Dell PowerVault NX3100 User Manual
Page 10

10
Introduction
•
It is a good practice to have two ports dedicated for iSCSI. Configure each
NIC (or ports if you have a multiport NIC) on a separate subnet.
•
Secured iSCSI is possible with Challenge-Handshake Authentication
Protocol (CHAP). For more information about CHAP settings, see
"Configuring Secured iSCSI Connections Using Challenge-Handshake
Authentication Protocol" on page 35.
Table 1-2.
Worksheet
NOTE:
IQNs are the standard naming convention for identifying Targets and
Initiators and it is recommended that you use IQN as the identifier whenever
possible.
NOTE:
It is recommended that you configure dedicated iSCSI NICs on
separate subnets and not on the public network.
Options
Host IP
Target IP
NIC 1
iSCSI
Public
Other
NIC 2
iSCSI
Public
Other
NIC 3
iSCSI
Public
Other
NIC 4
iSCSI
Public
Other