HP StorageWorks 1510i Modular Smart Array iSCSI concepts and deployment guide (431338-002, July 2008)

More complex congurations with multiple initiators need to control access to the storage and
usually create multiple LUNs and multiple targets. Each initiator is then granted access to one or
more specic targets. Targets may be shared among groups of initiators.
For example, the following illustration demonstrates how physical drives might be congured into four
LUNs, with three of the LUNs mapped to one target and the remaining LUN mapped, all by itself,
to a separate target.
1. Physical hard drives
2. Log
ical units (LUNs)
3. Mapped logical units
4. Storage target
Target security
To prevent unauthorized access to a storage target, all of the following security methods should be used:
Acce
ss Control Lists (ACLs) — Each target may be congured with specic Access Controls to provide
LUN
-level access limits to only the specied initiators.
CHAP secrets — Each target may be congured with a CHAP secret for Authentication purposes.
For more information on these and other security methods available on the MSA1510i, see Security.
24 M SA 1510 i o ve r v ie w