JavaScript is required to for searching.
Skip Navigation Links
Exit Print View
Oracle Solaris Administration: Devices and File Systems     Oracle Solaris 11 Information Library
search filter icon
search icon

Document Information

About This Book

1.  Managing Removable Media (Overview)

2.  Managing Removable Media (Tasks)

3.  Accessing Removable Media (Tasks)

4.  Writing CDs and DVDs (Tasks)

5.  Managing Devices (Overview/Tasks)

6.  Dynamically Configuring Devices (Tasks)

7.  Using USB Devices (Overview)

8.  Using USB Devices (Tasks)

9.  Using InfiniBand Devices (Overview/Tasks)

10.  Managing Disks (Overview)

11.  Administering Disks (Tasks)

12.  SPARC: Setting Up Disks (Tasks)

13.  x86: Setting Up Disks (Tasks)

14.  Configuring Storage Devices With COMSTAR

COMSTAR and iSCSI Technology (Overview)

COMSTAR Software and Hardware Requirements

Configuring COMSTAR (Task Map)

Configuring COMSTAR

COMSTAR Terminology

Configuring Dynamic or Static Target Discovery

Configuring iSCSI Devices With COMSTAR

How to Enable the STMF Service

How to Back Up and Restore a COMSTAR Configuration

How to Create an iSCSI LUN

How to Create the iSCSI Target

How to Configure an IB HCA for iSER

How to Configure an iSCSI Initiator

How to Remove Discovered iSCSI Targets

Creating iSCSI Target Portal Groups

Using TPGs with iSER

How to Create a Target Portal Group for iSCSI Targets

How to Access iSCSI Disks

Making SCSI Logical Units Available

How to Make a Logical Unit Available to All Systems

How to Restrict LUN Access to Selected Systems

Configuring Fibre Channel Devices With COMSTAR

Configuring Fibre Channel Ports For COMSTAR

How to Display Existing FC Port Bindings

How to Set All FC Ports to a Specific Mode

How to Set Selected FC Ports to Initiator or Target Mode

Making Logical Units Available for FC and FCoE

How to Make Logical Units Available for FC and FCoE

Configuring FCoE Devices With COMSTAR

Configuring FCoE Ports

Enabling 802.3x PAUSE and Jumbo Frames on the Ethernet Interface

How to Create FCoE Target Ports

How to Verify That an FCoE Target Port Is Working

How to Delete FCoE Target Ports

Configuring SRP Devices With COMSTAR

Using COMSTAR Views With SRP

How to Enable the SRP Target Service

How to Verify SRP Target Status

Configuring Authentication in Your iSCSI-Based Storage Network

How to Configure CHAP Authentication for Your iSCSI Initiator

How to Configure CHAP Authentication for Your iSCSI Target

Using a Third-Party RADIUS Server to Simplify CHAP Management in Your iSCSI Configuration

How to Configure a RADIUS Server for Your iSCSI Target

How to Configure a RADIUS Server for Your iSCSI Initiator

Oracle Solaris iSCSI and RADIUS Server Error Messages

Setting Up iSCSI Multipathed Devices in Oracle Solaris

How to Enable Multiple iSCSI Sessions for a Target

Monitoring Your iSCSI Configuration

How to Display iSCSI Configuration Information

Modifying iSCSI Initiator and Target Parameters

Tuning iSCSI Parameters

How to Tune iSCSI Parameters

How to Modify iSCSI Initiator and Target Parameters

Troubleshooting iSCSI Configuration Problems

No Connections to the iSCSI Target From the Local System

How to Troubleshoot iSCSI Connection Problems

iSCSI Device or Disk Is Not Available on the Local System

How to Troubleshoot iSCSI Device or Disk Unavailability

Use LUN Masking When Using the iSNS Discovery Method

General iSCSI Error Messages

15.  Configuring and Managing the Oracle Solaris Internet Storage Name Service (iSNS)

16.  The format Utility (Reference)

17.  Managing File Systems (Overview)

18.  Creating and Mounting File Systems (Tasks)

19.  Configuring Additional Swap Space (Tasks)

20.  Copying Files and File Systems (Tasks)

21.  Managing Tape Drives (Tasks)

Index

Configuring Authentication in Your iSCSI-Based Storage Network

Setting up authentication for your iSCSI devices is optional.

In a secure environment, authentication is not required because only trusted initiators can access the targets.

