Adaptec iSA1500 User Guide - Page 71

Setting iSCSI Target Authentication, Adding an Authentication User

Page 71 highlights

Controlling Access and Adding Security 2 Click Generate SAN Password. 3 Click OK to confirm the creation of a new password. Beginning immediately, your management station and all of its associated agents use this new password during authentication checks. Setting iSCSI Target Authentication When you create an iSCSI target, you can set an authentication method. (See Creating an iSCSI Target on page 4-11 for more information.) You can select either of two user authentication methods, or choose to have no authentication: ■ Challenge Handshake Authentication Protocol (CHAP)- CHAP verifies the identity of an initiator using a three-way handshake. Once a link is established between the initiator and the target, the target sends a challenge message to the initiator. The initiator responds to the challenge message and the target verifies the response. If the response is correct, communication between the initiator and the target can proceed; if the response is incorrect, the connection is terminated. ■ Secure Remote Password (SRP)-(Windows 2000 only) SRP uses passwords and key exchange to provide secure authentication. When SRP is enabled, you must provide a user name and password to log on to a target. When SRP is not enabled, the target uses the iSCSI name to identify the iSCSI client. ■ None-If you set the authentication method to None, no iSCSI target authentication takes place. Adding an Authentication User To add an authentication user to a specific iSCSI subsystem: 1 In the Tree Menu, click the iSCSI subsystem you want. 5-5

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • 148
  • 149
  • 150
  • 151
  • 152
  • 153
  • 154
  • 155
  • 156
  • 157
  • 158
  • 159
  • 160
  • 161
  • 162
  • 163
  • 164
  • 165
  • 166
  • 167
  • 168
  • 169
  • 170
  • 171
  • 172
  • 173
  • 174
  • 175
  • 176
  • 177
  • 178
  • 179
  • 180
  • 181
  • 182
  • 183
  • 184
  • 185
  • 186
  • 187
  • 188
  • 189
  • 190
  • 191
  • 192
  • 193
  • 194
  • 195
  • 196
  • 197
  • 198
  • 199
  • 200
  • 201
  • 202
  • 203
  • 204
  • 205
  • 206
  • 207
  • 208
  • 209
  • 210
  • 211
  • 212
  • 213
  • 214
  • 215
  • 216
  • 217
  • 218

5-5
Controlling Access and Adding Security
2
Click
Generate SAN Password
.
3
Click
OK
to confirm the creation of a new password.
Beginning immediately, your management station and all of its
associated agents use this new password during authentication
checks.
Setting iSCSI Target Authentication
When you create an iSCSI target, you can set an authentication
method. (See
Creating an iSCSI Target
on page 4-11
for more
information.) You can select either of two user authentication
methods, or choose to have no authentication:
Challenge Handshake Authentication Protocol (CHAP)
CHAP verifies the identity of an initiator using a three-way
handshake. Once a link is established between the initiator and
the target, the target sends a challenge message to the initiator.
The initiator responds to the challenge message and the target
verifies the response. If the response is correct, communication
between the initiator and the target can proceed; if the response
is incorrect, the connection is terminated.
Secure Remote Password (SRP)—
(
Windows 2000 only
) SRP uses
passwords and key exchange to provide secure authentication.
When SRP is enabled, you must provide a user name and
password to log on to a target. When SRP is not enabled, the target
uses the iSCSI name to identify the iSCSI client.
None
—If you set the authentication method to
None
, no iSCSI
target authentication takes place.
Adding an Authentication User
To add an authentication user to a specific iSCSI subsystem:
1
In the Tree Menu, click the iSCSI subsystem you want.