亚洲欧美第一页_禁久久精品乱码_粉嫩av一区二区三区免费野_久草精品视频

? 歡迎來到蟲蟲下載站! | ?? 資源下載 ?? 資源專輯 ?? 關于我們
? 蟲蟲下載站

?? rfc4018.txt

?? 一個學習iSCSI協議的文檔
?? TXT
?? 第 1 頁 / 共 4 頁
字號:

   1.  If an SLP DA is found, the SA contacts the DA and registers the
       service advertisement.  Whether or not one or more SLPv2 DAs are
       discovered, the SA maintains the advertisement itself and answers
       multicast UA queries directly.

   2.  When the iSCSI initiator requires contact information for an
       iSCSI target, the UA either contacts the DA by using unicast or
       the SA by using multicast.  If a UA is configured with the
       address of the SA, it may avoid multicast and may contact an SA



Bakke & Hufferd             Standards Track                     [Page 6]

RFC 4018                    iSCSI and SLPv2                   April 2005


       by using unicast.  The UA includes a query based on the
       attributes to indicate the characteristics of the target(s) it
       requires.

   3.  Once the UA has the host name or address of the iSCSI server, as
       well as the port number and iSCSI Target Name, it can begin the
       normal iSCSI login to the target.

   As information contained in the iSCSI target template may exceed
   common network datagram sizes, the SLP implementation for both UAs
   and SAs supporting this template MUST implement SLP over TCP.

4.1.1.  Finding Targets Based on Initiator Credentials

   To be allowed access to an iSCSI target, an initiator must be
   authenticated.  The initiator may be required by the target to
   produce one or more of the following credentials:

   - An iSCSI Initiator Name

   - An IP address

   - A CHAP, SRP, or Kerberos credential

   - Any combination of the above

   Most iSCSI targets allow access to only one or two initiators.  In
   the ideal discovery scenario, an initiator would send an SLP request
   and receive responses ONLY for targets to which the initiator is
   guaranteed a successful login.  To achieve this goal, the iSCSI
   target template contains the following attributes, each of which
   allows a list of values:

   1.  auth-name:  This attribute contains the list of initiator names
       allowed to access this target, or the value "any", indicating
       that no specific initiator name is required.

   2.  auth-addr:  This attribute contains the list of host names
       and/or IP addresses that will be allowed access to this target,
       or the value "any", indicating that no specific address or
       host name is required.  If a large number of addresses is to
       be allowed (perhaps a subnet), this attribute may contain the
       value "any".








Bakke & Hufferd             Standards Track                     [Page 7]

RFC 4018                    iSCSI and SLPv2                   April 2005


   3.  auth-cred:  This attribute contains a list of "method/identifier"
       credentials that will be allowed access to the target, provided
       they can produce the correct password or other verifier during
       the login process.  If no specific credentials are required, the
       value "any" is used.

   The list of valid method strings for auth-cred are defined in
   [RFC3720], section 11.1, "AuthMethod".  The identifier used after the
   "/" is defined by the specific AuthMethod, also in [RFC3720].
   Examples showing initiator searches based on auth-xxxx attributes are
   shown in the target-specific template section below.

   Also note that the auth-xxxx attributes are considered security
   policy information.  If these attributes are distributed, IPsec MUST
   be implemented as specified in the Security Implementation section
   below.

4.1.2.  Supporting Access by Multiple Identities to the Same Target

   If a target is to allow access to multiple host identities, more than
   one combination of auth-xxxx attributes will have to be allowed.  In
   some of these cases, it is not possible to express the entire set of
   valid combinations of auth-xxxx attributes within a single registered
   service URL.  For example, if a target can be addressed by

      auth-name=myhost1 AND auth-cred=CHAP/user1      (identity1)

   OR

      auth-name-myhost2 AND auth-cred=CHAP/user2      (identity2)

   the above cannot be specified in a single registered service URL,
   since (auth-name=myhost1, auth-name=myhost2, auth-cred=CHAP/user1,
   auth-cred=CHAP/user2) would allow either auth-name to be used with
   either auth-cred.  This necessitates the ability to register a target
   and address under more than one service URL; one for (identity1) and
   one for (identity2).

   Because service URLs must be unique, (identity1) and (identity2) must
   each be registered under a unique service URL.  For systems that
   support the configuration of multiple identities to access a target,
   the service URL must contain an additional, opaque string defining
   the identity.  This appears after the iSCSI name in the URL string
   and is separated by a "/".  Each registered (target-address, target-
   name, initiator-identity) tuple can then register a set of auth-xxxx
   attributes.





