Module 3
Module 3
Contents:
Th Th
is is
do do
cu cu
me me
nt nt
be be
lon lon
.blModule gs overview
ax a x.b gs
No t No l to
un ag oA un ag
au a@ le a a @ Ale
th o g x an u th o g xa
r ma d r ma nd
Lesson 1: zOverview i ed il.c of rDAS,
o m
u B NAS, and SANs ize
d
il.c
o m
ru
Bla
co lag co ga
pie a. pie .
sa sa
llo llo
Lesson 2: Comparing we Fibre Channel, iSCSI, and Fibre Channel
d!
we over Ethernet
d!
Storage is a key component that you must consider when planning and deploying
your datacenter infrastructure. Most organizations require large amounts of storage,
and this requirement is always increasing. Users work regularly with apps that create
Th Th
is is
new files,
do which require storage in a central location.
cu
do When users keep their files for
cu
me me
nt nt
longer periods,bestorage demands increase.
lo
be
lon
ax ng gs ax
No .b l st .b l No to
u ag
o ag u
na a@ Ale na a@ Ale
u th g x a u th g xa
o ri ma nd o ri ma nd
Storage options ze
d c have
il.c expanded
om
ru
Bla greatly over the last several ze
d c years,
il.c with
om
ru the
Bla
op g a. o p ga
ies ies .
introduction of new atechnologies llo and the expansion of existing ones. all
ow Therefore, as
we ed
d! !
you plan your storage solutions, you must account for your current environment’s
technologies and the impact of introducing new technologies. Many organizations
have standardized on a core group of hardware vendors and communication
standards, and virtualization is driving many administrators to reevaluate those
standards
Th and begin thinking about next-generation
Th storage solutions for heavily
is is
d o d o
virtualizedcuminfrastructures.
e
This module introduces youcumtoe various storage hardware
nt nt
be be
lon lon
gs gs
to to
Ale Ale
1 of 75 xan xan 19/03/2019, 07:46
d ru d ru
Bla Bla
g a. g a.
about:blank
Objectives
After completing this module, you will be able to:
Th Th
is
• Describe is
direct-attached storage (DAS), network-attached storage (NAS), and
do do
c um c um
en en
storage areat b networks (SANs).
e
tb
elo
ax lon ax ng
No .b l gs No .b l st
u to
ag u ag oA
na a@ Ale na a@ lex
• Compare
u tho FibremChannel,
riz
g
ail
xa
nd Internet Small Computer System
u th o
riz
g Interface
m ail
an (iSCSI),
d ru
and
ed .co ru ed .co
co overmEthernet. Bla m Bla
Fibre Channel pie ga
.
co
pie ga
.
sa sa
llo llo
we we
d! d!
• Explain the use of Internet Storage Name Service (iSNS), Datacenter Bridging
(DCB), and Multipath I/O (MPIO).
Th Th
is is
do do
cu cu
me me
Lesson
N
ax
.
1: loOverview
n g
of DAS, NAS,
nt
N
and
be
a x.
nt
be SANs
lon
g
ou bla st ou bla st
na ga oA na ga oA
u th @ le x u @ lex
o ri g ma an t ho g ma an
ze il.c d ru riz il.c d ru
dc om Bla ed om Bla
When you are planning op storage, g you need to determine how c oyour servers will
ga access
ies a. pie .
all s all
ow ow
disks. In some cases, you ed can attach disks directly to the servers that
!
ed require the
!
storage. However, in enterprises, storage often is in NAS or SANs, which provide
more flexibility. In this lesson, you will learn about the different methods that you can
use to provide servers with storage access.
his T Th
Lesson do objectives
cu
is
do
cu
me me
nt nt
be be
AfterNcompleting l nthis lon
gs lesson, you will be able to: N
ax o ax
. b . b gs
ou lag to ou lag to
na a@ Ale na a@ Ale
u th g x a u th g xa
o ri ma nd o ri ma nd
ze il.c ru ze il.c ru
dc om Bla dc om Bla
• Describe the ostorage pie solutions ga
. that are deployed in your environment.
op
ie
ga
.
sa sa
llo llo
we we
d! d!
• Describe DAS.
• Describe NAS.
• Describe SANs.
Th Th
is is
do do
cu cu
me me
nt nt
be be
lon lon
gs gs
to to
Ale Ale
2 of 75 xan xan 19/03/2019, 07:46
d ru d ru
Bla Bla
g a. g a.
about:blank
Th Th
is is
do do
cu cu
me me
nt nt
be be
ax lon ax lon
No .b l gs No .b l gs
u ag to u ag to
na a@ Ale na a@ Ale
u th gm x an u th g xa
o ri ail d ru o ri ma nd
ze .co ze il.c ru
dc m Bla dc om Bla
op g a. op ga
ies ies .
all all
ow ow
ed ed
! !
Organizations have a wide variety of storage options, such as DAS, NAS, and SANs.
Each of these options is valid for different scenarios.
Th Th
is is
do do
um c cu
Check Youren Knowledge
tb
me
be
nt
elo lon
ax ng ax gs
No .b l st No .b l to
u oA ag u ag
au n lex a@ na a@ Ale
Discoveryth o
r ail
an gm
d ru
u th
o ri g ma xa
nd
ize .co ze il.c ru
dc m Bl dc om Bla
op
Which storage solutions
ies does ayour ga
. organization use? o p ies ga
.
all all
ow ow
Show solution Reset ed ed
! !
Answers will vary, but will probably include a mix of direct attached storage (DAS),
network-attached storage (NAS), and storage area networks (SANs).
hisT Th
Check doYour Knowledge
c
is
do
cu
um me
en nt
tb be
elo lon
ng gs
st to
oA Ale
3 of 75 lex x 19/03/2019, 07:46
an an
d ru d ru
Bla Bla
g a. g a.
about:blank
Discovery
What benefits do those storage solutions offer?
Each organization will have different ideas as to the benefits offered by their storage
solutions. Some benefits might include:
Th Th
• DASis
do is easy to manage.
is
do
cu cu
me me
nt nt
• A SAN be many features, including be
ax offers lon
gs
snapshots and replication.
a lon
x.b gs
No .b l to No lag to
un ag u
au a@ Ale na a@ Ale
th o g xa u th gm xan
riz ma nd o ri ail d ru
ed il.c ru ze .co
co o m Bla dc m Bla
pie ga op g a.
What is DAS? sa
llo
we
. ies
all
ow
d! ed
!
Th Th
is is
do do
cu cu
me me
nt nt
be be
ax lon ax lon
No .b l gs No .b l gs
u ag to u ag to
na a@ Ale na a@ Ale
u th gm xan u th g xa
o ri ail d ru o ri ma nd
ze .co ze il.c ru
dc m Bla dc om Bla
op g a. op ga
ies ies .
all all
ow ow
ed ed
! !
Th Th
is is
do do
cu cu
me me
n direct-attached nt
Almost all servers t be provide built-in storage, or be storage (DAS). DAS
ax lo ng ax lon
No .b l s N . b gs
can include
un
au
disks
a ga
@
that
t o A are
lex
physically located inside
o the
un
au
server
la ga
@
ortothat
Ale connect directly
th o gm an th o gm xa
ail ail USBndcable
with an external riz
ed array, .co or ddisks
ru
B that connect to the server riz with a
ed .co ru
Bla or an
co m lag co m ga
pie a p ies
alternative connector. s a However,. because you connect DAS storage all to the .
server
llo ow
we ed
physically, the storage isd! unavailable if the server fails. DAS comes in ! various disk
types, such as Serial ATA (SATA), serial attached SCSI (SAS), or solid-state drive
(SSD). These disk types all offer different speeds and performance levels, and have
advantages and disadvantages.
Th Th
is is
do do
Advantages
cu
me of using DAS
cu
me
nt nt
be be
lon lon
gs gs
to to
Ale Ale
4 of 75 xa xan 19/03/2019, 07:46
nd d ru
ru
Bla Bla
g a. g a.
about:blank
A typical DAS system has a data-storage device that includes a number of hard
drives, which connect directly to a computer through a host bus adapter (HBA).
There are no network devices—hubs, switches, or routers—between the DAS and
the computer, but rather, the storage connects directly to the server that utilizes it.
Therefore, DAS is the easiest storage system to deploy and maintain.
Th Th
is is
do do
c
DAS typicallyum is the least expensive storage that is available, cu and it is available
en me
tb nt
elo b elo
widely
No
in various
ax
.b l nspeeds
gs and sizes to accommodate No
different
ax
.b l nginstallations.
st
un ag t o u ag oA
a@ Ale na a@
Additionally,
au
th o it is ginexpensive
m x an and is very easy to configure.
u th o Ing mmost lexinstances, you
an
riz ail d ru r ize a il.c d ru
ed .co B d o Bla
simply plug in the co device,
pie
m ensure
lag
a. that the running Windows coperating
o pie
m system ga
sa sa .
llo llo
recognizes it, and thenweuse d!
the Disk Management feature to configure we
d!
the disks.
Storing data locally on DAS makes data centralization more difficult because the
T T
data is
his on multiple servers. This might make it more
do
his complex to back up data and
do
cu cu
m m
users mightefind
nt
b it more difficult to locate the data that they
en
t b want to find.
elo elo
x.b gsa n x.b gs a n
Furthermore,
No
u laif
g any tone
o device to which DAS connects
No
u suffers
lag atopower outage, the
na a@ Ale na a@ Ale
u th
gm an x u th gm xan
storage on othat
riz
ed
device
ail
.co becomesd ru unavailable. o ri
ze ail
.co d ru
co m Bla dc m Bla
pie g a. op g a.
sa ies
llo all
we ow
ed
With DAS, allocating additional d! storage to servers can be more complex
! than with a
SAN. With DAS, a physical disk needs to be installed in the server, whereas with a
SAN, existing unallocated storage can be given to a server to expand storage
without physically accessing the server.
Th Th
is is
What is
cu NAS?
me
do do
cu
me
nt nt
be be
ax lon ax lon
No .b l gs No .b l gs
u ag to u ag to
na a@ Ale na a@ Ale
u th gm xan u th g xa
o ri ail d ru o ri ma nd
ze .co ze il.c ru
dc m Bla dc om Bla
op g a. op ga
ies ies .
all all
ow ow
ed ed
! !
