6.0

Table Of Contents
VMware, Inc. 61
Chapter 5 Managing iSCSI Storage
Discovery Target Names
ThetargetnameiseitheranIQNnameoranEUIname.
TheIQNnameusesthefollowingformat:
iqn.yyyy-mm.{reversed domain name}:id_string
Forexample:iqn.2007-05.com.mydomain:storage.tape.sys3.abc
TheESXihostgeneratesanIQNnameforsoftwareiSCSIanddependenthardwareiSCSIadapters.You
canchangethatdefaultIQNname.
TheEUInameisdescribedinIETFrfc3720asfollows:
TheIEEERegistrationAuthorityprovidesaserviceforassigninggloballyuniqueidentifiers[EUI].The
EUI64formatisusedtobuildaglobalidentifierinothernetworkprotocols.Forexample,FibreChannel
definesamethodofencodingitintoaWorldWideName
.
Theformatiseui.followedbyanEUI64identifier(16ASCIIencodedhexadecimaldigits).
Forexample:
Type EUI-64 identifier (ASCII-encoded hexadecimal)
+--++--------------+
| || |
eui.02004567A425678D
TheIEEEEUI64iSCSInameformatcanbeusedwhenamanufacturerisregisteredwiththeIEEE
RegistrationAuthorityandusesEUI64formattedworldwideuniquenamesforitsproducts.
CheckintheUIofthestoragearraywhetheranarrayusesanIQNnameoranEUIname.
Protecting an iSCSI SAN
YouriSCSIconfigurationisonlyassecureasyourIPnetwork.Byenforcinggoodsecuritystandardswhenyou
setupyournetwork,youhelpsafeguardyouriSCSIstorage.
Protecting Transmitted Data
AprimarysecurityriskiniSCSISANsisthatanattackermightsnifftransmittedstoragedata.Neitherthe
iSCSIadapternortheESXihostiSCSIinitiatorencryptsthedatathatittransmitstoandfromthetargets,
makingthedatavulnerabletosniffingattacks.Youmustthereforetakeadditionalmeasuresto
prevent
attackersfromeasilyseeingiSCSIdata.
AllowingyourvirtualmachinestosharevirtualswitchesandVLANswithyouriSCSIconfiguration
potentiallyexposesiSCSItraffictomisusebyavirtualmachineattacker.Tohelpensurethatintruderscannot
listentoiSCSItransmissions,makesurethatnoneofyourvirtualmachines
canseetheiSCSIstoragenetwork.
ProtectyoursystembygivingtheiSCSISANadedicatedvirtualswitch.
IfyouuseanindependenthardwareiSCSIadapter,makesurethattheiSCSIadapterandESXiphysical
networkadapterarenotinadvertentlyconnectedoutsidethehost.Suchaconnectionmightresultfrom
sharingaswitch.
Ifyouusedependenthardwareorsoftwareiscsiadapter,whichusesESXinetworking,configureiSCSI
storagethroughadifferentvirtualswitchthantheoneusedbyyourvirtualmachines.
YoucanalsoconfigureyouriSCSISANonitsownVLANtoimproveperformanceandsecurity.Placingyour
iSCSIconfigurationona
separateVLANensuresthatnodevicesotherthantheiSCSIadaptercansee
transmissionswithintheiSCSISAN.WithadedicatedVLAN,networkcongestionfromothersourcescannot
interferewithiSCSItraffic.