SANRAD V-Switch Manuel D’Utilisation
Chapter 7: Volume Exposure and Security
109
1012
4n
iSCSI Target 3
wwui3
Vol 3
Vol 4
LU0
LU1
Vol 2
LU0
iSCSI Target 2
wwui2
Vol 1
LU0
iSCSI Target 1
wwui1
V-Switch
Figure 53.
iSCSI Target Access
Once a volume has a LUN and is attached to a target, it is accessible to iSCSI
initiators. Each initiator can access, read and write into the volume.
initiators. Each initiator can access, read and write into the volume.
Identities
To allow selective iSCSI initiator access to iSCSI target volumes, the V-
Switch uses identities to define pools of initiators. An identity is a user-
defined list of iSCSI initiators. An identity can contain from one to multiple
initiators, with each initiator having a unique WWUI.
Switch uses identities to define pools of initiators. An identity is a user-
defined list of iSCSI initiators. An identity can contain from one to multiple
initiators, with each initiator having a unique WWUI.
101
48
Ident A
wwui2
wwui1
wwui10
wwui9
wwui8
wwui7
wwui6
wwui5
wwui4
wwui3
Figure 54.
Identity A’s iSCSI Initiators
In Figure 54, there are four iSCSI initiators in Identity A: WWUI 1, 2,5 and
8.
8.