8.1.3 iSCSI Target Configuration Guide


8.1.3 iSCSI Target Configuration Guide

Organising block-level storage entry over a community entails establishing a server-side part that presents storage assets to purchasers. This course of entails defining parameters equivalent to entry management, authentication, and the scale of the storage quantity being made obtainable. For instance, a system administrator would possibly allocate a particular portion of a tough drive or a devoted storage array to be accessed by distant servers. This permits these servers to make the most of the storage as if it had been instantly connected.

This functionality affords substantial benefits when it comes to flexibility and useful resource utilization. It permits centralized storage administration, facilitates catastrophe restoration eventualities by permitting fast relocation of storage assets, and reduces the necessity for bodily entry to server {hardware}. Traditionally, this performance crammed an important hole in community storage options, offering a standards-based method for distant block-level entry that pre-dates and enhances different applied sciences like Fibre Channel over Ethernet (FCoE). It stays a broadly used methodology for connecting servers to shared storage, notably in virtualized environments and cloud infrastructures.

This basic idea underpins quite a few superior storage networking matters, together with persistent storage for containers, high-availability storage clusters, and storage provisioning inside software-defined knowledge facilities. Understanding this course of is vital for managing and optimizing fashionable storage infrastructures. Additional exploration of those matters will present a extra complete understanding of the position of community block storage inside the broader IT panorama.

1. Goal Definition

Goal definition is a foundational factor inside the strategy of configuring an iSCSI goal (typically denoted as “8.1.3 configure an iscsi goal” in documentation). It offers the important framework for figuring out and managing the storage assets offered to iSCSI initiators. With out correct goal definition, initiators can not find or entry the specified storage.

  • IQN (iSCSI Certified Identify) Project

    Every iSCSI goal should possess a singular IQN, serving as its identifier inside the iSCSI community. This identify follows a particular format, making certain international uniqueness and facilitating correct routing and entry management. Assigning an accurate IQN is essential through the “8.1.3 configure an iscsi goal” course of, because it varieties the premise for all subsequent interactions between initiators and the goal. An incorrectly formatted or duplicate IQN can forestall connectivity and result in storage entry failures.

  • Portal Definition

    Portals outline the community entry factors by which initiators connect with the goal. Every portal consists of an IP handle and port quantity. A number of portals may be outlined for redundancy and elevated availability. Defining the proper portal data is important for profitable connections. When configuring an iSCSI goal, directors specify these portals, permitting initiators to find and set up classes with the goal.

  • Goal Alias (Non-compulsory)

    A user-friendly alias may be assigned to the goal along with the IQN. Whereas not strictly required, aliases simplify administration and enhance readability in configuration recordsdata and administration interfaces. This descriptive identify makes it simpler to establish and handle particular targets, particularly in complicated environments with a number of iSCSI targets.

  • Discovery Authentication (Non-compulsory)

    Through the discovery section, elective authentication mechanisms may be employed to confirm the id of initiators trying to connect with the goal. This added layer of safety prevents unauthorized entry and protects the integrity of the storage assets. This step, whereas elective, is a really useful safety apply when configuring an iSCSI goal.

These sides of goal definition collectively set up the core id and accessibility parameters for the iSCSI goal. Correct configuration of those parts is paramount to the success of the general “8.1.3 configure an iscsi goal” process, making certain that storage assets are appropriately offered and accessible to licensed initiators. Failure to correctly outline these parameters may end up in connectivity points, safety vulnerabilities, and in the end, disruption of companies reliant on the iSCSI storage.

2. Entry Management

Entry management varieties a vital part of configuring an iSCSI goal. It governs which initiators can connect with the goal and entry the underlying storage assets. With out strong entry management mechanisms, storage integrity and knowledge safety are considerably compromised. This can be a essential step within the “8.1.3 configure an iscsi goal” course of, making certain solely licensed programs can make the most of the offered storage.

  • Initiator Identify/IQN Whitelisting

    One main methodology entails explicitly itemizing permitted initiator names or IQNs. Solely initiators current on this whitelist are granted entry. For instance, a storage administrator would possibly whitelist the IQNs of particular servers inside a cluster, making certain that solely these servers can mount the iSCSI LUN. This method offers granular management, stopping unauthorized programs from even trying a connection. Its significance in “8.1.3 configure an iscsi goal” configurations can’t be overstated, because it varieties the primary line of protection in opposition to unauthorized entry.

