Which security method would be used to authenticate targets and initiators in an ISCSI environment?
Which security method would be used to authenticate targets and initiators in an ISCSI environment?
CHAP (Challenge-Handshake Authentication Protocol) is used to authenticate targets and initiators in an iSCSI environment. It provides a method to periodically verify the identity of the peer using a three-way handshake. This makes CHAP an appropriate authentication method for securing iSCSI communications.
A. (CHAP) as per link and is the only security method option.
A. https://docs.netapp.com/us-en/ontap/san-admin/chap-authentication-concept.html
B as per Link