SlideShare a Scribd company logo
iSCSI introduction and usage
Zhu Lingshan
lszhu@suse.com
What is SCSI
Small Computer System Interface(SCSI) is a set of standards for physically
connecting and transferring data between computers and peripheral devices. The
SCSI standards define commands, protocols, electrical and optical interfaces.
SCSI is most commonly used for hard disk drives and tape drives, but it can
connect a wide range of other devices, including scanners and CD drives,
although not all controllers can handle all devices. The SCSI standard defines
command sets for specific peripheral device types; the presence of "unknown" as
one of these types means that in theory it can be used as an interface to almost
any device, but the standard is highly pragmatic and addressed toward
commercial requirements.
What is SCSI
SCSI Initiator: An endpoint that initiates a SCSI session, that is, sends a SCSI
command.
SCSI Target: Usually a disk or a storage array.
SCSI LUN: SCSI Logical Unit Number, the “real storage”, a SCSI target should
have at least one LUN: LUN0.
In SCSI terminology, communication takes place between an initiator and a
target. The initiator sends a command to the LUN, which then responds. SCSI
commands are sent in a Command Descriptor Block (CDB).
What is SCSI
Lsscsi shows [Host:Bus:Target:LUN], device type,
vendor, etc
lsscsi shows SATA devices, Because SATA uses SCSI
transport layer.
What is SCSI
What is iSCSI
What is iSCSI
Carry SCSI CBD in iSCSI PDU, benefit from IP networks.
Key words in iSCSI:
• ISID: The initiator part of the Session Identifier. It is explicitly specified by
the initiator during Login.
• I_T nexus: According to [SAM2], the I_T nexus is a relationship between a
SCSI Initiator Port and a SCSI Target Port.
• SSID (Session ID): A session between an iSCSI initiator and an iSCSI target
is defined by a session ID that is a tuple composed of an initiator part (ISID)
and a target part (Target Portal Group Tag). The ISID is explicitly specified by
the initiator at session establishment. The Target Portal Group Tag is implied
by the initiator through the selection of the TCP endpoint at connection
establishment.
What is iSCSI, key words:
• TSIH (Target Session Identifying Handle): A target assigned tag for a session
with a specific named initiator. The target generates it during session
establishment. Its internal format and content are not defined by this protocol,
except for the value 0 that is reserved and used by the initiator to indicate a
new session.
• ITT(Initiator Task Tag):The Initiator Task Tag is used to identify a task during
its execution even over sessions/connections.
• CID: connection ID.
• CmdSN: command sequence number.
• ExpStatSN: The expected status number, ExpStatSN is what the initiator uses
to tell the target what status response it thinks is the next one.
What is iSCSI, key words:
• StatSN:status sequence number, it is different from status also in the PDU.
Responses in transit from the target to the initiator are numbered. The StatSN
(Status Sequence Number) is used for this purpose. This helps the initiator
detect any missing StatSN(s) and issue a SNACK for the status
• ExpCmdSN: Next expected CmdSN from this initiator.
• MaxCmdSN: Maximum CmdSN from this initiator
iSCSI discovery 1/4:
iSCSI discovery 2/4:
iSCSI discovery 3/4:
iSCSI discovery 4/4:
How iSCSI carry SCSI commands
14
Yast iSCSI target usage: discovery
Yast iSCSI target usage: add a target
Yast iSCSI target usage: add an initiaitor
Yast iSCSI target usage: login authentication
Yast iSCSI target usage: LUNs mapping
Targetcli overview
20
Targetcli create backend storage
• Create a backend storage with a existed file:
backstores/fileio create name=iscsi_file file_or_dev=/home/lszhu/target.raw
• Create a backend storage with a file not existed, while you want to create the
file at the same time.
backstores/fileio create name=iscsi_file file_or_dev=/home/lszhu/target.raw
size=100M
• Create a backend storage with a block device
backstores/block/ create name=iscsi_sbc dev=/dev/sdc
21
Targetcli create targets
/> iscsi/ create iqn.2017-03.suse.com.target
Created target iqn.2017-03.suse.com.target.
Created TPG 1.
Global pref auto_add_default_portal=true
Created default portal listening on all IPs (0.0.0.0), port 3260.
/>
22
Targetcli create portals and luns
• Create a portal
/iscsi/iqn.20...m.target/tpg1> portals/ create ip_address=147.2.212.166
ip_port=3260
• Create a lun:
/iscsi/iqn.20...m.target/tpg1> luns/ create /backstores/block/iscsi_sdc
23
Targetcli set demo mode
• Set to demo mode then every initiator can access the target without
authentication
/iscsi/iqn.20...m.target/tpg1> set attribute authentication=0
demo_mode_write_protect=0 generate_node_acls=1 cache_dynamic_acls=1
24
Targetcli add an ACL
An ACL means you want some specific initiators granted the access to the targets,
others not.
1. /iscsi/iqn.20...m.target/tpg1> acls/ create iqn.2017-03.suse.com.lszhu.init
2. /iscsi/iqn.20...m.target/tpg1> cd acls/iqn.2017-03.suse.com.lszhu.init
3. /iscsi/iqn.20...om.lszhu.init> set auth userid=lszhu password=lszhu
mutual_userid=test mutual_password=test
4. /iscsi/iqn.20...om.lszhu.init> create mapped_lun=6
tpg_lun_or_backstore=lun0
25
Q&A
Thanks

