Which of the following statements are true about software iSCSI? (Choose Two)
A.
It requires a dedicated NIC.
B.
It is enabled by default.
C.
CHAP authentication can be configured.
D.
SendTargets can be configured.
Explanation:
iSCSI SAN Configuration Guide ESX 4.0 ESXi 4.0 vCenter Server 4.0, page 35, 37.
Set up target discovery addresses so that the iSCSI initiator can determine which storage
resource on the network is available for access.
The ESX/ESXi system supports these discovery methods:
Dynamic Discovery Also known as Send Targets discovery. Each time the initiator
contacts a specified iSCSI server, the initiator sends the Send Targets request to the
server. The server responds by supplying a list of available targets to the initiator. The
names and IP addresses of these targets appear on the Static Discovery tab. If you remove
a static target added by dynamic discovery, the target might be returned to the list the
next time a rescan happens, the HBA is reset, or the host is rebooted.
Static Discovery The initiator does not have to perform any discovery. The initiator has a
list of targets it can contact and uses their IP addresses and target names to communicate
with them.
Because the IP networks that the iSCSI technology uses to connect to remote targets do
not protect the data they transport, you must ensure security of the connection. iSCSI
requires that all devices on the network implement Challenge Handshake Authentication
Protocol (CHAP), which verifies the legitimacy of initiators that access targets on the
network.
CHAP uses a three-way handshake algorithm to verify the identity of your host and, if
applicable, of the iSCSI target when the host and target establish a connection. The
verification is based on a predefined private value, or CHAP secret, that the initiator and
target share.
ESX/ESXi supports CHAP authentication at the adapter level. In this case, all targets
receive the same CHAP name and secret from the iSCSI initiator. For software iSCSI,
ESX/ESXi also supports per-target CHAP authentication, which allows you to configure
different credentials for each target to achieve greater level of security.
I would like to know the answer