Bakke & Hufferd             Standards Track                     [Page 8]

RFC 4018                    iSCSI and SLPv2                   April 2005


4.1.3.  Using SLP in a Non-multicast Environment

   In some networks, the use of multicast for discovery purposes is
   either unavailable or not allowed.  These include public or service-
   provider networks that are placed between an iSCSI client and a
   server.  These are probably most common between two iSCSI gateways,
   one at a storage service provider site, and one at a customer site.

   In these networks, an initiator may allow the addresses of one or
   more SAs to be configured instead of or in addition to its DA
   configuration.  The initiator would then make unicast SLP service
   requests directly to these SAs, without the use of multicast to
   discover them first.

   This functionality is well within the scope of the current SLP
   protocol.  The main consequence for implementors is that an initiator
   configured to make direct unicast requests to an SA will have to add
   this to the SLP API, if it is following the service location API
   defined in [RFC2614].

4.2.  Discovering Storage Management Services with SLP

   Storage management servers can be built to manage and control access
   to targets in a variety of ways.  They can provide extended services
   beyond discovery, which could include storage allocation and
   management.  None of these services are defined here; the intent of
   this document is to allow these services to be discovered by both
   clients and servers, in addition to the target discovery already
   being performed.

   The following drawing shows an iSCSI client, an iSCSI server, and a
   storage management server.  To simplify the drawing, the second IP
   network is not shown but is assumed to exist.  The storage management
   server would use its own protocol (smsp) to provide capabilities to
   iSCSI clients and servers; these clients and servers can both use SLP
   to discover the storage management server.















Bakke & Hufferd             Standards Track                     [Page 9]

RFC 4018                    iSCSI and SLPv2                   April 2005


      +---------------------------+
      |         iSCSI Client      |
      |                           |
      |       +-----------+       |
      |       | iSCSI     |       |
      |       | initiator |       |
      |       +-----------+       |
      |                           |
      +---------------+------+----+      +------------+
      | iSCSI Driver  | smsp | UA |      |  SLP DA    |
      +---------------+------+----+      |            |
      |        TCP/UDP/IP         |      | (optional) |
      +---------------+------+----+      +------------+
               |                               |
               |   IP Network                  |
           ------------------------------------------
               |                          |
               |                          |
      +---------------+-----------+     +---------------------+
      |        TCP/UDP/IP         |     | TCP/UDP/IP          |
      +---------------+------+----+     +---------------------+
      | iSCSI Driver  | smsp | UA |     |   SA    |   smsp    |
      +---------------+------+----+     +---------------------+
      |                           |     |                     |
      | +--------+ +--------+     |     | storage mgmt server |
      | | iSCSI  | | iSCSI  |     |     |                     |
      | | target | | target |     |     +---------------------+
      | |   1    | |   2    |     |
      | +--------+ +--------+     |
      |                           |
      |     iSCSI Server          |
      +---------------------------+

   Note the difference between the storage management server model and
   the previously defined target discovery model.  When target discovery
   was used, the iSCSI Server implemented an SA, to be discovered by the
   initiator's UA.  In the storage management server model, the iSCSI
   clients and servers both implement UAs, and the management server
   implements the SA.

   A storage management server's URL contains the domain name or IP
   address and TCP or UDP port number.  No other information is
   required.

   The storage management server constructs a service advertisement of
   the type "service:iscsi:sms" for each of the addresses at which it
   appears.  The advertisement contains the URL and a lifetime, along
   with other attributes that are defined in the service template.



Bakke & Hufferd             Standards Track                    [Page 10]

RFC 4018                    iSCSI and SLPv2                   April 2005


   The remainder of the discovery procedure is identical to that used to
   discover iSCSI targets, except that both initiators and targets would
   normally be "clients" of the storage management service.

   Targets that support a storage management service implement a UA in
   addition to the SA.  A target may alternatively just implement the UA
   and allow the storage management service to advertise its targets
   appropriately by providing an SA and registering the appropriate
   service:iscsi:target registrations on the target's behalf: The target
   device would not have to advertise its own targets.  This has no
   impact on the initiator.

   This allows the initiators' discovery of targets to be completely
   interoperable regardless of which storage management service is used,
   or whether one is used at all, or whether the target registrations
   are provided directly by the target or by the management service.