More Related Content

Viewers also liked

Windows Server 2008 R2 Group Policy Changes
Windows Server 2008 R2 Group Policy ChangesWindows Server 2008 R2 Group Policy Changes
Windows Server 2008 R2 Group Policy Changes
Eduardo Castro
 
Group policy management window server 2008r2
Group policy management window server 2008r2Group policy management window server 2008r2
Group policy management window server 2008r2
IGZ Software house
 
Introdução ao desenvolvimento de games
Introdução ao desenvolvimento de gamesIntrodução ao desenvolvimento de games
Introdução ao desenvolvimento de games
Professor José de Assis
 
MCSA 70-412 Chapter 10
MCSA 70-412 Chapter 10MCSA 70-412 Chapter 10
MCSA 70-412 Chapter 10
Computer Networking
 
Group Policy Windows Server 2008
Group Policy Windows Server 2008Group Policy Windows Server 2008
Group Policy Windows Server 2008
Unitek Eduation
 
Totem
TotemTotem
Totem
bin liu
 
Chapter03 Creating And Managing User Accounts
Chapter03      Creating And  Managing  User  AccountsChapter03      Creating And  Managing  User  Accounts
Chapter03 Creating And Managing User AccountsRaja Waseem Akhtar
 
Windows Server 2008 R2 Overview
Windows Server 2008 R2 OverviewWindows Server 2008 R2 Overview
Windows Server 2008 R2 OverviewSteven Wilder
 
Raid(redundant array of independent disks).
Raid(redundant array of independent disks).Raid(redundant array of independent disks).
Raid(redundant array of independent disks).
ali torabi
 
Understanding RAID Levels (RAID 0, RAID 1, RAID 2, RAID 3, RAID 4, RAID 5)
Understanding RAID Levels (RAID 0, RAID 1, RAID 2, RAID 3, RAID 4, RAID 5)Understanding RAID Levels (RAID 0, RAID 1, RAID 2, RAID 3, RAID 4, RAID 5)
Understanding RAID Levels (RAID 0, RAID 1, RAID 2, RAID 3, RAID 4, RAID 5)
Raid Data Recovery
 
Ms excel ppt presentation
Ms excel ppt presentationMs excel ppt presentation
Ms excel ppt presentation
vethics
 

Viewers also liked (14)

Windows Server 2008 R2 Group Policy Changes
Windows Server 2008 R2 Group Policy ChangesWindows Server 2008 R2 Group Policy Changes
Windows Server 2008 R2 Group Policy Changes
 
Group policy management window server 2008r2
Group policy management window server 2008r2Group policy management window server 2008r2
Group policy management window server 2008r2
 
Introdução ao desenvolvimento de games
Introdução ao desenvolvimento de gamesIntrodução ao desenvolvimento de games
Introdução ao desenvolvimento de games
 
MCSA 70-412 Chapter 10
MCSA 70-412 Chapter 10MCSA 70-412 Chapter 10
MCSA 70-412 Chapter 10
 
