FreeBSD Mastery: Specialty Filesystems by Lucas Michael W
Author:Lucas, Michael W
Language: eng
Format: epub
Tags: nonfiction
Published: 2016-01-28T00:00:00+00:00
In addition to requiring a username and password to access a target, you can also restrict which initiators can connect to which targets by using the initiator name and IP address.
Use the initiator-name keyword to define initiator names that can connect in an authentication group. If you have multiple permitted initiators, list each initiator name on its own line. Here I require the initiator to use the name I created earlier this chapter, as well as several similar initiator names.
auth-group db {
chap bugs daffy
initiator-name iqn.2013-11.io.mwl:host1
initiator-name iqn.2013-11.io.mwl:host2
initiator-name iqn.2013-11.io.mwl:host987
}
Most initiator software can set the initiator name, so restricting initiator names isnât a security measure. If someone has the targetâs CHAP username and secret, they can probably capture the initiator name as well. Itâs more of a way to prevent problems caused by human error.
Restricting initiators by IP address is probably more effective. Use the initiator-portal keyword and the permitted IP address or network block. If you have multiple permitted IP blocks, list each on its own line with its own initiator-portal keyword.
auth-group db {
chap bugs daffy
initiator-name iqn.2013-11.io.mwl:host1
initiator-portal 203.0.113.0/24
initiator-portal [2001:db8:bad:c0de::]/64
initiator-portal 192.0.2.87
}
While restricting connections by IP address is probably more secure than limiting initiator names, it still doesnât replace firewalls or packet filters. You really need a network access control device between your targets and the public Internet.
Restrictions by IP or initiator name are usable only in addition to other authentication methods. You must either use some sort of CHAP or specifically allow access without authentication.
Download
This site does not store any files on its server. We only index and link to content provided by other sites. Please contact the content providers to delete copyright contents if any and email us, we'll remove relevant links or contents immediately.
What's Done in Darkness by Kayla Perrin(26957)
The Ultimate Python Exercise Book: 700 Practical Exercises for Beginners with Quiz Questions by Copy(20854)
De Souza H. Master the Age of Artificial Intelligences. The Basic Guide...2024 by Unknown(20607)
D:\Jan\FTP\HOL\Work\Alien Breed - Tower Assault CD32 Alien Breed II - The Horror Continues Manual 1.jpg by PDFCreator(20535)
The Fifty Shades Trilogy & Grey by E L James(19454)
Shot Through the Heart: DI Grace Fisher 2 by Isabelle Grey(19377)
Shot Through the Heart by Mercy Celeste(19236)
Wolf & Parchment: New Theory Spice & Wolf, Vol. 10 by Isuna Hasekura and Jyuu Ayakura(17384)
Python GUI Applications using PyQt5 : The hands-on guide to build apps with Python by Verdugo Leire(17352)
Peren F. Statistics for Business and Economics...Essential Formulas 3ed 2025 by Unknown(17179)
Wolf & Parchment: New Theory Spice & Wolf, Vol. 03 by Isuna Hasekura and Jyuu Ayakura & Jyuu Ayakura(17094)
Wolf & Parchment: New Theory Spice & Wolf, Vol. 01 by Isuna Hasekura and Jyuu Ayakura & Jyuu Ayakura(16710)
The Subtle Art of Not Giving a F*ck by Mark Manson(14825)
The 3rd Cycle of the Betrayed Series Collection: Extremely Controversial Historical Thrillers (Betrayed Series Boxed set) by McCray Carolyn(14440)
Stepbrother Stories 2 - 21 Taboo Story Collection (Brother Sister Stepbrother Stepsister Taboo Pseudo Incest Family Virgin Creampie Pregnant Forced Pregnancy Breeding) by Roxi Harding(14211)
Cozy crochet hats: 7 Stylish and Beginner-Friendly Patterns from Baby Beanies to Trendy Bucket Hats by Vanilla Lazy(13494)
Scorched Earth by Nick Kyme(13092)
Reichel W. Numerical methods for Electrical Engineering, Meteorology,...2022 by Unknown(12975)
Drei Generationen auf dem Jakobsweg by Stein Pia(11255)