Figure 10-7 – Dell Emulex Family of Adapters User Manual
Page 1617

Boot Version 10.2 for NIC, iSCSI, FCoE, and RoCE Protocols User Manual
P010097-01B Rev. A
10. Configuring and Managing iSCSI Targets with the iSCSISelect Utility
Managing an iSCSI Target
1617
4. From the Controller Configuration menu, select iSCSI Target Configuration and
press
5. Select Add New iSCSI Target and press
6. Follow steps 5–11 in the procedure “Using SendTargets Discovery to Add an iSCSI
7. In the Add/Ping iSCSI Target dialog box, select Authentication Method, select
One-Way Chap, and press
Figure 10-7 One-way Chap Configuration Dialog Box
8. Enter the target CHAP name and target secret, then select OK and press
The target CHAP name can be any name or sequence of numbers over 12 and less
than 16 characters. However, the name and secret on the target side must match the
name and target on the initiator side.
The target secret can be in string (for example, abcdefg23456) or hexadecimal (for
example, 0x01234567890123456789ABCD) format.
If using a string format, the secret can be any name or sequence of numbers over
12 and less than 16 bytes long, where each character equals one byte.
If using a hexadecimal format, the secret must be at least 12 and less than 16
bytes long, where two characters equal one byte. Hexadecimal formatting
restrictions:
The 0x representation requires an even number of hexadecimal values
excluding the 0x (0-9, A-F). For example, the secret
0x1234567890123456789ABCD is not allowed because the character length is
odd, with 23 hexadecimal values excluding the 0x. The secret
0x01234567890123456789ABCD is allowed, with 24 hexadecimal values
excluding the 0x.
The hexadecimal representation of CHAP secrets must only contain
hexadecimal values. The 0x representation must only have the following
characters: 0, 1, 2, 3, 4, 5, 6, 7, 8, 9, a, b, c, d, e, f, A, B, C, D, E, and F. Any
other characters are not allowed.
When you have successfully enabled the CHAP authentication, the Add/Ping
iSCSI Target dialog box appears. For more information, see “Pinging a Target” on
Authenticating Mutual CHAP
With mutual CHAP authentication, the target authenticates the initiator and the
initiator authenticates the target. Use mutual CHAP authentication for a two-way
challenge/response security method.