Appendix B. Keys and Values

In the following table, each keyword is described according to the following:

  • When used (Use)

    IO—Only during connection login (initialize only).

    LO—Only during the leading (first connection) login (leading only).

    FFPO—Only during full-feature phase.

    All—During login or full-feature phase.

    S—Only during security negotiation phase.

    S&O—During security negotiation phase and operational negotiation phase.

    D—Declarative: can be combined with the above; can be used in security negotiation or operational phase. Nonsecurity and nondeclarative can be used only in the operational negotiation phase.

  • Who uses it (Who)

    I—Initiator

    T—Target

    I&T—Both

  • Scope of value (Scope)

    SW—Session-wide

    CO—Connection only

  • Value or list used ...

Get iSCSI: The Universal Storage Connection now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.