O'Reilly logo

iSCSI: The Universal Storage Connection by John L. Hufferd

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Appendix B. Keys and Values

In the following table, each keyword is described according to the following:

  • When used (Use)

    IO—Only during connection login (initialize only).

    LO—Only during the leading (first connection) login (leading only).

    FFPO—Only during full-feature phase.

    All—During login or full-feature phase.

    S—Only during security negotiation phase.

    S&O—During security negotiation phase and operational negotiation phase.

    D—Declarative: can be combined with the above; can be used in security negotiation or operational phase. Nonsecurity and nondeclarative can be used only in the operational negotiation phase.

  • Who uses it (Who)

    I—Initiator

    T—Target

    I&T—Both

  • Scope of value (Scope)

    SW—Session-wide

    CO—Connection only

  • Value or list used ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required