|
|
HP-UX iSCSI Software Initiator Support Guide: HP-UX 11i v1 & 11i v2 > Chapter 1 iSCSI OverviewiSCSI Login |
|
The iSCSI login enables:
An iSCSI session is established to identify all of the connections between an initiator and a target belonging to the same I_T nexus. Targets listen on a well-known TCP port (3260, as defined in the iSCSI Protocol Specification), or on a user configured TCP port, for incoming connections. The initiator begins the login process by connecting to one of these TCP ports. An iSCSI Session has two phases:
Login Phase The iSCSI Login Phase consists of Login requests and responses. Once authentication has occurred and operational parameters have been set, the session transitions to the Full Feature Phase and the initiator begins performing SCSI I/Os. NOTE: Using authentication is optional. iSCSI parameters are negotiated using Login Requests and Responses, during session establishment. During the Full Feature Phase, iSCSI parameters are negotiated using Text Requests and Responses. In both cases the mechanism is an exchange of iSCSI-text-key=value pairs (also referred to as key=value pairs). The Login Phase proceeds in two stages:
iSCSI Full Feature Phase After successfully completing the Login Phase on the first (leading) connection of the session, a session is in Full Feature Phase. In the Full Feature Phase, the initiator sends SCSI commands and data to the target by encapsulating them in iSCSI PDUs that go over the iSCSI session (transport). The initiator receives SCSI responses embedded in iSCSI PDUs, from the target. SCSI I/O only occurs after the Full Feature Phase begins. |
|