Restricting access to volumes – Dell PowerVault NX1950 User Manual

Page 25

Advertising
background image

Setting Up the Dell|EqualLogic PS Series SAN

25

2 Click Next to display the window that enables you to set up an access

control record for the volume, as described in "Restricting Access to
Volumes" on page 25.

NOTE:

You can create and modify access control records for a volume at

any time.

3 After you specify the access control information, click Next, confirm the

volume configuration, and then click Finish to create the volume.

The volume should appear when you expand Volumes in the far left panel
of the GUI. Select the volume name to display volume details. After you
create a volume, an iSCSI target name is automatically generated for the
volume. The PowerVault NX1950 storage system connects to the volume
through the group IP address and the target name.

Restricting Access to Volumes

All nodes in a cluster must have access to the shared storage (for example, the
quorum volume and service volumes). A PowerVault NX1950 storage system
that is not in the cluster must not have access to the volumes. The cluster
software ensures that only one cluster node can access a given volume at a time.

Access control records are used to restrict host access to volume data in a PS
Series group. A group volume and its snapshots share a list of access control
records (sometimes called the access control list). You can configure a record
to apply to the volume, its snapshots, or both, as needed.

When you create a volume with the GUI or CLI, you can create an access
control record at that time. You can also create and modify access control
records at any time.

For example, in the GUI:

1 Expand Volumes in the far left panel of Figure 4-1 and select the volume name.
2 Click the Access tab in the window that appears, and then either click Add

or select an existing record and click Modify. The Modify Access Control
Record window appears as shown in Figure 4-3.

In each access control record, you can specify an IP address, iSCSI initiator
name, or CHAP user name (or any combination).

NOTE:

A cluster node must match all the requirements in one record in order

to access the volume or snapshot.

Book.book Page 25 Monday, February 4, 2008 1:26 PM

Advertising