Server profile templates iSCSI authentication
iSCSI initiators and targets prove their identity to each other using a challenge handshake authentication protocol (CHAP) to protect against unauthorized systems from accessing the data volumes.
CHAP level
iSCSI authentication options:
None
No authentication
CHAP
With this level of security, only the target authenticates the initiator.
Mutual CHAP
With this level of security, the target and the initiator authenticate each other. A separate secret is set for each target and for each initiator in the storage area network (SAN).