The iSCSI target fabric is included since Linux 3.1.
The important kernel modules are target_core_mod and iscsi_target_mod, which should be in the kernel and loaded automatically.
It is highly recommended to use the free branch versions of the packages:AUR, AUR and AUR.
target.service, included in AUR, to load necessary modules, mount the configfs and load previously saved iSCSI target configuration.
targetcli status as root to see some information about the running configuration.
You can use targetcli to create the whole configuration, see.
The config shell creates most names and numbers for you automatically, but you can also provide your own settings.
At any point in the shell you can type
help in order to see what commands you can issue here.
cdto view & select paths.
After starting the target (see above) you enter the configuration shell with
In this shell you include a block device (here:
/dev/disk/by-id/md-name-nas:iscsi) to use with
/> cd backstores/block /backstores/block> create md_block0 /dev/disk/by-id/md-name-nas:iscsi
You then create an iSCSI Qualified Name (IQN) and a target portal group (TPG) with:
...> cd /iscsi /iscsi> create
createyou can keep targetcli from automatically creating an IQN.
In order to tell LIO that your block device should get used as backstore for the target you issue
cdto select the path of your <iqn>/tpg1
.../tpg1> cd luns .../tpg1/luns> create /backstores/block/md_block0
Then you need to create a portal, making a daemon listen for incoming connections:
.../luns/lun0> cd ../../portals .../portals> create
Targetcli will tell you the IP and port where LIO is listening for incoming connections (defaults to 0.0.0.0 (all)). You will need at least the IP for the clients. The port should be the standard port 3260.
In order for a client/initiator to connect you need to include the IQN of the initiator in the target configuration:
...> cd ../../acls .../acls> create iqn.2005-03.org.open-iscsi:SERIAL
iqn.2005-03.org.open-iscsi:SERIAL you use the IQN of an initiator.
It can normally be found in
You have to do this for every initiator that needs to connect.
Targetcli will automatically map the created LUN to the newly created ACL.
help createat this point in the targetcli shell.
The last thing you have to do in targetcli when everything works is saving the configuration with:
...> cd / /> saveconfig
The will the configuration in
You can now safely start and stop
target.service without losing your configuration.
saveconfigand also clear a configuration with
Authentication per CHAP is enabled per default for your targets. You can either setup passwords or disable this authentication.
Navigate targetcli to your target (i.e. /iscsi/iqn.../tpg1) and:
.../tpg1> set attribute authentication=0
Navigate to a certain ACL of your target (i.e. /iscsi/iqn.../tpg1/acls/iqn.../) and
...> get auth
will show you the current authentication credentials.
...> set auth userid=<username in target> ...> set auth password=<password in target> ...> set auth mutual_userid=<username in initiator> (optional) ...> set auth mutual_password=<password in initiator> (optional)
The first two fields are the username and password of the target. The initiator will use this to log into the target. The last two fields (prefixed with "mutual_") are the username and password of the initiators (note that all initiators will have the same username and password). These two are optional parameters and it ensures that initiators will only accept connections from permitted targets.
Tips & Tricks
targetcli sessionsyou can list the current open sessions.