
10 Introduction
• It is a good practice to have two ports dedicated for iSCSI. Configure each
NIC (or ports if you have a multiport NIC) on a separate subnet.
• Secured iSCSI is possible with Challenge-Handshake Authentication
Protocol (CHAP). For more information about CHAP settings, see
"Configuring Secured iSCSI Connections Using Challenge-Handshake
Authentication Protocol" on page 35.
Table 1-2. Worksheet
NOTE: IQNs are the standard naming convention for identifying Targets and
Initiators and it is recommended that you use IQN as the identifier whenever
possible.
NOTE: It is recommended that you configure dedicated iSCSI NICs on
separate subnets and not on the public network.
Options Host IP Target IP
NIC 1
iSCSI
Public
Other
NIC 2
iSCSI
Public
Other
NIC 3
iSCSI
Public
Other
NIC 4
iSCSI
Public
Other
Kommentare zu diesen Handbüchern