Dell PowerVault NX1950 User Manual

Page 26

Advertising
background image

26

Setting Up the Dell|EqualLogic PS Series SAN

Figure 4-3.

Modify Access Control Record

3 The most secure way to control access to your volumes is to use a

combination of IP address and CHAP, as shown in Figure 4-3. For example,
if a record includes both an IP address and a CHAP user name, the
PowerVault NX1950 cluster solution must present the IP address, the
CHAP user name, and its associated password (using the iSCSI initiator)
to match the record. If a record includes a CHAP user name only, the
initiators that support discovery unsuccessfully try to connect to the
volume, increasing event log activity. You can also specify whether the
record applies to the volume, the volume snapshots, or both.

NOTE:

If you use IP addresses or iSCSI initiator names to restrict access,

create an access control record for each IP address or initiator name in the
PowerVault NX1950 storage system. For example, if a PowerVault NX1950
storage system has two NICs that are handling iSCSI traffic, create two
records, one with the IP address assigned to one NIC and the other with the
IP address assigned to the other NIC. This ensures that the PowerVault
NX1950 cluster solution can access the volume (or snapshot), regardless of
which NIC is used for the connection.

Book.book Page 26 Monday, February 4, 2008 1:26 PM

Advertising