Previous Table of Contents Next


24.1.1 Assumptions


   The SAS protocol was designed under the following assumptions:

   Clients that reuse security contexts shall be capable of processing replies that indicate that the context has been discarded by the target.


   Context Protocol

   Supplemental Client Authentication Layer

   Client Authentication


   Figure 24-1 CSIv2 Security Architecture