Th Th
is is
do do
cu cu
me me
nt nt
be be
lon lon
gs gs
to to
Ale Ale
5 of 75 xan xan 19/03/2019, 07:46
d ru d ru
Bla Bla
g a. g a.
about:blank
Th Th
is is
do do
cu cu
me me
nt nt
be be
ax lon ax lon
No .b l gs No .b l gs
u ag to u ag to
na a@ Ale na a@ Ale
u th gm x an u th g xa
o ri ail d ru o ri ma nd
ze .co ze il.c ru
dc m Bla dc om Bla
op g a. op ga
ies ies .
all all
ow ow
ed ed
! !
NASTis
his storage that connects to a dedicated storage
Th
is
device and is then accessed
do do
cu
over the network.
me
n
NAS differs from DAS because the cstorage
um
en does not attach
tb tb
lon e lon e
directly
No to each
ax
.b individual
gs server, but rather is accessible
No
ax across
.b gs a network to many
un lag to un lag to
a A a A
servers. aNAS
u th @
or hasgmtwo
a
lex
distinct
an
d
au
solutions: a low-end appliance
th o
r
@
(NAS
gm
a
lex
only)
an
d
and an
ize il.c ru ize il.c ru
m d o B dc o m Bla
enterprise-classcoNAS
pie that integrates
lag
a. with a SAN. op
ies g a.
sa all
llo ow
we ed
d ! !
Each NAS device has a dedicated operating system that solely controls data access
on that device, which reduces the overhead associated with sharing the storage
device with other server services. Windows Storage Server, a feature of Windows
Server 2016, is an example of NAS software.
Th Th
is is
do do
cu cu
me me
NAS devices ttypicallyn
be provide file-level access to storage, nt which means that data in
be
ax lo ng ax lon
No .b l s N . gs
the storage
un isa accessible
ga t o A
only as files and folders,o and
un youb la ga must to use protocols such
Ale
au @ lex au @ xa
th o gm an th o gm nd or network
as CommonizInternet r
ed
a il.c File System
o
d ru
B
(CIFS), Server MessageizeBlock r
d
a il.(SMB),
co ru
Bla
co m lag co m ga
pie a. p
file system (NFS) tos aaccess llo
the files. ie sa
llo
.
we we
d! d!
To enable NAS, you need a storage device. Frequently, these devices do not have
any server interfaces, such as keyboards, mice, and monitors. To configure the
device, you need to provide a network configuration, and then access the device
across
T a network. You then can create shared folders
T on the device by using the
his his
do do
name of the
cu NAS and the share that
me you create. These cu shares then are accessible to
m
nt en
be tb
lon elo
gs ng
to st
Ale oA
6 of 75 xa lex 19/03/2019, 07:46
nd an
ru d ru
Bla Bla
ga g a.
.
about:blank
NAS is an ideal choice for organizations that are looking for a simple and cost-
effective
Th
i
way to achieve fast data access, at the Tfile
hi level, for multiple clients. NAS
sd sd
cu o cu o
users benefit
me from performance and productivity gains, mbecause
e a NAS device’s
nt nt
elo b be
processing
N
ax power
.b ng is dedicated solely to file distribution.
s N
ax
.b
lon
gs
ou lag to ou lag to
na a@ Ale na a@ Ale
u th gm xan u th gm xan
o ri ail d ru o ri ail d ru
ze .co ze .co
dc
m the Bmarket dcBla
NAS also fits nicely
op into
ies
lag
a. as a mid-priced solution.opItie is not
m expensive,
ga
.
but
all sa
ow DAS in the following ways: llo
it suits more needs than ed we
d
! !
• NAS typically includes Redundant Array of Independent Disks (RAID) for data
redundancy.
Th Th
is is
d oc do
um cu
en me
nt
• NAS offers baelosingle location for all critical files, rather than
t be dispersing them
lon
on
ax n gs a x.b gs
No .b l No
various
un
au servers
a ga
@
byAusing
t o
le
DAS. un
a
la ga
@
to
Ale
th o gm xa u th g xa
riz ail n d ru o riz m ail nd
ed .co e . c ru
co m Bla dc om Bla
• NAS offers centralized pie
sa
storage g a. at an affordable price. o pie
sa
ga
.
llo llo
we we
d! d!
• NAS units are accessible from any operating system. They often have multiple-
protocol support and can serve up data via CIFS and NFS simultaneously. For
example, Windows and Linux hosts can access a NAS unit simultaneously.
Th Th
is is
do do
NAS alsocuismea Plug and Play (PNP) solution that is easy
cu to install, deploy, and
me
nt nt
be be
manage,
No regardless
ax
.b l
lon
gs of whether you have IT staff Nonsite.
ax
.b
lon
gs
un a ga to ou lag to
au @ Ale na a@ Ale
th o gm xa u th gm xan
riz ail nd o ri ail d ru
ed .co ru ze .co
Bla dc Bla
Disadvantages oof c
pie using NAS
m ga
.
op
ies
m g a.
sa all
llo ow
we ed
d! !
NAS is slower than SAN technologies. You typically access NAS by using Ethernet
protocols, and it relies heavily on the network that is supporting the NAS solution.
Therefore, NAS commonly is used as a file sharing/storage solution, but you cannot
(and should not try to) use it with data-intensive programs such as Microsoft
hisT Th
Exchangedo Server and Microsoft SQL Server.
is
do
cu cu
me me
nt nt
be be
lon lon
gs gs
to to
Ale Ale
7 of 75 xan xan 19/03/2019, 07:46
d ru d ru
Bla Bla
g a. g a.
about:blank
NAS is affordable for small to mid-size businesses, but provides less performance
and might be less reliable than a SAN. For this reason, most large enterprises use
SANs rather than NAS.
What is a SAN?
Th Th
is is
do do
cu cu
me me
nt nt
be be
ax lon ax lon
No .b l gs No .b l gs
u ag to u ag to
na a@ Ale na a@ Ale
u th gm xan u th g xa
o ri ail d ru o ri ma nd
ze .co ze il.c ru
dc m Bla dc om Bla
op g a. op ga
ies ies .
all all
ow ow
ed ed
! !
Th Th
is is
do do
cu cu
me me
nt nt
be be
ax lon ax lon
No .b l gs No .b l gs
u ag to u ag to
na a@ Ale na a@ Ale
u th gm xan u th g xa
o ri ail d ru o ri ma nd
ze .co ze il.c ru
dc m Bla dc om Bla
op g a. op ga
ies ies .
all all
ow ow
ed ed
! !
The third type of storage is a SAN, which is a high‐speed network that connects
computer systems or host servers to high-performance storage subsystems. A SAN
usually includes various components such as HBAs, special switches to help route
traffic, and storage disk arrays with logical unit numbers (LUNs) for storage.
Th Th
is is
do do
cu cu
A SAN enables
me
n
multiple servers to access a storage pool
me in which any server
n
tb tb
lon e e
potentially
N
axcan access
.b gs any storage unit. However,N because
ax
.b alonSAN
gs uses a network,
ou lag to ou lag to
n a A n a A
you can auseo gm lex many different devices andauhosts,@and
@ connect
uth it to an th o
lexprovide access
gm to an
riz ail d ru riz ail d ru
ed Bla .co ed .co Bla
to any connected
co device
pie
m from galmost
a. anywhere. co
pie
m g a.
sa sa
llo llo
we we
d! d !
SANs provide block-level access. This means that rather than using a file-access
protocol to access disk contents as files, SANs write blocks of data directly to the
disks by using protocols such as Fibre Channel over Ethernet or Internet SCSI
(iSCSI).
Th Th
is is
do do
cu cu
me me
nt nt
be be
lon lon
gs gs
to to
Ale Ale
8 of 75 xan xan 19/03/2019, 07:46
d ru d ru
Bla Bla
g a. g a.
about:blank
Today, most SAN solutions offer SAN and NAS together. The backend head units,
disks, and technologies are identical, and the access method is the only thing that
changes. Enterprises often provision block storage from the SAN to the servers by
using Fibre Channel over Ethernet or iSCSI, while NAS services typically are
available through CIFS and NFS.
Th Th
is is
do do
Advantages c um of using SAN cu
en me
tb nt
elo be
ax n a lon
No .b l gs N x.b gs
un ag t oA o un lag to
a a@ a a @ Ale
SAN technologies
u th
o ri g maread lexand write at block levels, which
an u th omakes g madata xaaccess much
nd
ze il.c d ru r ize il.c ru
dc om Bla dc om Ba
faster. For example, op
ies
with most g DAS
a and NAS solutions, if you op write a file lof
ies ga 8
. .
all all
gigabytes (GB), the entire ow
ed file has to be read/written and its checksum ow
ed calculated.
! !
However, with a SAN, the file is written to the disk based on the block size for which
you configure the SAN. This speed is accomplished by using Fibre Channel and
block-level writing, instead of reading/writing an entire file by using a checksum.
Th Th
SANs ialso
sd provide: is
do
oc cu
um me
en nt
tb be
elo lon
ax ng ax
gs
• Nou .
Centralization b lag of s tostorage into a single pool, which No u enables. b lag storage
to resources and
na a@ Ale na a@ Ale
u th g x an u t ho g x an
ma ma
server resources
o ri
ze il.to
co
grow dru independently. They also enable riz
ed dynamic il.c drstorage
uB
dc m Bla c om lag
op g a o pie a. storage
assignment froms athe pool, when necessary. You can increase
ie . s a or decrease
llo llo
w w
on a given server asenecessary, d! without complex reconfigurationedor ! recabling of
devices.
The main drawback to SAN technology is that you likely will need to use
management tools and have expert skills because of its configuration complexities.
Additionally, it is considerably more expensive than DAS or NAS. An entry-level SAN
often costs as much as a fully loaded server with a DAS or NAS device, and that is
without any SAN disks or configuration.
Th Th
is is
do do
To manage c uma SAN, you must have a firm understanding cu of the underlying technology,
en me
tb nt
elo be
including
No
the
ax LUN
.b l n setup,
gs the Fibre Channel network,
N
the
a x.b block
lon sizing, and other
gs
un ag t oA o un lag to
a@ a Ale
factors. Additionally,
a u th
o ri g ma each
lex
an storage vendor often implements
a u th o
@ SANs
g ma by
xa using different
nd
ze il.c d ru r ize il.c ru
dc o B d o Bla
tools and features. op Therefore,
ies
m lagorganizations often dedicate personnel
a
co
p ies
m to SANga
. .
all all
deployment solely. wed o o we
d!
