|
[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index] Re: Question on iSCSI securityOn 6/12/03, wrstuden@wasabisystems.com wrote: >As I understand your scenario, target C will see initiator >A logging in from B's IP address. There is no way that >iSCSI will see the connection as coming from anywhere >other than B's IP. So you can close this by limiting A's >auths to only be valid from its IP addresses. And if A has to use an alternate path through another NIC? Or if A's address is assigned by DHCP? At the minimum, such a solution should be aware of ALL valid addresses for that A might use. Caitlin Bestler http://asomi.com/CaitlinBestler/
Home Last updated: Thu Jun 12 18:19:20 2003 12635 messages in chronological order |