White Papers

42
Step 3 - iSCSI Access
Choose to Auto-Generate ACL records or use an ACL policy to assign to the
cloned volumes to ensure that the designated cluster can rescan and see the
volumes. For more information on creating and using ACL policies see
TR1067
EqualLogic Virtual Storage Manager: Installation Considerations and Datastore
Manager
. Select the iSCSI Access and click Next.