  • Community-Based mostly Entry Management

    Proscribing entry based mostly on community supply addresses offers a further layer of safety. This methodology permits directors to restrict entry to particular IP handle ranges or subnets. As an illustration, a goal might be configured to just accept connections solely from inside a specific VLAN, enhancing safety by isolating storage site visitors. This enhances initiator whitelisting, additional bolstering the safety posture of the iSCSI goal.

  • Problem-Handshake Authentication Protocol (CHAP)

    CHAP offers mutual authentication between the initiator and goal, verifying the id of each events. This prevents unauthorized initiators from connecting, even when they possess a legitimate IQN or community handle. CHAP makes use of shared secrets and techniques to confirm id, enhancing safety in comparison with less complicated authentication strategies. Implementing CHAP throughout “8.1.3 configure an iscsi goal” setup considerably strengthens the general safety of the storage infrastructure.

  • Reverse CHAP

    Reverse CHAP provides a further layer of safety by requiring the goal to authenticate itself to the initiator. This helps forestall man-in-the-middle assaults by making certain the initiator connects to the authentic iSCSI goal. This reciprocal authentication enhances belief and safety inside the iSCSI material.

These entry management mechanisms are important issues when configuring an iSCSI goal. Correctly implementing these measures inside the “8.1.3 configure an iscsi goal” course of safeguards in opposition to unauthorized entry, making certain knowledge integrity and sustaining the safety of delicate data. Neglecting these elements can go away storage assets susceptible to compromise, doubtlessly resulting in knowledge breaches and repair disruptions.

3. Authentication

Authentication performs an important position in securing iSCSI goal configurations. Inside the context of “8.1.3 configure an iscsi goal,” authentication mechanisms confirm the id of initiators trying to entry the goal’s storage assets. This course of prevents unauthorized entry, defending knowledge integrity and confidentiality. With out correct authentication, malicious actors might doubtlessly acquire entry to delicate knowledge or disrupt storage operations. Implementing strong authentication is an important step in establishing a safe and dependable storage infrastructure.

A number of authentication strategies may be employed throughout iSCSI goal configuration. One frequent methodology is Problem-Handshake Authentication Protocol (CHAP), which offers mutual authentication between the initiator and goal. CHAP makes use of shared secrets and techniques to confirm the id of each events, enhancing safety in comparison with less complicated strategies. For instance, when configuring an iSCSI goal for a vital utility server, CHAP authentication ensures that solely the licensed server can entry the designated storage volumes. One other methodology, Reverse CHAP, additional strengthens safety by requiring the goal to authenticate itself to the initiator, mitigating the chance of man-in-the-middle assaults. In a virtualized surroundings, Reverse CHAP helps be sure that digital machines connect with the proper iSCSI targets, stopping potential knowledge corruption or leakage.

Understanding the significance of authentication inside the “8.1.3 configure an iscsi goal” course of is important for sustaining a safe storage surroundings. Implementing applicable authentication measures, equivalent to CHAP or Reverse CHAP, considerably reduces the chance of unauthorized entry and knowledge breaches. This, in flip, contributes to the general reliability and stability of the storage infrastructure, making certain enterprise continuity and defending delicate data. Failure to implement correct authentication can have extreme penalties, doubtlessly resulting in knowledge loss, regulatory penalties, and reputational injury.

4. LUN Mapping

LUN mapping (Logical Unit Quantity mapping) is an integral a part of the “8.1.3 configure an iscsi goal” course of. It establishes the connection between the storage offered to initiators by the iSCSI goal and the underlying bodily storage units. This mapping course of permits directors to summary bodily storage into logical models, offering flexibility and management over how storage is accessed and utilized by linked programs. With out LUN mapping, the iSCSI goal would lack the power to current usable storage to initiators. A direct consequence of incorrect LUN mapping might be knowledge corruption or loss, as initiators would possibly try to put in writing knowledge to unintended bodily places. For instance, in a virtualized server surroundings, LUN mapping permits directors to current particular person digital disks to digital machines, making certain every digital machine has its personal devoted cupboard space.

