The iSCSI Enterprise Target (IET) program is a Linux software solution that enables you to turn a Linux server into an iSCSI target, meaning a storage server accessible via the iSCSI protocol. It is designed to meet enterprise storage needs by providing flexible and efficient management of shared network storage volumes.
With IET, you can create, modify, or delete iSCSI targets and storage volumes in real time. The program allows you to assign unique identifiers to targets, configure paths to storage devices (physical disks or files), and manage connection sessions from iSCSI initiators. This dynamic management facilitates administration and reconfiguration without needing to stop the service.
IET lets you restrict access to targets through authentication settings, including defining authorized users (IncomingUser and OutgoingUser). You can finely control which iSCSI initiators are allowed to connect to each target, thus enhancing security on your storage network.
The program runs natively under Linux (requiring at least kernel 2.6) without kernel modifications, making deployment and integration into varied environments straightforward. Administration is performed through dedicated command-line tools, especially `ietadm`, which enables you to control the service and adapt configurations to your needs in real time.
In summary, iSCSI Enterprise Target is a flexible and secure tool to configure a Linux server as an iSCSI target, offering dynamic resource management, enterprise-grade access control, and native Linux compatibility, which are essential for system administration and virtualization contexts.
To install an iSCSI server, you will need these packages : iscsitarget-dkms (the kernel) et iscsitarget (tools).
For more information about the installation of the iSCSI server and an iSCSI client, see the tutorial listed below.
Pinned content
Contact
® InformatiWeb-Pro.net - InformatiWeb.net 2008-2022 - © Lionel Eppe - All rights reserved.
Total or partial reproduction of this site is prohibited and constitutes an infringement punishable by articles L.335-2 and following of the intellectual property Code.