!
Note: You can implement SANs by using a variety of technologies, and the
most common options are Fibre Channel and iSCSI.
Th Th
is is
do do
c cu
Comparison
um
en
tb and scenarios for usage me
nt
be
elo lon
ax ng ax gs
No .b l st No .b l to
u ag oA u ag
na a@ lex na a@ Ale
u th gm an u th g xa
o ri ail d ru o ri ma nd
ze .co ze il.c ru
dc m Bla dc om Bla
op ga op ga
ies . ies .
all all
ow ow
ed ed
! !
Th Th
is is
do do
cu cu
me me
nt nt
be be
ax lon ax lon
No .b l gs No .b l gs
u ag to u ag to
na a@ Ale na a@ Ale
u th gm x an u th g xa
o ri ail d ru o ri ma nd
ze .co ze il.c ru
dc m Bla dc om Bla
op g a. op ga
ies ies .
all all
ow ow
ed ed
! !
A good understanding of DAS, NAS, and SAN is the first step you must take in
identifying the storage solution that best fits your requirements, and you should be
aware
Th that each of these storage technologies has
is
d
Th expanded its available features
is
d
oc oc
um um
en en
tb tb
elo elo
ng ng
st st
oA oA
10 of 75 lex lex 19/03/2019, 07:46
an an
d ru d ru
Bla Bla
g a. g a.
about:blank
and added flexibility. Often, you will not have a clear best choice, so this next topic
examines the three topologies again, and compares them and explains which is the
best solution for different scenarios.
DAS
Th Th
is is
do do
cu
You might mconsider
e using DAS because it typically is cthe
um least expensive and least
e
nt nt
elo b elo b
complex
N solution.
ax
.b ng However, DAS might require more
s N administrative
ax
.b ng
s
overhead than
ou lag to ou lag to
n a A n a A
NAS andauSAN,
th o
@
gm lex if you deploy multiple DASasolutions.
especially
an u th
o
@
gm Forlexexample,
an imagine
riz ail d ru riz ail d ru
dc Bla e .co dc Bla e .co
that your organization
op
i
mis deploying
ga 15 Microsoft Hyper-V nodes
op in ma failover
i ga cluster in
es . es .
llo a llo a
Windows Server 2016. weIf you use NAS or SAN, a single highly available
d
we
d
storage
! !
solution can accommodate the failover cluster. However, if you use DAS, you might
need 15 appliances. In such cases, DAS can create storage sprawl, which means
that there are ever-increasing and expanding storage islands, which might be
difficult to manage and maintain.
Th Th
is is
do do
cu cu
me m
To combat this,
nt the latest DAS solutions sometimes include
b
en
t b some key SAN features,
elo elo
x.b a
gcommunication n x.b gs a n
including
No
u multiple
lag st
o protocols, enterprise-management
No
u lag to software, and
na a@ Ale Ale
na a@
u th
gm an x u th gm xa
easy expansion.
o riz
ed
Youail can duse
.co ru these features to add additional
o riz
e
disk
ail
. c
shelves.
nd
ru Entry-
co m Bla dc om Bla
pie provide only g o pie and do not g
level DAS offerings sa
a. a single shelf in each appliance,
sa
a. support
llo llo
we w
expansion. These restrictions d! lead to storage sprawl. However, withedhigh-end ! DAS
systems, you can expand the disk shelves and disk count, and deploy solutions
easily with hundreds of terabytes (TBs) of storage space. Therefore, these solutions
can handle the Hyper-V failover cluster scenario that the prior section describes.
Th Th
is is
In largerdoorganizations,
cu some database-management
do teams and messaging teams
cu
me me
tDAS n tb n
prefer to use
a
be
lo solutions to reduce their reliance ona the organization’s
elo storage
N x.b ng N x.b ng
s st
team.oThis
un lag
au gives
to
a@ them
o lag
Alemore control over their own ustorage.
na
u
a@ oA
lex
th o gm xa th o gm an
riz ail nd riz ail d ru
ed .co ru ed .co
co m Bla co m Bla
pie g a. pie ga
sa sa .
NAS llo
we
llo
we
d ! d!
A large majority of organizations use NAS, although many do not refer to their shared
folder solutions as NAS. Third-party storage companies have introduced or
expanded their NAS offerings, so it is common for SAN solutions to deliver NAS
services
Th
is via CIFS or NFS, as well. Therefore, in many
Th
is organizations, SAN and NAS
do do
cu cu
me me
nt nt
be be
lon lon
gs gs
to to
Ale Ale
11 of 75 xan xan 19/03/2019, 07:46
d ru d ru
Bla Bla
g a. g a.
about:blank
often share the same storage appliances, disk shelves, and supporting
infrastructure.
NAS is so ubiquitous that it likely is not useful to compare it directly to DAS or SAN.
DAS and SAN often compete directly with each other, but NAS typically plays a
complementary
Th role in systems that also incorporate
Th DAS and SAN. Recently, some
is is
d o d o
cu
technologies cu example is Hyper-V, which
me have adopted support for NAS. One suchme
nt nt
elo b elo b
now Nsupports
ax
.b
storing
ng
s
virtual machines on SMB 3.0
N
shares.
ax
.b
If nadditional
gs technologies
ou lag to ou lag to
Ale A
begin tonasupport
u th
o
a@
gNAS,
m xthen
an more-direct competitionnawith
u th
o
a@
DASgm andlexSAN
an is likely in
riz ail d ru riz ail d ru
ed .co Bla ed .co Bla
the future. co
pie
m g a.
co
pie
m g a.
sa sa
llo llo
we we
d ! d !
SAN
SAN solutions are known widely as the best enterprise storage solution. For a long
time, SAN was the only solution for high-performance storage. Not only is it flexible
Th Th
and high
is performing, but you also can expand it more
d
is
d easily than DAS and NAS.
oc oc
um um
en en
tb tb
elo elo
ax ng gs ax n
However,
No
un DAS
.bl ands tNAS have expanded their markets
ag oA
No
un recently.
.b l
ag tDAS
oA solutions can
au a@ lex au a@ lex
ho t an g an t g
riz
e
ma
offer high-performance il.c storage
d ru without the complexityhoof e
ma because
riz a SAN,
il.c d ru it utilizes
dc om Bla dc om Bla
ga o o
pie SSD technologies.
the latest disk and sa . pie
Countering that, SAN solutions
sa can goffer
a. the
llo llo
ed w ed w
same disk and SSD technologies
! on a much larger scale, and the scale
! is the key
differentiator. Whereas the largest DAS solutions offer hundreds of TBs of storage
space, the top SAN solutions offer thousands of TBs of storage space. Additionally,
SAN solutions offer more spindles, which often lead to better performance.
Th Th
is is
Finally, SAN
do
cu solutions offer:
m
do
cu
me
en nt
tb be
elo lon
ax ng gs ax
No .b l st .b l No to
u ag o ag u
• The best
n au management
th o
a @
gm
A lex tools. SAN management tools n au
th o
often
a @ provide
gm
Ale
xa a single
an nd
riz ail d r u r iz a il ru
management .co
ed interface. Bla ed .co Bla
co m ga c op m ga
pie . ie .
sa sa
llo llo
we we
• The most enterprise features. d! For example, a common feature is dan ! SSD cache in
front of a huge spindle of spinning disks.
• The most flexibility. SANs provide SAN and NAS services in a single solution.
Th Th
is is
do do
cu cu
me me
nt nt
be be
lon lon
gs gs
to to
Ale Ale
12 of 75 x an xan 19/03/2019, 07:46
d ru d ru
Bla Bla
g a. g a.
about:blank
Future trends
With each new version of Windows Server, Microsoft is making Windows Server with
DAS a more competitive option compared with SAN storage. Windows Server 2012
introduced storage spaces to provide redundancy for DAS, without requiring a RAID
controller.
Th However, we recommend that you useThcaching controller for performance.
is is
d o d o
WindowscuServer
me
cu allow the most frequently
2012 R2 introduced storage tiering to me
nt nt
elo b elo b
accessed
N
adisk
x.b blocks
ng
s
to be automatically stored Non SSD
ax drives
.b ng instead of spinning
s
ou lag to ou lag to
na a@ Ale na a@ Ale
disks. Highuth availability
o gm for
xa shared folders was also available
n
u th
o
by
gm implementing
xa
n
Scale-
riz ail d ru riz ail d ru
dc om Bla e .cdc oto Bla e .c
Out File Server. Windows
op
i
Server
ga 2016 also adds Storage Replica
op
i
m providega block-
es . es .
a a
level synchronous orlloasynchronous
we
d
llo
replication between two servers we that are using
d
! !
DAS.
The storage features that Windows Server includes are expanding steadily to include
those available only in SANs previously. Using Windows Server with DAS is often
Th
much iless
sd expensive than using it with a SAN, if Tthe
his feature set meets your needs.
d
oc oc
um um
en en
tb tb
elo elo
ax ng ax ng
Scenarios
No
u
.for
bla using
g
s t DAS, NAS, or SAN
o
No
u
.b l
ag oA
st
na a@ Ale na a@ lex
u th gm x an u th gm an
o ri ail d ru o ri ail d ru
ze .co ze .co
dc m Bla dc m Bla
op op
ies highlights gsome
The following table a. common storage scenarios, ies and describes ga
. the
a llo all
we ow
ed
capabilities of DAS, NAS,! and SAN in each scenario. d !
environments
computing device
might expand into features, but more
without prohibitive costs
decentralized islands than required for
of storage user home folders
Th Th
is
do
• Enterprise is
do
• Home folders
cu cu
me management of many me might need to be
nt nt
be be
ax lon DAS installations adds ax lon centralized
No .b l gs No .b l gs
u ag toadministrative u ag to
na a@ Ale na a@ Ale
u th g xa u th gm xan
o ri ma nd o ri
ze overhead
il.c ru ze ail•
.co dru be cost-
Might
dc om Bla dc m B lag
op ga op a.
ies . ies prohibitive
all all
ow ow
ed ed
! !
