Veritas™ Appliance iSCSI Guide

Last Published:
Product(s): Appliances (3.0)
Platform: NetBackup Appliance OS

About CHAP authentication

The authentication method that is used for appliances is called Challenge Handshake Authentication Protocol (or CHAP). The CHAP authentication can be applied to the following commands or actions:

  • Discovering a target

  • Connecting to the target

During the initial stage of an iSCSI session, the appliance (initiator) sends a login request to the storage system to begin an iSCSI session. The storage system will then either permit or deny the login request, or determine that a login is not required. If authentication is enabled on the target, the credentials must be authenticated and the session established before the server can access the storage resources. The server compares the value from the client and, if the information matches, grants the session. If the response fails, the session is denied, and the request phase starts over.

The initiator logs in using a CHAP user name and password. You can specify a CHAP password or generate a random password. To set up and configure CHAP authentication, see the target vendor documentation.