Dell PowerVault MD3000i User's Guide - Page 32

Changing the iSCSI Target Authentication, Entering Mutual Authentication Permissions

Page 32 highlights

Changing the iSCSI Target Authentication 1 Click the iSCSI tab, and then click Change Target Authentication. 2 Select None if no authentication is required for any initiator to access the target. NOTE: If you select None, any initiator can access this target. Use this option only if you do not require secure data. However, if you select both None and CHAP at the same time, the storage array will allow an iSCSI initiator to log on with or without CHAP authentication. 3 Select CHAP if you want any initiator that tries to access the target to provide the target permissions. If CHAP is selected, but no CHAP secret is defined, an error message appears. Click CHAP Secret to see the Enter CHAP Secret dialog (see "Creating CHAP Secrets" on page 32). You can define the permissions in this dialog. NOTE: If an initiator requires mutual (bi-directional) authentication see "Entering Mutual Authentication Permissions" on page 32. Entering Mutual Authentication Permissions Mutual authentication or two-way authentication is a way for a client or a user to verify themselves to a host server, and for the host server to validate itself to the user. This validation is accomplished in such a way that both parties are sure of the other's identity. 1 Click the iSCSI tab, and then click Enter Mutual Authentication Permissions. 2 Select an initiator from the list. The initiator details are shown. 3 Select CHAP Secret to enter the initiator CHAP permissions in the dialog that appears. NOTE: To add, modify, or delete an initiator, click the Modify tab, and then click Edit Host Topology. Creating CHAP Secrets When you set up an authentication method, you can choose to create a Challenge Handshake Authentication Protocol (CHAP) secret. The CHAP secret is a password that is recognized by the initiator and the target. If you are using mutual authentication to configure the MD3000i storage array, you 32 Using iSCSI

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120

32
Using iSCSI
Changing the iSCSI Target Authentication
1
Click the
iSCSI
tab, and then click
Change Target Authentication
.
2
Select
None
if no authentication is required for any initiator to access the
target.
NOTE:
If you select
None
, any initiator can access this target. Use this option
only if you do not require secure data. However, if you select both
None
and
CHAP
at the same time, the storage array will allow an iSCSI initiator to log on
with or without CHAP authentication.
3
Select
CHAP
if you want any initiator that tries to access the target to
provide the target permissions. If
CHAP
is selected, but no CHAP secret is
defined, an error message appears.
Click
CHAP Secret
to see the
Enter CHAP Secret
dialog (see "Creating
CHAP Secrets" on page 32). You can define the permissions in this dialog.
NOTE:
If an initiator requires mutual (bi-directional) authentication see "Entering
Mutual Authentication Permissions" on page 32.
Entering Mutual Authentication Permissions
Mutual authentication or two-way authentication is a way for a client or a
user to verify themselves to a host server, and for the host server to validate
itself to the user. This validation is accomplished in such a way that both
parties are sure of the other’s identity.
1
Click the
iSCSI
tab, and then click
Enter Mutual Authentication
Permissions
.
2
Select an initiator from the list. The initiator details are shown.
3
Select
CHAP Secret
to enter the initiator CHAP permissions in the dialog
that appears.
NOTE:
To add, modify, or delete an initiator, click the
Modify
tab, and then
click
Edit Host Topology
.
Creating CHAP Secrets
When you set up an authentication method, you can choose to create a
Challenge Handshake Authentication Protocol (CHAP) secret. The CHAP
secret is a password that is recognized by the initiator and the target. If you
are using mutual authentication to configure the MD3000i storage array, you