Storage of Very good performance but Supported for Hyper-V Excellent performance and
virtual the administrative overhead is in Windows Server features make this the
machines higher than SAN solutions 2012 R2 or later, NAS is best choice for most
a good choice when virtual environments
trying to keep costs and
Th Th
is complexity islow
do do
cu cu
me me
nt nt
be be
Branch office
ax lon a lon Often cost-prohibitive and
No .b l • gs Easy to deploy and at • Easy x.b
No to deploy gs
ag to la to
shared ufolders
na a@ Ale un
au
ga
@ more Ale features than what is
u th g a lowxa cost th o gm xa
o ri ma nd riz arequired ndfor a branch
ze il.c ru ed il.c ru
dc o m Bla • Moderate cost co om Bla
op g a. pie office ga
ies sa .
• aOften
llo the best choice llo
we we
d
for general
! shared d!
• Often a good
folders in branch choice for
offices because you branch offices
do not need that have a small
infrastructure at the infrastructure on
branch offices site
Th Th
is is
do do
cu cu
me me
nt nt
be be
Tiered storage
a Not
lon as flexible as SAN, but Limited communication
a lon
N x.b gs N gs •
x.b Most flexible
ou lag viabletofor a small budget
for applications ou lagto
protocols compared to
na a@ A lex na a@ Ale
u th gm an ut gm xa
o ri
ze situation
ail
.co d ru SAN, but some horiz ail nd
.•co Built-inru
dc Bla ed Bla tiering,
op m ga c op m ga
ies . solutions are viable, ies .
all all caching, and other
ow such as a Scale-Out File ow
ed edperformance
! !
Server with Storage
enhancements
Spaces and tiering
make SAN the best
choice for
applications
Th Th
is is
do do
cu cu
me me
nt nt
be be
lon lon
gs gs
to to
Ale Ale
14 of 75 x an xan 19/03/2019, 07:46
d ru d ru
Bla Bla
g a. g a.
about:blank
Microsoft Lowest cost, very good Not a valid choice Excellent performance and
Exchange performance, and a very good features make this a top
database and alternative to SANs, especially choice
log storage for messaging teams that
Th prefer to administer their own Th
is is
do storage do
cu cu
me me
nt nt
be be
ax lon ax lon
No .b l gs No .b l gs
Block-level
na u
ut
a@ storage
g
to
Ale
x
vs. file-level storage
ag u na
u th
ag
a@
g
to
Ale
xa
ho ma an o ri ma nd
riz il.c d ru ze il.c ru
ed o Bla dc om Bla
co m g op ga
pie a. ies .
sa all
llo ow
we ed
d ! !
Th Th
is is
do do
cu cu
me me
nt nt
be be
ax lon ax lon
No .b l gs No .b l gs
u ag to u ag to
na a@ Ale na a@ Ale
u th gm x an u th g xa
o ri ail d ru o ri ma nd
ze .co ze il.c ru
dc m Bla dc om Bla
op g a. op ga
ies ies .
all all
ow ow
ed ed
! !
You can arrange data on a disk in two ways: by blocks or by files. These ways of
Th Th
is is
arrangingdo data are block-level storage and file-level
cu
dstorage.
oc
u
Often, one arrangement
me me
nt nt
or the other is bthe
elo best solution in a particular scenario. Sometimes,
be
lo
however, they
ax ng ax ng
N
ou laeach .b so lag N .b s
complement
na ga
@ other
to
Ale in a storage infrastructure.uFor
na example,
a@
to it is common to use
Ale
u th gm xa u th gm xa
riz ail o d ru n o ri ail nd
both types of estorage
d .co in large
m Bl enterprise environments.
ze
dc .co
m
ru
Bla
co ag op g
pie a. ies a.
sa all
llo ow
we ed
! d
You typically use block-level storage in conjunction with a SAN, and !part or all of
that storage is allocated to servers. You typically use file-level storage in conjunction
with NAS, and NAS, a storage server or a file server allocates those chunks of
storage by using file-level protocols, such as CIFS or NFS. Additionally, you typically
placeThfile-level storage on block-level storage. Th
is is
d oc do
um cu
en me
tb nt
elo be
ng lon
st gs
oA to
lex Ale
15 of 75 an xan 19/03/2019, 07:46
d ru d ru
Bla Bla
g a. g a.
about:blank
Block-level storage
Block-level storage is delivered to servers via a SAN, most often by using one of the
SAN communication protocols, such as iSCSI, Fibre Channel, or Fibre Channel over
Ethernet. Storage administrators create storage volumes out of chunks of block-level
storage.
Th Inside the volumes, storage administrators
Th create LUNs, which are virtual
is is
d o d o
cu c
me You configure, or present, LUNs for useumon
storage areas. e
one or more servers.
nt nt
e b elo b
Servers
N
see
ax the lopresented
.b ng
s
LUNs as physical hardN drives,
ax and
.b ngadministrators create
s
ou lag to ou lag to
Ale Ale
volumesnain o
a@
uth Windows
gm Server
xa
n
na
2016 based on the LUNs. o
a@
uthVolumes
gm are xformatted
an with a
riz ail d ru riz ail d ru
dc Bla
om NTFS e .c dc om Bla e .c
file system, such opas the
i gfile
a system or Resilient File System
op
i
(ReFS), gand
a then
es . es .
a
llo manner as a physical or virtual hard disk. Block-level
llo a
accessed in the same we
d
we
d
storage
! !
has the following characteristics:
• It is very flexible. For example, you can use it as an operating system volume, a
data volume, or a storage location for shared folders.
Th Th
is is
do oc d
• It is not
cu tied to a specific operating system or a specific
me um
e
file system. All core
nt nt
elo b be
operating
N
ax systems
. ng and file systems support it.N .
lon
gs ax
ou bla st o b la to
na ga o Ale un ga Ale
u th @ x a u @ xa
o ri g ma an t ho g m nd
• Operatingzesystems dc
il.c candrustart from block-level storagerizLUNs.
om Bla e dc
aiThis
l. c om
means
ru
Bla
that your
op g a. o pie g a
ies
organization can adeploy
llo
diskless physical servers. In such a sscenario,
all the. servers
we o we
use Fibre Channel ordiSCSI ! HBAs to connect to their boot LUN upon d!
startup.
• You can present block-level storage directly to virtual machines to meet high-
performance storage needs. In Hyper-V, you can present block-level storage to
virtual machines by using a pass-through disk or by using virtual Fibre Channel.
Th Th
is is
do do
cu cu
me me
nt nt
be be
ax lon ax lon
gs gs
File-level
Nou storage
. b lag to Nou . b lag to
na a@ Ale na a@ Ale
u th g x a u th g xa
o ri ma nd o ri ma nd
ze il.c ru ze il.c ru
dc om Bla dc om Bla
op g o p ga
CIFS and NFS areiesthe all
primary acommunication
. protocols that file-level
ies
all
storage . uses.
ow ow
ed ed
CIFS originally was an enhanced ! version of SMB. Today, however, the ! terms CIFS
Th Th
is is
do do
cu cu
me me
nt nt
be be
lon lon
gs gs
to to
Ale Ale
16 of 75 xan xan 19/03/2019, 07:46
d ru d ru
Bla Bla
g a. g a.
about:blank
• File-level storage sits on top of block-level storage and has a file system.
DAS
Th Th
is is
do do
cu cu
NAS me me
nt nt
be be
ax lon ax lon
No .b l gs No .b l gs
SAN un ag to u ag to
a a@ Ale na a@ Ale
u th gm xan u th g xa
o ri ail d ru o ri ma nd
ze .co ze il.c ru
dc m Bla dc om Bla
Block-level storage
op
i g a. op
ies ga
es .
all all
ow ow
ed ed
File-level storage ! !
In most cases, DAS has the lowest implementation costs. However, it has the least
flexibility, because the storage is not pooled, and it is difficult to reallocate.
Th Th
is is
do do
cu cu
me me
nt nt
be be
lon lon
Check
No
u
Your
ax
.b l
ag
Knowledge
gs
to No
u
ax
.b l
ag
gs
to
na a@ Ale na a@ Ale
u th gm xan u th g xa
o rid ru ail o ri ma nd
ze .co ze il.c ru
dc
Bla dc om Bla
True or False Question
op
ies
m ga
.
op
ies ga
.
all all
ow ow
A SAN provides file-level edstorage.
!
ed
!
True False
You can use multiple protocols to configure SANs, and the protocol that you select
for aTSAN typically is based on your organization’s
T needs and the skills of your
his his
do
technical staff.
c um Fibre Channel is the best performingdosolution cu
me for SANs, but it is the
en nt
tb b
most complex ax
eand
lon expensive system to implement. An
gs ax iSCSI
elo SAN is less expensive,
ng
No .b l t No .b l st
un ag o u ag oA
becauseauthe th o
equipment
a@
g
Ale is less specialized, and is simpler
x an
na
u th o
to
a@ implement
g lex
an
and manage.
riz m ail d r m a d
.co ru ize il.c ru
In this lesson,edyou co will mlearn Babout
lag Fibre Channel and iSCSI. dc
op
om Bla
ga
pie a. ies .
sa all
llo o
we we
d! d!
Lesson objectives
After completing this lesson, you will be able to:
• Describe
T Fibre Channel. Th
his is
do do
cu cu
me me
• List considerations
nt
be for implementing Fibre Channel. be
nt
ax lon ax lon
No .b l gs No .b l gs
u ag to u ag to
au n
a@ Ale na a@ Ale
• Describe
tho iSCSI.
gm x an u th
o ri g ma xa
nd
riz ail d ru ze il.c ru
ed .co Bla dc om Bla
co m g op ga
pie a ies
• Identify components
sa
llo that are. part of an iSCSI SAN. all
ow
.
we ed
d! !
• List considerations for implementing iSCSI.
Th Th
is is
do do
cu cu
me me
nt nt
be be
lon lon
gs gs
to to
Ale Ale
18 of 75 x an xan 19/03/2019, 07:46
d ru d ru
Bla Bla
g a. g a.
about:blank
Th Th
is is
do do
cu cu
me me
nt nt
be be
ax lon ax lon
No .b l gs No .b l gs
u ag to u ag to
na a@ Ale na a@ Ale
u th gm x an u th g xa
o ri ail d ru o ri ma nd
ze .co ze il.c ru
dc m Bla dc om Bla
op g a. op ga
ies ies .
all all
ow ow
ed ed
! !
FibreThChannel
is
is a high-performance network technology
Th
is
that you use primarily to
do do
cu cu
connect computers
me
n
to SANs. It is a standard with a long me history, and it was approved
n
tb tb
lon e lon e
in 1994.
