 299
  • 300
  • 301
  • 302
  • 303
  • 304
  • 305
  • 306
  • 307
  • 308
  • 309
  • 310
  • 311
  • 312
  • 313
  • 314
  • 315
  • 316
  • 317
  • 318
  • 319
  • 320
  • 321
  • 322
  • 323
  • 324
  • 325
  • 326
  • 327
  • 328
  • 329
  • 330
  • 331
  • 332
  • 333
  • 334
  • 335
  • 336
  • 337
  • 338
  • 339
  • 340
  • 341
  • 342
  • 343
  • 344
  • 345
  • 346
  • 347
  • 348
  • 349
  • 350
  • 351
  • 352
  • 353
  • 354
  • 355

About Snapshot Access Controls
Online snapshots are seen on the network as iSCSI targets. It is important to protect your snapshots from unauthorized and
uncoordinated access by iSCSI initiators.
NOTE: When a snapshot is online and accessible, a user or application can change the contents of the snapshot. If the
content changes, the snapshot no longer represents a point-in-time copy of a volume and has limited use for data
recovery.
All iSCSI target security mechanisms apply to snapshots, including access control policies, which prevent unauthorized iSCSI initiator
access to a volume and its snapshots.
About Multihost Snapshot Access
In a shared storage environment, you must control computer access to iSCSI targets (volumes and snapshots), because multiple
computers writing to a target in an uncoordinated manner can result in volume corruption.
You can allow or disallow multihost (shared) access to a snapshot. If you disallow multihost access to a snapshot, only one iSCSI
qualified
name (IQN) can connect to the snapshot at one time. However, if you have a certain environment, you might want to allow
multihost access to a snapshot. See
About Multihost Access to Targets
.
NOTE: To disable multihost access to a snapshot,
first
disconnect all initiators from the snapshot except one. If multiple
initiators have connections when you try to disable multihost access, the operation fails unless the initiators have the
same IQN.
Allow or Disallow Multihost Snapshot Access
To enable or disable multihost access to a snapshot:
1.
Click
Volumes
.
2.
Expand
Volumes
and then expand the volume name.
3.
Select the snapshot timestamp.
4.
In the Activities panel, click
Set access type
to open the Set Access Type dialog box.
5.
To allow multiple initiators to access the target, select the
Allow simultaneous connections from initiators with
different
IQNs
checkbox. (By default, this checkbox is not selected.)
6.
Click
OK
.
About NAS Container Security
You control access to your NAS containers through volume-level and group-level security.
Windows and UNIX operating systems use
different
mechanisms for user
identification,
authentication, and resource access control.
The
file
security style controls the type of operations that are permitted in the NAS container.
When you create a NAS container, the NAS cluster applies the NAS clusterwide default
file
security style. When a
file
or directory is
created, the default NAS container security style, which controls the permissions and ownership, is applied.
You can modify a NAS container to change the
file
security style. The
modification
will
affect
only those
files
and directories that are
created after the
modification.
A NAS cluster supports the following security styles:
UNIX — Controls
file
access using UNIX permissions in all protocols. A client can change a permission only by using the
chmod
and
chown
commands on the NFS mount point. You can specify UNIX permissions for
files
and directories created in the NAS
container by Windows clients.
About Volume-Level Security
115