Sync the manual page with reality after adding the netmask functionality

This commit is contained in:
agc 2006-02-12 15:48:17 +00:00
parent d728d0329e
commit 9a2c5d1a2e

View File

@ -1,4 +1,4 @@
.\" $NetBSD: targets.5,v 1.1.1.1 2006/02/08 18:56:20 agc Exp $
.\" $NetBSD: targets.5,v 1.2 2006/02/12 15:48:17 agc Exp $
.\"
.\" Copyright © 2006 Alistair Crooks. All rights reserved.
.\"
@ -26,7 +26,7 @@
.\" NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS
.\" SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
.\"
.Dd January 30, 2006
.Dd February 12, 2006
.Dt TARGETS 5
.Os
.Sh NAME
@ -124,13 +124,17 @@ for this target.
The third field is a slash-notation netmask which will be used, during the
discovery phase, to control the network addresses to which targets will
be presented.
Please note that this netmask functionality has not yet been implemented,
and so
If an attempt is made to discover a target which is not allowed
by the netmask, a warning will be issued using
.Xr syslog 3
to make administrators aware of this attempt.
The administrator can still use
tcp wrapper functionality, as found in
.Xr hosts_access 5
and
.Xr hosts.deny 5
should be used at present.
to allow or deny discovery attempts from initiators as
well as using the inbuilt netmask functionality.
.Sh FILES
.Bl -tag -width /etc/iscsi/targets -compact
.It Pa /etc/iscsi/targets
@ -138,6 +142,7 @@ the list of exported storage
.Nm
.El
.Sh SEE ALSO
.Xr syslog 3 ,
.Xr hosts_access 5 ,
.Xr hosts.deny 5 ,
.Xr iscsi-target 8