No Fibre
ax
.b Channel
gs relies on the Fibre Channel
No protocol
ax
.b thatgs transports SCSI
un lag to un lag to
au @ lex a A
au @ lex a A
commands tho over gam network.
r a
an
d
A typical Fibre Channel implementation
th o
r
gm
a
acontains
nd the
ize il.c ru ize il.c ru
m d o Bla dc o m Bla
following components:
co
pie g a. op
ies g a.
sa all
llo ow
we ed
d ! !
• A SAN. In a Fibre Channel implementation, a SAN is the storage backend. It
serves as a Fibre Channel target, which is the component that listens for requests
from computers.
• A Tcomputer
hi with an HBA card. In a Fibre Channel
Th
i
implementation, a computer
sd sd
o o
with ancumHBA
en card is an initiator, because it initiatescurequests
me
n
when it needs to
tb tb
lon the SAN. e elo
access
N
adata
x.b on gs No
ax
.b l ng
st
ou lag to oAu ag
na a@ Ale na
lex a@
u th gm x an an u th gm
o ri ail d o ri ail d ru
• A Fibre Channel
z ed
co
switch.
.co
m
r uIn
B a
lag
Fibre Channel implementation,
z ed
co
you
.co typically
m Bla use
pie a. pie ga
.
Fibre Channel switches sa
llo so that computers do not connect directly sa
llo to a SAN.
we we
d! d!
SANs often have a very limited number of target ports, and those ports almost
always connect to Fibre Channel switches.
outstanding performance, particularly when you use it over your inexpensive, and
often preexisting, Ethernet infrastructure. You can use Fibre Channel over Ethernet to
converge all of your company's disparate communication mechanisms to Ethernet.
There are three main advantages to using Fibre Channel over Ethernet to merge your
communication systems, including that:
Th Th
is is
do do
cu cu
• It is easier
me to manage a single network topology than mea complex multitype
nt nt
be be
network.
N
ax
.b
lon
gs No
ax
.b l
lon
gs
ou lag to u ag to
na Alea@ na a@ Ale
u th xa gm u th g xa
o ri a nd o ri ma nd
• You can useze many
dc
il.c of the
om
ru standard
Bla network troubleshooting ze
dc tools
il.c
om with
ru Fibre
Bla
op ga op ga
ies . ies .
Channel over Ethernet. all
ow
all
ow
ed ed
! !
• Specialized training typically is not required.
Th Th
is is
do do
cu cu
me me
nt nt
be be
lon lon
gs gs
to to
Ale Ale
20 of 75 xan xan 19/03/2019, 07:46
d ru d ru
Bla Bla
g a. g a.
about:blank
Th Th
is is
do do
cu cu
me me
nt nt
be be
ax lon ax lon
No .b l gs No .b l gs
u ag to u ag to
na a@ Ale na a@ Ale
u th gm xan u th g xa
o ri ail d ru o ri ma nd
ze .co ze il.c ru
dc m Bla dc om Bla
op g a. op ga
ies ies .
all all
ow ow
ed ed
! !
You must
Th
is
consider several important factors when
Th you decide whether to use Fibre
is
do do
cu cu
Channel in mae storage environment, including:
n
me
nt
tb be
elo lon
ax ng ax gs
No .b l st No .b l to
u ag oA u ag
na a@ lex na a@ Ale
• u
Infrastructure
t ho grequirements. an u th g xa
riz ma d ru o ri ma nd
ed il.c ze il.c ru
co om Bla dc om Bla
pie ga op ga
sa . ies .
• Storage-bandwidth llo requirements.
we
all
ow
d! ed
!
Th Th
is is
do do
um c cu
Infrastructure
en
t
me
nt
be be
ax lon lon ax
No .b l gs .No
b gs
u agto lag
u to
na a@ Ale na a@ Ale
u th u th
The infrastructure
o ri g mrequirements
a il.c
x a nd of Fibre Channel are often ori extensive
g ma
il.c
xa for new storage
nd
ze ru ze ru
dc om Bla dc om Bla
deployments. When op
ies you use Fibre
g a. Channel, you typically install
o p ies a specific gand
a.
all all
ow ow
separate infrastructure efor d! it. This dedicated infrastructure includes ethe d! following
components:
• Fabric or network switches. In a network that uses only fiber optic cables, you
might use Fibre Channel switches. However, many networks use more than one
Th Th
is is
do do
cu cu
me me
nt nt
be be
lon lon
gs gs
to to
Ale Ale
21 of 75 xan xan 19/03/2019, 07:46
d ru d ru
Bla Bla
g a. g a.
about:blank
type of cable, and you might combine separate networks that each are using a
different type of cable. In these converged networks, switches must be able to
handle multiple types of traffic and cables.
A new Fibre Channel infrastructure typically requires switches that are dedicated
solely to the storage environment. A dedicated network often provides better
performance
Th and security because the switches Tare
h only for storage-related traffic to
is is
d d
and fromocthe
e
oc
um hosts and storage controllers. Fabric switches
um
e
also generally require
nt nt
elo b elo b
additional
N
asmall
x. form-factor
ng
s
pluggable transceivers
N
that
ax support
. ng Fibre Channel
s
ou bla to ou bla to
Ale g Ale g
cabling.naThis
o
a@
uth increases
gm xthe
na
ho
a@
an infrastructure’s initial cost.utAdditionally,
gm each
xa
n
host also
riz ail d ru riz ail d ru
dc om e .c
Bla HBA, and often two HBAs dfor om Bla which you e .c
requires at least oone
p dedicatedga co redundancy,
p ga
ies . ies .
all a
must manage and cable
o we separately
d!
from your production networkllowtraffic.
ed Finally, the
!
storage system that you are using also must support Fibre Channel.
You can use Fibre Channel with several cable types, the most common of which are:
T Th
• Single-mode
his
do fiber optic. is
do
cu cu
me me
nt nt
be be
• Multi-mode
No
ax
.b l
fiber
lon
gs optic. No
ax
.b l
lon
gs
un a ga to u ag to
au @ Ale na a@ Ale
th o gm xa u th g xa
nd o ri ma nd
• Ethernet: ized r a il.c
o
ru
Bla
ze
dc
il.c
om
ru
Bla
co m ga op ga
pie . ies .
sa all
llo ow
o Fibre Channel over wed Ethernet.
!
ed
!
Th Th
is is
do do
cu cu
me me
nt nt
be be
lon lon
gs gs
to to
Ale Ale
22 of 75 xan xan 19/03/2019, 07:46
d ru d ru
Bla Bla
g a. g a.
about:blank
Costs
Th Th
is is
do do
cu cu
me me
nt nt
be be
lon lon
gs gs
to to
Ale Ale
23 of 75 xan xan 19/03/2019, 07:46
d ru d ru
Bla Bla
g a. g a.
about:blank
The personnel that manage the Fibre Channel solution require a specialized set of
skills, which can make it more expensive than other storage solutions. In-house
personnel might need additional training to initially deploy and manage the solution
as well as ongoing training to stay current as the technology changes. If you use a
third-party vendor to support your Fibre Channel solution, your costs might be the
sameThor even higher than if you use your organization’s
Th staff.
is is
d oc d oc
um um
en en
tb tb
What
No isx.iSCSI?
a
bla
ng
st
o
elo
No
ax
.b l
ag
elo
ng
st
oA
un ga Ale u na a@
au @ x u th lex
th o gm an o ri g ma an
riz ail d ru ze il.c d ru
ed .co Bla dc om Bla
co m g op ga
pie a. ies .
sa all
llo ow
we ed
d ! !
Th Th
is is
do do
cu cu
me me
nt nt
be be
ax lon ax lon
No .b l gs No .b l gs
u ag to u ag to
na a@ Ale na a@ Ale
u th gm xan u th g xa
o ri ail d ru o ri ma nd
ze .co ze il.c ru
dc m Bla dc om Bla
op g a. op ga
ies ies .
all all
ow ow
ed ed
! !
bus subsystem architecture and emulates it over networks, thereby creating a SAN.
Unlike some SAN protocols, iSCSI requires no specialized cabling. You can run it
over an existing switching and IP infrastructure. However, to ensure performance,
you should operate an iSCSI SAN deployment on a dedicated network. Otherwise,
you might
Th experience severely decreased performance.
Th
is is
d oc d oc
um um
en en
tb tb
elo elo
An iSCSI
N SAN
ax
.b deployment
ng
s
includes the following:N . bla
ng
st
ax
ou lag to ou g oA
na a@ Ale na a@ lex
u th g x an u th o g an
o ri ma d r m a d ru
ze il.c ru ize il.c
dc om Bla dc om Bla
• IP network. You o pie can use standard ga
.
network interface adapters o pie and standard ga
.
sa sa
llo llo
Ethernet protocol network we
d! switches to connect servers to a storage we
d! device. To
provide sufficient performance, the network should provide speeds of at least 1
Gbps, and should provide multiple paths to the iSCSI target. We recommend that
you use a dedicated physical and logical network to achieve fast, reliable
throughput.
Th Th
is is
do oc d
• iSCSI ctargets.
um
e
ISCSI targets present or advertise storage,
um
e
similar to controllers for
nt nt
elo b elo b
hard
N
drives
ax
.
of nlocally
gs attached storage. However,
N
servers
ax
.
access
ng
s
this storage over
ou bla to ou bla to
na a@ Ale g na a@ Ale g
a network,
u th
o
rather
gm than xa accessing it locally. Many storage
n
u th
o
vendors
gm xa implement
n
riz ail d ru riz ail d ru
dc e
om targets .c dc
Bla as part of their storage device’s om Bla Other e .c
hardware-level
op iSCSI ga op hardware.ga
ies . ies .
all all
devices or appliances,
ow
ed such as Windows Storage Server devices,
o we implement
d!
!
iSCSI targets by using a software driver and at least one Ethernet adapter.
Windows Server 2016 provides the iSCSI Target Server, which is a driver for the
iSCSI protocol, as a role service of the File and Storage Services role.
