26.10.2013 Views

8.3.17.0 - Force10 Networks

8.3.17.0 - Force10 Networks

8.3.17.0 - Force10 Networks

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

www.dell.com | support.dell.com<br />

148 | iSCSI Optimization<br />

Figure 11-1. iSCSI Optimization Example<br />

Monitoring iSCSI Traffic Flows<br />

The switch snoops iSCSI session-establishment and termination packets by installing classifier rules that<br />

trap iSCSI protocol packets to the CPU for examination. Devices that initiate iSCSI sessions usually use<br />

well-known TCP ports 3260 or 860 to contact targets. When you enable iSCSI optimization, by default the<br />

switch identifies IP packets to or from these ports as iSCSI traffic.<br />

You can configure the switch to monitor traffic for additional port numbers or a combination of port<br />

number and target IP address, and you can remove the well-known port numbers from monitoring.<br />

Information Monitored in iSCSI Traffic Flows<br />

iSCSI optimization examines the following data in packets and uses the data to track the session and create<br />

the classifier entries that enable QoS treatment:<br />

• Initiator’s IP Address<br />

• Target’s IP Address<br />

• ISID (Initiator defined session identifier)<br />

• Initiator’s IQN (iSCSI qualified name)<br />

• Target’s IQN<br />

• Initiator’s TCP Port<br />

• Target’s TCP Port

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!