SANRAD V-Switch Switch User Manual


 
Chapter 7: Volume Exposure and Security 107
7
Volume Exposure & Security
IN THIS
CHAPTER
INTRODUCTION TO
VOLUME EXPOSURE &
S
ECURITY
CREATING AN ISCSI
T
ARGET
CHANGING THE
DEFAULT IDENTITY
CREATING AN IDENTITY
ADDING INITIATORS TO
AN
IDENTITY
ASSIGNING IDENTITY
CREDENTIALS
CONNECTING AN
IDENTITY AND TARGET
EXPOSING AN ISCSI
T
ARGET AND LUN
After you have created your virtual volumes and storage
hierarchies, you want to expose them securely to hosts using the
iSCSI protocol. Up to this point, all volumes created are invisible
and inaccessible to network hosts.
This chapter explains how to create iSCSI targets; assign LUNs to
volumes and attach LUNs to iSCSI targets. This enables hosts with
installed iSCSI initiators to view and access the exposed volumes.
This chapter also explains how to create identities, assign access
rights and enable authentication methods to control iSCSI initiator
access to exposed volumes.