1e25c779eSMatthew Dillon.\" Copyright (c) 2007-2008 Daniel Braniss <danny@cs.huji.ac.il> 2e25c779eSMatthew Dillon.\" All rights reserved. 3e25c779eSMatthew Dillon.\" 4e25c779eSMatthew Dillon.\" Redistribution and use in source and binary forms, with or without 5e25c779eSMatthew Dillon.\" modification, are permitted provided that the following conditions 6e25c779eSMatthew Dillon.\" are met: 7e25c779eSMatthew Dillon.\" 1. Redistributions of source code must retain the above copyright 8e25c779eSMatthew Dillon.\" notice, this list of conditions and the following disclaimer. 9e25c779eSMatthew Dillon.\" 2. Redistributions in binary form must reproduce the above copyright 10e25c779eSMatthew Dillon.\" notice, this list of conditions and the following disclaimer in the 11e25c779eSMatthew Dillon.\" documentation and/or other materials provided with the distribution. 12e25c779eSMatthew Dillon.\" 13e25c779eSMatthew Dillon.\" THIS SOFTWARE IS PROVIDED BY THE AUTHOR AND CONTRIBUTORS ``AS IS'' AND 14e25c779eSMatthew Dillon.\" ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE 15e25c779eSMatthew Dillon.\" IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE 16e25c779eSMatthew Dillon.\" ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHOR OR CONTRIBUTORS BE LIABLE 17e25c779eSMatthew Dillon.\" FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL 18e25c779eSMatthew Dillon.\" DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS 19e25c779eSMatthew Dillon.\" OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) 20e25c779eSMatthew Dillon.\" HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT 21e25c779eSMatthew Dillon.\" LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY 22e25c779eSMatthew Dillon.\" OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF 23e25c779eSMatthew Dillon.\" SUCH DAMAGE. 24e25c779eSMatthew Dillon.\" 25ef8e7823SSascha Wildner.\" $FreeBSD: src/sbin/iscontrol/iscontrol.8,v 1.3 2008/11/25 07:17:11 scottl Exp $ 26e25c779eSMatthew Dillon.\" 27*0b674f74SSascha Wildner.Dd September 29, 2016 28e25c779eSMatthew Dillon.Dt ISCONTROL 8 29e25c779eSMatthew Dillon.Os 30e25c779eSMatthew Dillon.Sh NAME 31e25c779eSMatthew Dillon.Nm iscontrol 32e25c779eSMatthew Dillon.Nd login/negotiator/control for an iSCSI initiator session 33e25c779eSMatthew Dillon.Sh SYNOPSIS 34e25c779eSMatthew Dillon.Nm 35e53224f8SThomas Nikolajsen.Op Fl dv 36e53224f8SThomas Nikolajsen.Op Fl c Ar file 37e25c779eSMatthew Dillon.Op Fl n Ar nickname 38e25c779eSMatthew Dillon.Op Fl t Ar target 39e53224f8SThomas Nikolajsen.Op Ar variable Ns = Ns Ar value ... 40e25c779eSMatthew Dillon.Sh DESCRIPTION 41e25c779eSMatthew DillonInternet SCSI (iSCSI) is a network protocol standard, that allows the 42e53224f8SThomas Nikolajsenuse of the SCSI protocol over TCP/IP networks, the 43e25c779eSMatthew Dillon.Nm 44e25c779eSMatthew Dillonprogram is the userland side of an iSCSI session, see 45e25c779eSMatthew Dillon.Xr iscsi_initiator 4 . 46e53224f8SThomas NikolajsenIt has two modes of operation, if 47e53224f8SThomas Nikolajsen.Fl d 48e53224f8SThomas Nikolajsen(discovery session) is specified, 49e25c779eSMatthew Dillonit will print out the 50e25c779eSMatthew Dillon.Em target names 51e25c779eSMatthew Dillonreturned by the target and exit. 52e25c779eSMatthew DillonIn the second mode, it will, after a successful login/negotiation, run 53e25c779eSMatthew Dillonin daemon mode, monitoring the connection, and will try to reconnect 54e25c779eSMatthew Dillonin case of a network/target failure. 55e25c779eSMatthew DillonIt will terminate/logout the session 56e25c779eSMatthew Dillonwhen a SIGHUP signal is received. 