Important Notice: Our web hosting provider recently started charging us for additional visits, which was unexpected. In response, we're seeking donations. Depending on the situation, we may explore different monetization options for our Community and Expert Contributors. It's crucial to provide more returns for their expertise and offer more Expert Validated Answers or AI Validated Answers. Learn more about our hosting issue here.

What is iSCSI Authentication?

authentication iSCSI
0
Posted

What is iSCSI Authentication?

0

The initiator and the target must establish a relationship of trust. A target without an access control list automatically “trusts” all non-authenticated and authenticated initiators. A target with an access control list will only “trust” the initiators on that list, i.e. the initiators whose initiator-iqn is already known to the target. But simply knowing the right name is no security. In classic storage area networks such as fiber channel networks, much of the trust between nodes is achieved by the physical security (i.e. isolation) of the nodes and links in the network. Full iSCSI security depends on full security at the Internet Protocol level, such as is provided using the IPSec internet security suite. This document does not go into detail of how to use IPSec features with iSCSI. iSCSI Authentication is a method whereby an initiator node and target node can assure themselves that each one has been specifically configured to connect with the other, i.e. that each side shares a “se

What is your question?

*Sadly, we had to bring back ads too. Hopefully more targeted.

Experts123