4.3.  Internationalization Considerations

   SLP allows internationalized strings to be registered and retrieved.
   Attributes in the template that are not marked with an 'L' (literal)
   will be registered in a localized manner.  An "en" (English)
   localization MUST be registered, and others MAY be registered.

   Attributes that include non-ASCII characters will be encoded by using
   UTF-8, as discussed in [RFC3722] and [RFC3491].

5.  iSCSI SLP Templates

   Three templates are provided: an iSCSI target template, a management
   service template, and an abstract template to encapsulate the two.

5.1.  The iSCSI Abstract Service Type Template

   This template defines the abstract service "service:iscsi".  It is
   used as a top-level service to encapsulate all other iSCSI-related
   services.

   Name of submitter: Mark Bakke
   Language of service template: en
   Security Considerations: See section 6.

   Template Text:
   -------------------------template begins here-----------------------
   template-type=iscsi
   template-version=1.0

   template-description=



Bakke & Hufferd             Standards Track                    [Page 11]

RFC 4018                    iSCSI and SLPv2                   April 2005


     This is an abstract service type.  The purpose of the iscsi
     service type is to encompass all of the services used to support
     the iSCSI protocol.

   template-url-syntax=
     url-path=  ;  Depends on the concrete service type.

   --------------------------template ends here------------------------

5.2.  The iSCSI Target Concrete Service Type Template

   This template defines the service "service:iscsi:target".  An entity
   containing iSCSI targets that wishes them discovered via SLP would
   register each of them, with each of their addresses, as this service
   type.

   Initiators (and perhaps management services) wishing to discover
   targets in this way will generally use one of the following queries:

   1. Find a specific target, given its iSCSI Target Name:

        Service: service:iscsi:target
        Scope:   initiator-scope-list
        Query:   (iscsi-name=iqn.2001-04.com.example:sn.456)

