Hp StorageWorks XP10000 Disk Array Manuale Utente Pagina 54

  • Scaricare
  • Aggiungi ai miei manuali
  • Stampa
Vedere la pagina 53
Figure 13 Example of authentication of hosts (iSCSI environments)
In Figure 13, iSCSI target 1 performs authentication of hosts, but iSCSI target 2 does not.
Host A's user information is registered on iSCSI target 1, and the authentication setting is enabled.
Therefore, if authentication of the host succeeds, Host A can connect to the array (or processing goes to
the authentication of the iSCSI target). As a precondition of successful authentication, congure Host A
for authentication by iSCSI targets with CHAP.
Host B's user information is also registered on iSCSI target 1, but the authentication setting is disabled.
Therefore, Host B can connect to the array without authentication. (If Host B uses Microsoft iSCSI Initiator,
Host B can connect to the array only when Host B is not congured for authentication by iSCSI targets
with CHAP.)
Host C's user information is not registered on iSCSI target 1. Therefore, when Host C tries to connect to
the array, authentication fails and the connection request is denied regardless of Host C's setting.
Host D is attached to iSCSI target 2, which does not perform authentication of hosts. Therefore, Host D
can connect to the array without authentication. In this case, it does not matter whether Host D's user
information is registered on iSCSI target 2. (If Host D uses Microsoft iSCSI Initiator, Host D can connect to
the array only when Host D is not congured for authentication by iSCSI targets with CHAP.)
For more information, see:
Enabling and disabling authentication of hosts on iSCSI targets
Registering a host's user information on an iSCSI target
Settings and connection results in authentication of hosts (iSCSI environments).
54
Overview of LUN Manager
Vedere la pagina 53
1 2 ... 49 50 51 52 53 54 55 56 57 58 59 ... 219 220

Commenti su questo manuale

Nessun commento