%% You should probably cite rfc7143 instead of this I-D. @techreport{ietf-storm-iscsi-cons-09, number = {draft-ietf-storm-iscsi-cons-09}, type = {Internet-Draft}, institution = {Internet Engineering Task Force}, publisher = {Internet Engineering Task Force}, note = {Work in Progress}, url = {https://datatracker.ietf.org/doc/draft-ietf-storm-iscsi-cons/09/}, author = {Mallikarjun Chadalapaka and Julian Satran and Kalman Meth and David L. Black}, title = {{iSCSI Protocol (Consolidated)}}, pagetotal = 344, year = 2013, month = jun, day = 24, abstract = {This document describes a transport protocol for SCSI that works on top of TCP. The iSCSI protocol aims to be fully compliant with the standardized SCSI Architecture Model (SAM-2). RFC 3720 defined the original iSCSI protocol. RFC 3721 discusses iSCSI Naming examples and discovery techniques. Subsequently, RFC 3980 added an additional naming format to iSCSI protocol. RFC 4850 followed up by adding a new public extension key to iSCSI. RFC 5048 offered a number of clarifications and a few improvements and corrections to the original iSCSI protocol. This document obsoletes RFCs 3720, 3980, 4850 and 5048 by consolidating them into a single document and making additional updates to the consolidated specification. This document also updates RFC 3721. The text in this document thus supersedes the text in all the noted RFCs wherever there is a difference in semantics. Note: This version of the draft does not yet incorporate planned resolutions to some Last Call comments regarding Kerberos and IPsec-related security considerations.}, }