HP StorageWorks XP Remote Web Console Software User Manual
Page 57

Figure 13 Example of authentication of hosts (iSCSI environments)
.
In
, iSCSI target 1 performs authentication of hosts, but iSCSI target 2 does not.
Host A's user information is registered on iSCSI target 1, and the authentication setting is enabled.
Therefore, if authentication of the host succeeds, Host A can connect to the array (or processing goes
to the authentication of the iSCSI target). As a precondition of successful authentication, configure
Host A for authentication by iSCSI targets with CHAP.
Host B's user information is also registered on iSCSI target 1, but the authentication setting is disabled.
Therefore, Host B can connect to the array without authentication. (If Host B uses Microsoft iSCSI
Initiator, Host B can connect to the array only when Host B is not configured for authentication by
iSCSI targets with CHAP.)
Host C's user information is not registered on iSCSI target 1. Therefore, when Host C tries to connect
to the array, authentication fails and the connection request is denied regardless of Host C's setting.
Host D is attached to iSCSI target 2, which does not perform authentication of hosts. Therefore, Host
D can connect to the array without authentication. In this case, it does not matter whether Host D's
user information is registered on iSCSI target 2. (If Host D uses Microsoft iSCSI Initiator, Host D can
connect to the array only when Host D is not configured for authentication by iSCSI targets with
CHAP.)
For more information, see:
XP LUN Configuration and Security Manager User Guide
57