HP StorageWorks 1510i Modular Smart Array iSCSI concepts and deployment guide (431338-002, July 2008)
Table Of Contents
authentication is used to verify a password (a shared secret). For more information about CHAP
authentication, see Data security.
• Access Control Lists (ACLs) should be enabled for the target’s mapped LUNs, with each server granted
access to a specificLUNonthetarget.
38
M SA 1510 i c o n figuration options and samples