?? 快捷鍵說明

復制代碼 Ctrl + C
搜索代碼 Ctrl + F
全屏模式 F11
切換主題 Ctrl + Shift + D
顯示快捷鍵 ?
增大字號 Ctrl + =
減小字號 Ctrl + -
亚洲欧美第一页_禁久久精品乱码_粉嫩av一区二区三区免费野_久草精品视频
久久成人免费电影| 欧美午夜宅男影院| 欧美综合色免费| 精品久久人人做人人爽| 中文字幕中文乱码欧美一区二区| 亚洲一区二区视频在线| 成人爱爱电影网址| 日韩免费看的电影| 亚洲小说欧美激情另类| 成人网男人的天堂| 欧美成人国产一区二区| 亚洲一区二区精品久久av| 国产福利一区在线| 91精品在线一区二区| 亚洲欧美日韩国产综合在线 | 欧美日韩一区二区在线观看视频 | 亚洲制服欧美中文字幕中文字幕| 国产电影一区在线| 欧美哺乳videos| 亚洲成人免费看| 色呦呦日韩精品| 1区2区3区精品视频| 国内一区二区在线| 精品国产免费一区二区三区香蕉| 图片区日韩欧美亚洲| 91久久线看在观草草青青| 国产精品国产三级国产普通话三级 | 亚洲影视资源网| 91国内精品野花午夜精品| 日韩美女精品在线| 91美女福利视频| 中文字幕在线观看一区| 国产91精品精华液一区二区三区| 精品久久久久久最新网址| 免费成人在线视频观看| 欧美电影免费观看高清完整版| 肉色丝袜一区二区| 91精品国产综合久久精品| 亚洲一区二区三区三| 欧美三级视频在线播放| 偷窥少妇高潮呻吟av久久免费| 欧美精品亚洲二区| 久久精品国产亚洲a| 26uuu精品一区二区三区四区在线| 久久国产剧场电影| 国产欧美日产一区| 91影视在线播放| 亚洲超碰精品一区二区| 日韩欧美一二区| 国产99久久久国产精品潘金| 亚洲欧洲性图库| 欧美丝袜第三区| 美女视频黄频大全不卡视频在线播放| 日韩欧美一二三| 99在线热播精品免费| 亚洲午夜精品在线| 精品国产百合女同互慰| 国产999精品久久| 亚洲一二三区在线观看| 欧美一区二区三区的| 成人激情视频网站| 偷拍与自拍一区| 中日韩免费视频中文字幕| 色噜噜久久综合| 另类欧美日韩国产在线| 中文字幕欧美激情一区| 欧美专区亚洲专区| 久久电影网站中文字幕| 国产精品成人一区二区三区夜夜夜 | 精品在线播放免费| 综合精品久久久| 日韩欧美国产高清| 色老汉av一区二区三区| 麻豆免费精品视频| 一区二区欧美精品| 久久久精品免费网站| 色999日韩国产欧美一区二区| 日韩和欧美的一区| 亚洲精品国久久99热| 精品国产网站在线观看| 欧美撒尿777hd撒尿| 国产成人精品一区二| 午夜一区二区三区在线观看| 欧美极品少妇xxxxⅹ高跟鞋| 欧美久久久久久久久| 成人一二三区视频| 久久激情综合网| 一区二区三区四区在线播放| 久久无码av三级| 欧美日韩国产欧美日美国产精品| 国产99久久久国产精品免费看 | 欧美日韩视频在线一区二区| 国产成人精品亚洲午夜麻豆| 日本欧美一区二区在线观看| 综合久久一区二区三区| 久久精品夜夜夜夜久久| 日韩你懂的在线播放| 精品婷婷伊人一区三区三| 一本一道久久a久久精品| 国产精品538一区二区在线| 麻豆高清免费国产一区| 亚洲国产精品自拍| 中文字幕一区二区三区在线观看| xfplay精品久久| 精品免费一区二区三区| 欧美一区二区私人影院日本| 色偷偷一区二区三区| 色狠狠av一区二区三区| 91在线观看污| 91美女在线观看| 日本韩国精品在线| 欧洲生活片亚洲生活在线观看| 99精品久久久久久| 高清beeg欧美| 成人激情图片网| 一本色道久久综合狠狠躁的推荐| 99国产精品国产精品久久| 成人av小说网| 一本色道亚洲精品aⅴ| 91蝌蚪porny成人天涯| 91美女在线看| 欧美日韩日日夜夜| 欧美成人一区二区三区在线观看| 欧美一卡二卡三卡| 26uuu亚洲| 中文字幕av一区二区三区高 | caoporn国产一区二区| 97精品久久久午夜一区二区三区| 99精品视频在线免费观看| 99vv1com这只有精品| 色狠狠av一区二区三区| 欧美精品18+| 精品国产露脸精彩对白| 日本一区二区三区视频视频| 中文字幕一区二区三区av| 一区二区在线观看免费| 日本亚洲一区二区| 国产成人午夜电影网| 91免费看视频| 欧美一区二区三区电影| 欧美国产国产综合| 亚洲一区二区三区视频在线 | 日韩视频在线观看一区二区| 精品国产91乱码一区二区三区| 国产日韩欧美高清在线| 综合网在线视频| 免费成人av在线| 97成人超碰视| 日韩小视频在线观看专区| 国产精品理论片| 亚洲高清视频的网址| 国产乱码字幕精品高清av| 一本色道a无线码一区v| 欧美一二三四在线| 亚洲天堂av老司机| 麻豆成人av在线| 91免费版在线| 日韩精品中文字幕在线不卡尤物 | 久久久蜜桃精品| 亚洲精品成a人| 国产精品一区二区三区乱码| 欧美午夜在线观看| 中文字幕不卡一区| 久久99热国产| 欧美亚洲综合网| 最新不卡av在线| 韩国女主播一区| 在线播放视频一区| 亚洲码国产岛国毛片在线| 激情综合色综合久久| 欧美丝袜丝nylons| 日韩美女视频一区| 成人动漫一区二区| 26uuu色噜噜精品一区| 日本中文在线一区| 欧美视频日韩视频在线观看| 亚洲国产高清在线| 国产一区二区三区高清播放| 欧美精品久久一区二区三区| 国产欧美日韩卡一| 国产乱理伦片在线观看夜一区| 欧美日韩一区二区三区视频| 综合欧美一区二区三区| 国产高清在线观看免费不卡| 精品国产一区二区国模嫣然| 日韩国产成人精品| 欧美美女激情18p| 亚洲精品v日韩精品| 色综合亚洲欧洲| 亚洲欧美偷拍卡通变态| 成人av网站在线观看| 国产午夜精品一区二区三区四区| 美女网站色91| 精品成人一区二区三区| 久久激五月天综合精品| 欧美精品一区二区三区高清aⅴ| 日韩av电影天堂| 日韩欧美卡一卡二| 国产在线精品一区二区夜色| 欧美一区二区性放荡片|