Dell EqualLogic PS6210XS EqualLogic Group Manager Administrator s Guide PS Ser - Page 122

Enable the iSCSI Discovery Filter, About Multihost Access to Targets

Page 122 highlights

Table 22. Access Requirements for iSCSI Targets Security Condition Description Network access To discover targets, the initiator must have network access to the group IP address. Initiator access controls (Optional) If the initiator enabled target authentication (sometimes called mutual authentication), the target authentication credentials in the group must match the credentials that were configured in the initiator. These credentials apply to all group targets. Target access controls The initiator must meet all the conditions in one access control policy for the target. (See About Multihost Access to Targets.) Enable the iSCSI Discovery Filter To enable the iSCSI discovery filter: 1. Click Group → Group Configuration. 2. Click the iSCSI tab. 3. In the iSCSI Discovery panel, select Prevent unauthorized hosts from discovering targets. Disable the iSCSI Discovery Filter To disable the iSCSI discovery filter: 1. Click Group → Group Configuration. 2. Click the iSCSI tab. 3. In the iSCSI Discovery panel, clear Prevent unauthorized hosts from discovering targets. About Multihost Access to Targets In a shared storage environment, you must control computer access to iSCSI targets (volumes and snapshots), because multiple computers writing to a target in an uncoordinated manner will result in volume corruption. When an initiator tries to log in to a target, the group uses access control policies to determine if access should be authorized. However, access control policies do not prevent multiple initiators, either on the same computer or different computers, from accessing the same target. By default, the group disables multihost (shared) access to a target. Therefore, only one iSCSI qualified name (IQN) can connect to a target at one time. If you disable multihost access to a volume, when an initiator tries to log in to the volume: • If an iSCSI initiator is not connected to the volume, the group uses access control policies to determine whether to authorize access. • If an initiator is connected to the volume, the group compares the IQN of the current connection to the IQN of the incoming connection. If the IQNs are not the same, access is denied. If the IQNs are the same, the group uses access control policies to determine whether to authorize access. However, some environments might need multihost access to a target. You can enable multihost access to a target if you meet one of the following conditions: • Your cluster environment gives the initiators on each cluster computer a different IQN, and the environment can manage multiple connections to a target. For example, the environment uses a Distributed Lock Manager or SCSI reservations. • Your multipathing solution does not use the same IQN on all initiators, and you cannot modify the names to be the same. • You use an environment, such as a virtual server, that can manage multiple connections to the same iSCSI target (for example, through SCSI reservations). • Initiators on a single computer do not use the same IQN. In all cases, use access control policies as the primary method of protecting iSCSI targets in a group. 122 About Volume-Level Security