In a less secure environment, the target cannot determine if a connection request is truly from a given host. In that case, the target can authenticate an initiator by using the Challenge-Handshake Authentication Protocol (CHAP).

CHAP authentication uses the notion of a challenge and response, which means that the target challenges the initiator to prove its identity. For the challenge/response method to work, the target must know the initiator's secret key, and the initiator must be set up to respond to a challenge. Refer to the array vendor's documentation for instructions on setting up the secret key on the array.

iSCSI supports unidirectional and bidirectional authentication as follows:

How to Configure CHAP Authentication for Your iSCSI Initiator

This procedure assumes that you are logged in to the local system where you want to securely access the configured iSCSI target device.

You can simplify CHAP secret key management by using a third-party RADIUS server, which acts as a centralized authentication service. When you use RADIUS, the RADIUS server stores the set of node names and matching CHAP secret keys. The system performing the authentication forwards the node name of the requester and the supplied secret of the requester to the RADIUS server. The RADIUS server confirms whether the secret key is the appropriate key to authenticate the given node name. Both iSCSI and iSER support the use of a RADIUS server.

For more information about using a third-party RADIUS server, see Using a Third-Party RADIUS Server to Simplify CHAP Management in Your iSCSI Configuration.

  1. Become an administrator.

    For more information, see How to Use Your Assigned Administrative Rights in Oracle Solaris Administration: Security Services.

  2. Determine whether you want to configure unidirectional or bidirectional CHAP.
    • Unidirectional authentication, the default method, enables the target to validate the initiator. Complete steps 3–5 only.

    • Bidirectional authentication adds a second level of security by enabling the initiator to authenticate the target. Complete steps 3–9.

  3. Unidirectional CHAP: Set the secret key on the initiator.

    The following command initiates a dialogue to define the CHAP secret key:

    initiator# iscsiadm modify initiator-node --CHAP-secret
    Enter CHAP secret: ************
    Re-enter secret: ************
  4. (Optional) Unidirectional CHAP: Set the CHAP user name on the initiator.

    By default, the initiator's CHAP user name is set to the initiator node name.

    Use the following command to use your own initiator CHAP user name:

    initiator# iscsiadm modify initiator-node --CHAP-name new-CHAP-name
  5. Unidirectional CHAP – Enable CHAP authentication on the initiator.
    initiator# iscsiadm modify initiator-node --authentication CHAP

    CHAP requires that the initiator node have both a user name and a password. The user name is typically used by the target to look up the secret key for the given user name.

  6. Select one of the following to enable or disable bidirectional CHAP.
    • Enable bidirectional CHAP for connections with the target.

      initiator# iscsiadm modify target-param -B enable target-iqn
    • Disable bidirectional CHAP.

      initiator# iscsiadm modify target-param -B disable target-iqn
  7. Bidirectional CHAP: Set the authentication method to CHAP for the target.
    initiator# iscsiadm modify target-param --authentication CHAP target-iqn
  8. Bidirectional CHAP: Set the target device secret key that identifies the target.

    The following command initiates a dialogue to define the CHAP secret key:

    initiator# iscsiadm modify target-param --CHAP-secret target-iqn
  9. Bidirectional CHAP: If the target uses an alternate CHAP user name, set the CHAP name that identifies the target.

    By default, the target's CHAP name is set to the target name.

    You can use the following command to change the target's CHAP name:

    initiator# iscsiadm modify target-param --CHAP-name target-CHAP-name

How to Configure CHAP Authentication for Your iSCSI Target

This procedure assumes that you are logged in to the local system that contains the iSCSI targets.

  1. Become an administrator.
  2. Determine whether you want to configure unidirectional or bidirectional CHAP.
    • Unidirectional authentication is the default method. Complete steps 3–5 only.

    • For bidirectional authentication. Complete steps 3–7.

  3. Unidirectional/Bidirectional CHAP: Configure the target to require that initiators identify themselves using CHAP.
    target# itadm modify-target -a chap target-iqn
  4. Unidirectional/Bidirectional CHAP: Create an initiator context that describes the initiator.

