Iscsi Security; Figure 3.9 Host Affinity - Fujitsu ETERNUS DX60 S3 Overview Manual

Disk storage system
Hide thumbs Also See for ETERNUS DX60 S3:
Table of Contents

Advertisement

Chapter 3
Functions
3.4
Security
Volumes that are accessed can be set for each host interface port.

Figure 3.9 Host Affinity

Server A
LUN#127
Server B
LUN#127
Server C
LUN#127
Server D
LUN#127
By using the host affinity function, a host interface port can be shared by multiple servers with different OSs
in a system or by multiple servers in a cluster system.
3.4.5

iSCSI Security

For an iSCSI interface, the iSCSI authentication function can be used when the initiator accesses the target.
The iSCSI authentication function is available for host connections and remote copying.
The Challenge Handshake Authentication Protocol (CHAP) is supported for iSCSI authentication. For CHAP Au-
thentication, unidirectional CHAP or bidirectional CHAP can be selected. When unidirectional CHAP is used,
the target authenticates the initiator to prevent fraudulent access. When bidirectional CHAP is used, the tar-
get authenticates the initiator to prevent fraudulent access and the initiator authenticates the target to pre-
vent impersonation.
Permission for Server A
LUN#0 → Volume#0 ... LUN#127 → Volume#127
Permission for Server B
LUN#0 → Volume#128 ... LUN#127 → Volume#255
LUN#0
:
LUN#0
:
Switch
LUN#0
:
LUN#0
:
Permission for Server C
LUN#0 → Volume#256 ... LUN#127 → Volume #383
Permission for Server D
LUN#0 → Volume#384 ... LUN#127 → Volume #511
FUJITSU Storage ETERNUS DX60 S3 Disk storage system Overview
Copyright 2014 FUJITSU LIMITED
Volume#0
:
Volume#127
Port
Volume#128
:
Volume#255
Volume#256
:
Volume#383
Port
Volume#384
:
Volume#511
33
ETERNUS DX
P3AM-8972-01ENZ0

Advertisement

Table of Contents
loading

Table of Contents