- Notes, cautions, and warnings
- Additional Resources
- Volumes
- Volume groups overview
- Hosts and host group configurations
- Data mobility for volumes and volume groups
- Thin clones
- Quality of Service (QoS) policies
- Performance policies
Challenge Handshake Authentication Protocol (CHAP) authenticates iSCSI initiators (hosts) and targets (volumes and snapshots) to expose iSCSI storage while ensuring a secure, standard storage protocol.
Without CHAP authentication, any host that is connected to the same IP network as the system iSCSI ports can read from and write to the system. If your system is on a public network, it is strongly recommended that you use CHAP authentication.
For more information about CHAP authentication, including the benefits that it provides and details about implementation types, see the context-sensitive help entry in PowerStore Manager.
For in-depth information about how this feature works, see the PowerStore Security Configuration Guide.