EasyManua.ls Logo

Fujitsu ETERNUS DX60 S3 - Iscsi Security; Figure 3.9 Host Affinity

Fujitsu ETERNUS DX60 S3
63 pages
Print Icon
To Next Page IconTo Next Page
To Next Page IconTo Next Page
To Previous Page IconTo Previous Page
To Previous Page IconTo Previous Page
Loading...
Volumes that are accessed can be set for each host interface port.
Figure 3.9 Host Affinity
Permission for Server A
LUN#0 Volume#0 LUN#127 V olume#127
Permission for Server B
LUN#0 → Volume#128 LUN#127 V olume#255
Permission for Server C
LUN#0 → Volume#256 LUN#127 V olume #383
Permission for Server D
LUN#0 → Volume#384 LUN#127 V olume #511
Switch
Server A
LUN#0
:
LUN#127
Server B
LUN#0
LUN#127
Server D
LUN#0
:
LUN#127
Server C
LUN#0
:
LUN#127
Volume#0
:
Volume#127
Volume#128
:
Volume#255
Volume#256
:
Volume#383
Volume#384
Volume#511
:
Port
Port
ETERNUS DX
:
By using the host affinity function, a host interface port can be shared by multiple servers with different OSs
in a system or by multiple servers in a cluster system.
3.4.5 iSCSI Security
For an iSCSI interface, the iSCSI authentication function can be used when the initiator accesses the target.
The iSCSI authentication function is available for host connections and remote copying.
The Challenge Handshake Authentication Protocol (CHAP) is supported for iSCSI authentication. For CHAP Au-
thentication, unidirectional CHAP or bidirectional CHAP can be selected. When unidirectional CHAP is used,
the target authenticates the initiator to prevent fraudulent access. When bidirectional CHAP is used, the tar-
get authenticates the initiator to prevent fraudulent access and the initiator authenticates the target to pre-
vent impersonation.
Chapter 3 Functions
3.4 Security
33
FUJITSU Storage ETERNUS DX60 S3 Disk storage system Overview
Copyright 2014 FUJITSU LIMITED
P3AM-8972-01ENZ0

Table of Contents

Other manuals for Fujitsu ETERNUS DX60 S3

Related product manuals