Administrator Guide

Table Of Contents
Log Out of Group Manager Using Single Sign-On...................................................................................................... 69
Enable or Disable Single Sign-On................................................................................................................................69
About SNMP Access to the Group...................................................................................................................................69
About SNMP Authentication......................................................................................................................................69
Add or Change SNMP Access to a Group..................................................................................................................69
Display SNMP Access to a Group...............................................................................................................................70
About SNMP Traps.....................................................................................................................................................70
About VDS and VSS Authentication..................................................................................................................................71
Display and Congure Windows Service Access to a Group....................................................................................... 72
Add a VDS/VSS Access Control Policy.......................................................................................................................72
Modify a VDS/VSS Access Control Policy..................................................................................................................72
Delete a VDS/VSS Access Control Policy...................................................................................................................72
About IPsec......................................................................................................................................................................73
Types of Protected Trac...........................................................................................................................................73
IPsec Policies.............................................................................................................................................................. 74
Security Certicates................................................................................................................................................... 74
IPsec Security Parameters..........................................................................................................................................75
IPsec Security Associations (SA)................................................................................................................................75
IPsec Pre-Shared Keys (PSKs)...................................................................................................................................75
Examples of IPsec Congurations.............................................................................................................................. 75
IPsec Performance Considerations.............................................................................................................................92
IPsec Conguration Limitations.................................................................................................................................. 92
Protect Network Trac with IPsec............................................................................................................................ 95
About Dedicated Management Networks.........................................................................................................................97
Using IPv6 with Management Networks.................................................................................................................... 97
Congure a Management Network.............................................................................................................................97
Display Management Network Information.................................................................................................................99
Uncongure a Management Network........................................................................................................................ 99
Enable Secure Erase...................................................................................................................................................99
7 About Volume-Level Security....................................................................................... 101
Connect Initiators to iSCSI Targets.................................................................................................................................. 101
Access Control Methods................................................................................................................................................. 101
About Access Policies............................................................................................................................................... 102
Access Policies: Use Cases....................................................................................................................................... 102
Create a New Access Policy..................................................................................................................................... 104
Create a New Basic Access Point............................................................................................................................. 104
Modify or Delete a Basic Access Point......................................................................................................................105
Modify Access Policies and Basic Access Points by Volume..................................................................................... 105
Associate Access Control Policies with Volumes.......................................................................................................106
Create an Access Policy Group................................................................................................................................. 107
Associate an Access Policy Group to a Volume......................................................................................................... 107
Manage Access Controls for VDS/VSS Access........................................................................................................108
Authenticate Initiators with CHAP.................................................................................................................................. 108
Display Local CHAP Accounts...................................................................................................................................109
Create a Local CHAP Account..................................................................................................................................109
5