Controlling Access To Your Ip San With Authentication - Adaptec 5325302057 User Manual

Snap server 750i nas
Table of Contents

Advertisement

Click
Next
13
Click
Back
Click
Apply
14
The logical devices are created or modified, and iSCSI initiator assignments are
saved in the iSCSI Storage Appliance.

Controlling Access to Your IP SAN with Authentication

When you create a new volume (see page 40) or logical device (page 42), you can set
an authentication method so that any server that attempts to log in to your iSCSI
Storage Appliance is forced to authenticate itself.
Supported authentication methods vary by iSCSI initiator. Refer to your iSCSI
Note
initiator documentation for more information.
Once an authentication method is set, any server trying to log in without
authentication, or with the incorrect authentication, is rejected.
Two authentication methods are available in Adaptec Storage Manager:
Challenge Handshake Authentication Password (CHAP)
If you are using iSNS (see page 155) to discover iSCSI targets and want to
Note
control which iSCSI targets can be logged into by which iSCSI initiators, you
must set CHAP authentication. Without CHAP authentication, all iSCSI initiators
will be able to log in to all iSCSI targets.
• Secure Remote Password (SRP)
You can choose not to set any authentication method. When authentication for a
provisioned volume or logical device is set to None, the authentication method (if
any) is set by the iSCSI initiator instead of your iSCSI Storage Appliance, and your
iSCSI Storage Appliance allows a server to log in when the server bypasses security
or when the server-requested authentication is completed successfully.
again, then review the configuration summary.
to change the configuration.
, then click
.
Yes
Controlling Access to Your IP SAN with Authentication
—Default setting
Chapter 7 Controlling Access to Your IP SAN
79

Advertisement

Table of Contents
loading

Table of Contents