System information
Table Of Contents
- Cover
- Preface
- Overview
- Configuring System Basics
- Configuring RADs and mSAN Connections
- Configuring iSAN Connections
- Configuring iSCSI Connections
- Monitoring SAN Router Operation and Connections
- Configuration, Firmware, and System Log Maintenance
- Troubleshooting
- Glossary
- Index

5
5-28
Eclipseâ„¢ 2640 SAN Router Administration and Configuration Manual
Configuring iSCSI Authentication
If you are having problems authenticating iSCSI login requests, make
sure that the RADIUS server has logical connectivity to the iSCSI port
address. You can confirm this with a ping to the internal address
from the RADIUS server (ping 10.10.10.11). If the ping fails, iSCSI
initiator will never receive the authentication grant. If the RADIUS
server is not in a subnet attached directly to the SAN Router (not in
the management port subnet, inband address subnet, or TCP port
subnet), then you may need to add a static route to the SAN Router to
reach the RADIUS server.
For more information and procedures on configuring static routes,
refer to
Static Routes on page 2-36.
Using RADIUS Authentication
Use the following steps to configure the SAN Router to use RADIUS
authentication.
1. From Element Manager, select Configuration>iSCSI>RADIUS
Server Configuration.
Figure 5-15 RADIUS Server Configuration Dialog Box
2. Enter the IP address of the primary and secondary RADIUS
servers where this SAN Router will send device-login
authentication requests. To indicate that this server is not in use,
set the value to 0.0.0.0