debian 11搭建ISCSI Target

ISCSI

环境

主机名ip地址角色系统
dc110.10.70.101ISCSI-serverdebian 11
dc210.10.70.102ISCSI-clientdebian 11

配置

servr

#安装targetcli-fb
apt -y install targetcli-fb

#创建一个目录
root@dlp:~# mkdir /var/lib/iscsi_disks
#进入管理控制台
root@dlp:~# targetcli
Warning: Could not load preferences file /root/.targetcli/prefs.bin.
targetcli shell version 2.1.53
Copyright 2011-2013 by Datera, Inc and others.
For help on commands, type 'help'.

/> cd backstores/fileio 

#添加一块磁盘,在挂历控制台上添加上
/backstores/fileio> create disk01 /var/lib/iscsi_disks/disk01.img 10G 
Created fileio disk01 with size 10737418240
/backstores/fileio> cd /iscsi 

# create a target
# naming rule : [ iqn.(year)-(month).(reverse of domain name):(any name you like) ]
/iscsi> create iqn.2021-08.world.srv:dlp.target01 
Created target iqn.2021-08.world.srv:dlp.target01.
Created TPG 1.
Global pref auto_add_default_portal=true
Created default portal listening on all IPs (0.0.0.0), port 3260.
/iscsi> cd iqn.2021-08.world.srv:dlp.target01/tpg1/luns 

# set LUN
/iscsi/iqn.20...t01/tpg1/luns> create /backstores/fileio/disk01 
Created LUN 0.
/iscsi/iqn.20...t01/tpg1/luns> cd ../acls 

# set ACL (it's the IQN of an initiator you permit to connect)
/iscsi/iqn.20...t01/tpg1/acls> create iqn.2021-08.world.srv:node01.initiator01 
Created Node ACL for iqn.2021-08.world.srv:node01.initiator01
Created mapped LUN 0.
/iscsi/iqn.20...t01/tpg1/acls> cd iqn.2021-08.world.srv:node01.initiator01 

# set UserID and Password for authentication
/iscsi/iqn.20...w.initiator01> set auth userid=username 
Parameter userid is now 'username'.
/iscsi/iqn.20...w.initiator01> set auth password=password 
Parameter password is now 'password'.
/iscsi/iqn.20...w.initiator01> exit 
Global pref auto_save_on_exit=true
Configuration saved to /etc/rtslib-fb-target/saveconfig.json

# after configuration above, the target enters in listening like follows
root@dlp:~# ss -napt | grep 3260
LISTEN 0      256          0.0.0.0:3260      0.0.0.0:*

root@dlp:~# systemctl enable rtslib-fb-targetctl
#示例
#session认证
/iscsi/iqn.20....iscsi:client>  set auth userid=LinuxServerUser password=ServerPassword  mutual_userid=LinuxClientUser mutual_password=ClientPassword
Parameter userid is now 'LinuxServerUser'.
Parameter password is now 'ServerPassword'.
Parameter mutual_userid is now 'LinuxClientUser'.
Parameter mutual_password is now 'ClientPassword'.
#discover认证
/iscsi>  set  discovery_auth  userid=LinuxServerUser password=ServerPassword  mutual_userid=LinuxClientUser mutual_password=ClientPassword
Parameter userid is now 'LinuxServerUser'.
Parameter password is now 'ServerPassword'.
Parameter mutual_userid is now 'LinuxClientUser'.
Parameter mutual_password is now 'ClientPassword'.

client

root@node01:~# apt -y install open-iscsi
root@node01:~# vi /etc/iscsi/initiatorname.iscsi
# 修改为与iSCSI目标服务器上设置的IQN相同  
InitiatorName=iqn.2021-08.world.srv:node01.initiator01
root@node01:~# vi /etc/iscsi/iscsid.conf
# 第58行:取消注释
node.session.auth.authmethod = CHAP
# 第69、70行:取消注释并指定在iSCSI目标服务器上设置的用户名和密码  
node.session.auth.username = username
node.session.auth.password = password
# 重启服务
root@node01:~# systemctl restart iscsid open-iscsi
# 发现目标
root@node01:~# iscsiadm -m discovery -t sendtargets -p 10.0.0.30
10.0.0.30:3260,1 iqn.2021-08.world.srv:dlp.target01
# 发现后确认状态
root@node01:~# iscsiadm -m node -o show
# 开始记录2.1.3
node.name = iqn.2021-08.world.srv:dlp.target01
node.tpgt = 1
node.startup = manual
node.leading_login = No
iface.iscsi_ifacename = default
.....
.....
node.conn[0].iscsi.HeaderDigest = None
node.conn[0].iscsi.DataDigest = None
node.conn[0].iscsi.IFMarker = No
node.conn[0].iscsi.OFMarker = No
# 结束记录

# 登录到目标器
root@node01:~# iscsiadm -m node --login
Logging in to [iface: default, target: iqn.2021-08.world.srv:dlp.target01, portal: 10.0.0.30,3260]
Login to [iface: default, target: iqn.2021-08.world.srv:dlp.target01, portal: 10.0.0.30,3260] successful.

# 确认建立的会话
root@node01:~# iscsiadm -m session -o show
tcp: [1] 10.0.0.30:3260,1 iqn.2021-08.world.srv:dlp.target01 (non-flash)
# 确认分区
root@node01:~# cat /proc/partitions
major minor  #blocks  name

 254        0   31457280 sda
 254        1     498688 sda1
 254        2          1 sda2
 254        5   30955520 sda5
 253        0   29949952 dm-0
 253        1    1003520 dm-1
  11        0    1048575 sr0
   8        0   10485760 sdb

# 添加了目标服务器提供的新设备[sdb]  

2.完成iSCSI设备的设置后,需要在启动器上进行如下配置才能使用iSCSI设备。

root@node01:~# apt -y install parted
# create label
root@node01:~# parted --script /dev/sdb "mklabel gpt"
# create partiton
root@node01:~# parted --script /dev/sdb "mkpart primary 0% 100%"
# format with ext4
root@node01:~# mkfs.ext4 /dev/sdb1
mke2fs 1.46.2 (28-Feb-2021)
Creating filesystem with 2617344 4k blocks and 655360 inodes
Filesystem UUID: 0d55d46a-e2d1-45d1-b55c-e030c23c18f5
Superblock backups stored on blocks:
        32768, 98304, 163840, 229376, 294912, 819200, 884736, 1605632

Allocating group tables: done
Writing inode tables: done
Creating journal (16384 blocks): done
Writing superblocks and filesystem accounting information: done

root@node01:~# mount /dev/sdb1 /mnt
root@node01:~# df -hT
Filesystem                  Type      Size  Used Avail Use% Mounted on
udev                        devtmpfs  2.0G     0  2.0G   0% /dev
tmpfs                       tmpfs     394M  540K  393M   1% /run
/dev/mapper/debian--vg-root ext4       28G  1.1G   26G   4% /
tmpfs                       tmpfs     2.0G     0  2.0G   0% /dev/shm
tmpfs                       tmpfs     5.0M     0  5.0M   0% /run/lock
/dev/sda1                   ext2      470M   48M  398M  11% /boot
tmpfs                       tmpfs     394M     0  394M   0% /run/user/0
/dev/sdb1                   ext4      9.8G   24K  9.3G   1% /mnt
  • 1
    点赞
  • 1
    收藏
    觉得还不错? 一键收藏
  • 0
    评论
以下是在Debian 11上安装和配置OpenVPN的步骤: 1. 更新软件包列表: ``` sudo apt update ``` 2. 安装OpenVPN软件包和EasyRSA工具: ``` sudo apt install openvpn easy-rsa ``` 3. 创建OpenVPN的配置目录: ``` sudo mkdir /etc/openvpn/server ``` 4. 复制OpenVPN的示例配置文件: ``` sudo cp /usr/share/doc/openvpn/examples/sample-config-files/server.conf.gz /etc/openvpn/server/ ``` 5. 解压缩配置文件: ``` sudo gzip -d /etc/openvpn/server/server.conf.gz ``` 6. 生成证书和密钥: ``` cd /usr/share/easy-rsa/ sudo ./easyrsa init-pki sudo ./easyrsa build-ca sudo ./easyrsa build-server-full server nopass ``` 7. 复制证书和密钥到OpenVPN的配置目录: ``` sudo cp /usr/share/easy-rsa/pki/ca.crt /etc/openvpn/server/ sudo cp /usr/share/easy-rsa/pki/issued/server.crt /etc/openvpn/server/ sudo cp /usr/share/easy-rsa/pki/private/server.key /etc/openvpn/server/ ``` 8. 生成Diffie-Hellman参数: ``` sudo openssl dhparam -out /etc/openvpn/server/dh.pem 2048 ``` 9. 配置OpenVPN服务器: 编辑OpenVPN配置文件: ``` sudo nano /etc/openvpn/server/server.conf ``` 确保以下配置项与下面的示例配置文件相同: ``` port 1194 proto udp dev tun ca /etc/openvpn/server/ca.crt cert /etc/openvpn/server/server.crt key /etc/openvpn/server/server.key dh /etc/openvpn/server/dh.pem server 10.8.0.0 255.255.255.0 ifconfig-pool-persist ipp.txt push "redirect-gateway def1 bypass-dhcp" push "dhcp-option DNS 8.8.8.8" push "dhcp-option DNS 8.8.4.4" keepalive 10 120 cipher AES-256-CBC user nobody group nogroup persist-key persist-tun status openvpn-status.log verb 3 ``` 10. 启动OpenVPN服务: ``` sudo systemctl start openvpn-server@server ``` 11. 确认服务已经启动: ``` sudo systemctl status openvpn-server@server ``` 12. 配置防火墙: 如果您的服务器上有防火墙,请允许OpenVPN的UDP端口(默认为1194)通过防火墙。 完成以上步骤后,您的OpenVPN服务器就已经搭建完成了。您可以使用OpenVPN客户端连接到该服务器,以便安全地访问您的服务器或局域网中的资源。

“相关推荐”对你有帮助么?

  • 非常没帮助
  • 没帮助
  • 一般
  • 有帮助
  • 非常有帮助
提交
评论
添加红包

请填写红包祝福语或标题

红包个数最小为10个

红包金额最低5元

当前余额3.43前往充值 >
需支付:10.00
成就一亿技术人!
领取后你会自动成为博主和红包主的粉丝 规则
hope_wisdom
发出的红包
实付
使用余额支付
点击重新获取
扫码支付
钱包余额 0

抵扣说明:

1.余额是钱包充值的虚拟货币,按照1:1的比例进行支付金额的抵扣。
2.余额无法直接购买下载,可以购买VIP、付费专栏及课程。

余额充值