HP StorageWorks LUN Configuration and Security Manager XP user guide for the XP12000/XP10000/SVS200 (T1714-96008, June 2006)

LUN Configuration and Security Manager XP user guide for the XP12000/XP10000/SVS200 51
Figure 13 shows an example of authentication of hosts. In this figure, iSCSI names of host bus adapters
(HBAs) are abbreviated as a, b, and so on.
Figure 13 Example of authentication of hosts (iSCSI environments)
In Figure 13, iSCSI target 1 performs authentication of hosts, but iSCSI target 2 does not.
Host A’s user information is registered on iSCSI target 1, and the authentication setting is enabled.
Therefore, if authentication of the host succeeds, Host A can connect to the array (or processing goes to
the authentication of the iSCSI target). As a precondition of successful authentication, configure Host A for
authentication by iSCSI targets with CHAP.
Host B’s user information is also registered on iSCSI target 1, but the authentication setting is disabled.
Therefore, Host B can connect to the array without authentication. (If Host B uses Microsoft iSCSI Initiator,
Host B can connect to the array only when Host B is not configured for authentication by iSCSI targets
with CHAP.)
Host C’s user information is not registered on iSCSI target 1. Therefore, when Host C tries to connect to
the array, authentication fails and the connection request is denied regardless of Host C’s setting.
Host D is attached to iSCSI target 2, which does not perform authentication of hosts. Therefore, Host D
can connect to the array without authentication. In this case, it does not matter whether Host D’s user
information is registered on iSCSI target 2. (If Host D uses Microsoft iSCSI Initiator, Host D can connect to
the array only when Host D is not configured for authentication by iSCSI targets with CHAP.)
For more information, see:
Enabling and disabling authentication of hosts on iSCSI targets” on page 112
Registering a host’s user information on an iSCSI target” on page 112
Settings and connection results in authentication of hosts (iSCSI environments)” on page 116.