Brands
3Com
Alcatel-Lucent
Allied-Telesis
Avaya
Brocade
Cisco
D-Link
Dell
Emulex
Enterasys
Extreme
Force10
Foundry
H3C
HP
Huawei
Intel
Juniper
Linksys
Marconi
McAfee
Netgear
Nortel
Planet
Qlogic
Redback
SMC
Sun
TRENDnet
Vixel
ZTE
ZyXEL

Authorization of iSCSI

Because iSCSI aims to consolidate storage for many servers into a single storage array, iSCSI deployments require strategies to prevent unrelated initiators from accessing storage resources.

As a pathological example, a single enterprise storage array could hold data for servers variously regulated by the Sarbanes-Oxley Act for corporate accounting, HIPAA for health benefits information, and PCI DSS for credit card processing. During an audit, storage systems must demonstrate controls to ensure that a server under one regime cannot access the storage assets of a server under another.

Typically, iSCSI storage arrays explicitly map initiators to specific target LUNs; an initiator authenticates not to the storage array, but to the specific storage asset it intends to use. However, because the target LUNs for SCSI commands are expressed both in the iSCSI negotiation protocol and in the underlying SCSI protocol, care must be taken to ensure that access control is provided consistently.

July 26, 2011
Bestsellers
10GBASE-SR SFP+ 850nm 300m
SFP-10G-SR
5 out of 5 Stars! $175.00
5 out of 5 Stars!
1000BASE-SX SFP 850nm 550m
GLC-SX-MM
5 out of 5 Stars! $25.00
5 out of 5 Stars!
1000BASE-T SFP RJ45 100m
GLC-T
0 out of 5 Stars! $45.00
0 out of 5 Stars!
10GBASE-LR SFP+ 1310nm 10km
SFP-10G-LR
0 out of 5 Stars! $399.00
0 out of 5 Stars!