iSCSI Initiators

The array uses iSCSI initiators and iSCSI targets as a method of communication. The volumes and snapshots on the array act as targets, or data providers. This provides an extra level of security.

A common method for limiting access is to create groups of iSCSI initiators that are managed as a single unit. The iSCSI groups can be based on OS, application, or any other logical common requirement. All members of the iSCSI group are granted access to the target volume.

To access an iSCSI target (the volumes and snapshots) you must have a supported iSCSI initiator installed on a computer within your network subsystem. You then grant the initiator permission to access the array's iSCSI discovery IP address.