LUN mapping affords a number of benefits. It permits directors to carve up bodily storage into smaller, extra manageable models tailor-made to particular wants. This granularity facilitates environment friendly storage allocation and utilization. Moreover, LUN mapping permits for better management over entry permissions. Completely different LUNs may be assigned totally different entry management lists, proscribing entry based mostly on initiator or community standards. In a multi-tenant surroundings, this segregation is vital for knowledge safety and isolation. For instance, a service supplier might make the most of LUN mapping to current separate storage volumes to totally different purchasers, making certain knowledge privateness and stopping unauthorized entry between tenants. A sensible implication of understanding LUN mapping is the power to troubleshoot storage connectivity and efficiency points. By tracing the mapping between logical models and bodily units, directors can rapidly establish and resolve issues associated to particular storage volumes.

In abstract, LUN mapping inside the “8.1.3 configure an iscsi goal” course of offers the vital hyperlink between the logical presentation of storage and the bodily storage infrastructure. A radical understanding of LUN mapping is important for efficient storage provisioning, entry management, and troubleshooting. Failure to appropriately configure LUN mappings can result in vital points, together with knowledge loss, safety vulnerabilities, and efficiency degradation. This highlights the significance of cautious planning and execution through the LUN mapping section of iSCSI goal configuration.

5. Storage Allocation

Storage allocation is inextricably linked to the method of configuring an iSCSI goal (typically denoted as “8.1.3 configure an iscsi goal” in technical documentation). It defines the capability and traits of the storage assets offered to initiators. This course of determines how a lot storage is offered to linked programs and influences efficiency traits. With out correct storage allocation, the iSCSI goal can not operate as meant, and linked programs will lack entry to crucial storage assets. Inadequate storage allocation can result in utility failures and repair disruptions, whereas over-allocation may end up in wasted assets and elevated prices. As an illustration, when provisioning storage for a database server, cautious storage allocation is essential to make sure ample area for knowledge progress and optimum efficiency. Underneath-allocating storage might result in database outages, whereas over-allocating might tie up helpful storage assets.

A number of components affect storage allocation choices. The anticipated workload, efficiency necessities, and knowledge progress projections are key issues. Skinny provisioning permits for versatile storage allocation, the place the iSCSI goal presents a bigger digital dimension than the bodily allotted area, optimizing storage utilization. Nonetheless, cautious monitoring is critical to stop over-provisioning and potential storage exhaustion. Thick provisioning, then again, allocates the complete storage capability upfront, guaranteeing storage availability however doubtlessly resulting in underutilization. In a digital desktop infrastructure (VDI) surroundings, skinny provisioning may be employed to optimize storage utilization, whereas thick provisioning may be most well-liked for performance-sensitive purposes. The selection between skinny and thick provisioning will depend on the particular necessities of the surroundings and the trade-offs between storage utilization and efficiency ensures.

Efficient storage allocation inside the “8.1.3 configure an iscsi goal” course of is essential for optimizing storage utilization, making certain utility efficiency, and controlling prices. Understanding the implications of skinny and thick provisioning, together with correct workload evaluation, permits directors to make knowledgeable choices about storage allocation. Failure to adequately handle storage allocation throughout iSCSI goal configuration can result in efficiency bottlenecks, storage exhaustion, and in the end, disruption of vital companies. Due to this fact, meticulous planning and ongoing monitoring of storage utilization are important for sustaining a steady and environment friendly storage infrastructure.

6. Community Configuration

Community configuration is a vital facet of deploying an iSCSI goal (typically referenced as “8.1.3 configure an iscsi goal”). Correct community setup instantly impacts the efficiency, reliability, and safety of the iSCSI storage infrastructure. With out cautious consideration to community particulars, storage entry may be gradual, unreliable, and even susceptible to safety threats. This part explores the important thing community issues important for profitable iSCSI goal implementation.

  • Devoted Community Infrastructure

    Using a devoted community for iSCSI site visitors is extremely really useful to keep away from congestion and guarantee optimum efficiency. Sharing the community with different site visitors can result in efficiency bottlenecks and latency points, impacting storage-dependent purposes. For instance, in a virtualized server surroundings, dedicating a separate VLAN for iSCSI storage site visitors isolates storage site visitors from different community exercise, stopping efficiency degradation. This isolation is essential for sustaining constant storage efficiency and stopping disruptions to digital machine operations.