57e25c779eSMatthew DillonThe flags are as follows: 58e25c779eSMatthew Dillon.Bl -tag -width variable=value 59e25c779eSMatthew Dillon.It Fl c Ar file 60e25c779eSMatthew Dillona file containing configuration 61e25c779eSMatthew Dillon.Em key-options , 62e25c779eSMatthew Dillonsee 63e53224f8SThomas Nikolajsen.Xr iscsi.conf 5 . 64e53224f8SThomas NikolajsenDefault is 65e53224f8SThomas Nikolajsen.Pa /etc/iscsi.conf 66e53224f8SThomas Nikolajsen.It Fl d 67e53224f8SThomas Nikolajsendo a 68e53224f8SThomas Nikolajsen.Em discovery session 69e53224f8SThomas Nikolajsenand exit. 70e25c779eSMatthew Dillon.It Fl n Ar nickname 71e53224f8SThomas Nikolajsensearch for the block named 72e53224f8SThomas Nikolajsen.Ar nickname 73e53224f8SThomas Nikolajsenin the configuration file 74e53224f8SThomas Nikolajsen.Fl ( c ) , 75e53224f8SThomas Nikolajsensee 76e53224f8SThomas Nikolajsen.Xr iscsi.conf 5 . 77e25c779eSMatthew Dillon.It Fl t Ar target 78e53224f8SThomas Nikolajsenis the target's IP address or name. 79e53224f8SThomas Nikolajsen.It Fl v 80e53224f8SThomas Nikolajsenverbose mode. 81e25c779eSMatthew Dillon.It Ar variable Ns = Ns Ar value 82e25c779eSMatthew Dillonsee 83e25c779eSMatthew Dillon.Xr iscsi.conf 5 84e25c779eSMatthew Dillonfor the complete list of variables/options and their 85e25c779eSMatthew Dillonpossible values. 86e25c779eSMatthew Dillon.El 87e53224f8SThomas Nikolajsen.Sh FILES 88e53224f8SThomas Nikolajsen.Bl -tag -width /etc/iscsi.conf -compact 89e53224f8SThomas Nikolajsen.It Pa /etc/iscsi.conf 90e53224f8SThomas Nikolajsendefault configuration file 91e53224f8SThomas Nikolajsen.El 92e25c779eSMatthew Dillon.Sh EXAMPLES 93e25c779eSMatthew Dillon.Dl iscontrol -dt myiscsitarget 94e25c779eSMatthew Dillon.Pp 95e25c779eSMatthew Dillonwill start a 96e25c779eSMatthew Dillon.Em discovery session 97e25c779eSMatthew Dillonwith the target and 98e25c779eSMatthew Dillonprint to stdout the list of available targetnames/targetadresses. 99e25c779eSMatthew DillonNote: this listing does not necessarily mean availability, since 100e25c779eSMatthew Dillondepending on the target configuration, a discovery session might 101e25c779eSMatthew Dillonnot need login/access permission, but a 102e25c779eSMatthew Dillon.Em full session 103e25c779eSMatthew Dilloncertainly does. 10498c3344bSSascha Wildner.Pp 105e53224f8SThomas Nikolajsen.Dl iscontrol -c myiscsi.conf -n myiscsi 106e25c779eSMatthew Dillon.Pp 107e25c779eSMatthew Dillonwill read options from 108e53224f8SThomas Nikolajsen.Pa myiscsi.conf , 109e25c779eSMatthew Dillonuse the targetaddress 110e25c779eSMatthew Dillonfound in the block nicknamed myiscsi, login and negotiate 111e25c779eSMatthew Dillonwhatever options are specified, and start an iscsi-session. 112e25c779eSMatthew Dillon.Sh SEE ALSO 113e25c779eSMatthew Dillon.Xr da 4 , 114e25c779eSMatthew Dillon.Xr iscsi_initiator 4 , 115e25c779eSMatthew Dillon.Xr sa 4 , 116e25c779eSMatthew Dillon.Xr iscsi.conf 5 , 117e25c779eSMatthew Dillon.Xr camcontrol 8 118e25c779eSMatthew Dillon.Sh STANDARDS 119e25c779eSMatthew DillonRFC 3720 120*0b674f74SSascha Wildner.Sh HISTORY 121*0b674f74SSascha WildnerThe 122*0b674f74SSascha Wildner.Nm 123*0b674f74SSascha Wildnerutility appeared in 124*0b674f74SSascha Wildner.Fx 7.0 . 125*0b674f74SSascha Wildner.Nm 126*0b674f74SSascha Wildnerutility first appeared in 127*0b674f74SSascha Wildner.Dx 2.3 . 128e25c779eSMatthew Dillon.Sh BUGS 129e25c779eSMatthew DillonNot all functions/specifications have been implemented yet, noticeably 130e25c779eSMatthew Dillonmissing are the Task Management Functions. 131e25c779eSMatthew DillonThe error recovery, though not 132e25c779eSMatthew Dillon.Em fully compliant 133e25c779eSMatthew Dillondoes a brave effort to recover from network disconnects. 134