Nt1310 Unit 7

Words: 700
Pages: 3

1. How does iSCSI handle the process of authentication? Research the available options? iSCSI follows the Challenge Handshake Authentication Protocol initially the initiator sends the request to the system and checks whether to begin the session or not. If the system is preoccupied with the requests, then it denies the request and replies the system is busy or else it allocates the session. iSCSI uses the Challenge Handshake Authentication Protocol and the user can log in using the CHAP user name and password. There are two ways of generating and using the CHAP password.
In the inbound the storage system authenticates the user and in the outbound the user can authenticate the storage system. The CHAP uses the component to clear the passwords while exchanging the data on the wire. They use the encryption methods and performs the hash operations over the network instead on the passwords. It is most secure than the normal password authentication protocol. The basic permissions that are defined in the CHAP protocol are
Deny: The initiator/user access will be denied accessing the storage system.
None: The user can access the storage system and doesn’t require any authentication methods.
3. Why should an MTU value of at least 2,500
…show more content…
The FCoE allows to run over the single network and helps in avoiding to run separate LAN and SAN Networks. But to support them they will be using separate host bus adapters, network interface cards and cables. To reduce the traffic the only solution is virtualization but there will be lot of network adapters. But there will be minimal use of cards and cables which reduces cost for the organization. It allows to map the fiber channel over the full duplex Ethernet network. It enables the switch that runs on top of the rack and uses the Converged network adapters and Universal LAN over