  • IP Handle and Subnet Configuration

    Assigning static IP addresses to each the iSCSI goal and initiators is important for dependable communication. DHCP-assigned addresses can change, resulting in connectivity points and storage entry failures. Moreover, configuring applicable subnet masks ensures correct community segmentation and routing effectivity. Appropriate subnet configuration prevents addressing conflicts and ensures that iSCSI site visitors flows effectively between the goal and initiators. For instance, configuring each the goal and initiators inside the identical subnet simplifies routing and minimizes latency.

  • Jumbo Frames

    Enabling jumbo frames on community interfaces and switches can considerably enhance iSCSI efficiency by decreasing the overhead related to smaller Ethernet frames. Bigger frames permit for extra environment friendly switch of information, minimizing CPU utilization and decreasing latency. Nonetheless, jumbo frames require constant configuration throughout the whole iSCSI community, together with initiators, targets, and community infrastructure. In a high-performance computing surroundings, enabling jumbo frames can considerably enhance throughput and cut back latency for iSCSI storage entry, resulting in improved utility efficiency.

  • Multipath I/O (MPIO)

    Configuring MPIO permits initiators to ascertain a number of connections to the iSCSI goal over totally different community paths. This redundancy will increase availability and efficiency by offering failover capabilities and cargo balancing. If one community path fails, MPIO routinely switches to an alternate path, making certain steady storage entry. In a mission-critical utility surroundings, MPIO offers resilience in opposition to community failures, making certain uninterrupted entry to vital knowledge and stopping pricey downtime. Furthermore, MPIO can enhance efficiency by distributing storage site visitors throughout a number of paths, successfully growing bandwidth and decreasing latency.

These community configuration elements are essential for profitable “8.1.3 configure an iscsi goal” implementations. Addressing these parts ensures optimum efficiency, excessive availability, and strong safety for the iSCSI storage infrastructure. Neglecting these issues can result in efficiency bottlenecks, connectivity points, safety vulnerabilities, and in the end, disruptions to vital enterprise operations. Cautious planning and implementation of community configuration are important for realizing the complete potential of iSCSI storage expertise.

7. Safety Concerns

Safety issues are paramount when configuring an iSCSI goal (typically denoted as “8.1.3 configure an iscsi goal” in technical documentation). Overlooking these elements can expose helpful knowledge to unauthorized entry, knowledge breaches, and operational disruptions. Implementing strong safety measures through the configuration course of is important for sustaining knowledge confidentiality, integrity, and availability. A failure to prioritize safety may end up in vital monetary losses, reputational injury, and authorized repercussions, notably in industries with stringent regulatory necessities.

A number of key safety measures should be applied throughout iSCSI goal configuration. Entry management restrictions, utilizing mechanisms like initiator IQN whitelisting and network-based entry management, restrict connections to licensed initiators. Robust authentication protocols, equivalent to CHAP (Problem-Handshake Authentication Protocol) and Mutual CHAP, confirm the id of each the initiator and goal, stopping unauthorized entry. Information encryption, utilizing protocols like IPSec or devoted storage encryption options, protects knowledge in transit and at relaxation, safeguarding in opposition to eavesdropping and unauthorized knowledge entry. Common safety audits and vulnerability assessments assist establish and mitigate potential weaknesses within the iSCSI infrastructure. As an illustration, a healthcare group configuring an iSCSI goal for storing affected person knowledge should implement strong entry controls, sturdy authentication, and knowledge encryption to adjust to HIPAA rules and defend delicate affected person data. In a monetary establishment, implementing multi-factor authentication for iSCSI initiator entry can considerably improve safety and stop unauthorized transactions.

Integrating safety issues into the “8.1.3 configure an iscsi goal” course of isn’t merely a greatest apply however a vital requirement for accountable knowledge administration. Implementing strong entry controls, sturdy authentication, and knowledge encryption safeguards delicate data and ensures the integrity and availability of storage assets. Organizations should prioritize safety all through the lifecycle of their iSCSI storage infrastructure, from preliminary configuration to ongoing upkeep and monitoring. This proactive method minimizes the chance of safety breaches and ensures compliance with related trade rules, in the end defending helpful knowledge belongings and sustaining operational stability.

