Administrator Guide

Table Of Contents
4. Conrm that you want to delete the policy.
When you delete or modify a basic access point, you might need to update any computer that was previously accessing volumes
through that access point.
About IPsec
IPsec is a set of standardized protocols designed to allow systems on IP-based networks to verify each other’s identities and create
secured communication links. IPsec uses cryptographic security mechanisms for authentication and protection. IPsec validates the
identity of devices communicating over IP-based networks, encrypts all data passing between participating systems, and protects
against disclosure, modication, eavesdropping, and attack. IPsec is supported for both IPv4 and IPv6 networks.
NOTE: For more general information about IPsec, refer to the website of the Internet Engineering Task Force (ietf.org),
the organization that originally developed the IPsec protocols.
In the context of an iSCSI SAN that uses EqualLogic PS Series storage arrays, IPsec secures communications between group
member arrays and also between iSCSI initiators and the group. You can use policies to congure your IPsec implementation to
protect iSCSI trac based on initiator IP address, initiators in a specic subnet, or network protocol. IPsec authentication is handled
using certicates or pre-shared keys.
Types of Protected Trac
The types of trac protected by IPsec are shown in Figure 9. What IPsec Protects.
Figure 9. What IPsec Protects
IP Trac Protection
To enable IPsec protection for trac between the group and iSCSI initiators, use the following basic process:
NOTE: This process is not required for protecting communications between group members. After IPsec is enabled, all
network trac between group members is automatically protected, without need for further conguration.
1. A group administrator creates security parameters to specify how trac should be authenticated.
2. A group administrator creates policies to identify trac and determine what action to take for it:
Trac is dropped.
Trac is allowed to pass directly through to the array in the clear.
About Group-Level Security
73