Configuring iSCSI security

One major risk with enabling iSCSI storage is the ease at which it can be deployed and configured in an unsecure fashion. Not so long ago, the enterprise storage was primarily based on the Fibre Channel technology and used almost exclusively for any infrastructure supporting mission critical business applications. Today, iSCSI provides a cost-effective alternative to smaller businesses to implement shared storage supporting a VMware cluster, for example.

All iSCSI network traffic should always be segmented from all other network traffic on a separate subnet. In addition to segmentation, authentication between the ESXi host and the SAN or NAS is recommended to guard against man in the middle attacks. An additional layer ...

Get VMware vSphere Security Cookbook now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.