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • 148
  • 149
  • 150
  • 151
  • 152
  • 153
  • 154
  • 155
  • 156
  • 157
  • 158
  • 159
  • 160
  • 161
  • 162
  • 163
  • 164
  • 165
  • 166
  • 167
  • 168
  • 169
  • 170
  • 171
  • 172
  • 173
  • 174
  • 175
  • 176
  • 177
  • 178
  • 179
  • 180
  • 181
  • 182
  • 183
  • 184
  • 185
  • 186
  • 187
  • 188
  • 189
  • 190
  • 191
  • 192
  • 193
  • 194
  • 195
  • 196
  • 197
  • 198
  • 199
  • 200
  • 201
  • 202
  • 203
  • 204
  • 205
  • 206
  • 207
  • 208
  • 209
  • 210
  • 211
  • 212
  • 213
  • 214
  • 215
  • 216
  • 217
  • 218
  • 219
  • 220
  • 221
  • 222
  • 223
  • 224
  • 225
  • 226
  • 227
  • 228
  • 229
  • 230
  • 231
  • 232
  • 233
  • 234
  • 235
  • 236
  • 237
  • 238
  • 239
  • 240
  • 241
  • 242
  • 243
  • 244
  • 245
  • 246
  • 247
  • 248
  • 249
  • 250
  • 251
  • 252
  • 253
  • 254
  • 255
  • 256
  • 257
  • 258
  • 259
  • 260
  • 261
  • 262
  • 263
  • 264
  • 265
  • 266
  • 267
  • 268
  • 269
  • 270
  • 271
  • 272
  • 273
  • 274
  • 275
  • 276
  • 277
  • 278
  • 279
  • 280
  • 281
  • 282
  • 283
  • 284
  • 285
  • 286
  • 287
  • 288
  • 289
  • 290
  • 291
  • 292
  • 293
  • 294
  • 295
  • 296
  • 297
  • 298
  • 299
  • 300
  • 301
  • 302
  • 303
  • 304
  • 305
  • 306
  • 307
  • 308
  • 309
  • 310
  • 311
  • 312
  • 313
  • 314
  • 315
  • 316
  • 317
  • 318
  • 319
  • 320
  • 321
  • 322
  • 323
  • 324
  • 325
  • 326
  • 327
  • 328
  • 329
  • 330
  • 331
  • 332
  • 333
  • 334
  • 335
  • 336
  • 337
  • 338
  • 339
  • 340
  • 341
  • 342
  • 343
  • 344
  • 345
  • 346
  • 347
  • 348
  • 349
  • 350
  • 351
  • 352
  • 353
  • 354
  • 355
  • 356
  • 357
  • 358
  • 359
  • 360
  • 361
  • 362
  • 363
  • 364
  • 365
  • 366
  • 367
  • 368
  • 369
  • 370
  • 371
  • 372
  • 373
  • 374
  • 375
  • 376
  • 377
  • 378
  • 379
  • 380
  • 381
  • 382
  • 383
  • 384
  • 385
  • 386
  • 387
  • 388
  • 389
  • 390
  • 391
  • 392
  • 393
  • 394
  • 395
  • 396
  • 397
  • 398
  • 399
  • 400
  • 401
  • 402
  • 403
  • 404
  • 405
  • 406
  • 407
  • 408
  • 409
  • 410
  • 411
  • 412
  • 413
  • 414
  • 415
  • 416
  • 417
  • 418
  • 419
  • 420
  • 421
  • 422
  • 423
  • 424
  • 425
  • 426
  • 427
  • 428
  • 429
  • 430
  • 431
  • 432
  • 433
  • 434
  • 435
  • 436
  • 437
  • 438
  • 439
  • 440
  • 441
  • 442
  • 443
  • 444
  • 445
  • 446
  • 447
  • 448
  • 449
  • 450
  • 451
  • 452
  • 453
  • 454
  • 455
  • 456
  • 457
  • 458
  • 459
  • 460
  • 461
  • 462
  • 463
  • 464
  • 465
  • 466
  • 467
  • 468
  • 469
  • 470
  • 471
  • 472
  • 473
  • 474
  • 475
  • 476
  • 477
  • 478
  • 479
  • 480
  • 481
  • 482
  • 483
  • 484
  • 485
  • 486
  • 487
  • 488
  • 489
  • 490
  • 491
  • 492
  • 493
  • 494
  • 495
  • 496
  • 497
  • 498
  • 499
  • 500
  • 501
  • 502
  • 503
  • 504
  • 505
  • 506
  • 507
  • 508
  • 509
  • 510
  • 511
  • 512
  • 513
  • 514
  • 515
  • 516
  • 517
  • 518
  • 519
  • 520
  • 521
  • 522
  • 523
  • 524
  • 525
  • 526
  • 527
  • 528
  • 529
  • 530
  • 531
  • 532
  • 533
  • 534
  • 535
  • 536
  • 537
  • 538
  • 539
  • 540
  • 541
  • 542
  • 543
  • 544
  • 545
  • 546
  • 547
  • 548
  • 549
  • 550
  • 551
  • 552
  • 553
  • 554
  • 555
  • 556
  • 557
  • 558
  • 559
  • 560
  • 561
  • 562
  • 563
  • 564
  • 565
  • 566
  • 567
  • 568
  • 569
  • 570
  • 571
  • 572
  • 573
  • 574
  • 575
  • 576
  • 577
  • 578
  • 579
  • 580
  • 581
  • 582
  • 583

Table 22. Access Requirements for iSCSI Targets
Security Condition
Description
Network access
To discover targets, the initiator must have network access to the group IP address.
Initiator access controls
(Optional) If the initiator enabled target authentication (sometimes called mutual authentication),
the target authentication credentials in the group must match the credentials that were
configured
in the initiator. These credentials apply to all group targets.
Target access controls
The initiator must meet all the conditions in one access control policy for the target. (See
About
Multihost Access to Targets
.)
Enable the iSCSI Discovery Filter
To enable the iSCSI discovery
filter:
1.
Click
Group
Group
Configuration
.
2.
Click the
iSCSI
tab.
3.
In the iSCSI Discovery panel, select
Prevent unauthorized hosts from discovering targets
.
Disable the iSCSI Discovery Filter
To disable the iSCSI discovery
filter:
1.
Click
Group
Group
Configuration
.
2.
Click the
iSCSI
tab.
3.
In the iSCSI Discovery panel, clear
Prevent unauthorized hosts from discovering targets
.
About Multihost Access to Targets
In a shared storage environment, you must control computer access to iSCSI targets (volumes and snapshots), because multiple
computers writing to a target in an uncoordinated manner will result in volume corruption.
When an initiator tries to log in to a target, the group uses access control policies to determine if access should be authorized.
However, access control policies do not prevent multiple initiators, either on the same computer or
different
computers, from
accessing the same target. By default, the group disables multihost (shared) access to a target. Therefore, only one iSCSI
qualified
name (IQN) can connect to a target at one time.
If you disable multihost access to a volume, when an initiator tries to log in to the volume:
If an iSCSI initiator is not connected to the volume, the group uses access control policies to determine whether to authorize
access.
If an initiator is connected to the volume, the group compares the IQN of the current connection to the IQN of the incoming
connection. If the IQNs are not the same, access is denied. If the IQNs are the same, the group uses access control policies to
determine whether to authorize access.
However, some environments might need multihost access to a target. You can enable multihost access to a target if you meet one
of the following conditions:
Your cluster environment gives the initiators on each cluster computer a
different
IQN, and the environment can manage multiple
connections to a target. For example, the environment uses a Distributed Lock Manager or SCSI reservations.
Your multipathing solution does not use the same IQN on all initiators, and you cannot modify the names to be the same.
You use an environment, such as a virtual server, that can manage multiple connections to the same iSCSI target (for example,
through SCSI reservations).
Initiators on a single computer do not use the same IQN.
In all cases, use access control policies as the primary method of protecting iSCSI targets in a group.
122
About Volume-Level Security