Administrator’s Command Line Guide
Table Of Contents
- Introduction
- Accessing Acronis Storage Clusters via iSCSI
- Preparing to Work with Acronis Storage iSCSI Targets
- Creating and Running Acronis Storage iSCSI Targets
- Listing Acronis Storage iSCSI Targets
- Transferring Acronis Storage iSCSI Targets Between Acronis Storage Nodes
- Stopping Acronis Storage iSCSI Targets
- Deleting Acronis Storage iSCSI Targets
- Configuring Multipath I/O for Acronis Storage iSCSI Targets
- Managing CHAP Accounts for Acronis Storage iSCSI Targets
- Managing LUN Snapshots
- Accessing Acronis Storage Clusters via S3 Protocol
- Monitoring Acronis Storage Clusters
- Managing Cluster Security
- Maximizing Cluster Performance
CHAPTER 5
Managing Cluster Security
This chapter describes some situations that may affect your cluster security.
5.1 Security Considerations
This section describes the security limitations you should keep in mind when deploying a Acronis Storage
cluster.
Traffic sniffing
Acronis Storage does not protect you from traffic sniffing. Anyone who has access to your network can capture
and analyze the data being sent and received through your network.
To learn how to keep your data secure, see Securing Server Communication in Clusters on page 60.
Absence of users and groups
Acronis Storage does not use the concept of users and groups, providing specific users and groups with access
to specific parts of a cluster. Anyone authorized to access a cluster can access all its data.
Non-encrypted data on disks
Acronis Storage does not encrypt data stored in a cluster. Attackers can immediately see the data once they
gain access to a physical disk drive.
59










