EasyManua.ls Logo

Fujitsu ETERNUS DX60 S3 - User Authentication; Audit Log; Host Affinity; Figure 3.8 Audit Log

Fujitsu ETERNUS DX60 S3
63 pages
Print Icon
To Next Page IconTo Next Page
To Next Page IconTo Next Page
To Previous Page IconTo Previous Page
To Previous Page IconTo Previous Page
Loading...
3.4.2 User Authentication
Internal Authentication and External Authentication are available as logon authentication methods.
Internal Authentication uses the user account information that is registered in the ETERNUS DX to perform
logon authentication.
External Authentication uses the user account information that is registered on the RADIUS server.
An authentication with a server certificate is performed when an https connection is used with SSL/TLS to
connect to ETERNUS Web GUI. Password authentication and client public key authentication are available
when SSH is used to connect to ETERNUS CLI.
3.4.3 Audit Log
The ETERNUS DX can send information such as access records by the administrator and setting changes as
audit logs to the Syslog servers.
Audit logs are audit trail information that record operations that are executed for the ETERNUS DX and the
response from the system. This information is required for auditing.
The audit log function enables monitoring of all operations and any unauthorized access that may affect the
system.
Syslog protocols (RFC3164 and RFC5424) are supported for audit logs.
Information that is to be sent is not saved in the ETERNUS DX and the Syslog protocols are used to send out
the information. Two Syslog servers can be set as the destination servers in addition to the Syslog server that
is used for event notification.
Figure 3.8 Audit Log
Syslog serverETERNUS DX
System administrator
Log in
Log out
Change settings
Information such as
the storage system name,
the user/role,
the process time,
the process details,
and the process results
Audit log
3.4.4 Host Affinity
The host affinity function prevents data from being damaged due to inadvertent storage access.
By defining a server that can access the volume, security can be ensured when multiple servers are connec-
ted.
A server can access the volume by associating the server that is allowed to access the volume with the vol-
ume.
Chapter 3 Functions
3.4 Security
32
FUJITSU Storage ETERNUS DX60 S3 Disk storage system Overview
Copyright 2014 FUJITSU LIMITED
P3AM-8972-01ENZ0

Table of Contents

Other manuals for Fujitsu ETERNUS DX60 S3

Related product manuals