Brands
3Com
Alcatel-Lucent
Allied-Telesis
Avaya
Brocade
Cisco
D-Link
Dell
Emulex
Enterasys
Extreme
Force10
Foundry
H3C
HP
Huawei
Intel
Juniper
Linksys
Marconi
McAfee
Netgear
Nortel
Planet
Qlogic
Redback
SMC
Sun
TRENDnet
Vixel
ZTE
ZyXEL

Authentication of iSCSI initiators and targets

ISCSI initiators and targets prove their identity to each other using the CHAP protocol, which includes a mechanism to prevent cleartext passwords from appearing on the wire. By itself, the CHAP protocol is vulnerable to dictionary attacks, spoofing, or reflection attacks. If followed carefully, the rules for using CHAP within iSCSI prevent most of these attacks.

Additionally, as with all IP-based protocols, IPsec can operate at the network layer. The iSCSI negotiation protocol is designed to accommodate other authentication schemes, though interoperability issues limit their deployment.

July 27, 2011
Bestsellers
10GBASE-SR SFP+ 850nm 300m
SFP-10G-SR
5 out of 5 Stars! $175.00
5 out of 5 Stars!
1000BASE-SX SFP 850nm 550m
GLC-SX-MM
5 out of 5 Stars! $25.00
5 out of 5 Stars!
1000BASE-T SFP RJ45 100m
GLC-T
0 out of 5 Stars! $45.00
0 out of 5 Stars!
10GBASE-LR SFP+ 1310nm 10km
SFP-10G-LR
0 out of 5 Stars! $399.00
0 out of 5 Stars!