User's Guide
Chapter 3 DX3000 and DX5000 Remote Management
Configuration
Quantum DX3000 and DX5000 User’s Guide 56
Figure 36 iSCSI Configuration 
Page
Configure the following iSCSI settings as desired:
• CRC/Checksum - Cyclic Redundancy Check is a common technique for 
detecting data transmission errors. Messages are divided into 
predetermined lengths that are divided by a fixed divisor. According 
to the calculation, the remainder number is appended onto and sent 
with the message. When the message is received, the computer 
recalculates the remainder and compares it to the transmitted 
remainder. If the numbers do not match, an error is detected.
• Authentication for all iSCSI initiators - Authentication for iSCSI 
initiators is the process of identifying an initiator based on a 
username and password. If you want to authenticate the iSCSI 
initiators, enter a 
User Name and Password for the initiator.
• Authentication for all iSCSI targets:
• CHAP - Challenge Handshake Authentication Protocol is an 
authentication type in which the authentication agent (typically a 
network server) sends the client program a random value that is 
used only once and an ID value. Both the sender and peer share a 
predefined secret. The peer concatenates the random value (or 
nonce), the ID and the secret and calculates a one-way hash using 
MD5. The hash value is sent to the authenticator, which in turn 
builds that same string on its side, calculates the MD5 sum itself 
and compares the result with the value received from the peer. If 