70 640 Lesson05 Ppt 041009
70 640 Lesson05 Ppt 04100970 640 Lesson05 Ppt 041009
70 640 Lesson05 Ppt 041009
 
Group Policy Windows Server 2008
Group Policy Windows Server 2008Group Policy Windows Server 2008
Group Policy Windows Server 2008
 
Totem
TotemTotem
Totem
 
DAS RAID NAS SAN
DAS RAID NAS SANDAS RAID NAS SAN
DAS RAID NAS SAN
 
Chapter03 Creating And Managing User Accounts
Chapter03      Creating And  Managing  User  AccountsChapter03      Creating And  Managing  User  Accounts
Chapter03 Creating And Managing User Accounts
 
Windows Server 2008 R2 Overview
Windows Server 2008 R2 OverviewWindows Server 2008 R2 Overview
Windows Server 2008 R2 Overview
 
Raid(redundant array of independent disks).
Raid(redundant array of independent disks).Raid(redundant array of independent disks).
Raid(redundant array of independent disks).
 
network storage
network storagenetwork storage
network storage
 
Understanding RAID Levels (RAID 0, RAID 1, RAID 2, RAID 3, RAID 4, RAID 5)
Understanding RAID Levels (RAID 0, RAID 1, RAID 2, RAID 3, RAID 4, RAID 5)Understanding RAID Levels (RAID 0, RAID 1, RAID 2, RAID 3, RAID 4, RAID 5)
Understanding RAID Levels (RAID 0, RAID 1, RAID 2, RAID 3, RAID 4, RAID 5)
 
Ms excel ppt presentation
Ms excel ppt presentationMs excel ppt presentation
Ms excel ppt presentation
 

Similar to iSCSI introduction and usage

Setting up iSCSI Providers and Clients in openSUSE
Setting up iSCSI Providers and Clients in openSUSESetting up iSCSI Providers and Clients in openSUSE
Setting up iSCSI Providers and Clients in openSUSE
LeeDuncan16
 
Detailed iSCSI presentation
Detailed iSCSI presentationDetailed iSCSI presentation
Detailed iSCSI presentation
Sheel Sindhu Manohar
 
iSCSI (Internet Small Computer System Interface)
iSCSI (Internet Small Computer System Interface)iSCSI (Internet Small Computer System Interface)
iSCSI (Internet Small Computer System Interface)
Sayali Koranne
 
Scsi drives
Scsi drivesScsi drives
Scsi drives
Bits
 
OpenSSL Basic Function Call Flow
OpenSSL Basic Function Call FlowOpenSSL Basic Function Call Flow
OpenSSL Basic Function Call Flow
William Lee
 
ISCSI server configuration
ISCSI server configurationISCSI server configuration
ISCSI server configuration
Thamizharasan P
 
Oleksyk applied-anti-forensics
Oleksyk   applied-anti-forensicsOleksyk   applied-anti-forensics
Oleksyk applied-anti-forensicsDefconRussia
 
UNH InterOperability Lab - iSCSI Introduction
UNH InterOperability Lab - iSCSI IntroductionUNH InterOperability Lab - iSCSI Introduction
UNH InterOperability Lab - iSCSI Introduction
sexyeightysix
 
SCSI(small computer system interface)
SCSI(small computer system interface)SCSI(small computer system interface)
SCSI(small computer system interface)
Niraj Lamichhane
 
BKK16-103 OpenCSD - Open for Business!
BKK16-103 OpenCSD - Open for Business!BKK16-103 OpenCSD - Open for Business!
BKK16-103 OpenCSD - Open for Business!
Linaro
 
Study notes for CompTIA Certified Advanced Security Practitioner (ver2)
Study notes for CompTIA Certified Advanced Security Practitioner  (ver2)Study notes for CompTIA Certified Advanced Security Practitioner  (ver2)
Study notes for CompTIA Certified Advanced Security Practitioner (ver2)
David Sweigert
 
Memory Forensics: Defeating Disk Encryption, Skilled Attackers, and Advanced ...
Memory Forensics: Defeating Disk Encryption, Skilled Attackers, and Advanced ...Memory Forensics: Defeating Disk Encryption, Skilled Attackers, and Advanced ...
Memory Forensics: Defeating Disk Encryption, Skilled Attackers, and Advanced ...
Andrew Case
 
