Veritas™ Appliance iSCSI Guide
- Overview
- Understanding the appliance configurations
- Understanding NetBackup for VMware
- Configuring iSCSI
- Troubleshooting iSCSI issues and some best practices
About CHAP authentication
The authentication method that is used for appliances is called Challenge Handshake Authentication Protocol (or CHAP). The CHAP authentication can be applied to the following commands or actions:
Discovering a target
Connecting to the target
During the initial stage of an iSCSI session, the appliance (initiator) sends a login request to the storage system to begin an iSCSI session. The storage system will then either permit or deny the login request, or determine that a login is not required. If authentication is enabled on the target, the credentials must be authenticated and the session established before the server can access the storage resources. The server compares the value from the client and, if the information matches, grants the session. If the response fails, the session is denied, and the request phase starts over.
The initiator logs in using a CHAP user name and password. You can specify a CHAP password or generate a random password. To set up and configure CHAP authentication, see the target vendor documentation.