6.0

Table Of Contents
7 Type the IP address or DNS name of the storage system and click OK.
After your host establishes the SendTargets session with this system, any newly discovered targets
appear in the Static Discovery list.
8 To delete a specific SendTargets server, select it and click Remove.
After you remove a SendTargets server, it might still appear in the Inheritance field as the parent of
static targets. This entry indicates where the static targets were discovered and does not affect the
functionality.
What to do next
After configuring Dynamic Discovery for your iSCSI adapter, rescan the adapter.
Set Up Static Discovery in the vSphere Client
With iSCSI initiators, in addition to the dynamic discovery method, you can use static discovery and
manually enter information for the targets.
Launch the vSphere Client and log in to a vCenter Server system.
Required privilege: Host.Configuration.Storage Partition Configuration
When you set up Static Discovery, you can only add new iSCSI targets. You cannot change the IP address,
DNS name, iSCSI target name, or port number of an existing target. To make changes, remove the existing
target and add a new one.
Procedure
1 Log in to the vSphere Client, and select a host from the inventory panel.
2 Click the Configuration tab, and click Storage Adapters in the Hardware panel.
The list of available storage adapters appears.
3 Select the iSCSI initiator to configure and click Properties.
4 Click the Static Discovery tab.
The tab displays all dynamically discovered targets and any static targets already entered.
5 To add a target, click Add and enter the target’s information.
6 To delete a specific target, select the target and click Remove.
What to do next
After configuring Static Discovery for your iSCSI adapter, rescan the adapter.
Configuring CHAP Parameters for iSCSI Adapters
Because the IP networks that the iSCSI technology uses to connect to remote targets do not protect the data
they transport, you must ensure security of the connection. One of the protocols that iSCSI implements is the
Challenge Handshake Authentication Protocol (CHAP), which verifies the legitimacy of initiators that
access targets on the network.
CHAP uses a three-way handshake algorithm to verify the identity of your host and, if applicable, of the
iSCSI target when the host and target establish a connection. The verification is based on a predefined
private value, or CHAP secret, that the initiator and target share.
ESXi supports CHAP authentication at the adapter level. In this case, all targets receive the same CHAP
name and secret from the iSCSI initiator. For software and dependent hardware iSCSI adapters, ESXi also
supports per-target CHAP authentication, which allows you to configure different credentials for each
target to achieve greater level of security.
Chapter 24 Managing Storage in the vSphere Client
VMware, Inc. 317