Chapter 3
Functions
3.4
Security
Volumes that are accessed can be set for each host interface port.
Figure 3.9 Host Affinity
Server A
LUN#127
Server B
LUN#127
Server C
LUN#127
Server D
LUN#127
By using the host affinity function, a host interface port can be shared by multiple servers with different OSs
in a system or by multiple servers in a cluster system.
3.4.5
iSCSI Security
For an iSCSI interface, the iSCSI authentication function can be used when the initiator accesses the target.
The iSCSI authentication function is available for host connections and remote copying.
The Challenge Handshake Authentication Protocol (CHAP) is supported for iSCSI authentication. For CHAP Au-
thentication, unidirectional CHAP or bidirectional CHAP can be selected. When unidirectional CHAP is used,
the target authenticates the initiator to prevent fraudulent access. When bidirectional CHAP is used, the tar-
get authenticates the initiator to prevent fraudulent access and the initiator authenticates the target to pre-
vent impersonation.
Permission for Server A
LUN#0 → Volume#0 ... LUN#127 → Volume#127
Permission for Server B
LUN#0 → Volume#128 ... LUN#127 → Volume#255
LUN#0
:
LUN#0
:
Switch
LUN#0
:
LUN#0
:
Permission for Server C
LUN#0 → Volume#256 ... LUN#127 → Volume #383
Permission for Server D
LUN#0 → Volume#384 ... LUN#127 → Volume #511
FUJITSU Storage ETERNUS DX60 S3 Disk storage system Overview
Copyright 2014 FUJITSU LIMITED
Volume#0
:
Volume#127
Port
Volume#128
:
Volume#255
Volume#256
:
Volume#383
Port
Volume#384
:
Volume#511
33
ETERNUS DX
P3AM-8972-01ENZ0