• iSCSI
T initiators. The iSCSI target displays storage
T to the iSCSI initiator, or client.
his his
oc d oc the remote disks. All Windows d
The iSCSI
um initiator acts as a local disk controller forum
en en
be t b t
versions
ax sincelon Windows Server 2008 and Windowsa Vistaeloinclude
g x ng the iSCSI
No .b l st No .b l st
un g a o u oA ag
initiator
au anda@
th can
g connect
Ale
xa to iSCSI targets. na
u th lex
an
a@
gm
o ri ma nd o ri ail d ru
ze il.c ru ze .co
dc
Bla o m dc m Bla
op
g op ga
• iSCSI qualified name
ie sa (IQN). aIQNs
. are unique identifiers that iSCSIie sa uses to . address
llo llo
we we
initiators and targets don ! an iSCSI network. When you configure an d! iSCSI target,
you must configure the IQN for the iSCSI initiators that will connect to the target.
iSCSI initiators also use IQNs to connect to iSCSI targets. However, if name
resolution on the iSCSI network is a possible issue, you can identify iSCSI
endpoints
T
(both target and initiator) by their IPT addresses.
his his
do do
cu cu
me me
nt nt
be be
lon lon
gs gs
to to
Ale Ale
25 of 75 x an xan 19/03/2019, 07:46
d ru d ru
Bla Bla
g a. g a.
about:blank
iSCSI components
Th Th
is is
do do
cu cu
me me
nt nt
be be
ax lon ax lon
No .b l gs No .b l gs
u ag to u ag to
na a@ Ale na a@ Ale
u th gm xan u th g xa
o ri ail d ru o ri ma nd
ze .co ze il.c ru
dc m Bla dc om Bla
op g a. op ga
ies ies .
all all
ow ow
ed ed
! !
Th Th
is is
do do
cu cu
me me
nt tan n
This topicadiscusses
be
lo the two main components of iSCSI:
a
be iSCSI Target Server and
lo
N x.b ng No x.b ng
ou lag st lag st
an iSCSIna initiator.
a@ oA u na a@ oA
u gm lex u th gm lex
th o an o ri an
riz ail d ru ze ail d ru
ed .co Bla dc .co Bla
co m ga op m ga
pie . ies .
sa
iSCSI Target Serverllow all
ow
ed ed
! !
The iSCSI Target Server role service provides for a software-based and hardware-
independent iSCSI disk subsystem. You can use the iSCSI Target Server to create
iSCSI targets and iSCSI virtual disks, and then use the Server Manager to manage
theseThiiSCSI targets and virtual disks. Th
is
sd do
oc cu
um me
en nt
tb be
elo lon
The iSCSI
No
axTargetnServer
.b gs that Windows Server 2016
No includes
ax
.b provides
gs the following
un lag to un lag to
au a@ Ale au a@ Ale
functionality:
th o
r
gm
ail
xan
d ru
th o
riz
gm
ail
xan
d ru
ize .co ed .co
dc m Bla co m Bla
op g a. pie g a.
ies sa
all llo
ow
• Network or diskless eboot.
d! You can deploy diskless servers rapidlywe by
d! using boot-
capable network adapters or a software loader, and you can save as much as 90
percent of the storage space that you use for operating system images by using
differencing virtual hard disks. This is ideal for large deployments of identical
operating system images, such as on virtual machines that are running Hyper-V
Th Th
is is
do do
cu cu
me me
nt nt
be be
lon lon
gs gs
to to
Ale Ale
26 of 75 xan xan 19/03/2019, 07:46
d ru d ru
Bla Bla
g a. g a.
about:blank
Th Th
is is
do oc d
The features
cu
me of the iSCSI Target Server in Windows Server
um
e
2016 include:
nt nt
be be
ax lon lon ax
No .b l gs . b No gs
u ag to lag u to
na a@ Ale na a@ Ale
• Authentication.
u th
o ri g maYou can
x an enable Challenge Handshakeu t ho Authentication
g m xa
nd Protocol
ze il.c d ru riz ail ru
dc om Bla e dc . c om Bla
(CHAP) to authenticate op
ies
initiator
g a. connections or enable reverse
o pie CHAP togaallow
.
the
all s all
initiator to authenticate ow
ed the iSCSI target.
ow
ed
! !
• Query initiator computer for ID. To use this, you must use Windows 8 or Windows
Server 2012 and newer operating systems.
• Virtual hard disk support. You create iSCSI virtual disks as virtual hard disks.
Th Th
is
Windows is
Server 2016 supports both .vhd and .vhdx files, and .vhdx supports up
do do
c um c um
to 64 TB ecapacity.
nt
be You create new iSCSI virtual diskseas
nt .vhdx files, but you can
be
ax lon ax lon
No .b l st g No .b l gs
import
un .vhd
a
ag files.
a oA u na
ag
a@
to
Ale
u th @ lex u th x
o ri gm an o ri gm an
ze ail d ru ze d ru ail
dc
Bla .co dc Bla .co
• Scalability. The
op maximumm number of iSCSI targets per target m
ies server is 256, and
ga op ga
ies . .
all all
ow ow
the maximum number ed of virtual hard
!
disks per target server is 512. ed
!
• Manageability. You manage the iSCSI Target Server by using Server Manager or
Windows PowerShell. Windows Server 2016 uses the Storage Management
Initiative Specification provider with Microsoft System Center 2012 Virtual
Machine Manager and later versions to manage an iSCSI Target Server in a
hosted and private cloud.
T
his his T
You could
do
c
use the following Windows PowerShelldocmdlets to manage the iSCSI
c
um um
en en
Target Server:
tb
e
tb
elo
ax lon ng ax
No .b l gs . No
bla st
u ag to gu oA
na a@ Ale na a@ lex
u th g x an u th o g an
o ri ma d r m a d ru
ze il.c ru ize il.c
d
Install-WindowsFeature
co o m Blag FS-iSCSITarget-Server co d o m Bla
pie a. pie ga
sa sa .
New-IscsiVirtualDisk llo E:\iSCSIVirtualHardDisk\1.vhdx llo –size 1GB
we we
d! d!
New-IscsiServerTarget SQLTarget –InitiatorIds “IQN:
iqn.1991-05.com.Microsoft:SQL1.adatum.com”
Add-IscsiVirtualDiskTargetMapping SQLTarget
E:\iSCSIVirtualHardDisk\1.vhdx
Th Th
is is
do do
cu cu
me me
nt nt
be be
ax lon lonax
No .b l gs No
. b gs
u ag to ulag to
na a@ Ale na a@ Ale
u th g x an u t ho g xa
o ri ma m nd
Additional ze
dc
Reading:
il.c
om
druFor more information, refer to
Bla
riz iSCSIailTarget
e dc . c om
rCmdlets
uB in
op g o lag
Windows PowerShell: ie sa http://aka.ms/j1iomo
a . p ie sa
a.
llo llo
we we
d! d!
When you enable the iSCSI Target Server to provide block storage, the iSCSI Target
Server capitalizes on your existing Ethernet network. You need a dedicated network
for iSCSI to ensure performance, or you can use Quality of Service (QoS) standards
Th Th
on youris existing network. If high availability is important
d
is
d to your organization, you
oc oc
me u me u
should configure
nt
b
a high-availability cluster. However, whennt you configure a high-
b
elo elo
x.b a n a n
availability
No cluster,
lag to No thex.cluster.
gsyou will need shared storage for bla gs This storage can be
to
u na a@ u
Ale g na a@ Ale
u
gm x gm u x
hardware tFibre
ho
riz Channel
e
ail
. d ru
th o
anstorage or a serial attached SCSI
riz storage
e
ail
.
an
array.
dru You
dc co Bla dc co Bla
op ga m op ga m
configure the iSCSIies Target Server
a
. as a cluster role in the failover
ies cluster. Windows
a
.
llo llo
w w
Server 2016 introducesedthe
! Storage Spaces Direct feature, which euses
d! unshared
storage to make a high-availability cluster. It does this by using only local unshared
storage and commodity hardware.
iSCSI
T
initiator Th
his is
do do
cu cu
me me
nt nt
be be
lon lon
gs gs
to to
Ale Ale
28 of 75 xan xan 19/03/2019, 07:46
d ru d ru
Bla Bla
g a. g a.
about:blank
The iSCSI initiator was introduced in Windows Server 2008 and Windows Vista, and
it is installed by default. To connect your computer to an iSCSI target, you must start
and configure the service.
You could use the following Windows PowerShell cmdlets to manage your iSCSI
initiator:
Th Th
is is
d oc do
um cu
en me
tb nt
elo be
ax ng lon ax
No .b lst . b No gs
u ag oA lag u to
n
Start-Service
a a @ msiscsi lex n a a @ Ale
u th g an u th o g xa
o ri ma d r ma nd
ze il.c ru ize il.c ru
Set-Service cmsiscsi d o B
m –StartupType
lag “Automatic” d co o m Bla
op a p ga
ies . ies .
all all
New-IscsiTargetPortal ow
ed
–TargetPortalAddress iSCSIServer1 ow
ed
! !
Connect-IscsiTarget –NodeAddress “iqn.1991-05.com.microsoft:netboot-
1-SQLTarget-target”
T T
Considerations
his
do
cu for implementing iSCSI
his
do
cu
me me
nt nt
be be
ax lon ax lon
No .b l gs No .b l gs
u ag to u ag to
na a@ Ale na a@ Ale
u th gm xan u th g xa
o ri ail d ru o ri ma nd
ze .co ze il.c ru
dc m Bla dc om Bla
op g a. op ga
ies ies .
all all
ow ow
ed ed
! !
Th Th
is is
do do
cu cu
me me
nt nt
be be
ax lon ax lon
No .b l gs No .b l gs
u ag to u ag to
na a@ Ale na a@ Ale
u th gm xan u th g xa
o ri ail d ru o ri ma nd
ze .co ze il.c ru
dc m Bla dc om Bla
op g a. op ga
ies ies .
all all
ow ow
ed ed
! !
• Network speed and performance. The network speed should be at least 1 Gbps,
but in many cases, iSCSI networks in a datacenter now are 10 Gbps, 40 Gbps, or
even 100 Gbps.
• High availability. The network infrastructure must be highly available because data
is sent from the servers to the iSCSI storage over network devices and
Th Th
is is
components.
do
c
do
cu
um me
en nt
tb be
elo lon
• Security.
No
a x.bThe iSCSI
lag
n gs
t
solution should have an appropriate
No
a x.b
lag
levelgs of security. In
to
un a@ oA un a Ale
au le a u @
situations tho where
riz
g ma you aneed x
nd high security, you can use tho a dedicated
r i
g ma xa network and
nd
ed il.c ru ze il.c ru
co o m Blag d co o m Bla
iSCSI authentication. pie
sa
In situations
a. with lower security requirements,
pie
sa
you gamight not
.
llo llo
have to use a dedicated w ed
!
network and iSCSI authentication. wed
!
