Login. Before iSCSI sessions can be created, and therefore before data can be Figure 65 shows the entire login, authentication, and parameter negotiation .