Symmetric Crypto for DPDK - Declan Doherty
Symmetric Crypto for DPDK - Declan DohertySymmetric Crypto for DPDK - Declan Doherty
Symmetric Crypto for DPDK - Declan Doherty
harryvanhaaren
 
Linux PCI device driver
Linux PCI device driverLinux PCI device driver
Linux PCI device driver
艾鍗科技
 
R server and spark
R server and sparkR server and spark
R server and spark
BAINIDA
 
Notes for LX0-101 Linux
Notes for LX0-101 Linux Notes for LX0-101 Linux
Notes for LX0-101 Linux
Chris Henson, CCNP
 
Connect dell equallogic storage to linux instance
Connect dell equallogic storage to linux instanceConnect dell equallogic storage to linux instance
Connect dell equallogic storage to linux instance
Saeed Siddik
 

Similar to iSCSI introduction and usage (20)

Setting up iSCSI Providers and Clients in openSUSE
Setting up iSCSI Providers and Clients in openSUSESetting up iSCSI Providers and Clients in openSUSE
Setting up iSCSI Providers and Clients in openSUSE
 
Detailed iSCSI presentation
Detailed iSCSI presentationDetailed iSCSI presentation
Detailed iSCSI presentation
 
iSCSI (Internet Small Computer System Interface)
iSCSI (Internet Small Computer System Interface)iSCSI (Internet Small Computer System Interface)
iSCSI (Internet Small Computer System Interface)
 
Scsi drives
Scsi drivesScsi drives
Scsi drives
 
10.1.1.48.4087
10.1.1.48.408710.1.1.48.4087
10.1.1.48.4087
 
OpenSSL Basic Function Call Flow
OpenSSL Basic Function Call FlowOpenSSL Basic Function Call Flow
OpenSSL Basic Function Call Flow
 
ISCSI server configuration
ISCSI server configurationISCSI server configuration
ISCSI server configuration
 
Oleksyk applied-anti-forensics
Oleksyk   applied-anti-forensicsOleksyk   applied-anti-forensics
Oleksyk applied-anti-forensics
 
UNH InterOperability Lab - iSCSI Introduction
UNH InterOperability Lab - iSCSI IntroductionUNH InterOperability Lab - iSCSI Introduction
UNH InterOperability Lab - iSCSI Introduction
 
SCSI(small computer system interface)
SCSI(small computer system interface)SCSI(small computer system interface)
SCSI(small computer system interface)
 
BKK16-103 OpenCSD - Open for Business!
BKK16-103 OpenCSD - Open for Business!BKK16-103 OpenCSD - Open for Business!
BKK16-103 OpenCSD - Open for Business!
 
Study notes for CompTIA Certified Advanced Security Practitioner (ver2)
Study notes for CompTIA Certified Advanced Security Practitioner  (ver2)Study notes for CompTIA Certified Advanced Security Practitioner  (ver2)
Study notes for CompTIA Certified Advanced Security Practitioner (ver2)
 
Memory Forensics: Defeating Disk Encryption, Skilled Attackers, and Advanced ...
Memory Forensics: Defeating Disk Encryption, Skilled Attackers, and Advanced ...Memory Forensics: Defeating Disk Encryption, Skilled Attackers, and Advanced ...
Memory Forensics: Defeating Disk Encryption, Skilled Attackers, and Advanced ...
 
Hta w22
Hta w22Hta w22
Hta w22
 
Symmetric Crypto for DPDK - Declan Doherty
Symmetric Crypto for DPDK - Declan DohertySymmetric Crypto for DPDK - Declan Doherty
Symmetric Crypto for DPDK - Declan Doherty
 
Linux PCI device driver
Linux PCI device driverLinux PCI device driver
Linux PCI device driver
 
Chapter22
Chapter22Chapter22
Chapter22
 
R server and spark
R server and sparkR server and spark
R server and spark
 
Notes for LX0-101 Linux
Notes for LX0-101 Linux Notes for LX0-101 Linux
Notes for LX0-101 Linux
 