• Application teams. The design team for an iSCSI storage solution should include
application-specific administrators, such as Exchange Server administrators and
SQL Server administrators, so that you can implement the optimal configuration
Th Th
for ithe
s d specific technology or solution.
oc
is
do
cu
um me
en nt
tb be
elo lon
ax ng gs ax
No .b l st .b l No to
u ag o ag u
na a@ Ale na a@ Ale
u th g x a u th g xa
o ma n o ma nd investigate
In addition toizelooking
r
dc
il.c at the d ru infrastructure and teams, you r izealso need
dc
il.c to ru
om Bla om Bla
op g a. o p ga
competitive solutions ie s a to see if they better meet your business requirements. ie sa . The
llo llo
we we
primary iSCSI competitors d! are Fibre Channel, Fibre Channel over Ethernet, d! and
InfiniBand.
Th Th
is is
do do
cu cu
me me
nt nt
be be
ax lon ax lon
No .b l gs No .b l gs
u ag to u ag to
na a@ Ale na a@ Ale
u th gm xan u th g xa
o ri ail d ru o ri ma nd
ze .co ze il.c ru
dc m Bla dc om Bla
op g a. op ga
ies ies .
all all
ow ow
ed ed
! !
In a storage
Th
is
infrastructure, several types of adapters
Th
is
and controllers comprise a
do do
cu cu
storage system’s
me
n
physical foundation, including: me
nt
tb be
elo lon
ax ng ax gs
No .b l st No .b l to
u oAag u ag
na a@ lex na a@ Ale
• u
Networkhoradapters
t g an u th g xa
ma d ru o ri ma nd
ize il.c ze il.c ru
dc om Bla dc om Bla
op ga op ga
ies . ies .
• HBAs a llo
we
all
ow
d! ed
!
• Disk
T
controllers Th
his is
do do
cu cu
me me
nt nt
be be
ax lon lon ax
No .b l gs . b No gs
to
ag lag to
This topic
na examines
u
u th
a@ the
Ale characteristics of these components,
x
na
u th
a@ and
u Aleprovides a
xa
high-
o ri g ma a nd o ri g ma nd
ze il.c ru ze il.c ru
level overview dof
co scenarioso m for
Blag which each component is best
d co suited.o m Bla
pie a. p i ga
sa e sa .
llo llo
we we
d! d!
Network adapters
Network adapters are composed of microchips and physical ports that are on a
motherboard or an expansion card. Network adapters provide connectivity primarily
to Ethernet
Th
is networks. Network adapters communicate
Th
is over a wired network by using
do do
cu cu
me me
nt nt
be be
lon lon
gs gs
to to
Ale Ale
31 of 75 xan xan 19/03/2019, 07:46
d ru d ru
Bla Bla
g a. g a.
about:blank
an RJ-45 port or over wireless networks by using the 802.11 wireless network
standard. Network adapters are the most cost-effective storage-connectivity
solution.
Current network adapters operate at up to 100 Gbps per port, although 10 Gbps and
40 Gbps
Th are more common. Th
is is
d oc do
um cu
en me
tb nt
elo elo b
You can
N configure
ax
.b ng teaming to achieve performance,
s N failover,
ax
.b or
ng both. When you use
s
ou lag to ou lag to
n a A n a A
teaming,auall @
tho network
gm adapters
lex
an that are part of a teamaucombine
th o
@ to create
gm lex
an a virtual
riz ail d ru riz ail d ru
dc Bla e .co dc e .co
opor team
network adapter, i
m network
ga adapter. You configure the opsettings
i
m onBlathe
ga team
es . es .
all all
network adapter. ow
ed
ow
ed
! !
For performance, Fibre Channel HBAs offer speeds up to 16 Gbps per port, whereas
iSCSI
Th HBAs typically offer 1 Gbps or 10 Gbps per
is
Th port. However, you can combine
is
do do
cu cu
me me
nt nt
be be
lon lon
gs gs
to to
Ale Ale
32 of 75 xan xan 19/03/2019, 07:46
d ru d ru
Bla Bla
g a. g a.
about:blank
HBAs are load-balanced with software, and their speed is based on the total number
of ports
Th and optimized paths to the backend storage.
Th In the real world, it is
is is
d o d o
cu for a host to have more than two paths tocua single SAN controller.
uncommonme me
nt nt
elo b elo b
Instead,
N
companies
ax
.b ng generally opt to have paths going
s N
ato
x.b more ng than one SAN
s
ou lag to ou lag to
na a Ale na a@ A
controller,uthwhile@using
o gm two
xa HBAs. The industry has announced
n
u th
o gm thatlexupcoming
an
riz ail d ru riz ail d ru
dc om Bla e .c
dc om Bla e .c
solutions can meet
op a new
i
standard
ga of 32 Gbps per port performance.
op
i
However,
ga with
es . es .
a
llo Channel over Ethernet and converged networking,
llo a
the popularity of Fibre we
d
we
d
Fibre
! !
Channel and Fibre Channel HBAs are beginning to lose market share to Ethernet and
converged adapter solutions.
On the performance side, converged network adapters are capable of achieving the
Th Th
is is
highest dspeed
oc
u that a specific protocol can achieve. dFor
oc example, if one of the ports
u
me me
n
t bport, the converged network adapter can achieve
tb n
is an Ethernet
a
elo
a
elo speeds up to
N x.b ng N x.b ng
ou lag to ou s lag to s
10 Gbps.na However,
u
a@ because
Ale converged network adapters
na
u
ausually
@ Alprovide
e multiple
th o gm xa th o gm xa
riz a riz nd a nd
port types, they il.c
ed typically ru not achieve the combined speed ofil.caomdedicated
ru
c om do Bla ed
c Bla single-
op ga op ga
ies . ies .
port solution. all
ow
all
ow
ed ed
! !
Currently, converged network adapters are popular because of their flexibility, and
organizations typically use them in modern datacenters.
InfiniBand
Th
is host channel adapters Th
is
do do
cu cu
me me
nt nt
be be
lon lon
gs gs
to to
Ale Ale
33 of 75 xan xan 19/03/2019, 07:46
d ru d ru
Bla Bla
g a. g a.
about:blank
InfiniBand host channel adapters, similar to other storage connectivity cards, are
composed of microchips and physical ports, typically on an expansion card. Host
channel adapters provide connectivity over an InfiniBand network, and they provide
the highest levels of performance available today. This high performance comes at a
cost, however, because host channel adapters are the most expensive storage-
connectivity
Th adapters that are available. Some current
Th host channel adapters
is is
d d
operate oat me
oc
cu up to 56 Gbps. InfiniBand provides the lowest
um latency by having less
e
nt nt
elo b elo b
communication
N
ax
.
overhead
ng than competing solutions,
N
such
ax
.
as nEthernet.
g However,
ou bla st ou bla st
na a@ Ale g o na a@ Ale g o
organizations
u th
o
usegmInfiniBand
xa
n
rarely, typically because uof
tho high gcost,
m
the
xa training that is
n
riz ail d ru riz ail d ru
co
d c and e . dc
Bla it, and the competitive features co Bla e .
necessary to use op manage
m ga op of lower-cost
m ga
ies . ies .
all all
solutions. ow
ed
ow
ed
! !
Disk controllers
Disk controllers are microchips that facilitate communication between hard disks
Th Th
and a icentral
sd processing unit (CPU) over an associated
is
d
bus. Early versions of disk
oc oc
um um
controllers were e nt
be
embedded on dedicated expansion cards. en Today, most disk
tb
lo elo
ax n a x.b ng
controllers
No
un
are
.bl embedded
a ga
gs
t o in a disk drive. Additionally,
No
un
with la ga
the swidespread
to adoption
au @ A le a @ Ale
th o gm xa u th g x an controllers
of virtualization, riz
ed
virtual
ail
.co
disk
nd controllers are quite common.
ru
ori Virtual
ze
ma disk
il.c d ru
co m Bla dc om Bla
g o ga
sometimes emulate pie physical disk
sa
a. controllers, although newerpivirtual es controllers . are
llo a llo
we w
written specifically for virtual d! implementations, and they do not relyeon d! emulation.
• Most servers offer built-in RAID capabilities and a specialized disk controller, or
Th Th
is is
RAIDdocontroller,
cu
m
which facilitates the RAID capabilities.
do
cu
m
en en
tb tb
elo elo
ax ng ng ax
• Another
No
u
.type
bla
g
ofsspecialized
to disk controller, or Narray
ou controller,
.b l
ag s t facilitates
o
na a@ Ale na a@ Ale
th o u
gm xa th o u gm x
communication
riz
e
abetween
il.
nd a server and a DAS appliance.
ru riz
e
ail
.co
an
d ru
dc co Bla dc Bla
op m g op m g
ies a. ies a.
all all
• Physical disk controllers
ow
e
typically operate over a Serial ATA (SATA)
ow
e
or serial
d! d!
attached SCSI (SAS) interface.
• Virtual disk controllers typically emulate integrated drive electronics (IDE) or SCSI
controllers.
Th Th
is is
do do
cu cu
me me
nt nt
be be
lon lon
gs gs
to to
Ale Ale
34 of 75 x an xan 19/03/2019, 07:46
d ru d ru
Bla Bla
g a. g a.
about:blank
• Create
Th
is two iSCSI virtual disks and an iSCSI target.
Th
is
do do
cu cu
me me
nt nt
• Connect be be
ax to the lon iSCSI target.
gs ax lon
gs
No .b l to No .b l to
un ag u ag
au a@ Ale na a@ Ale
th o g xa u th g xa
• Verify the rizpresence ma ma
il.c of the ru iSCSI drive.
nd o ri nd
ed ze il.c ru
co o m Bla dc om Bla
pie ga op ga
sa . ies .
llo all
we ow
d! ed
!
Demonstration steps
• On
Th LON-DC1, use Server Manager to add theThiSCSI Target Server role service in
is is
do do
c cu
File andumStorage
en Services. me
nt
tb be
elo lon
ax ng ax gs
No .b l st No .b l to
u ag oA u ag
na a@lex na a@ Ale
u th gm
an u th g xa
o ri ail d ru o ri ma nd
ze .co ze il.c ru
dc m Bla dc om Bla
Create two iSCSI op virtual disks
ies ga
.
and an iSCSI target op
ies ga
.
all all
ow ow
ed ed
! !
