Authentication of hosts (iscsi environments), 12 authentication of hosts (iscsi environments) – HP StorageWorks XP Remote Web Console Software User Manual

Page 49

Advertising
background image

LUN Configuration and Security Manager XP user guide for the XP12000/XP10000/SVS200

49

Configure the operating system and iSCSI driver for authentication by iSCSI targets with CHAP.

You must specify the host’s user name and secret used for CHAP. For more information, see the

documentation for the operating system and iSCSI driver in your environment.

Settings for authentication of ports (required if performing mutual authentication)
• On the array:

Use LUN Manager to specify each iSCSI target’s user information (user name and secret). For more

information about the settings, see ”

Specifying an iSCSI target’s user information (when

performing mutual authentication)

” on page 115.

• On hosts:

Configure the operating system and iSCSI driver for authenticating iSCSI targets with CHAP. You

must specify the user name and secret of the iSCSI target that is the connection target. For more

information, see the documentation for the operating system and iSCSI driver in your environment.

The next section explains authentication of hosts and iSCSI targets.

Authentication of hosts (iSCSI environments)

When a host attempts to connect to the array, the connection results of the authentication of the host differ

depending on the iSCSI target settings.

Figure 12

illustrates the relationship between iSCSI target settings

and the connection results.

Figure 12

Authentication of hosts (iSCSI environments)

Case A to Case D in

Figure 12

are explained as follows:

Case A through Case C: When connecting via an iSCSI target that performs authentication of hosts
• Case A: If the host’s user information is registered on the iSCSI target, and authentication of the

host is enabled
The iSCSI target authenticates the user information sent from the host. If authentication of the host

succeeds, either of the following actions occur:
• When the host is configured for mutual authentication, processing goes to authentication of the

iSCSI target.

Advertising
This manual is related to the following products: