Paralan iS521 Switch User Manual


 
Page 41
Target are protected from unauthorized iSCSI access. Mutual CHAP provides an
added protection over One-Way CHAP for iSCSI communications on the Storage
Network. See CHAP and One-Way CHAP.
One-Way CHAP – Username and Secret in the Target (iS5xx iSCSI Bridge) that an
initiating device must use in order for the Target to authenticate the initiator for
communications. When the Initiator tries to contact the Target, the Target will
challenge the initiator to provide the correct Secret. If it is not provided, the Target
will not communicate with the Initiator. In this way, the Target device will not be
able to be accessed casually by other computers that do not have the One-Way CHAP
Secret, but can communicate on the same network. Both Microsoft’s iSCSI Initiator
software and the iS5xx iSCSI Bridges have the capability of setting both One-Way
and Mutual CHAP for secure system communications. See CHAP and Mutual CHAP.
SAN – Storage Area Network. A network of storage disks. In large enterprises, a
SAN connects multiple servers to a centralized pool of disk storage.
SCSI – The Small Computer System Interface standard for interfacing multiple
computers and devices. SCSI has three defined methods of parallel signal
communications, Low Voltage Differential (LVD), Single-Ended (SE) and High
Voltage Differential (HVD). Most LVD SCSI devices are Multimode, which allows
them to be backwards compatible with SE. The backwards compatibility is called
LVD/MSE.
SCSI Initiator/Host – A device that begins a SCSI transaction by issuing a command
to another device (the SCSI target), giving it a task to perform. SCSI host bus
adapters are normally considered to be initiators.
SCSI Target – A SCSI device that executes a command from a SCSI initiator to
perform some task. SCSI hard drives, tape drives and other storage devices are
normally considered to be targets.
SE – Single-Ended. Type of signal transmission used by SCSI. SE supports cable
lengths of up to 6 meters.
Subnet – A division of a network into an interconnected, but independent, segment, or
domain. The subnet limits the number of nodes (clients, servers) that have to
compete for available bandwidth to a confined geographic area.
Subnet Mask – The technique used by the IP protocol to determine which network
segment packets are destined for. The subnet mask is a binary pattern that is stored in
the client machine, server or router and is matched with the IP address.
Terminator – A hardware component that is connected at each end of a SCSI cable
chain. The terminator may be external or internal to the device.