Chapter 4
SAN Functions
4.1
Security Measures (Unauthorized Access Prevention)
4.1.2
iSCSI Security
For an iSCSI interface, the iSCSI authentication function can be used when the initiator accesses the target.
The iSCSI authentication function is available for host connections and remote copying.
The Challenge Handshake Authentication Protocol (CHAP) is supported for iSCSI authentication. For CHAP Au-
thentication, unidirectional CHAP or bidirectional CHAP can be selected. When unidirectional CHAP is used,
the target authenticates the initiator to prevent fraudulent access. When bidirectional CHAP is used, the tar-
get authenticates the initiator to prevent fraudulent access and the initiator authenticates the target to pre-
vent impersonation.
FUJITSU Storage ETERNUS DX500 S3/DX600 S3 Disk storage system Overview
Copyright 2015 FUJITSU LIMITED
55
P3AM-7702-14ENZ0