Experimental steps:
(1) iSCSItarget configuration step 1 Install iscsitarget-1.4.20.2 under Linux Step 2 Modify the configuration /etc/ietd.conf to map the RAID logical volume to iSCSI Target LUN0 Step 3 (Heavy) Start /etc/init.d/iscsi-target and view the port Step 4 Install the configuration of the initiator under Windows Step 5 View the experimental results (2) Multi-LUN experiment and then create some new hard disks to create RAID, modify the configuration /etc/ietd.conf, New RAID mapping for iSCSI Target LUN1 Introduction to iSCSI: iSCSI is the abbreviation of internet Small Computer System Interface, also known as IP-SAN. It is a storage technology based on Internet and SCSI-3 protocol, proposed by IETF, and in 2003. February 11 became the official standard. The purpose of iSCSI is to connect storage devices together using the IP protocol. By transmitting SCSI commands and data over IP networks, iSCSI facilitates the transfer of data between networks, while also facilitating remote management of data. Due to its excellent data transfer capabilities, the iSCSI protocol is considered to be one of the key factors driving the rapid growth of the storage area network (SAN) market. Because of the widespread use of IP networks, iSCSI can transfer data over LANs, WANs, and even the Internet, making data storage no longer geographically present. The core of iSCSI technology is to transmit SCSI protocol on TCP/IP network, that is, to encapsulate SCSI packets by using TCP/IP packets and iSCSI packets, so that SCSI commands and data can be transmitted on a common Ethernet network, as shown in the following figure. The working process of iSCSI: When the iSCSI host application issues a data read and write request, the operating system generates a corresponding SCSI command, which is encapsulated into an ISCSI message packet at the iSCSI initiator layer and transmitted to the device side through TCP/IP. The iSCSI target layer on the device side unpacks the iSCSI message packet and obtains the contents of the SCSI command, which is then transmitted to the SCSI device for execution. The device's response after executing the SCSI command is encapsulated into an ISCSI response PDU when passing through the iSCSI target layer on the device side. The TCP/IP network transmits to the ISCSI initiator layer of the host, and the iSCSI initiator parses the SCSI response from the ISCSI response PDU and transmits it to the operating system, which then responds to the application. Iet (iSCSI Enterprise Target) is an iSCSI Target implementation under Linux. Open-iscsi is an iscsi initiator implementation under Linux. It can be easily implemented using iet (official website: http://iscsitarget.sourceforge.net) and open-iscsi. Simple IPSAN, and iet can also be used with other system's iscsi initiator. Here we experiment with windows to connect to linux. The final effect: Under the windows can see the Linux server "shared" file devices or block devices, can be used as a cost of the hard disk, in fact, the data is stored in linux. Experimental steps: 1. Install iscsitarget-1.4.20.2.tar.gz under linux tar -zvxf iscsitarget-1.4.20.2.tar.gz cd iscsitarget-1.4.20.2 make && make install 2. Modify the configuration file /etc /iet/iet.conf Introduction to iet before configuration: iet basic configuration iet mainly includes the following configuration files (the priority of control files is similar to tcp_wrappers). /etc/iet/ietd.conf : The main configuration file for iet /etc/iet/initiators.allow: Controls the access rights of the initiator to the target. /etc/iet/initiators.deny: Controls the access rights of the initiator to the target. /etc/iet/targets.allow: Controls the access rights of different targets. To implement the basic functions of the iSCSI Target through iet, you need to complete the following two configurations. Name the iSCSI Target. The name should be unique within the same subnet. Add the following content to the /etc/iet/ietd.conf file to implement iSCSI Target naming. Target target name where: target name: is the iSCSI target name. The general iSCSI Target naming uses the format of “iqn.yyyy-mm.<reversed domain name>: identifier to identify the code”. Map block devices, files, LVM volumes, and RAID volumes as block devices to the iSCSI initiator. Add the following content to the /etc/iet/ietd.conf file to implement block device mapping. Lun <lunID> Path=<device>,Type=fileio
What should I do if the u disk file cannot be copied? I believe that many users have encountered thi
The win2008 system is the only one that is comparable to the security and stability of the 2003 syst
Recently, many users have noticed that the computer has a blue screen after reflecting the reinstall
WeChat has become one of the hottest social software available today. When you log in to the WeChat
Process photos to 20k or less with ImageMagic
How to recover 360 deleted files?
0x8DDD0018 error problem solution
How xcopy copies local files to remote servers
Several common computer screen capture shortcuts?
How to forget the power-on password
Little-known hacker attack computer program
Remove admin rights to block 92% of Windows vulnerabilities
WinME does not automatically shut down
Legacy files after software uninstallation
Use the registry to modify the Win7/Win8 hard disk partition name
Solve the problem of download delay with IE8 under Win 7
Experts easily set the cheats of win8 account password
Win10 system file display mode settings to display pictures with more details
Exciting: WinRAR application latest cheats
Vista's Ping tells you the IPv6 form of the local address.
Why Microsoft "sacrifices" XBox one to push Win10 store
WinXP appears to delay write failure error