Send documentation comments to mdsfeedback-doc@cisco.com
50-58
Cisco MDS 9000 Family Fabric Manager Configuration Guide
OL-17256-03, Cisco MDS NX-OS Release 4.x
Chapter 50 Configuring iSCSI
iSCSI Authentication Setup Guidelines and Scenarios
c. Set the Index field to a unique number.
d. Set the Protocol radio button to radius.
e. Set the Name field to the server group name.
f. Set the ServerIDList to the index value of the RADIUS server (as created in Step 2 c.) and click
Create.
Step 4 Set up the authentication verification for the iSCSI protocol to go to the RADIUS server.
a. In Fabric Manager, choose Switches > Security > AAA in the Physical Attributes pane.
b. Click the Applications tab in the Information pane.
c. Right-click on the iSCSI row in the Type, SubType, Function column.
d. Set the ServerGroup IDList to the index value of the Server Group (as created in Step 3 c) and click
Create.
Step 5 Set up the iSCSI authentication method to require CHAP for all iSCSI clients.
a. In Fabric Manager, choose End Devices > iSCSI in the Physical Attributes pane.
b. Select chap from the AuthMethod drop-down menu.
c. Click the Apply Changes icon.
Step 6 In Fabric Manager, choose End Devices > iSCSI in the Physical Attributes pane.
Step 7 Click the Globals tab in the Information pane to verify that the global iSCSI authentication setup is for
CHAP.
Step 8 In Fabric Manager, choose Switches > Security > AAA in the Physical Attributes pane.
Step 9 Click the Applications tab in the Information pane to verify the AAA authentication information for
iSCSI.
To configure an iSCSI RADIUS server, follow these steps:
Step 1 Configure the RADIUS server to allow access from the Cisco MDS switch's management Ethernet IP
address.
Step 2 Configure the shared secret for the RADIUS server to authenticate the Cisco MDS switch.
Step 3 Configure the iSCSI users and passwords on the RADIUS server.
iSCSI Transparent Mode Initiator
This scenario assumes the following configuration (see Figure 50-42):
• No LUN mapping or LUN masking or any other access control for hosts on the target device
• No iSCSI login authentication (that is, login authentication set to none)
• The topology is as follows:
–
iSCSI interface 7/1 is configured to identify initiators by IP address.
–
iSCSI interface 7/5 is configured to identify initiators by node name.