Iscsi Security - Fujitsu ETERNUS DX60 S4 Design Manual

Hybrid storage systems
Hide thumbs Also See for ETERNUS DX60 S4:
Table of Contents

Advertisement

1.
Function
Improving Host Connectivity

iSCSI Security

For an iSCSI interface, the iSCSI authentication function can be used when the initiator accesses the target. The
iSCSI authentication function is available for host connections and remote copying.
The Challenge Handshake Authentication Protocol (CHAP) is supported for iSCSI authentication. For CHAP Au-
thentication, unidirectional CHAP or bidirectional CHAP can be selected. When unidirectional CHAP is used, the
target authenticates the initiator to prevent fraudulent access. When bidirectional CHAP is used, the target au-
thenticates the initiator to prevent fraudulent access and the initiator authenticates the target to prevent imper-
sonation.
Note that the Internet Storage Name Service (iSNS) is also supported as an iSCSI name resolution.
FUJITSU Storage ETERNUS DX60 S4, ETERNUS DX60 S3 Hybrid Storage Systems Design Guide (Basic)
57
Copyright 2019 FUJITSU LIMITED
P3AM-8992-14ENZ0

Advertisement

Table of Contents
loading

This manual is also suitable for:

Eternus dx60 s3

Table of Contents