Chapter 7: Volume Exposure and Security 7-1
7
Volume Exposure & Security
IN THIS
CHAPTER
Introduction to
Volume Exposure &
Security
Creating an iSCSI
Target
Changing the
Default Identity
Creating an Identity
Adding Initiators to
an Identity
Assigning Identity
Credentials
Connecting an
Identity and Target
Exposing an iSCSI
Target and LUN
After you have created your virtual volumes and storage
hierarchies, you want to expose them securely to hosts using the
iSCSI protocol. Up to this point, all volumes created are invisible
and inaccessible to network hosts.
This chapter explains how to create iSCSI targets; assign LUNs to
volumes and attach LUNs to iSCSI targets. This enables hosts with
installed iSCSI initiators to view and access the exposed volumes.
This chapter also explains how to create identities, assign access
rights and enable authentication methods to control iSCSI initiator
access to exposed volumes.