📄 iscsi_manage.8
字号:
replies are not sent..IP "t" 4Forces target authentication during CHAP and SRP security negotiations.The default is not to use target confirmation after an initiator successfully responds to a target challenge.Without the t option, an initiator using CHAP needs to configure onlythe px and pn options, and a target using CHAP needs to configure onlythe lx, ln and cl=<size> options with matching values.With the t option, both initiator and targetneed to configure both pairs of matching options in order to complete theCHAP negotiation successfully..IP "b" 4During security negotiations,forces reply key valuesthat are large binary numbers to be formated and sent using base64 format.The default is hex format..IP "xok" 4Forces the responder during negotiations to reply to an X- or X# key withthe value recieved, rather than with NotUnderstood..IP "tk1" 4Forces the target to responde to SendTargets requests by sending only onekey=value per Text Response pdu.(Target only, illegal on initiator.).IP "n=<number>" 4Forces sending of nops at a periodic interval, which is given in secondsby the number..IP "p=<number>" 4Forces the initiator to retransmit any command that has notseen any activity from target for p seconds.On the target, forces the phase collapse on the last DataIn pdu in a command as follows:.br p=0\ \ never use phase collapse -- the default..br p=1\ \ always use phase collapse..br p=2\ \ alternate use of phase collapse(i.e., use it when first possible, then don't use it, then use it again, then don't, etc.)..IP "sch=<number>" 4Forces the initiator to use one of the following scheduling algorithmsfor dispatching commands over multiple connections within a single session: .br sch=0\ \ all commands send on first connection -- the default. .br sch=1\ \ distribute commands over all connections in a round-robin fashion..br sch=2\ \ map each LUN onto exactly one connection. When a new lun is brought up, it ispermanently assigned to the connection having the fewest luns assigned at that time.(Initiator only, illegal on target.).IP "r2tp=<number>" 4Forces the time-out value for the target's R2T timer to be the number in seconds.(Target only, illegal on initiator.).IP "isidt=<number>" 4Forces the initiator to offer this ISID type on a login. <number> must be0, 1, 2 or 3 only. The default type is 2.See Section 10.12.5 of RFC 3720 for details on thestructure of the ISID.(Initiator only, illegal on target.).IP "isidn=<number>" 4Forces the initiator to offer this ISID number on a login.When isidt is 0, isidn is the 22-bit OUI.When isidt is 1, isidn is the 24-bit EN.When isidt is 2, isidn is the 24-bit random value.When isidt is 3, isidn is ignored.The default is 0x123456.See Section 10.12.5 of RFC 3720 for details on thestructure of the ISID.(Initiator only, illegal on target.).IP "isidq=<number>" 4Forces the initiator to offer this ISID qualifier on a login.When isidt is 0, isidq is the 24-bit qualifier.When isidt is 1 or 2, isidq is the 16-bit qualifier.When isidt is 3, isidq is ignored.The default is 0x789a.See Section 10.12.5 of RFC 3720 for details on thestructure of the ISID.(Initiator only, illegal on target.).IP "cl=<number>" 4Forces thelength in bytes of the large-binary-value generated as the value of a CHAP challenge value when sending a challenge.The min/maximum allowed are 256 to 1024. cl always needs set to a value on the target. There is no default..IP "px=<string>" 4Forces the use of <string> as the peer secretwhen generating the CHAP_R response to send backin response to a previously received CHAP_C challenge.There is no default value, so a "px" value must beforced on an initiator that wants to use CHAP authentication,and on a target that wants to use CHAP target authentication..IP "pn=<string" 4Forces the use of <string> as the peer namewhen generating the CHAP_N response to send backin response to a previously received CHAP_C challenge.There is no default value, so a "pn" value must beforced on an initiator that wants to use CHAP authentication,and on a target that wants to use CHAP target authentication..IP "lx=<string>" 4Forces the use of <string> as the local secretwhen generating CHAP_C challenges to be sent,and when checking CHAP_R responses received back in response to the challenge.There is no default value, so an "lx" value must beforced on a target that wants to use CHAP authentication,and on an initiator that wants to use CHAP target authentication..IP "ln=<string>" 4Forces the use of <string> as the local nameto check against the CHAP_N value received back in responseto a challenge.There is no default value, so an "ln" value must beforced on a target that wants to use CHAP authentication,and on an initiator that wants to use CHAP target authentication..IP "sx=<string>" 4Forces the use of <string> as the SRP secret when generating and checking SRP challenges.There is no default value, so an "sx" value must be forced if SRP authentication is to be used..IP "sn=<string>" 4Forces the use of <string> as the SRP namewhen generating and checking the SRP_U key.There is no default value, so an "sn" value must be forced ifSRP authentication is to be used..IP "sg=SRP-768|SRP-1024|SRP-1280|SRP-1536|SRP-2048" 4Forces the initiator to use the indicated group duringSRP authentication.The default is SRP_1536 if no "sg" value is forced.