Which of the following statements are true about software iSCSI?

Which of the following statements are true about software iSCSI? (Choose Two)

A.
It requires a dedicated NIC

B.
It is enabled by def ault.

C.
CHAP authentication can be configured.

D.
SendTargets can be configured.

Explanation:
Set up target discovery addresses so that the iSCSI initiator can determine which storage resource on the network is available for access.
The ESX/ESXi system supports these discovery methods:
Dynamic Discovery Also known as Send Targets discovery. Each time the initiator contacts a specified iSCSI server, the initiator sends the Send Targets request to the server. The server responds by supplying a list of available targets to the initiator. The names and IP addresses of these targets appear on the Static Discovery tab. If you remove a static target added by dynamic discovery, the target might be returned to the list the next time a rescan happens, the HBA is reset, or the host is rebooted.
Static Discovery The initiator does not have to perform any discovery. The initiator has a list of targets it can contact and uses their IP addresses and target names to communicate with them.

Because the IP networks that the iSCSI technology uses to connect to remote targets do not protect the data they transport, you must ensure security of the connection. iSCSI requires that all devices on the network implement Challenge Handshake Authentication Protocol (CHAP), which verifies the legitimacy of initiators that access targets on the network.

CHAP uses a three-way handshake algorithm to verify the identity of your host and, if applicable, of the iSCSI target when the host and target establish a connection. The verification is based on a predefined private value, or CHAP secret, that the initiator and target share.

ESX/ESXi supports CHAP authentication at the adapter level. In this case, all targets receive the same CHAP name and secret from the iSCSI initiator. For software iSCSI, ESX/ESXi also supports per-target CHAP authentication, which allows you to configure different credentials for each target to achieve greater level of security.


Leave a Reply

Your email address will not be published. Required fields are marked *