"As part of the planning process, a strategy should have been devised regarding how iSCSI Software Target will be accessed from the network, including but not limited to:" . . . .