(Initiator only, illegal on target.).IP "V=<number>" 4Turns on Verbose mode, which causes the module to write messagesto /var/log/messages. <number> turns on bits as defined in thefile common/debug.h..PPIf the action is "snack", the parameter=value forms are:.IP "a=y|n" 4On the target, indicates if the A bit should be set on thelast DataIn pdu in each sequence (i.e., on all DataIn pdus withthe F bit set) in order to provoke a DataACK SNACK back fromthe initiator. (Target only, illegal on initiator.).IP "d=y|n" 4Indicates if the data snack is enabled (y) or not (n).This is used by both initiator and target modules..IP "s=y|n" 4Indicates if the status snack is enabled (y) or not (n).This is used by both initiator and target modules..IP "h=<number>" 4Indicates how the UNH target module will handle the data snack request.The target may either retransmit or reject a data snack request: .Vb 2\& 1 \- data retransmission\& 2 \- snack reject.Ve.SH EXAMPLES.IP "\(bu" 4If the initiator wants to restore the default values of all theparameters to its original state (state when the module wasinitially loaded) for session 1.Vb 1\& iscsi_manage init restore target=1.Ve.IP "\(bu" 4If the initiator wants to offer no authentication for session creation.Vb 2\& iscsi_manage init set AuthMethod=none\& iscsi_manage init set Sessiontype=Normal.Ve.IP "\(bu" 4If the initiator wants to offer SRP authentication for a discovery session.Vb 5\& iscsi_manage init set AuthMethod=SRP,None \& iscsi_manage init set Sessiontype=Discovery\& iscsi_manage init force sx="secret" (used in all challenges)\& iscsi_manage init force cn="name" (used in all challenges)\& iscsi_manage init force sg=SRP-768.Ve.IP "\(bu" 4If the initiator wants to offer CHAP authentication for session creation.Vb 5\& iscsi_manage init set AuthMethod=CHAP,None (or some other list)\& iscsi_manage init set Sessiontype=Discovery\& iscsi_manage init force px="peer secret" (1st challenge)\& iscsi_manage init force pn="peer name" (1st challenge)\& iscsi_manage init force cl=256 (length).Ve.IP "\(bu" 4If the initiator wants to offer CHAP authentication with an targetchallenge for session creation.Vb 8\& iscsi_manage init set AuthMethod=CHAP,None (or some other list)\& iscsi_manage init set Sessiontype=Discovery\& iscsi_manage init force px="peer secret" (1st challenge)\& iscsi_manage init force pn="peer name" (1st challenge)\& iscsi_manage init force cl=256 (length)\& iscsi_manage init force t\& iscsi_manage init force lx="local secret" (2nd challenge)\& iscsi_manage init force ln="local name" (2nd challenge).Ve.IP "\(bu" 4If the initiator supports both the options (Yes/No) but likesthe no value as the default for InitialR2T, then we might want to configure the initiator like this.Vb 1\& iscsi_manage init set InitialR2T=No.Ve.IP "\(bu" 4If the initiator wants to change the default behavior ofthe key InitialR2T (from Yes to No) but does not want tonegotiate thiswith the target (presumably for purposes of testing the target), use.Vb 1\& iscsi_manage init setp InitialR2T=No.Ve.IP "\(bu" 4If the initiator wants to use up to 5 (for example) connectionswithin a single session, but is able to use fewer, it should use.Vb 1\& iscsi_manage initiator set MaxConnections=5.VeThe target will reply with a number in the range [1..5] indicatingthe actual number that the target can support (and therefore, thatthe initiator can use)..IP "\(bu" 4If the initiator must be able to use up to 3 (for example) connectionswithin a single session,it has to use:.Vb 1\& iscsi_manage initiator setr MaxConnections=3.VeThis will cause the initiator to fail the login negotiations if the targetresponds to this offer with a value less than 3 (indicating thatit cannot support 3 connections within a single session)..IP "\(bu" 4If the target can accept just a single connection within a session,it can just leave the MaxConnections parameter at the default value,which is 1. It can also explicitly set it using either.Vb 1\& iscsi_manage target set MaxConnections=1.Veor .Vb 1\& iscsi_manage target setr MaxConnections=1.Ve.IP "\(bu" 4If the initiator wants to force NopOut PDUs to be sent to thetarget if there has been no activity on a connection for more than 20 seconds, then use.Vb 1\& iscsi_manage init force n=20.Ve.IP "\(bu" 4To enable the initiator to print a minimal trace of its actionsto /var/log/messages(assuming the initiator was compiled to generate such information).Vb 1\& iscsi_manage init force V=4.Ve.SH NOTES.PPGenerally, an iscsi_config(8) command must be executed after iscsi_manage command(s) are issued for the majority of the Text Login optionsto take affect. These commands are typically executed from the UNH startup scripts found at /opt/unh/iscsi/conf. .SH BUGS.PPReport bugs to <unh_iscsi_bugs@lists.sourceforge.net>.SH COPYRIGHT.PPCopyright (c) 2003-2004 UNH Interoperability Lab.This is free software; see the source for copying conditions.There is NO warranty; not even for MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE..SH SEE ALSO.PPiscsi_config(8)
⌨️ 快捷键说明
复制代码
Ctrl + C
搜索代码
Ctrl + F
全屏模式
F11
切换主题
Ctrl + Shift + D
显示快捷键
?
增大字号
Ctrl + =
减小字号
Ctrl + -