{"id":104,"date":"2007-08-06T19:24:05","date_gmt":"2007-08-06T17:24:05","guid":{"rendered":"http:\/\/www.corelan.be:8800\/?p=17"},"modified":"2007-08-06T19:24:05","modified_gmt":"2007-08-06T17:24:05","slug":"connect-to-an-iscsi-san-from-windows","status":"publish","type":"post","link":"https:\/\/www.corelan.be\/index.php\/2007\/08\/06\/connect-to-an-iscsi-san-from-windows\/","title":{"rendered":"Connect to an iSCSI SAN from Windows"},"content":{"rendered":"<p>In a previous post, I've shown how to set up a Linux based SAN solution, based upon Fedora Core 6 and the free iSCSI Enterprise Target tool. In this post, I'll show how to connect to the SAN from Windows<\/p>\n<p>First, make sure you have the Microsoft iSCSI initiatior software loaded onto your system. The components are already available in Longhorn and Vista. Windows 2003 server and XP will require some packages to be installed (which can be found on the Microsoft website). In my example, I'm using Windows Longhorn beta3, but the procedure should be more or less the same from Vista, 2003 server or XP.<\/p>\n<p>Open the Microsoft iSCSI Initiator tool and go to the &quot;discovery&quot; tabsheet. Click &quot;Add portal&quot; and enter the IP address of the Linux box running the SAN emulator.<\/p>\n<p>After clicking OK, you should see the target under the &quot;Targets&quot; tabsheet.<\/p>\n<p>In the &quot;targets&quot; tabsheet, select the target and click &quot;Log on&quot;. Make sure the &quot;Automatically restore this connection when the computer starts&quot; checkbox is enabled. This will ensure that the server will connect to the target at system boot time. If the server has a dedicated NIC to the SAN network, you may want to click the &quot;Advanced&quot; button and specify the correct interfaces for this connection.<\/p>\n<p>(Note : this page would also be the place where you can specify CHAP authentication parameters and IPSec tunnel parameters. Be aware though, that I have not tested those on iSCSI Target &#224;nd that using IPSec will put additional load on the network (iSCSI SAN) traffic.<\/p>\n<p>When closing the window, you should see that the status of the connection has now changed to &quot;Connected&quot;. Now you are ready to create a volume and mount it as a disk under Windows.<\/p>\n<p>Click &quot;OK&quot; to save and close the Microsoft iSCSI initiator configuration tool.<\/p>\n<p>Go to the Disk Management MMC. You should be prompted about a new Logical Disk that was found on the system.<\/p>\n<p>Choose &quot;MBR&quot; if you're not sure and press OK. Now you can create a volume, format the disk, and assign a drive letter. Depending on the speed of your network, formatting might take a while. Once the drive is formatted, you can use it as a regular disk in the server.<\/p>\n<p>On the Linux SAN, you should see that it is connected :<\/p>\n<div>\n<table style=\"border-collapse: collapse\" border=\"0\">\n<colgroup>\n<col style=\"width: 629px\" \/><\/col>\n<\/colgroup>\n<tbody>\n<tr>\n<td style=\"border-right: 0.75pt outset; padding-right: 1px; border-top: 0.75pt outset; padding-left: 1px; padding-bottom: 1px; border-left: 0.75pt outset; padding-top: 1px; border-bottom: 0.75pt outset\"><span style=\"color: #969696\"><span style=\"font-family: courier new\">user@machine ~]# cat \/proc\/net\/iet\/volume               <br \/>tid:1 name:iqn.2001-04.be.corelan:san1                <br \/>&#160;&#160;&#160;&#160;&#160;&#160;&#160; lun:0 state:0 iotype:fileio iomode:wt path:\/dev\/hda3<\/span> <\/span><span style=\"color: #969696; font-family: courier new\">[user@machine ~]# cat \/proc\/net\/iet\/session             <br \/>tid:1 name:iqn.2001-04.be.corelan:san1              <br \/>&#160;&#160;&#160;&#160;&#160;&#160;&#160; sid:281475899523136 initiator:iqn.1991-05.com.microsoft:longhorn.corelan.be              <br \/>&#160;&#160;&#160;&#160;&#160;&#160;&#160;&#160;&#160;&#160;&#160;&#160;&#160;&#160;&#160; cid:1 ip:192.168.0.3 state:active hd:none dd:none<\/span><\/td>\n<\/tr>\n<\/tbody>\n<\/table><\/div>\n","protected":false},"excerpt":{"rendered":"<p>In a previous post, I've shown how to set up a Linux based SAN solution, based upon Fedora Core 6 and the free iSCSI Enterprise Target tool. In this post, I'll show how to connect to the SAN from Windows First, make sure you have the Microsoft iSCSI initiatior software loaded onto your system. The &hellip; <a href=\"https:\/\/www.corelan.be\/index.php\/2007\/08\/06\/connect-to-an-iscsi-san-from-windows\/\" class=\"more-link\">Continue reading<span