Administrator Guide

Table Of Contents
In the Modify Basic Access Point dialog box, change the CHAP user name, iSCSI initiator name, or IP address, then click
OK.
4. Click OK.
Delete a VDS/VSS Access Control Policy
1. Click GroupGroup Conguration.
2. Click the VDS/VSS tab.
3. Select the policy from the appropriate subpanel (Access policy groups, Access policies, or Basic access points) and click the
corresponding Delete command.
4. Conrm that you want to delete the policy.
When you delete or modify a basic access point, you might need to update any computer that was previously accessing volumes
through that access point.
About IPsec
IPsec is a set of standardized protocols designed to allow systems on IP-based networks to verify each other’s identities and create
secured communication links. IPsec uses cryptographic security mechanisms for authentication and protection. IPsec validates the
identity of devices communicating over IP-based networks, encrypts all data passing between participating systems, and protects
against disclosure, modication, eavesdropping, and attack. IPsec is supported for both IPv4 and IPv6 networks.
NOTE: For more general information about IPsec, refer to the website of the Internet Engineering Task Force (ietf.org),
the organization that originally developed the IPsec protocols.
In the context of an iSCSI SAN that uses EqualLogic PS Series storage arrays, IPsec secures communications between group
member arrays and also between iSCSI initiators and the group. You can use policies to congure your IPsec implementation to
protect iSCSI trac based on initiator IP address, initiators in a specic subnet, or network protocol. IPsec authentication is handled
using certicates or pre-shared keys.
Types of Protected Trac
The types of trac protected by IPsec are shown in Figure 9. What IPsec Protects.
Figure 9. What IPsec Protects
IP Trac Protection
To enable IPsec protection for trac between the group and iSCSI initiators, use the following basic process:
82
About Group-Level Security