The IP networks that the iSCSI technology uses to connect your ESXi host to remote targets do not protect the data they transport. As a result, you must ensure security of the connection. One of the protocols that iSCSI implements is the Challenge Handshake Authentication Protocol (CHAP). The CHAP protocol verifies the legitimacy of ESXi initiators that access targets on the network.
CHAP uses a three-way handshake algorithm to verify the identity of your host and, if applicable, of the iSCSI target when the host and target establish a connection. The verification is based on a predefined private value, or CHAP secret, that the initiator and target share.
ESXi supports CHAP authentication at the adapter level. In this case, all targets receive the same CHAP name and secret from the iSCSI initiator. For software and dependent hardware iSCSI adapters, and for iSER adapters, ESXi also supports per-target CHAP authentication, which allows you to configure different credentials for each target to achieve greater level of security.
Selecting CHAP Authentication Method
ESXi supports unidirectional CHAP for all types of iSCSI and iSER initiators, and bidirectional CHAP for software and dependent hardware iSCSI, and for iSER.
Before configuring CHAP, check whether CHAP is activated at the iSCSI storage system. Also, obtain information about the CHAP authentication method the system supports. If CHAP is activated, configure it for your initiators, making sure that the CHAP authentication credentials match the credentials on the iSCSI storage.
- Unidirectional CHAP
- In unidirectional CHAP authentication, the target authenticates the initiator, but the initiator does not authenticate the target.
- Bidirectional CHAP
- The bidirectional CHAP authentication adds an extra level of security. With this method, the initiator can also authenticate the target. VMware supports this method for software and dependent hardware iSCSI adapters, and for iSER adapters.
For software and dependent hardware iSCSI adapters, and for iSER adapters, you can set unidirectional CHAP and bidirectional CHAP for each adapter or at the target level. Independent hardware iSCSI supports CHAP only at the adapter level.
When you set the CHAP parameters, specify a security level for CHAP.
CHAP Security Level | Description | Supported Storage Adapters |
---|---|---|
None | The host does not use CHAP authentication. If authentication is activated, use this option to deactivate it. | Independent hardware iSCSI Software iSCSI Dependent hardware iSCSI iSER |
Use unidirectional CHAP if required by target | The host prefers a non-CHAP connection, but can use a CHAP connection if required by the target. | Software iSCSI Dependent hardware iSCSI iSER |
Use unidirectional CHAP unless prohibited by target | The host prefers CHAP, but can use non-CHAP connections if the target does not support CHAP. | Independent hardware iSCSI Software iSCSI Dependent hardware iSCSI iSER |
Use unidirectional CHAP | The host requires successful CHAP authentication. The connection fails if CHAP negotiation fails. | Independent hardware iSCSI Software iSCSI Dependent hardware iSCSI iSER |
Use bidirectional CHAP | The host and the target support bidirectional CHAP. | Software iSCSI Dependent hardware iSCSI iSER |
Set Up CHAP for iSCSI or iSER Storage Adapter
When you set up CHAP name and secret at the iSCSI/iSER adapter level, all targets receive the same parameters from the adapter. By default, all discovery addresses or static targets inherit CHAP parameters that you set up at the adapter level.
Prerequisites
- Before setting up CHAP parameters for software or dependent hardware iSCSI, determine whether to configure unidirectional or bidirectional CHAP. Independent hardware iSCSI adapters do not support bidirectional CHAP.
- Verify CHAP parameters configured on the storage side. Parameters that you configure must match the ones on the storage side.
- Required privilege:
Procedure
Results
If you change the CHAP parameters, they are used for new iSCSI sessions. For existing sessions, new settings are not used until you log out and log in again.
What to do next
Set Up CHAP for Target
If you use software and dependent hardware iSCSI adapters, or an iSER storage adapter, you can configure different CHAP credentials for each discovery address or static target.
Prerequisites
- Before setting up CHAP parameters, determine whether to configure unidirectional or bidirectional CHAP.
- Verify CHAP parameters configured on the storage side. Parameters that you configure must match the ones on the storage side.
- Required privilege:
Procedure
Results
If you change the CHAP parameters, they are used for new iSCSI sessions. For existing sessions, new settings are not used until you log out and login again.