6Contents
Step 2: Configure the iSCSI Ports on the
Storage Array. . . . . . . . . . . . . . . . . . . . . . . 57
Step 3: Perform Target Discovery From
the iSCSI Initiator . . . . . . . . . . . . . . . . . . . . 59
Step 4: Configure Host Access. . . . . . . . . . . . . . 61
Understanding CHAP Authentication . . . . . . . . . . 62
What is CHAP? . . . . . . . . . . . . . . . . . . . 62
Target CHAP. . . . . . . . . . . . . . . . . . . . . 62
Mutual CHAP . . . . . . . . . . . . . . . . . . . . 62
CHAP Definitions . . . . . . . . . . . . . . . . . . 63
Step 5: Configure CHAP Authentication on the
Storage Array (Optional). . . . . . . . . . . . . . . . . 63
Configuring Target CHAP Authentication on
the Storage Array. . . . . . . . . . . . . . . . . . 63
Configuring Mutual CHAP Authentication on
the Storage Array. . . . . . . . . . . . . . . . . . 64
Step 6: Configure CHAP Authentication on the
Host Server (Optional) . . . . . . . . . . . . . . . . . . 65
Step 7: Connect to the Target Storage Array From
the Host Server. . . . . . . . . . . . . . . . . . . . . . 69
Step 8: (Optional) Set Up In-Band Management. . . . . 72
book.book Page 6 Thursday, July 18, 2013 5:56 PM