HP StorageWorks XP Remote Web Console Software User Manual

Page 57

Advertising
background image

Figure 13 Example of authentication of hosts (iSCSI environments)

.

In

Figure 13

, iSCSI target 1 performs authentication of hosts, but iSCSI target 2 does not.

Host A's user information is registered on iSCSI target 1, and the authentication setting is enabled.
Therefore, if authentication of the host succeeds, Host A can connect to the array (or processing goes
to the authentication of the iSCSI target). As a precondition of successful authentication, configure
Host A for authentication by iSCSI targets with CHAP.

Host B's user information is also registered on iSCSI target 1, but the authentication setting is disabled.
Therefore, Host B can connect to the array without authentication. (If Host B uses Microsoft iSCSI
Initiator, Host B can connect to the array only when Host B is not configured for authentication by
iSCSI targets with CHAP.)

Host C's user information is not registered on iSCSI target 1. Therefore, when Host C tries to connect
to the array, authentication fails and the connection request is denied regardless of Host C's setting.

Host D is attached to iSCSI target 2, which does not perform authentication of hosts. Therefore, Host
D can connect to the array without authentication. In this case, it does not matter whether Host D's
user information is registered on iSCSI target 2. (If Host D uses Microsoft iSCSI Initiator, Host D can
connect to the array only when Host D is not configured for authentication by iSCSI targets with
CHAP.)

For more information, see:

XP LUN Configuration and Security Manager User Guide

57

Advertising
This manual is related to the following products: