Iscsi Security - Fujitsu ETERNUS DX500 S3 Overview

Disk storage system
Hide thumbs Also See for ETERNUS DX500 S3:
Table of Contents

Advertisement

Chapter 4
SAN Functions
4.1
Security Measures (Unauthorized Access Prevention)
4.1.2

iSCSI Security

For an iSCSI interface, the iSCSI authentication function can be used when the initiator accesses the target.
The iSCSI authentication function is available for host connections and remote copying.
The Challenge Handshake Authentication Protocol (CHAP) is supported for iSCSI authentication. For CHAP Au-
thentication, unidirectional CHAP or bidirectional CHAP can be selected. When unidirectional CHAP is used,
the target authenticates the initiator to prevent fraudulent access. When bidirectional CHAP is used, the tar-
get authenticates the initiator to prevent fraudulent access and the initiator authenticates the target to pre-
vent impersonation.
FUJITSU Storage ETERNUS DX500 S3/DX600 S3 Disk storage system Overview
Copyright 2015 FUJITSU LIMITED
55
P3AM-7702-14ENZ0

Advertisement

Table of Contents
loading

This manual is also suitable for:

Eternus dx600 s3

Table of Contents