Appendix B. Keys and Values
In the following table, each keyword is described according to the following:
When used (Use)
IO—Only during connection login (initialize only).
LO—Only during the leading (first connection) login (leading only).
FFPO—Only during full-feature phase.
All—During login or full-feature phase.
S—Only during security negotiation phase.
S&O—During security negotiation phase and operational negotiation phase.
D—Declarative: can be combined with the above; can be used in security negotiation or operational phase. Nonsecurity and nondeclarative can be used only in the operational negotiation phase.
Who uses it (Who)
I—Initiator
T—Target
I&T—Both
Scope of value (Scope)
SW—Session-wide
CO—Connection only
Value or list used ...
Get iSCSI: The Universal Storage Connection now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.