HP StorageWorks XP Remote Web Console Software User Manual

Page 116

Advertising
background image

116 LUN Manager operations

• User Name: iSCSI target’s user name up to 128 characters. You can use alphanumeric characters,

spaces, and the following symbols in a user name:

. - + @ _ = : / [ ] , ~

User names are case-sensitive. For example, port1 and Port1 represent different user names.

• Secret: Secret (that is, a password used in CHAP authentication) between 12 to 32 characters. You

can use the same characters and symbols as a user name.

• Re-enter Secret: Specify the secret again for confirmation.

4.

Click OK. The specified user information for the port appears in blue in the Authentication information

(Target) list.

5.

Click Apply. A confirmation message appears.

6.

Click OK. Settings are applied to the array.

Clearing an iSCSI target’s user information (when performing mutual

authentication)

1.

Start LUN Manager, and display the Authentication pane (

Figure 30

).

2.

In the Port tree, expand the iSCSI folder, and select the port or iSCSI target whose user information you

want to clear. The currently registered user information for the port or iSCSI target appears in the

Authentication Information (Target) list on the right of the tree.

3.

Right-click any point in the Authentication information (Target) list, and select Clear Authentication

Information. The Clear Authentication Information pane appears.

4.

Click OK. The selected iSCSI target’s user information disappears from the Authentication information

(Target) list.

5.

Click Apply. A confirmation message appears.

6.

Click OK. Settings are applied to the array.

Settings and connection results in authentication of hosts (iSCSI environments)

During authentication of hosts, the connection result is determined based on the combination of the

following iSCSI target settings:

iSCSI target’s setting in the Port tree: enable (

) or disable (

)

Whether or not the user information for the host that attempts to connect is registered on the iSCSI

target

Table 20

shows the relationship between combinations of iSCSI target settings and connection results in

authentication of hosts. Regardless of whether or not the host is configured for authentication by ports with

CHAP, the connection results are as follows, unless otherwise noted.

Table 20

Combinations of port settings and connection results (iSCSI environments)

Port settings

Host settings

Connection results

Authentication: at target Host user information

Enable

Registered

Registered

Connected if the authentication of

the host succeeded

1

1. If a host is not configured for authentication by ports with CHAP, the host cannot connect to the array.

Enable

Registered

Not registered

Failed to be authenticated and

cannot be connected

Enable

Not registered

Registered

Failed to be authenticated and

cannot be connected

Disable

2

2. This item does not affect the connection results, or cannot be specified.

2

Connected without authentication of

the host

3

3. If a host uses Microsoft iSCSI Initiator and is configured for authentication by ports with CHAP, authentication of the host fails.

To allow such a host to connect to the port without authentication, do not configure it for authentication by ports with CHAP.

Advertising
This manual is related to the following products: