At least one iSCSI target is configured not to use authentication.
Description
One or more of the iSCSI (Internet Small Computer Systems Interface) targets on the remote host are configured not to use an authentication mechanism, potentially allowing unauthorized access to the targets.
Solution
Configure authentication on the target to restrict access to authorized initiators.