    Create the initiator context with the initiator's full node name and with the initiator's CHAP secret key.

    target# itadm create-initiator -s initiator-iqn
    Enter CHAP secret: ************
    Re-enter secret: ************
  5. Unidirectional/Bidirectional CHAP: If the initiator uses an alternate CHAP name, then configure the initiator-context with the alternate name.
    target# itadm modify-initiator -u initiator-CHAP-name initiator-iqn
  6. Bidirectional CHAP: Set the target device secret key that identifies this target.
    target# itadm modify-target -s target-iqn
    Enter CHAP secret: ************
    Re-enter secret: ************
  7. (Optional) Bidirectional CHAP: If the target uses an alternate CHAP user name other than the target node name (iqn), modify the target.
    target# itadm modify-target -u target-CHAP-name target-iqn

Using a Third-Party RADIUS Server to Simplify CHAP Management in Your iSCSI Configuration

You can use a third-party RADIUS server that acts as a centralized authentication service to simplify CHAP key secret management. With this method, the recommended practice is to use the default CHAP name for each initiator node. In the common case when all initiators are using the default CHAP name, you do not have to create initiator contexts on the target.

How to Configure a RADIUS Server for Your iSCSI Target

This procedure assumes that you are logged in to the local system where you want to securely access the configured iSCSI target device.

  1. Become an administrator.
  2. Configure the initiator node with the IP address and the port of the RADIUS server.

    The default port is 1812. This configuration is completed once for all iSCSI targets on the target system.

    initiator# itadm modify-defaults -r RADIUS-server-IP-address
    Enter RADIUS secret: ************
    Re-enter secret: ************
  3. Configure the shared secret key that is used for communication between the target system and the RADIUS server.
    initiator# itadm modify-defaults -d
    Enter RADIUS secret: ************
    Re-enter secret: ************
  4. Configure the target system to require RADIUS authentication.

    This configuration can be performed for an individual target or as a default for all targets.

    initiator# itadm modify-target -a radius target-iqn
  5. Configure the RADIUS server with the following components:
    • The identity of the target node (for example, its IP address)

    • The shared secret key that the target node uses to communicate with the RADIUS server

    • The initiator's CHAP name (for example, it's iqn name) and the secret key for each initiator that needs to be authenticated

How to Configure a RADIUS Server for Your iSCSI Initiator

You can use a third-party RADIUS server that acts as a centralized authentication service to simplify CHAP secret key management. This setup is only useful when the initiator is requesting bidirectional CHAP authentication. You must still specify the initiator's CHAP secret key, but you are not required to specify the CHAP secret key for each target on an initiator when using bidirectional authentication with a RADIUS server. RADIUS can be independently configured on either the initiator or the target. The initiator and the target do not have to use RADIUS.

  1. Become an administrator.
  2. Configure the initiator node with the IP address and the port of the RADIUS server.

    The default port is 1812.

    # iscsiadm modify initiator-node --radius-server ip-address:1812
  3. Configure the initiator node with the shared secret key of the RADIUS server.

    The RADIUS server must be configured with a shared secret for iSCSI to interact with the server.

    # iscsiadm modify initiator-node --radius-shared-secret
    Enter secret:
    Re-enter secret
  4. Enable the use of the RADIUS server.
    # iscsiadm modify initiator-node --radius-access enable
  5. Set up the other aspects of CHAP bidirectional authentication.
    # iscsiadm modify initiator-node --authentication CHAP
    # iscsiadm modify target-param --bi-directional-authentication enable target-iqn
    # iscsiadm modify target-param --authentication CHAP target-iqn
  6. Configure the RADIUS server with the following components:
    • The identity of this node (for example, its IP address)

    • The shared secret key that this node uses to communicate with the RADIUS server

    • The target's CHAP name (for example, its iqn name) and the secret key for each target that needs to be authenticated

Oracle Solaris iSCSI and RADIUS Server Error Messages

This section describes the error messages that are related to an Oracle Solaris iSCSI and RADIUS server configuration. Potential solutions for recovery are also provided.

empty RADIUS shared secret

Cause: The RADIUS server is enabled on the initiator, but the RADIUS shared secret key is not set.

Solution: Configure the initiator with the RADIUS shared secret key. For more information, see How to Configure a RADIUS Server for Your iSCSI Target.

WARNING: RADIUS packet authentication failed

Cause: The initiator failed to authenticate the RADIUS data packet. This error can occur if the shared secret key that is configured on the initiator node is different from the shared secret key on the RADIUS server.

Solution: Reconfigure the initiator with the correct RADIUS shared secret. For more information, see How to Configure a RADIUS Server for Your iSCSI Target.