SANRAD V-Switch Switch User Manual


 
Chapter 7: Volume Exposure and Security 111
An identity can be
used with more than
one target.
10151
wwui2
wwui1
wwui10
wwui9
wwui8
wwui7
wwui4
wwui3
Ident B
wwui6
wwui5
iSCSI Target 1
wwui21
iSCSI Target 2
wwui22
iSCSI Target 4
wwui24
iSCSI Target 3
wwui23
Ident A
Ident C
Ident B
Vol 1
Vol 4
Vol 2
Vol 3
Vol 5
Vol 6
Figure 57. Identities Coupled with Targets
In Figure 57, Identity A is coupled with both Targets 1 and 2. Identity B is
coupled with Target 3. Identity C is coupled with Target 4. As a result,
each iSCSI initiator has access to the following volumes:
ISCSI INITIATOR VOLUMES ACCESSIBLE
WWUI1 fVOL1 fVOL2 fVOL3
WWUI2 fVOL1 fVOL2 fVOL3
WWUI3 fV
OL4
WWUI4 fV
OL4
WWUI5 fV
OL1 fVOL2 fVOL3
WWUI6 fV
OL4
WWUI7 fV
OL4
WWUI8 fV
OL1 fVOL2 fVOL3 fVOL4
WWUI9 fV
OL4
WWUI10 fV
OL5 fVOL6
Access Rights
The creation of an identity limits the iSCSI initiators able to access an iSCSI
target and its underlying volumes. Now, you want to define the access
rights for each identity-target pair. When you couple an identity and target,
you assign access rights: read-write (RW), read-only (RO) or not accessible
(NA). The access rights are per identity-target pair. An identity can be
coupled with multiple targets, each time with different access rights. As
well, a target can have multiple identities, each with different access rights.