About Single Sign-On
.......................................................................................................................................................
77
Check Server and Single Sign-On
Configuration
.........................................................................................................
77
Use Single Sign-On to Log In to a PS Series Group
....................................................................................................
77
Log Out of Group Manager Using Single Sign-On
......................................................................................................
78
Enable or Disable Single Sign-On
................................................................................................................................
78
About SNMP Access to the Group
...................................................................................................................................
78
About SNMP Authentication
......................................................................................................................................
78
Add or Change SNMP Access to a Group
..................................................................................................................
78
Display SNMP Access to a Group
...............................................................................................................................
79
About SNMP Traps
.....................................................................................................................................................
79
About VDS and VSS Authentication
..................................................................................................................................
81
Display and
Configure
Windows Service Access to a Group
........................................................................................
81
Add a VDS/VSS Access Control Policy
.......................................................................................................................
81
Modify a VDS/VSS Access Control Policy
..................................................................................................................
81
Delete a VDS/VSS Access Control Policy
...................................................................................................................
82
About IPsec
......................................................................................................................................................................
82
Types of Protected
Traffic
..........................................................................................................................................
82
IPsec Policies
..............................................................................................................................................................
83
Security
Certificates
...................................................................................................................................................
84
IPsec Security Parameters
.........................................................................................................................................
84
IPsec Security Associations (SA)
................................................................................................................................
84
IPsec Pre-Shared Keys (PSKs)
...................................................................................................................................
84
Examples of IPsec
Configurations
..............................................................................................................................
85
IPsec Performance Considerations
............................................................................................................................
101
IPsec
Configuration
Limitations
.................................................................................................................................
101
Protect Network
Traffic
with IPsec
...........................................................................................................................
104
About Dedicated Management Networks
.......................................................................................................................
106
Using IPv6 with Management Networks
..................................................................................................................
106
Configure
a Management Network
...........................................................................................................................
106
Display Management Network Information
...............................................................................................................
108
Unconfigure
a Management Network
.......................................................................................................................
108
Secure Erase
...................................................................................................................................................................
108
7 About Volume-Level Security
.......................................................................................
110
Connect Initiators to iSCSI Targets
..................................................................................................................................
110
Access Control Methods
.................................................................................................................................................
110
About Access Policies
.................................................................................................................................................
111
Access Policies: Use Cases
.........................................................................................................................................
111
Create a New Access Policy
......................................................................................................................................
113
Create a New Basic Access Point
..............................................................................................................................
113
Modify or Delete a Basic Access Point
.......................................................................................................................
114
Modify Access Policies and Basic Access Points by Volume
......................................................................................
114
Associate Access Control Policies with Volumes
........................................................................................................
115
Create an Access Policy Group
..................................................................................................................................
116
Associate an Access Policy Group to a Volume
..........................................................................................................
116
Manage Access Controls for VDS/VSS Access
.........................................................................................................
116
5