iSCSI Authentication
iSCSI initiators and targets prove their identity to each other using a challenge handshake authentication protocol (CHAP) to protect against unauthorized systems from accessing the data volumes.
Screen component |
Description |
---|---|
CHAP level |
Select an iSCSI authentication option:
|