Administrator Guide

576 iSCSI Optimization
How Does iSCSI Optimization Use ACLs?
iSCSI Optimization borrows ACL lists from the global system pool. ACL lists
allocated by iSCSI Optimization reduce the total number of ACLs available
for use by the network operator. Enabling iSCSI Optimization uses one ACL
list to monitor for iSCSI sessions. Each monitored iSCSI session utilizes two
rules from additional ACL lists up to a maximum of two ACL lists. This
means that the maximum number of ACL lists allocated by iSCSI is three.
What Information Does the Switch Track in iSCSI Traffic Flows?
Packets are examined to find the following data, which is used in tracking the
session and creating the classifier entries that enable QoS treatment:
Initiator's IP Address
•Target's IP Address
ISID (Initiator defined session identifier)
Initiator's IQN (iSCSI Qualified Name)
•Target's IQN
Initiator's TCP Port
Target's TCP Port
If no iSCSI traffic is detected for a session for a configurable aging period, the
session data is cleared.