version 1.1, 2013/03/15 20:56:17
|
version 1.2, 2019/04/08 20:37:11
|
Line 12 remotely, possibly on co-located hardwar
|
Line 12 remotely, possibly on co-located hardwar
|
could be stolen, or to which others could gain access. |
could be stolen, or to which others could gain access. |
|
|
To encrypt the iSCSI device, we use the NetBSD iSCSI initiator, available in |
To encrypt the iSCSI device, we use the NetBSD iSCSI initiator, available in |
NetBSD-current, and the standard cgd device. In all, setting up an encrypted |
NetBSD-6 and newer, and the standard cgd device. In all, setting up an encrypted |
device in this manner should take less than 15 minutes, even for someone |
device in this manner should take less than 15 minutes, even for someone |
unfamiliar with iSCSI or cgd. |
unfamiliar with iSCSI or cgd. |
|
|
Line 30 this example, the target is running on t
|
Line 30 this example, the target is running on t
|
laptop called, in a moment of inspiration, inspiron1300). A 50 MB iSCSI target |
laptop called, in a moment of inspiration, inspiron1300). A 50 MB iSCSI target |
is being presented as target1. |
is being presented as target1. |
|
|
# obj/iscsifs -u agc -h inspiron1300.wherever.co.uk /mnt & |
# iscsi-initiator -u agc -h inspiron1300.wherever.co.uk /mnt & |
[1] 11196 |
[1] 11196 |
# df |
# df |
Filesystem 1K-blocks Used Avail %Cap Mounted on |
Filesystem 1K-blocks Used Avail %Cap Mounted on |