class=\"screen-reader-text\"> \"Connect to an iSCSI SAN from Windows\"<\/span><\/a><\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"jetpack_post_was_ever_published":false,"_jetpack_newsletter_access":"","_jetpack_dont_email_post_to_subs":false,"_jetpack_newsletter_tier_id":0,"_jetpack_memberships_contains_paywalled_content":false,"_jetpack_memberships_contains_paid_content":false,"footnotes":"","jetpack_publicize_message":"","jetpack_publicize_feature_enabled":true,"jetpack_social_post_already_shared":false,"jetpack_social_options":{"image_generator_settings":{"template":"highway","default_image_id":0,"font":"","enabled":false},"version":2}},"categories":[64,70],"tags":[131,67,62],"class_list":["post-104","post","type-post","status-publish","format-standard","hentry","category-linux","category-storage","tag-linux","tag-san","tag-iscsi"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.5 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Connect to an iSCSI SAN from Windows - Corelan | Exploit Development &amp; Vulnerability Research<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.corelan.be\/index.php\/2007\/08\/06\/connect-to-an-iscsi-san-from-windows\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Connect to an iSCSI SAN from Windows - Corelan | Exploit Development &amp; Vulnerability Research\" \/>\n<meta property=\"og:description\" content=\"In a previous post, I&#039;ve shown how to set up a Linux based SAN solution, based upon Fedora Core 6 and the free iSCSI Enterprise Target tool. In this post, I&#039;ll show how to connect to the SAN from Windows First, make sure you have the Microsoft iSCSI initiatior software loaded onto your system. The &hellip; Continue reading &quot;Connect to an iSCSI SAN from Windows&quot;\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.corelan.be\/index.php\/2007\/08\/06\/connect-to-an-iscsi-san-from-windows\/\" \/>\n<meta property=\"og:site_name\" content=\"Corelan | Exploit Development &amp; Vulnerability Research\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/corelanconsulting\" \/>\n<meta property=\"article:published_time\" content=\"2007-08-06T17:24:05+00:00\" \/>\n<meta name=\"author\" content=\"corelanc0d3r\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@corelanc0d3r\" \/>\n<meta name=\"twitter:site\" content=\"@corelanc0d3r\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"TechArticle\",\"@id\":\"https:\\\/\\\/www.corelan.be\\\/index.php\\\/2007\\\/08\\\/06\\\/connect-to-an-iscsi-san-from-windows\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.corelan.be\\\/index.php\\\/2007\\\/08\\\/06\\\/connect-to-an-iscsi-san-from-windows\\\/\"},\"author\":{\"name\":\"corelanc0d3r\",\"@id\":\"https:\\\/\\\/www.corelan.be\\\/#\\\/schema\\\/person\\\/3be5542b9b0a0787893db83a5ad68e8f\"},\"headline\":\"Connect to an iSCSI SAN from Windows\",\"datePublished\":\"2007-08-06T17:24:05+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.corelan.be\\\/index.php\\\/2007\\\/08\\\/06\\\/connect-to-an-iscsi-san-from-windows\\\/\"},\"wordCount\":466,\"publisher\":{\"@id\":\"https:\\\/\\\/www.corelan.be\\\/#organization\"},\"keywords\":[\"Linux and Unix\",\"san\",\"iSCSI\"],\"articleSection\":[\"Linux and Unix\",\"Storage\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.corelan.be\\\/index.php\\\/2007\\\/08\\\/06\\\/connect-to-an-iscsi-san-from-windows\\\/\",\"url\":\"https:\\\/\\\/www.corelan.be\\\/index.php\\\/2007\\\/08\\\/06\\\/connect-to-an-iscsi-san-from-windows\\\/\",\"name\":\"Connect to an iSCSI SAN from Windows - Corelan | Exploit Development &amp; Vulnerability Research\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.corelan.be\\\/#website\"},\"datePublished\":\"2007-08-06T17:24:05+00:00\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.corelan.be\\\/index.php\\\/2007\\\/08\\\/06\\\/connect-to-an-iscsi-san-from-windows\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.corelan.be\\\/index.php\\\/2007\\\/08\\\/06\\\/connect-to-an-iscsi-san-from-windows\\\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.corelan.be\\\/index.php\\\/2007\\\/08\\\/06\\\/connect-to-an-iscsi-san-from-windows\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.corelan.be\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Connect to an iSCSI SAN from Windows\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.corelan.be\\\/#website\",\"url\":\"https:\\\/\\\/www.corelan.be\\\/\",\"name\":\"Corelan CyberSecurity Research\",\"description\":\"Corelan publishes in-depth tutorials on exploit development, Windows exploitation, vulnerability research, heap internals, reverse engineering and security tooling used by professionals worldwide.