Figure 10-7 – Dell Emulex Family of Adapters User Manual

Page 1617

Advertising
background image

Boot Version 10.2 for NIC, iSCSI, FCoE, and RoCE Protocols User Manual

P010097-01B Rev. A

10. Configuring and Managing iSCSI Targets with the iSCSISelect Utility

Managing an iSCSI Target

1617

4. From the Controller Configuration menu, select iSCSI Target Configuration and

press <Enter>.

5. Select Add New iSCSI Target and press <Enter>.
6. Follow steps 5–11 in the procedure “Using SendTargets Discovery to Add an iSCSI

Target” on page 1611.

7. In the Add/Ping iSCSI Target dialog box, select Authentication Method, select

One-Way Chap, and press <Enter>.

Figure 10-7 One-way Chap Configuration Dialog Box

8. Enter the target CHAP name and target secret, then select OK and press <Enter>.

The target CHAP name can be any name or sequence of numbers over 12 and less

than 16 characters. However, the name and secret on the target side must match the

name and target on the initiator side.
The target secret can be in string (for example, abcdefg23456) or hexadecimal (for

example, 0x01234567890123456789ABCD) format.

If using a string format, the secret can be any name or sequence of numbers over

12 and less than 16 bytes long, where each character equals one byte.

If using a hexadecimal format, the secret must be at least 12 and less than 16

bytes long, where two characters equal one byte. Hexadecimal formatting

restrictions:

The 0x representation requires an even number of hexadecimal values

excluding the 0x (0-9, A-F). For example, the secret

0x1234567890123456789ABCD is not allowed because the character length is

odd, with 23 hexadecimal values excluding the 0x. The secret

0x01234567890123456789ABCD is allowed, with 24 hexadecimal values

excluding the 0x.

The hexadecimal representation of CHAP secrets must only contain

hexadecimal values. The 0x representation must only have the following

characters: 0, 1, 2, 3, 4, 5, 6, 7, 8, 9, a, b, c, d, e, f, A, B, C, D, E, and F. Any

other characters are not allowed.

When you have successfully enabled the CHAP authentication, the Add/Ping

iSCSI Target dialog box appears. For more information, see “Pinging a Target” on

page 1619.

Authenticating Mutual CHAP

With mutual CHAP authentication, the target authenticates the initiator and the

initiator authenticates the target. Use mutual CHAP authentication for a two-way

challenge/response security method.

Advertising