How is CHAP utilized to provide authentication for the iSCSI technology?

What will be an ideal response?

CHAP uses a three-way handshake algorithm to verify the identity of your host and, if applicable, of the iSCSI target when the host and target establish a connection. The verification is based on a predefined private key, also called a CHAP secret, that the initiator and target share. When using hardware-based HBA, ESXi supports CHAP authentication at the adapter level, so all targets receive the same CHAP secret from the iSCSI initiator. For software based iSCSI adapters, ESXi supports CHAP on a per-target level. After the connection is established, the initiator transmits SCSI commands over the IP network to the target service.

Computer Science & Information Technology

You might also like to view...

When using the View Side by Side feature, the maximum number of documents that you can display at one time is:

A) five. B) three. C) four. D) two.

Computer Science & Information Technology

Slides can be grouped into named ________, which will help organize a presentation

A) modules B) segments C) sections D) subdivisions

Computer Science & Information Technology