13 Click Next again, then review the configuration summary.Click Back to change the configuration.14 Click Apply, then click Yes.The logical devices are created or modified, and iSCSI initiator assignments aresaved in the iSCSI Storage Appliance.Controlling Access to Your IP SAN with AuthenticationWhen you create a new volume (see page 40) or logical device (page 42), you can setan authentication method so that any server that attempts to log in to your iSCSIStorage Appliance is forced to authenticate itself.Note Supported authentication methods vary by iSCSI initiator. Refer to your iSCSIinitiator documentation for more information.Once an authentication method is set, any server trying to log in withoutauthentication, or with the incorrect authentication, is rejected.Two authentication methods are available in Adaptec Storage Manager:• Challenge Handshake Authentication Password (CHAP)—Default settingNote If you are using iSNS (see page 163) to discover iSCSI targets and want tocontrol which iSCSI targets can be logged into by which iSCSI initiators, youmust set CHAP authentication. Without CHAP authentication, all iSCSI initiatorswill be able to log in to all iSCSI targets.• Secure Remote Password (SRP)You can choose not to set any authentication method. When authentication for aprovisioned volume or logical device is set to None, the authentication method (ifany) is set by the iSCSI initiator instead of your iSCSI Storage Appliance, and youriSCSI Storage Appliance allows a server to log in when the server bypasses securityor when the server-requested authentication is completed successfully.