Connect dell equallogic storage to linux instance
Connect dell equallogic storage to linux instanceConnect dell equallogic storage to linux instance
Connect dell equallogic storage to linux instance
 

Recently uploaded

Globus Compute wth IRI Workflows - GlobusWorld 2024
Globus Compute wth IRI Workflows - GlobusWorld 2024Globus Compute wth IRI Workflows - GlobusWorld 2024
Globus Compute wth IRI Workflows - GlobusWorld 2024
Globus
 
May Marketo Masterclass, London MUG May 22 2024.pdf
May Marketo Masterclass, London MUG May 22 2024.pdfMay Marketo Masterclass, London MUG May 22 2024.pdf
May Marketo Masterclass, London MUG May 22 2024.pdf
Adele Miller
 
Empowering Growth with Best Software Development Company in Noida - Deuglo
Empowering Growth with Best Software  Development Company in Noida - DeugloEmpowering Growth with Best Software  Development Company in Noida - Deuglo
Empowering Growth with Best Software Development Company in Noida - Deuglo
Deuglo Infosystem Pvt Ltd
 
Atelier - Innover avec l’IA Générative et les graphes de connaissances
Atelier - Innover avec l’IA Générative et les graphes de connaissancesAtelier - Innover avec l’IA Générative et les graphes de connaissances
Atelier - Innover avec l’IA Générative et les graphes de connaissances
Neo4j
 
Enhancing Research Orchestration Capabilities at ORNL.pdf
Enhancing Research Orchestration Capabilities at ORNL.pdfEnhancing Research Orchestration Capabilities at ORNL.pdf
Enhancing Research Orchestration Capabilities at ORNL.pdf
Globus
 
Graspan: A Big Data System for Big Code Analysis
Graspan: A Big Data System for Big Code AnalysisGraspan: A Big Data System for Big Code Analysis
Graspan: A Big Data System for Big Code Analysis
Aftab Hussain
 
GraphSummit Paris - The art of the possible with Graph Technology
GraphSummit Paris - The art of the possible with Graph TechnologyGraphSummit Paris - The art of the possible with Graph Technology
GraphSummit Paris - The art of the possible with Graph Technology
Neo4j
 
Providing Globus Services to Users of JASMIN for Environmental Data Analysis
Providing Globus Services to Users of JASMIN for Environmental Data AnalysisProviding Globus Services to Users of JASMIN for Environmental Data Analysis
Providing Globus Services to Users of JASMIN for Environmental Data Analysis
Globus
 
Top Features to Include in Your Winzo Clone App for Business Growth (4).pptx
Top Features to Include in Your Winzo Clone App for Business Growth (4).pptxTop Features to Include in Your Winzo Clone App for Business Growth (4).pptx
Top Features to Include in Your Winzo Clone App for Business Growth (4).pptx
rickgrimesss22
 
APIs for Browser Automation (MoT Meetup 2024)
APIs for Browser Automation (MoT Meetup 2024)APIs for Browser Automation (MoT Meetup 2024)
APIs for Browser Automation (MoT Meetup 2024)
Boni García
 
LORRAINE ANDREI_LEQUIGAN_HOW TO USE ZOOM
LORRAINE ANDREI_LEQUIGAN_HOW TO USE ZOOMLORRAINE ANDREI_LEQUIGAN_HOW TO USE ZOOM
LORRAINE ANDREI_LEQUIGAN_HOW TO USE ZOOM
lorraineandreiamcidl
 
Vitthal Shirke Java Microservices Resume.pdf
Vitthal Shirke Java Microservices Resume.pdfVitthal Shirke Java Microservices Resume.pdf
Vitthal Shirke Java Microservices Resume.pdf
Vitthal Shirke
 
A Sighting of filterA in Typelevel Rite of Passage
A Sighting of filterA in Typelevel Rite of PassageA Sighting of filterA in Typelevel Rite of Passage
A Sighting of filterA in Typelevel Rite of Passage
Philip Schwarz
 
Game Development with Unity3D (Game Development lecture 3)
Game Development  with Unity3D (Game Development lecture 3)Game Development  with Unity3D (Game Development lecture 3)
Game Development with Unity3D (Game Development lecture 3)
abdulrafaychaudhry
 
