Adaptec 5325302057 User Guide - Page 85

Controlling Access to Your IP SAN with Authentication, Apply

Page 85 highlights

Controlling Access to Your IP SAN with Authentication 13 Click Next again, then review the configuration summary. Click Back to change the configuration. 14 Click Apply, then click Yes. The logical devices are created or modified, and iSCSI initiator assignments are saved in the iSCSI Storage Appliance. Controlling Access to Your IP SAN with Authentication When you create a new volume (see page 40) or logical device (page 42), you can set an authentication method so that any server that attempts to log in to your iSCSI Storage Appliance is forced to authenticate itself. Note Supported authentication methods vary by iSCSI initiator. Refer to your iSCSI initiator documentation for more information. Once an authentication method is set, any server trying to log in without authentication, or with the incorrect authentication, is rejected. Two authentication methods are available in Adaptec Storage Manager: • Challenge Handshake Authentication Password (CHAP)-Default setting Note If you are using iSNS (see page 155) to discover iSCSI targets and want to control which iSCSI targets can be logged into by which iSCSI initiators, you must set CHAP authentication. Without CHAP authentication, all iSCSI initiators will be able to log in to all iSCSI targets. • Secure Remote Password (SRP) You can choose not to set any authentication method. When authentication for a provisioned volume or logical device is set to None, the authentication method (if any) is set by the iSCSI initiator instead of your iSCSI Storage Appliance, and your iSCSI Storage Appliance allows a server to log in when the server bypasses security or when the server-requested authentication is completed successfully. Chapter 7 Controlling Access to Your IP SAN 79

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • 148
  • 149
  • 150
  • 151
  • 152
  • 153
  • 154
  • 155
  • 156
  • 157
  • 158
  • 159
  • 160
  • 161
  • 162
  • 163
  • 164
  • 165
  • 166
  • 167
  • 168
  • 169
  • 170
  • 171
  • 172
  • 173
  • 174
  • 175
  • 176
  • 177
  • 178
  • 179
  • 180
  • 181
  • 182
  • 183
  • 184
  • 185
  • 186
  • 187
  • 188
  • 189
  • 190
  • 191
  • 192
  • 193
  • 194
  • 195
  • 196
  • 197
  • 198
  • 199
  • 200
  • 201
  • 202
  • 203
  • 204
  • 205
  • 206
  • 207
  • 208
  • 209
  • 210
  • 211
  • 212
  • 213
  • 214
  • 215
  • 216
  • 217
  • 218
  • 219
  • 220
  • 221
  • 222
  • 223
  • 224
  • 225
  • 226
  • 227
  • 228
  • 229
  • 230
  • 231
  • 232
  • 233
  • 234
  • 235
  • 236

Controlling Access to Your IP SAN with Authentication
Chapter 7
Controlling Access to Your IP SAN
79
13
Click
Next
again, then review the configuration summary.
Click
Back
to change the configuration.
14
Click
Apply
, then click
Yes
.
The logical devices are created or modified, and iSCSI initiator assignments are
saved in the iSCSI Storage Appliance.
Controlling Access to Your IP SAN with Authentication
When you create a new volume (see page 40) or logical device (page 42), you can set
an authentication method so that any server that attempts to log in to your iSCSI
Storage Appliance is forced to authenticate itself.
Note
Supported authentication methods vary by iSCSI initiator. Refer to your iSCSI
initiator documentation for more information.
Once an authentication method is set, any server trying to log in without
authentication, or with the incorrect authentication, is rejected.
Two authentication methods are available in Adaptec Storage Manager:
Challenge Handshake Authentication Password (CHAP)
—Default setting
Note
If you are using iSNS (see page 155) to discover iSCSI targets and want to
control which iSCSI targets can be logged into by which iSCSI initiators, you
must set CHAP authentication. Without CHAP authentication, all iSCSI initiators
will be able to log in to all iSCSI targets.
Secure Remote Password (SRP)
You can choose not to set any authentication method. When authentication for a
provisioned volume or logical device is set to None, the authentication method (if
any) is set by the iSCSI initiator instead of your iSCSI Storage Appliance, and your
iSCSI Storage Appliance allows a server to log in when the server bypasses security
or when the server-requested authentication is completed successfully.