iSCSI Authentication

iSCSI initiators and targets prove their identity to each other using a challenge handshake authentication protocol (CHAP) to protect against unauthorized systems from accessing the data volumes.

Screen component


CHAP level

Select an iSCSI authentication option:


No authentication


With this level of security, only the target authenticates the initiator.

Mutual CHAP

With this level of security, the target and the initiator authenticate each other. A separate secret is set for each target and for each initiator in the storage area network (SAN).