6. Text Commands and Keyword Processing

To the Reader

Image

This chapter contains very detailed information concerning how text commands and key=value pairs are negotiated. If you are not interested in the details of this process, skip to the chapter summary.

The iSCSI protocol includes a method to send non-SCSI commands from the initiator to the target. It also has a technique for negotiating values between the two sides. This is the same process and negotiating routine that is part of the login process—even the syntax is the same. (See Chapter 5, the section Keywords and the Login Process.)

Text Requests and Responses

The Text Request ...

Get iSCSI: The Universal Storage Connection now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.