6 Contents
Step 2: Configure the iSCSI Ports on the
Storage Array
. . . . . . . . . . . . . . . . . . . . . . . 57
Step 3: Perform Target Discovery From
the iSCSI Initiator
. . . . . . . . . . . . . . . . . . . . 59
Step 4: Configure Host Access. . . . . . . . . . . . . . 61
Understanding CHAP Authentication
. . . . . . . . . . 62
What is CHAP?
. . . . . . . . . . . . . . . . . . . 62
Target CHAP
. . . . . . . . . . . . . . . . . . . . . 62
Mutual CHAP . . . . . . . . . . . . . . . . . . . . 62
CHAP Definitions
. . . . . . . . . . . . . . . . . . 63
Step 5: Configure CHAP Authentication on the
Storage Array (Optional)
. . . . . . . . . . . . . . . . . 63
Configuring Target CHAP Authentication on
the Storage Array
. . . . . . . . . . . . . . . . . . 63
Configuring Mutual CHAP Authentication on
the Storage Array . . . . . . . . . . . . . . . . . . 64
Step 6: Configure CHAP Authentication on the
Host Server (Optional)
. . . . . . . . . . . . . . . . . . 65
Step 7: Connect to the Target Storage Array From
the Host Server
. . . . . . . . . . . . . . . . . . . . . . 69
Step 8: (Optional) Set Up In-Band Management
. . . . . 72
book.book Page 6 Thursday, July 18, 2013 5:56 PM