Dell PowerVault MD3200i Deployment Guide - Page 62

CHAP Definitions, Step 5: Con CHAP Authentication on the Storage Array (Optional)

Page 62 highlights

CHAP is an optional feature and is not required to use iSCSI. However, if you do not configure CHAP authentication, any host server connected to the same IP network as the storage array can read from and write to the storage array. NOTE: When using CHAP authentication, you should configure it on both the storage array (using MDSM) and the host server (using the iSCSI initiator) before preparing virtual disks to receive data. If you prepare disks to receive data before you configure CHAP authentication, you lose visibility to the disks once CHAP is configured. CHAP Definitions To summarize the differences between target CHAP and mutual CHAP authentication, see Table A-3. Table A-3. CHAP Types Defined CHAP Type Target CHAP Mutual CHAP Description Sets up accounts that iSCSI initiators use to connect to the target storage array. The target storage array then authenticates the iSCSI initiator. Applied in addition to target CHAP, mutual CHAP sets up an account that a target storage array uses to connect to an iSCSI initiator. The iSCSI initiator then authenticates the target. Step 5: Configure CHAP Authentication on the Storage Array (Optional) If you are configuring CHAP authentication of any kind (either target-only or target and mutual), you must complete this step and "Step 5: Configure CHAP Authentication on the Storage Array (Optional)" on page 62. If you are not configuring any type of CHAP, skip these steps and go to "Step 7: Connect to the Target Storage Array from the Host Server" on page 68. NOTE: If you choose to configure mutual CHAP authentication, you must first configure target CHAP. In terms of iSCSI configuration, the term target always refers to the storage array. 62 Appendix-Manual Configuration

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82

62
Appendix—Manual Configuration
CHAP is an optional feature and is not required to use iSCSI. However, if you
do not configure CHAP authentication, any host server connected to the same
IP network as the storage array can read from and write to the storage array.
NOTE:
When using CHAP authentication, you should configure it on both the
storage array (using MDSM) and the host server (using the iSCSI initiator) before
preparing virtual disks to receive data. If you prepare disks to receive data before
you configure CHAP authentication, you lose visibility to the disks once CHAP
is configured.
CHAP Definitions
To summarize the differences between target CHAP and mutual CHAP
authentication, see Table A-3.
Step 5: Configure CHAP Authentication on the
Storage Array (Optional)
If you are configuring CHAP authentication of any kind (either target-only or
target and mutual), you must complete this step and "Step 5: Configure
CHAP Authentication on the Storage Array (Optional)" on page 62.
If you are not configuring any type of CHAP, skip these steps and go to "Step
7: Connect to the Target Storage Array from the Host Server" on page 68.
NOTE:
If you choose to configure mutual CHAP authentication, you must first
configure target CHAP.
In terms of iSCSI configuration, the term target always refers to the storage array.
Table A-3.
CHAP Types Defined
CHAP Type
Description
Target CHAP
Sets up accounts that iSCSI initiators use to connect to the
target storage array. The target storage array then authenticates
the iSCSI initiator.
Mutual CHAP
Applied in addition to target CHAP, mutual CHAP sets up an
account that a target storage array uses to connect to an iSCSI
initiator. The iSCSI initiator then authenticates the target.