6.5

Table Of Contents
Discovery Target Names
The target name is either an IQN name or an EUI name.
The IQN and EUI names use specic formats.
n
The IQN name uses the following format.
iqn.yyyy-mm.{reversed domain name}:id_string
The following IQN name contains example values.
iqn.2007-05.com.mydomain:storage.tape.sys3.abc
The ESXi host generates an IQN name for software iSCSI and dependent hardware iSCSI adapters. You
can change that default IQN name.
n
The EUI name is described in IETF rfc3720 as follows.
The IEEE Registration Authority provides a service for assigning globally unique identiers [EUI]. The
EUI-64 format is used to build a global identier in other network protocols. For example, Fibre
Channel denes a method of encoding it into a WorldWideName.
The format is eui. followed by an EUI-64 identier (16 ASCII-encoded hexadecimal digits).
The following EUI name contains example values.
Type EUI-64 identifier (ASCII-encoded hexadecimal)
+- -++--------------+
| || |
eui.02004567A425678D
The IEEE EUI-64 iSCSI name format can be used when a manufacturer is registered with the IEEE
Registration Authority and uses EUI-64 formaed worldwide unique names for its products.
You can check in the UI of the storage array whether an array uses an IQN name or an EUI name.
Protecting an iSCSI SAN
Your iSCSI conguration is only as secure as your IP network. By enforcing good security standards when
you set up your network, you help safeguard your iSCSI storage.
Protecting Transmitted Data
A primary security risk in iSCSI SANs is that an aacker might sni transmied storage data.
Neither the iSCSI adapter nor the ESXi host iSCSI initiator encrypts the data that it transmits to and from the
targets, making the data vulnerable to sning aacks. You must therefore take additional measures to
prevent aackers from easily seeing iSCSI data.
Allowing your virtual machines to share virtual switches and VLANs with your iSCSI conguration
potentially exposes iSCSI trac to misuse by a virtual machine aacker. To help ensure that intruders
cannot listen to iSCSI transmissions, make sure that none of your virtual machines can see the iSCSI storage
network.
Protect your system by giving the iSCSI SAN a dedicated virtual switch.
n
If you use an independent hardware iSCSI adapter, make sure that the iSCSI adapter and ESXi physical
network adapter are not inadvertently connected outside the host. Such a connection might result from
sharing a switch.
n
If you use dependent hardware or software iscsi adapter, which uses ESXi networking, congure iSCSI
storage through a dierent virtual switch than the one used by your virtual machines.
Chapter 5 Managing iSCSI Storage
VMware, Inc. 71