8. Efficiency Optimization

Efficiency optimization is integral to configuring an iSCSI goal (typically designated “8.1.3 configure an iscsi goal” in documentation). Optimum configuration instantly influences storage entry speeds, utility responsiveness, and total system efficiency. With out meticulous consideration to efficiency parameters through the configuration course of, storage bottlenecks can emerge, hindering utility efficiency and impacting consumer expertise. Suboptimal efficiency can result in decreased productiveness, misplaced income, and diminished service high quality. For instance, a poorly configured iSCSI goal serving a virtualized surroundings might end in sluggish digital machine efficiency, impacting utility responsiveness and consumer satisfaction.

A number of components contribute to iSCSI goal efficiency optimization. Community configuration performs an important position. Using a devoted community for iSCSI site visitors minimizes congestion and latency. Enabling jumbo frames reduces community overhead, enhancing throughput. Multipath I/O (MPIO) enhances each efficiency and availability by distributing site visitors throughout a number of community paths. On the storage layer, choosing applicable RAID ranges balances efficiency and redundancy. Stable-state drives (SSDs) supply considerably quicker learn/write speeds in comparison with conventional laborious disk drives (HDDs), decreasing storage latency. Queue depth configuration influences the variety of excellent I/O requests, impacting storage throughput. For a high-transaction database utility, optimizing queue depth and using SSDs can considerably enhance database efficiency. In a video modifying surroundings, using a devoted iSCSI community with jumbo frames enabled can facilitate clean video streaming and modifying workflows.

Optimizing iSCSI goal efficiency requires a holistic method, encompassing community infrastructure, storage {hardware}, and software program configuration parameters. Cautious consideration of those components through the “8.1.3 configure an iscsi goal” section is important for reaching desired efficiency ranges. Failure to deal with efficiency optimization may end up in vital efficiency bottlenecks, impacting utility responsiveness and consumer expertise. Understanding the interaction between these elements permits directors to tailor iSCSI goal configurations to particular workload necessities, maximizing effectivity and minimizing performance-related points. This proactive method to efficiency optimization ensures a responsive and environment friendly storage infrastructure, contributing to total system stability and consumer satisfaction.

Often Requested Questions on iSCSI Goal Configuration

This part addresses frequent inquiries relating to the configuration of iSCSI targets, aiming to supply clear and concise solutions to facilitate profitable implementation and operation. Understanding these regularly raised factors might help keep away from frequent pitfalls and guarantee optimum configuration.

Query 1: What’s the distinction between an iSCSI goal and an iSCSI initiator?

An iSCSI goal serves storage assets over the community. An iSCSI initiator connects to and makes use of the storage offered by the goal. The goal acts because the storage server, whereas the initiator acts because the shopper accessing the storage.

Query 2: How does CHAP authentication improve iSCSI safety?

CHAP employs a three-way handshake involving problem, response, and verification. This course of makes use of shared secrets and techniques, stopping unauthorized entry even when community credentials are compromised. Mutual CHAP enhances safety additional by requiring each the initiator and goal to authenticate one another.

Query 3: What are the implications of incorrectly configuring LUN masking?

Incorrect LUN masking can expose storage assets to unauthorized initiators, resulting in knowledge breaches or corruption. It may additionally forestall authentic initiators from accessing required storage, disrupting operations. Cautious verification of LUN masking configurations is essential for sustaining knowledge safety and system stability.

Query 4: What are the efficiency implications of selecting between skinny and thick provisioning?

Skinny provisioning can supply higher storage utilization initially however might result in efficiency degradation if bodily storage turns into over-allocated. Thick provisioning ensures storage availability however would possibly end in underutilized storage capability. The selection will depend on the particular utility necessities and the steadiness between storage utilization and efficiency consistency.

Query 5: Why is a devoted community really useful for iSCSI site visitors?

A devoted community isolates iSCSI site visitors from different community exercise, stopping congestion and making certain constant storage efficiency. Sharing the community with different site visitors can result in efficiency bottlenecks and latency points, particularly for performance-sensitive purposes. Community isolation ensures optimum storage entry speeds and minimizes disruptions.

Query 6: How does MPIO contribute to excessive availability in iSCSI deployments?

MPIO permits initiators to connect with the goal by a number of community paths. If one path fails, MPIO routinely switches to an alternate path, making certain steady storage entry and minimizing downtime. This redundancy enhances the supply and resilience of the iSCSI storage infrastructure.