\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.corelan.be\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.corelan.be\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.corelan.be\\\/#organization\",\"name\":\"Corelan CyberSecurity Research\",\"url\":\"https:\\\/\\\/www.corelan.be\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.corelan.be\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.corelan.be\\\/wp-content\\\/uploads\\\/2026\\\/03\\\/corelanlogo2_small-20.png\",\"contentUrl\":\"https:\\\/\\\/www.corelan.be\\\/wp-content\\\/uploads\\\/2026\\\/03\\\/corelanlogo2_small-20.png\",\"width\":200,\"height\":200,\"caption\":\"Corelan CyberSecurity Research\"},\"image\":{\"@id\":\"https:\\\/\\\/www.corelan.be\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.facebook.com\\\/corelanconsulting\",\"https:\\\/\\\/x.com\\\/corelanc0d3r\",\"https:\\\/\\\/x.com\\\/corelanconsulting\",\"https:\\\/\\\/instagram.com\\\/corelanconsult\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.corelan.be\\\/#\\\/schema\\\/person\\\/3be5542b9b0a0787893db83a5ad68e8f\",\"name\":\"corelanc0d3r\",\"pronouns\":\"he\\\/him\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/3783bed6acd72d7fa5bb2387d88acbb9a3403e7cada60b2037e1cbb74ad451f9?s=96&d=mm&r=x\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/3783bed6acd72d7fa5bb2387d88acbb9a3403e7cada60b2037e1cbb74ad451f9?s=96&d=mm&r=x\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/3783bed6acd72d7fa5bb2387d88acbb9a3403e7cada60b2037e1cbb74ad451f9?s=96&d=mm&r=x\",\"caption\":\"corelanc0d3r\"},\"description\":\"Peter Van Eeckhoutte is the founder of Corelan and a globally recognized expert in exploit development and vulnerability research. With over two decades in IT security, he built Corelan into a respected platform for deep technical research, hands-on training, and knowledge sharing. Known for his influential exploit development tutorials, tools, and real-world training, Peter combines a strong research mindset with a passion for education\u2014helping security professionals understand not just how exploits work, but why.\",\"sameAs\":[\"https:\\\/\\\/www.corelan-training.com\",\"https:\\\/\\\/instagram.com\\\/corelanc0d3r\",\"https:\\\/\\\/www.linkedin.com\\\/in\\\/petervaneeckhoutte\\\/\",\"https:\\\/\\\/x.com\\\/corelanc0d3r\"],\"url\":\"https:\\\/\\\/www.corelan.be\\\/index.php\\\/author\\\/admin0\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Connect to an iSCSI SAN from Windows - Corelan | Exploit Development &amp; Vulnerability Research","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.corelan.be\/index.php\/2007\/08\/06\/connect-to-an-iscsi-san-from-windows\/","og_locale":"en_US","og_type":"article","og_title":"Connect to an iSCSI SAN from Windows - Corelan | Exploit Development &amp; Vulnerability Research","og_description":"In a previous post, I've shown how to set up a Linux based SAN solution, based upon Fedora Core 6 and the free iSCSI Enterprise Target tool. In this post, I'll show how to connect to the SAN from Windows First, make sure you have the Microsoft iSCSI initiatior software loaded onto your system. The &hellip; Continue reading \"Connect to an iSCSI SAN from Windows\"","og_url":"https:\/\/www.corelan.be\/index.php\/2007\/08\/06\/connect-to-an-iscsi-san-from-windows\/","og_site_name":"Corelan | Exploit Development &amp; Vulnerability Research","article_publisher":"https:\/\/www.facebook.com\/corelanconsulting","article_published_time":"2007-08-06T17:24:05+00:00","author":"corelanc0d3r","twitter_card":"summary_large_image","twitter_creator":"@corelanc0d3r","twitter_site":"@corelanc0d3r","schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"TechArticle","@id":"https:\/\/www.corelan.be\/index.php\/2007\/08\/06\/connect-to-an-iscsi-san-from-windows\/#article","isPartOf":{"@id":"https:\/\/www.corelan.be\/index.php\/2007\/08\/06\/connect-to-an-iscsi-san-from-windows\/"},"author":{"name":"corelanc0d3r","@id":"https:\/\/www.corelan.be\/#\/schema\/person\/3be5542b9b0a0787893db83a5ad68e8f"},"headline":"Connect to an iSCSI SAN from Windows","datePublished":"2007-08-06T17:24:05+00:00","mainEntityOfPage":{"@id":"https:\/\/www.corelan.be\/index.php\/2007\/08\/06\/connect-to-an-iscsi-san-from-windows\/"},"wordCount":466,"publisher":{"@id":"https:\/\/www.corelan.be\/#organization"},"keywords":["Linux and