Automated software refactoring with OpenRewrite and Generative AI.pptx.pdf
Automated software refactoring with OpenRewrite and Generative AI.pptx.pdfAutomated software refactoring with OpenRewrite and Generative AI.pptx.pdf
Automated software refactoring with OpenRewrite and Generative AI.pptx.pdf
timtebeek1
 
In 2015, I used to write extensions for Joomla, WordPress, phpBB3, etc and I ...
In 2015, I used to write extensions for Joomla, WordPress, phpBB3, etc and I ...In 2015, I used to write extensions for Joomla, WordPress, phpBB3, etc and I ...
In 2015, I used to write extensions for Joomla, WordPress, phpBB3, etc and I ...
Juraj Vysvader
 
GOING AOT WITH GRAALVM FOR SPRING BOOT (SPRING IO)
GOING AOT WITH GRAALVM FOR  SPRING BOOT (SPRING IO)GOING AOT WITH GRAALVM FOR  SPRING BOOT (SPRING IO)
GOING AOT WITH GRAALVM FOR SPRING BOOT (SPRING IO)
Alina Yurenko
 
Custom Healthcare Software for Managing Chronic Conditions and Remote Patient...
Custom Healthcare Software for Managing Chronic Conditions and Remote Patient...Custom Healthcare Software for Managing Chronic Conditions and Remote Patient...
Custom Healthcare Software for Managing Chronic Conditions and Remote Patient...
Mind IT Systems
 
BoxLang: Review our Visionary Licenses of 2024
BoxLang: Review our Visionary Licenses of 2024BoxLang: Review our Visionary Licenses of 2024
BoxLang: Review our Visionary Licenses of 2024
Ortus Solutions, Corp
 
Lecture 1 Introduction to games development
Lecture 1 Introduction to games developmentLecture 1 Introduction to games development
Lecture 1 Introduction to games development
abdulrafaychaudhry
 

Recently uploaded (20)

Globus Compute wth IRI Workflows - GlobusWorld 2024
Globus Compute wth IRI Workflows - GlobusWorld 2024Globus Compute wth IRI Workflows - GlobusWorld 2024
Globus Compute wth IRI Workflows - GlobusWorld 2024
 
May Marketo Masterclass, London MUG May 22 2024.pdf
May Marketo Masterclass, London MUG May 22 2024.pdfMay Marketo Masterclass, London MUG May 22 2024.pdf
May Marketo Masterclass, London MUG May 22 2024.pdf
 
Empowering Growth with Best Software Development Company in Noida - Deuglo
Empowering Growth with Best Software  Development Company in Noida - DeugloEmpowering Growth with Best Software  Development Company in Noida - Deuglo
Empowering Growth with Best Software Development Company in Noida - Deuglo
 
Atelier - Innover avec l’IA Générative et les graphes de connaissances
Atelier - Innover avec l’IA Générative et les graphes de connaissancesAtelier - Innover avec l’IA Générative et les graphes de connaissances
Atelier - Innover avec l’IA Générative et les graphes de connaissances
 
Enhancing Research Orchestration Capabilities at ORNL.pdf
Enhancing Research Orchestration Capabilities at ORNL.pdfEnhancing Research Orchestration Capabilities at ORNL.pdf
Enhancing Research Orchestration Capabilities at ORNL.pdf
 
Graspan: A Big Data System for Big Code Analysis
Graspan: A Big Data System for Big Code AnalysisGraspan: A Big Data System for Big Code Analysis
Graspan: A Big Data System for Big Code Analysis
 
GraphSummit Paris - The art of the possible with Graph Technology
GraphSummit Paris - The art of the possible with Graph TechnologyGraphSummit Paris - The art of the possible with Graph Technology
GraphSummit Paris - The art of the possible with Graph Technology
 
Providing Globus Services to Users of JASMIN for Environmental Data Analysis
Providing Globus Services to Users of JASMIN for Environmental Data AnalysisProviding Globus Services to Users of JASMIN for Environmental Data Analysis
Providing Globus Services to Users of JASMIN for Environmental Data Analysis
 
Top Features to Include in Your Winzo Clone App for Business Growth (4).pptx
Top Features to Include in Your Winzo Clone App for Business Growth (4).pptxTop Features to Include in Your Winzo Clone App for Business Growth (4).pptx
Top Features to Include in Your Winzo Clone App for Business Growth (4).pptx
 
