Chapter 7: volume exposure and security 7-9 – SANRAD I3.1.1205 User Manual

Page 127

Advertising
background image

Chapter 7: Volume Exposure and Security

7-9

101

56n

V-Switch

Cloud

IP SAN

Tower box

Tower box

wwui1

iSCSI

initiator

iSCSI

initiator

wwui2

Vol 1

LU0

Ident A

wwui1

Target 1

Identity A

Def Ident

Target 2

Identity B

Def Ident

iSCSI Target 1

wwui3

Vol 2

LU0

Vol 3

LU1

Default

all

RW

NA

iSCSI Target 2

wwui4

Default

all

Ident B

wwui2

RW

NA

Vol 1

RW

Vol 3

RW

Vol 2

RW

Figure 7-9. Modifying Default Identities

In Figure 7-9, the default identities for Target 1 and Target 2 have been
modified to not accessible (NA) for all initiators. Remember that the default
identity is in position 0 so it is the last position scanned by the V-Switch.

Target 1 is coupled with Identity A with read-write (RW) access to Identity A
iSCSI initiators, meaning WWUI1.

Target 2 is coupled with Identity B with read-write (RW) access to Identity B
iSCSI initiators, meaning WWUI2.

When iSCSI initiator WWUI1 logs in to Target 1, the V-Switch first scans
Identity A and finds the initiator listed there. The scan stops and the initiator is
granted read-write access to Target 1’s underlying volume, Volume 1.

Advertising