Sync the manual page with reality after adding the netmask functionality
This commit is contained in:
parent
d728d0329e
commit
9a2c5d1a2e
15
dist/iscsi/src/targets.5
vendored
15
dist/iscsi/src/targets.5
vendored
@ -1,4 +1,4 @@
|
|||||||
.\" $NetBSD: targets.5,v 1.1.1.1 2006/02/08 18:56:20 agc Exp $
|
.\" $NetBSD: targets.5,v 1.2 2006/02/12 15:48:17 agc Exp $
|
||||||
.\"
|
.\"
|
||||||
.\" Copyright © 2006 Alistair Crooks. All rights reserved.
|
.\" Copyright © 2006 Alistair Crooks. All rights reserved.
|
||||||
.\"
|
.\"
|
||||||
@ -26,7 +26,7 @@
|
|||||||
.\" NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS
|
.\" NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS
|
||||||
.\" SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
|
.\" SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
|
||||||
.\"
|
.\"
|
||||||
.Dd January 30, 2006
|
.Dd February 12, 2006
|
||||||
.Dt TARGETS 5
|
.Dt TARGETS 5
|
||||||
.Os
|
.Os
|
||||||
.Sh NAME
|
.Sh NAME
|
||||||
@ -124,13 +124,17 @@ for this target.
|
|||||||
The third field is a slash-notation netmask which will be used, during the
|
The third field is a slash-notation netmask which will be used, during the
|
||||||
discovery phase, to control the network addresses to which targets will
|
discovery phase, to control the network addresses to which targets will
|
||||||
be presented.
|
be presented.
|
||||||
Please note that this netmask functionality has not yet been implemented,
|
If an attempt is made to discover a target which is not allowed
|
||||||
and so
|
by the netmask, a warning will be issued using
|
||||||
|
.Xr syslog 3
|
||||||
|
to make administrators aware of this attempt.
|
||||||
|
The administrator can still use
|
||||||
tcp wrapper functionality, as found in
|
tcp wrapper functionality, as found in
|
||||||
.Xr hosts_access 5
|
.Xr hosts_access 5
|
||||||
and
|
and
|
||||||
.Xr hosts.deny 5
|
.Xr hosts.deny 5
|
||||||
should be used at present.
|
to allow or deny discovery attempts from initiators as
|
||||||
|
well as using the inbuilt netmask functionality.
|
||||||
.Sh FILES
|
.Sh FILES
|
||||||
.Bl -tag -width /etc/iscsi/targets -compact
|
.Bl -tag -width /etc/iscsi/targets -compact
|
||||||
.It Pa /etc/iscsi/targets
|
.It Pa /etc/iscsi/targets
|
||||||
@ -138,6 +142,7 @@ the list of exported storage
|
|||||||
.Nm
|
.Nm
|
||||||
.El
|
.El
|
||||||
.Sh SEE ALSO
|
.Sh SEE ALSO
|
||||||
|
.Xr syslog 3 ,
|
||||||
.Xr hosts_access 5 ,
|
.Xr hosts_access 5 ,
|
||||||
.Xr hosts.deny 5 ,
|
.Xr hosts.deny 5 ,
|
||||||
.Xr iscsi-target 8
|
.Xr iscsi-target 8
|
||||||
|
Loading…
Reference in New Issue
Block a user