SANRAD V-Switch Manuel D’Utilisation

Page de 300
 
 
Chapter 7:  Volume Exposure and Security  
109
 
 
1012
4n
iSCSI Target 3
wwui3
Vol 3
Vol 4
LU0
LU1
Vol 2
LU0
iSCSI Target 2
wwui2
Vol 1
LU0
iSCSI Target 1
wwui1
V-Switch
 
Figure 53. 
iSCSI Target Access 
Once a volume has a LUN and is attached to a target, it is accessible to iSCSI 
initiators.  Each initiator can access, read and write into the volume.   
Identities 
To allow selective iSCSI initiator access to iSCSI target volumes, the V-
Switch uses identities to define pools of initiators.  An identity is a user-
defined list of iSCSI initiators.  An identity can contain from one to multiple 
initiators, with each initiator having a unique WWUI. 
101
48
Ident A
wwui2
wwui1
wwui10
wwui9
wwui8
wwui7
wwui6
wwui5
wwui4
wwui3
 
Figure 54. 
Identity A’s iSCSI Initiators 
In Figure 54, there are four iSCSI initiators in Identity A:  WWUI 1, 2,5 and 
8.