ATTO Technology XstreamCORE ET 8100T Installation And Operation Manual page 22

2-port 10gb ethernet to 1-port 12gb sas intelligent bridge
Table of Contents

Advertisement

Select Target Ports for Connection
iSCSI targets may be accessed through one or more ports. The
ATTO iSCSI Initiator presents all the ports identified by a
target during the discovery process. You must select each
port and identify if the port is visible for connection and if a
visible port requires auto login. All ports for a target are listed
in the Setup tab while only visible ports are listed in the
Status tab.
You may automatically log into a target at system boot by
clicking the Auto Login check box during target setup.
1.
Click on the Setup tab. A list of one or more ports is
displayed. Set up each port individually to connect to
the target.
Highlight one of the target's ports. Click the Visible check
box if you want to connect using this port.
Click the Auto Login check box if you want to
automatically connect to this port after the
system boots.
Click on Security if your system requires CHAP
security. Refer to Configure security.
Click on Parameters if the default iSCSI login
parameters are not correct for your target.
Refer to Configure iSCSI login parameters.
2.
Set up the remaining ports by highlighting each port
and selecting the options listed in Step 2.
3.
When you have set up all the ports, click on Save to
save the configuration.
4.
Continue to manage additional targets or continue
to Connect to targets.
Configure security using CHAP
CHAP is a mechanism for authenticating the device at the
other end of a network link. CHAP requires that the target
device challenges the initiator first (Target Challenge) and
that the initiator challenges the target second (Initiator
Challenge).
The CHAP challenge mechanism requires that both ends
know the Target Secret and the Initiator Secret. The Target
Secret answers the Target Challenge and the Initiator Secret
answers the Initiator Challenge.
Be sure to have the secrets when configuring security. The
ATTO iSCSI Initiator does not impose rules for formatting
CHAP secrets. However, many iSCSI targets have formatting
rules which determine the format of the ATTO iSCSI CHAP
secrets. In general, secrets should follow these guidelines:
• Do not use a tab or space.
• Use ASCII printable characters: do not use special control
characters.
• Secrets are case sensitive: you may use all upper case, all
lower case or a combination of upper and lower case.
• Secrets should be longer than 12 characters.
1.
Click on the Setup tab.
2.
Click on Security.
3.
The Configure Security screen appears.
4.
Type in the Target Secret. If the initiator requires mutual
authentication, click on the Mutual Authentication check
box.
5.
Type in the Initiator User Name and the Initiator Secret.
6.
Click OK when you have completed your choices.
7.
Click Save to save your configuration.
Exhibit 10 – Configuring CHAP

Advertisement

Table of Contents
loading

Table of Contents