APIs for Browser Automation (MoT Meetup 2024)
APIs for Browser Automation (MoT Meetup 2024)APIs for Browser Automation (MoT Meetup 2024)
APIs for Browser Automation (MoT Meetup 2024)
 
LORRAINE ANDREI_LEQUIGAN_HOW TO USE ZOOM
LORRAINE ANDREI_LEQUIGAN_HOW TO USE ZOOMLORRAINE ANDREI_LEQUIGAN_HOW TO USE ZOOM
LORRAINE ANDREI_LEQUIGAN_HOW TO USE ZOOM
 
Vitthal Shirke Java Microservices Resume.pdf
Vitthal Shirke Java Microservices Resume.pdfVitthal Shirke Java Microservices Resume.pdf
Vitthal Shirke Java Microservices Resume.pdf
 
A Sighting of filterA in Typelevel Rite of Passage
A Sighting of filterA in Typelevel Rite of PassageA Sighting of filterA in Typelevel Rite of Passage
A Sighting of filterA in Typelevel Rite of Passage
 
Game Development with Unity3D (Game Development lecture 3)
Game Development  with Unity3D (Game Development lecture 3)Game Development  with Unity3D (Game Development lecture 3)
Game Development with Unity3D (Game Development lecture 3)
 
Automated software refactoring with OpenRewrite and Generative AI.pptx.pdf
Automated software refactoring with OpenRewrite and Generative AI.pptx.pdfAutomated software refactoring with OpenRewrite and Generative AI.pptx.pdf
Automated software refactoring with OpenRewrite and Generative AI.pptx.pdf
 
In 2015, I used to write extensions for Joomla, WordPress, phpBB3, etc and I ...
In 2015, I used to write extensions for Joomla, WordPress, phpBB3, etc and I ...In 2015, I used to write extensions for Joomla, WordPress, phpBB3, etc and I ...
In 2015, I used to write extensions for Joomla, WordPress, phpBB3, etc and I ...
 
GOING AOT WITH GRAALVM FOR SPRING BOOT (SPRING IO)
GOING AOT WITH GRAALVM FOR  SPRING BOOT (SPRING IO)GOING AOT WITH GRAALVM FOR  SPRING BOOT (SPRING IO)
GOING AOT WITH GRAALVM FOR SPRING BOOT (SPRING IO)
 
Custom Healthcare Software for Managing Chronic Conditions and Remote Patient...
Custom Healthcare Software for Managing Chronic Conditions and Remote Patient...Custom Healthcare Software for Managing Chronic Conditions and Remote Patient...
Custom Healthcare Software for Managing Chronic Conditions and Remote Patient...
 
BoxLang: Review our Visionary Licenses of 2024
BoxLang: Review our Visionary Licenses of 2024BoxLang: Review our Visionary Licenses of 2024
BoxLang: Review our Visionary Licenses of 2024
 
Lecture 1 Introduction to games development
Lecture 1 Introduction to games developmentLecture 1 Introduction to games development
Lecture 1 Introduction to games development
 