Cautious consideration of those regularly requested questions is important for mitigating potential points and making certain a profitable iSCSI goal configuration. A radical understanding of those elements contributes considerably to the general stability, efficiency, and safety of the storage infrastructure.

This FAQ part concludes the dialogue on configuring iSCSI targets. The following part will handle sensible implementation examples and superior configuration eventualities.

Optimizing iSCSI Goal Configuration

Implementing an iSCSI goal requires cautious consideration of assorted components to make sure optimum efficiency, safety, and stability. The following pointers present sensible steerage for directors enterprise the configuration course of.

Tip 1: Plan Capability and Efficiency Necessities

Thorough planning is essential. Precisely assess storage capability wants and efficiency expectations earlier than configuring the iSCSI goal. Contemplate components equivalent to knowledge progress projections, I/O necessities, and utility efficiency wants. This preemptive evaluation helps forestall efficiency bottlenecks and storage limitations later.

Tip 2: Prioritize Community Safety

Implement strong safety measures. Make the most of CHAP authentication to confirm initiator id and defend in opposition to unauthorized entry. Make use of IPsec or different encryption strategies to safe knowledge in transit, safeguarding delicate data. Prohibit community entry by initiator whitelisting and firewall guidelines, minimizing the chance of unauthorized connections.

Tip 3: Optimize Community Infrastructure

Dedicate a separate community or VLAN for iSCSI site visitors. This isolation minimizes congestion and ensures constant storage efficiency. Allow jumbo frames on community interfaces and switches to cut back overhead and enhance throughput. Contemplate implementing MPIO for redundancy and elevated bandwidth.

Tip 4: Choose Applicable Storage {Hardware}

Select storage {hardware} that aligns with efficiency necessities. Stable-state drives (SSDs) supply vital efficiency benefits over conventional laborious disk drives (HDDs), particularly for I/O-intensive purposes. Choose the suitable RAID stage to steadiness efficiency, capability, and knowledge redundancy based mostly on particular wants.

Tip 5: Configure LUNs Strategically

Map LUNs logically to align with utility and consumer wants. Implement LUN masking to limit entry to particular initiators, making certain knowledge safety and isolation. Contemplate implementing skinny provisioning for environment friendly storage utilization, however monitor capability carefully to keep away from over-provisioning.

Tip 6: Monitor and Preserve Recurrently

Implement strong monitoring instruments to trace storage efficiency, capability utilization, and community well being. Recurrently overview logs and efficiency metrics to establish potential points proactively. Set up a upkeep schedule for firmware updates and safety patching to make sure optimum efficiency and safety.

Tip 7: Doc Configuration Particulars

Preserve complete documentation of all configuration settings, together with community parameters, authentication credentials, LUN mappings, and storage allocation particulars. This documentation is vital for troubleshooting, upkeep, and future modifications. Correct documentation facilitates environment friendly administration and reduces the chance of configuration errors.

Adhering to those suggestions ensures optimum efficiency, safety, and stability for iSCSI goal implementations. These proactive measures decrease the chance of efficiency bottlenecks, safety vulnerabilities, and operational disruptions, contributing to a dependable and environment friendly storage infrastructure.

The concluding part will summarize key takeaways and supply remaining suggestions for profitable iSCSI goal deployment and administration.

Conclusion

Configuring an iSCSI goal, as denoted by the key phrase “8.1.3 configure an iscsi goal,” requires meticulous consideration to element and a complete understanding of its varied elements. This doc has explored essential elements of goal configuration, together with goal definition, entry management, authentication, LUN mapping, storage allocation, community configuration, safety issues, and efficiency optimization. Every of those elements performs an important position in establishing a practical, safe, and environment friendly iSCSI storage infrastructure. Neglecting any of those areas can result in efficiency bottlenecks, safety vulnerabilities, and operational instability. Correct configuration ensures knowledge integrity, accessibility, and optimum utilization of storage assets.

Profitable implementation of an iSCSI goal requires a proactive and well-informed method. Directors should rigorously take into account the particular necessities of their surroundings, together with efficiency expectations, safety wants, and storage capability calls for. Thorough planning, meticulous configuration, and ongoing monitoring are important for sustaining a strong and dependable storage infrastructure. Steady analysis of evolving storage applied sciences and greatest practices is vital for adapting to future calls for and making certain long-term success in managing iSCSI storage deployments.