Learn About iSCSI Target Authentication
Changing the Initiator Authentication Settings
iSCSI Authentication Methods
When should I use multiple authentication types simultaneously?