beautypg.com

Volume exposure and security, Volume exposure & security – SANRAD I3.1.1205 User Manual

Page 119

background image

Chapter 7: Volume Exposure and Security

7-1

7

Volume Exposure & Security

IN THIS
CHAPTER

Introduction to

Volume Exposure &

Security

Creating an iSCSI
Target

Changing the

Default Identity

Creating an Identity

Adding Initiators to

an Identity

Assigning Identity

Credentials

Connecting an

Identity and Target

Exposing an iSCSI

Target and LUN

After you have created your virtual volumes and storage
hierarchies, you want to expose them securely to hosts using the
iSCSI protocol. Up to this point, all volumes created are invisible
and inaccessible to network hosts.

This chapter explains how to create iSCSI targets; assign LUNs to
volumes and attach LUNs to iSCSI targets. This enables hosts with
installed iSCSI initiators to view and access the exposed volumes.

This chapter also explains how to create identities, assign access
rights and enable authentication methods to control iSCSI initiator
access to exposed volumes.