Monitoring Iscsi Traffic Flows; Information Monitored In Iscsi Traffic Flows - Dell PowerEdge M IO Aggregator Command Reference Manual

Mxl 10/40gbe switch io module ftos command reference guide, ftos 8.3.16.1
Hide thumbs Also See for PowerEdge M IO Aggregator:
Table of Contents

Advertisement

Figure 11-1. iSCSI Optimization Example

Monitoring iSCSI Traffic Flows

The switch snoops iSCSI session-establishment and termination packets by installing classifier rules that
trap iSCSI protocol packets to the CPU for examination. Devices that initiate iSCSI sessions usually use
well-known TCP ports 3260 or 860 to contact targets. When you enable iSCSI optimization, by default the
switch identifies IP packets to or from these ports as iSCSI traffic.
You can configure the switch to monitor traffic for additional port numbers or a combination of port
number and target IP address, and you can remove the well-known port numbers from monitoring.

Information Monitored in iSCSI Traffic Flows

iSCSI optimization examines the following data in packets and uses the data to track the session and create
the classifier entries that enable QoS treatment:
Initiator's IP Address
Target's IP Address
ISID (Initiator defined session identifier)
Initiator's IQN (iSCSI qualified name)
Target's IQN
Initiator's TCP Port
Target's TCP Port
150
|
iSCSI Optimization

Advertisement

Table of Contents
loading

Table of Contents