Brands
3Com
Alcatel-Lucent
Allied-Telesis
Avaya
Brocade
Cisco
D-Link
Dell
Emulex
Enterasys
Extreme
Force10
Foundry
H3C
HP
Huawei
Intel
Juniper
Linksys
Marconi
McAfee
Netgear
Nortel
Planet
Qlogic
Redback
SMC
Sun
TRENDnet
Vixel
ZTE
ZyXEL

Confidentiality and integrity

For the most part, iSCSI operates as a cleartext protocol that provides no cryptographic protection for data in motion during SCSI transactions. As a result, an attacker who can listen in on iSCSI Ethernet traffic can:
 

Reconstruct and copy the files and filesystems being transferred on the wire;

Alter the contents of files by injecting fake iSCSI frames;

Corrupt filesystems being accessed by initiators, exposing servers to software flaws in poorly-tested filesystem code.

These problems do not occur only with iSCSI, but rather apply to any IP-based SAN protocol without cryptographic security. Adoption and deployment of IPsec, frequently cited as a solution to the IP SAN security problem, has been hampered by performance and compatibility issues.[citation needed]

July 26, 2011
Bestsellers
10GBASE-SR SFP+ 850nm 300m
SFP-10G-SR
5 out of 5 Stars! $175.00
5 out of 5 Stars!
1000BASE-SX SFP 850nm 550m
GLC-SX-MM
5 out of 5 Stars! $25.00
5 out of 5 Stars!
1000BASE-T SFP RJ45 100m
GLC-T
0 out of 5 Stars! $45.00
0 out of 5 Stars!
10GBASE-LR SFP+ 1310nm 10km
SFP-10G-LR
0 out of 5 Stars! $399.00
0 out of 5 Stars!