HP NC550SFP Dual Port 10GbE Server Adapter User Manual

Page 6

Advertising
background image

Overview 6

Allows negotiation of various parameters

iSCSI Login
An iSCSI session has two phases:

Login Phase. iSCSI parameters are negotiated using login requests and responses.

Full Featured Phase. After security or authentication has occurred and operational parameters have
been set, the initiator performs SCSI I/Os.

Security
Security is a necessary and critical party of the iSCSI protocol because it operates within the Internet
environment.
CHAP Authentication
Challenge Handshake Authentication Protocol (CHAP) is used to periodically verify the identity of the
initiator by the target by using a challenge/response mechanism. This is accomplished upon initial link
establishment and may be repeated any time after the link has been established. For the
challenge/response method to work, the target must know the initiator's secret key and the initiator must
be set up to respond to a challenge.
Although the authentication is only one-way, you can negotiate CHAP in both directions for mutual
authentication with the help of the same secret set.

Advertising