Unix","san","iSCSI"],"articleSection":["Linux and Unix","Storage"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.corelan.be\/index.php\/2007\/08\/06\/connect-to-an-iscsi-san-from-windows\/","url":"https:\/\/www.corelan.be\/index.php\/2007\/08\/06\/connect-to-an-iscsi-san-from-windows\/","name":"Connect to an iSCSI SAN from Windows - Corelan | Exploit Development &amp; Vulnerability Research","isPartOf":{"@id":"https:\/\/www.corelan.be\/#website"},"datePublished":"2007-08-06T17:24:05+00:00","breadcrumb":{"@id":"https:\/\/www.corelan.be\/index.php\/2007\/08\/06\/connect-to-an-iscsi-san-from-windows\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.corelan.be\/index.php\/2007\/08\/06\/connect-to-an-iscsi-san-from-windows\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.corelan.be\/index.php\/2007\/08\/06\/connect-to-an-iscsi-san-from-windows\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.corelan.be\/"},{"@type":"ListItem","position":2,"name":"Connect to an iSCSI SAN from Windows"}]},{"@type":"WebSite","@id":"https:\/\/www.corelan.be\/#website","url":"https:\/\/www.corelan.be\/","name":"Corelan CyberSecurity Research","description":"Corelan publishes in-depth tutorials on exploit development, Windows exploitation, vulnerability research, heap internals, reverse engineering and security tooling used by professionals worldwide.","publisher":{"@id":"https:\/\/www.corelan.be\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.corelan.be\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.corelan.be\/#organization","name":"Corelan CyberSecurity Research","url":"https:\/\/www.corelan.be\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.corelan.be\/#\/schema\/logo\/image\/","url":"https:\/\/www.corelan.be\/wp-content\/uploads\/2026\/03\/corelanlogo2_small-20.png","contentUrl":"https:\/\/www.corelan.be\/wp-content\/uploads\/2026\/03\/corelanlogo2_small-20.png","width":200,"height":200,"caption":"Corelan CyberSecurity Research"},"image":{"@id":"https:\/\/www.corelan.be\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/corelanconsulting","https:\/\/x.com\/corelanc0d3r","https:\/\/x.com\/corelanconsulting","https:\/\/instagram.com\/corelanconsult"]},{"@type":"Person","@id":"https:\/\/www.corelan.be\/#\/schema\/person\/3be5542b9b0a0787893db83a5ad68e8f","name":"corelanc0d3r","pronouns":"he\/him","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/3783bed6acd72d7fa5bb2387d88acbb9a3403e7cada60b2037e1cbb74ad451f9?s=96&d=mm&r=x","url":"https:\/\/secure.gravatar.com\/avatar\/3783bed6acd72d7fa5bb2387d88acbb9a3403e7cada60b2037e1cbb74ad451f9?s=96&d=mm&r=x","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/3783bed6acd72d7fa5bb2387d88acbb9a3403e7cada60b2037e1cbb74ad451f9?s=96&d=mm&r=x","caption":"corelanc0d3r"},"description":"Peter Van Eeckhoutte is the founder of Corelan and a globally recognized expert in exploit development and vulnerability research. With over two decades in IT security, he built Corelan into a respected platform for deep technical research, hands-on training, and knowledge sharing. Known for his influential exploit development tutorials, tools, and real-world training, Peter combines a strong research mindset with a passion for education\u2014helping security professionals understand not just how exploits work, but why.","sameAs":["https:\/\/www.corelan-training.com","https:\/\/instagram.com\/corelanc0d3r","https:\/\/www.linkedin.com\/in\/petervaneeckhoutte\/","https:\/\/x.com\/corelanc0d3r"],"url":"https:\/\/www.corelan.be\/index.php\/author\/admin0\/"}]}},"views":1823,"jetpack_publicize_connections":[],"jetpack_featured_media_url":"","jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/www.corelan.be\/index.php\/wp-json\/wp\/v2\/posts\/104","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.corelan.be\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.corelan.be\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.corelan.be\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.corelan.be\/index.php\/wp-json\/wp\/v2\/comments?post=104"}],"version-history":[{"count":0,"href":"https:\/\/www.corelan.be\/index.php\/wp-json\/wp\/v2\/posts\/104\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.corelan.be\/index.php\/wp-json\/wp\/v2\/media?parent=104"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.corelan.be\/index.php\/wp-json\/wp\/v2\/categories?post=104"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.corelan.be\/index.php\/wp-json\/wp\/v2\/tags?post=104"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}