iSCSI introduction and usage

  • 1. iSCSI introduction and usage Zhu Lingshan lszhu@suse.com
  • 2. What is SCSI Small Computer System Interface(SCSI) is a set of standards for physically connecting and transferring data between computers and peripheral devices. The SCSI standards define commands, protocols, electrical and optical interfaces. SCSI is most commonly used for hard disk drives and tape drives, but it can connect a wide range of other devices, including scanners and CD drives, although not all controllers can handle all devices. The SCSI standard defines command sets for specific peripheral device types; the presence of "unknown" as one of these types means that in theory it can be used as an interface to almost any device, but the standard is highly pragmatic and addressed toward commercial requirements.
  • 3. What is SCSI SCSI Initiator: An endpoint that initiates a SCSI session, that is, sends a SCSI command. SCSI Target: Usually a disk or a storage array. SCSI LUN: SCSI Logical Unit Number, the “real storage”, a SCSI target should have at least one LUN: LUN0. In SCSI terminology, communication takes place between an initiator and a target. The initiator sends a command to the LUN, which then responds. SCSI commands are sent in a Command Descriptor Block (CDB).
  • 4. What is SCSI Lsscsi shows [Host:Bus:Target:LUN], device type, vendor, etc lsscsi shows SATA devices, Because SATA uses SCSI transport layer.
  • 7. What is iSCSI Carry SCSI CBD in iSCSI PDU, benefit from IP networks. Key words in iSCSI: • ISID: The initiator part of the Session Identifier. It is explicitly specified by the initiator during Login. • I_T nexus: According to [SAM2], the I_T nexus is a relationship between a SCSI Initiator Port and a SCSI Target Port. • SSID (Session ID): A session between an iSCSI initiator and an iSCSI target is defined by a session ID that is a tuple composed of an initiator part (ISID) and a target part (Target Portal Group Tag). The ISID is explicitly specified by the initiator at session establishment. The Target Portal Group Tag is implied by the initiator through the selection of the TCP endpoint at connection establishment.
  • 8. What is iSCSI, key words: • TSIH (Target Session Identifying Handle): A target assigned tag for a session with a specific named initiator. The target generates it during session establishment. Its internal format and content are not defined by this protocol, except for the value 0 that is reserved and used by the initiator to indicate a new session. • ITT(Initiator Task Tag):The Initiator Task Tag is used to identify a task during its execution even over sessions/connections. • CID: connection ID. • CmdSN: command sequence number. • ExpStatSN: The expected status number, ExpStatSN is what the initiator uses to tell the target what status response it thinks is the next one.
  • 9. What is iSCSI, key words: • StatSN:status sequence number, it is different from status also in the PDU. Responses in transit from the target to the initiator are numbered. The StatSN (Status Sequence Number) is used for this purpose. This helps the initiator detect any missing StatSN(s) and issue a SNACK for the status • ExpCmdSN: Next expected CmdSN from this initiator. • MaxCmdSN: Maximum CmdSN from this initiator
  • 14. How iSCSI carry SCSI commands 14
  • 15. Yast iSCSI target usage: discovery
  • 16. Yast iSCSI target usage: add a target
  • 17. Yast iSCSI target usage: add an initiaitor
  • 18. Yast iSCSI target usage: login authentication
  • 19. Yast iSCSI target usage: LUNs mapping
  • 21. Targetcli create backend storage • Create a backend storage with a existed file: backstores/fileio create name=iscsi_file file_or_dev=/home/lszhu/target.raw • Create a backend storage with a file not existed, while you want to create the file at the same time. backstores/fileio create name=iscsi_file file_or_dev=/home/lszhu/target.raw size=100M • Create a backend storage with a block device backstores/block/ create name=iscsi_sbc dev=/dev/sdc 21
  • 22. Targetcli create targets /> iscsi/ create iqn.2017-03.suse.com.target Created target iqn.2017-03.suse.com.target. Created TPG 1. Global pref auto_add_default_portal=true Created default portal listening on all IPs (0.0.0.0), port 3260. /> 22
  • 23. Targetcli create portals and luns • Create a portal /iscsi/iqn.20...m.target/tpg1> portals/ create ip_address=147.2.212.166 ip_port=3260 • Create a lun: /iscsi/iqn.20...m.target/tpg1> luns/ create /backstores/block/iscsi_sdc 23
  • 24. Targetcli set demo mode • Set to demo mode then every initiator can access the target without authentication /iscsi/iqn.20...m.target/tpg1> set attribute authentication=0 demo_mode_write_protect=0 generate_node_acls=1 cache_dynamic_acls=1 24
  • 25. Targetcli add an ACL An ACL means you want some specific initiators granted the access to the targets, others not. 1. /iscsi/iqn.20...m.target/tpg1> acls/ create iqn.2017-03.suse.com.lszhu.init 2. /iscsi/iqn.20...m.target/tpg1> cd acls/iqn.2017-03.suse.com.lszhu.init 3. /iscsi/iqn.20...om.lszhu.init> set auth userid=lszhu password=lszhu mutual_userid=test mutual_password=test 4. /iscsi/iqn.20...om.lszhu.init> create mapped_lun=6 tpg_lun_or_backstore=lun0 25
  • 26. Q&A