Administrator Guide

Table Of Contents
About Single Sign-On....................................................................................................................................................... 77
Check Server and Single Sign-On Conguration.........................................................................................................77
Use Single Sign-On to Log In to a PS Series Group.................................................................................................... 77
Log Out of Group Manager Using Single Sign-On...................................................................................................... 78
Enable or Disable Single Sign-On................................................................................................................................78
About SNMP Access to the Group...................................................................................................................................78
About SNMP Authentication...................................................................................................................................... 78
Add or Change SNMP Access to a Group.................................................................................................................. 78
Display SNMP Access to a Group...............................................................................................................................79
About SNMP Traps.....................................................................................................................................................79
About VDS and VSS Authentication..................................................................................................................................81
Display and Congure Windows Service Access to a Group........................................................................................81
Add a VDS/VSS Access Control Policy....................................................................................................................... 81
Modify a VDS/VSS Access Control Policy.................................................................................................................. 81
Delete a VDS/VSS Access Control Policy...................................................................................................................82
About IPsec......................................................................................................................................................................82
Types of Protected Trac.......................................................................................................................................... 82
IPsec Policies..............................................................................................................................................................83
Security Certicates...................................................................................................................................................84
IPsec Security Parameters......................................................................................................................................... 84
IPsec Security Associations (SA)................................................................................................................................84
IPsec Pre-Shared Keys (PSKs)...................................................................................................................................84
Examples of IPsec Congurations.............................................................................................................................. 85
IPsec Performance Considerations............................................................................................................................101
IPsec Conguration Limitations................................................................................................................................. 101
Protect Network Trac with IPsec...........................................................................................................................104
About Dedicated Management Networks.......................................................................................................................106
Using IPv6 with Management Networks.................................................................................................................. 106
Congure a Management Network...........................................................................................................................106
Display Management Network Information............................................................................................................... 108
Uncongure a Management Network.......................................................................................................................108
Secure Erase...................................................................................................................................................................108
7 About Volume-Level Security....................................................................................... 110
Connect Initiators to iSCSI Targets.................................................................................................................................. 110
Access Control Methods................................................................................................................................................. 110
About Access Policies.................................................................................................................................................111
Access Policies: Use Cases.........................................................................................................................................111
Create a New Access Policy...................................................................................................................................... 113
Create a New Basic Access Point..............................................................................................................................113
Modify or Delete a Basic Access Point.......................................................................................................................114
Modify Access Policies and Basic Access Points by Volume...................................................................................... 114
Associate Access Control Policies with Volumes........................................................................................................115
Create an Access Policy Group..................................................................................................................................116
Associate an Access Policy Group to a Volume..........................................................................................................116
Manage Access Controls for VDS/VSS Access.........................................................................................................116
5