1. On LON-DC1, in Server Manager, in File and Storage Services, browse to
iSCSI.
o Name: iSCSIDisk2
o Disk size: 5 GB
Connect
o toiSCSI
the iSCSI
target:target
LON-DC1
1. ThOn LON-SVR1, open Server Manager, andThon the Tools menu, open iSCSI
is is
do do
cu cu
Initiator.m en me
nt
tb be
elo lon
ax n gs a x.b gs
No .b l t N o l to
ag oA ag
2. au iSCSI
Inunthe a@ Initiator le x
Properties dialog box, configure
un
a u
a @ the following:
Ale
xa
th o g ma an th o g ma nd
riz il.c d ru r ize il.c ru
ed o B d o Bla
co m lag co m ga
o Quick Connect:
p ies LON-DC1
a . p ies .
all all
ow ow
ed ed
! !
o Discover targets: iqn.1991-05.com.microsoft:lon-dc1-lon-dc1-target
Note: The new disks are added, but they all are currently offline and not
formatted. These are listed as Disk 11 and Disk 12.
Th Th
is is
do do
cu cu
me me
nt nt
be be
ax lon ax lon
No .b l gs No .b l gs
ChecknaYoura@Knowledge
u to
Ale
ag u na
ag
a@
to
Ale
u th gm xa u th g xa
o ri ail nd o ri ma nd
ze .co ru ze il.c ru
dc m Bla dc om Bla
op g a. op ga
Discovery ies
all
ies
all
.
ow ow
ed ed
!
Can you use your organization’s internal TCP/IP network to provide iSCSI? !
Yes, you can. However, as a best practice, you should have a dedicated TCP/IP network
for iSCSI, so that other network traffic does not interfere with iSCSI communication, and
so that
Th iSCSI communication does not interfere with
is
Th the network traffic.
is
do do
cu cu
me me
nt nt
be be
lon lon
gs gs
to to
Ale Ale
36 of 75 xan xan 19/03/2019, 07:46
d ru d ru
Bla Bla
g a. g a.
about:blank
Discovery
When would you consider implementing diskless booting from iSCSI targets?
Enterprises often require storage features that smaller organizations do not need,
and these advanced features typically simplify storage management. An iSNS server
is a central directory of iSCSI targets. DCB helps ensure that QoS goals are met on
Th Th
is is
high-speed
d o cu converged networks that carry multiple types
do
cu of data. Multipath I/O
me me
nt nt
(MPIO) is used
ax
beto identify multiple paths through a storagebenetwork for redundancy
lon ax lon
No .b l gs No .b l gs
a t o a to
and performance.
un
au
ga
@ Ale
xa
un
a u th
ga
@ Ale
xa
th o gm n o g m nd
riz ail d ru riz ail ru
ed .co Bla e dc . c om Bla
co m g o ga
pie a. pie .
sa sa
Lesson objectives llo
we
d!
llo
we
d!
• Describe iSNS.
Th Th
• Describe
is
d
DCB. is
do
oc cu
um me
en nt
tb be
• Describe ax MPIO.
elo
ng ax lon
gs
No .b l st No .b l to
un ag oA u ag
au a @ lex na a@ Ale
th o gm an u th g xa
o ri ma nd
• ConfigurerizMPIO. ed
ail
.co d ru
Bla
ze
dc
il.c
om
ru
Bla
co m ga op ga
pie . ies .
sa all
llo ow
we ed
d! !
What is iSNS?
Th Th
is is
do do
cu cu
me me
nt nt
be be
lon lon
gs gs
to to
Ale Ale
37 of 75 xan xan 19/03/2019, 07:46
d ru d ru
Bla Bla
g a. g a.
about:blank
Th Th
is is
do do
cu cu
me me
nt nt
be be
ax lon ax lon
No .b l gs No .b l gs
u ag to u ag to
na a@ Ale na a@ Ale
u th gm x an u th g xa
o ri ail d ru o ri ma nd
ze .co ze il.c ru
dc m Bla dc om Bla
op g a. op ga
ies ies .
all all
ow ow
ed ed
! !
In complex
Th
is
IT systems, there are many storage devices
Th
is
and many devices that need
do do
access tocustorage.
me
n
cu
An iSNS server has a database with ma
en collection of information
tb tb
lon e lon e
about
No storage
ax
.b devices
gs and where that storage has
No been
ax allocated.
.b gs This database
un lag to un lag to
au @ lex a A
au @ lex a A
and the associated
th o
r
gm iSNS
a
an protocol make it possible for
d
thdevices
or gm that
a
need
an
d
storage to
ize il.c ru ize il.c ru
mdevices. d o m server B d o B
find allocated storage
co
pie
lag That is, iSNS clients query the
a.
co iSNS
pie
lagto find
a.
sa sa
low l llo
storage allocated to them.
ed
!
we
d !
iSNS is a flexible protocol that uses few system resources; iSNS servers and iSNS
clients use the iSNS protocol to interact with one another. Clients can use iSNS to
discover iSCSI storage devices automatically, and you can use iSNS to configure
T
his his T
and manage
do iSCSI storage devices. iSNS also facilitates
do the same operations for
cu cu
m
en devices by using an Internet Fibre Channel
en protocol gateway. m
Fibre Channeltb
e
tb
e
ax lon ax lon
No .b l gs No .b l gs
u ag to u ag to
na a@ Ale Ale na a@
u th gm x an xa u th gm
o
However, because iSNS can o nd
r ize a il.c d ru perform storage discovery and
r ize configuration
a il.c ru tasks, you
dc om Bla dc om Bla
op g a. o p g a.
can use iSNS to make ies
all an IP network function similar to a SAN.s You
ie
all also can use
ow ow
ed ed
iSNS to integrate IP and !Fibre Channel networks seamlessly because! iSNS can
emulate Fibre Channel fabric services, and manage both iSCSI and Fibre Channel
devices. As a result, if iSCSI and Fibre Channel devices comprise your storage
network, this is very valuable to your organization.
Th Th
is is
do do
You can use
cu iSNS to manage groups
me of devices instead
cu of managing them
m
nt en
be tb
lon elo
gs ng
to st
Ale oA
38 of 75 xa lex 19/03/2019, 07:46
nd an
ru d ru
Bla Bla
ga g a.
.
about:blank
iSNS components
Th Th
is is
do do
cu
iSNS has three
me primary components: clients, servers,cuand
me a database.
nt nt
be be
ax lon axlon
No .b l gs No .b l gs
u to
ag u ag to
na a@ Ale na a@ Ale
iSNS clients
u th o
riz
g ma xa
nd
u th
o ri g ma xa
nd
ed il.c ru ze il.c ru
co o m Bla dc om Bla
pie ga op ga
sa . ies .
llo all
ow
When an iSNS client attempts we
d! to discover a storage device, it initiates ed
!
communication with iSNS by using the iSNS protocol. iSNS clients are typically
processes resident in the storage device. The iSNS client registers device attribute
information, downloads information about other registered clients in a Discovery
Domain, and receives asynchronous notification of events that occur in their
T
his his of iSNS client that has access to T
Discoverydo Domain. A management station is a type do
cu cu
m me
Discovery Domains
en
tb contained within iSNS. be
nt
elo lon
ax ng ax gs
No .b l st No .b l to
u ag oA u ag
na a@lex na a@ Ale
u th gm
an u th g xa
iSNS servers
o ri
ze ail
.co d ru o ri
ze
ma
il.c
nd
ru
dc m Bla dc om Bla
op ga op ga
ies . ies .
iSNS servers respond all to iSNS protocol
ow queries and requests. iSNS all
ow servers also
ed ed
! !
initiate iSNS protocol state change notifications. Authenticated information
submitted by a registration request is stored in the iSNS database.
iSNS database
T T
iSNS hservers
is
do
his
use the iSNS database as an information
do repository. The iSNS
cu cu
en m en m
database contains
tb information about iSNS client attributes.
t b It is possible to store
elo elo
ax ng ax ng
iSNSNoclient
un
.attributes
bla
ga
s t in a Lightweight Direct
oA Access
No u Protocol
na
. b lag
a@
(LDAP)
st
oA directory by
au @ lex u th lex
th o gm an g ma a
using a directory-enabled
riz
ed
ail
.co drimplementation
uB of iSNS. o ri
ze il.c
nd
ru
co m lag dc om Bla
pie a. op ga
sa ies .
llo all
we ow
ed
iSNS Functions d! !
• A Tname
h
service. All entities in a storage network
Th can use this service to register
is is
d oc d oc
um um
en en
tb tb
elo elo
ng ng
st st
oA oA
39 of 75 lex lex 19/03/2019, 07:46
an an
d ru d ru
Bla Bla
g a. g a.
about:blank
their names and other information in the database. All registered entities can then
query the iSNS database to find other entities.
• A Discovery Domain and login control service. This service helps to divide storage
nodes into groups. These groups are then used for administrative purposes and
to control login activities.
Th Th
is is
do do
cu c
• A state change
me
nt notification service. The iSNS serverumuses
en
t
this service to issue
be be
on l lon
notifications
No
ax
.b l
a
about
gs
t
events on the network. No .b l
ag
axgs
to
un ga oA n u a Ale
au @ le x a u @ xa
th o g ma an th o g ma nd
riz il.c d ru r ize il.c ru
• Mapping informatione dc
op
om to an Bla iSNS database. iSNS maps dnaming co o and
m discovery
Bla
ies g a p ies ga
. .
information aboutalloiSCSI we
and Fibre Channel devices to an iSNS all database.
o we
d! d!
The iSNS
Th Server service is a Windows feature included
Th in Windows Server 2016. You
is is
d o d o
can installcumiteby adding the feature in Server Manager cor
um by using the Add-
e
nt nt
be be
lon cmdlet.
WindowsFeature
ax lon ax
N .b gs No
. b gs
ou lag to u lag to
na a@ Ale na a@ Ale
u th g x an u t ho g xa
o ri ma d ru riz m ail nd
ze il.c e . c ru
dc om Bla dc om B
After installation,opyou ies can launch g a. the iSNS Server from the Tools
o pie menu inlaServer
ga
.
all s all
ow ow
Manager. You can theneregister d! iSCSI devices and group them into eDiscovery d!
Domains and Discovery Domain Sets. When you are configuring the Windows iSCSI
initiator, you specify which iSNS Server IP address or Domain Name System fully
qualified domain name (DNS FQDN) to use. The initiator will query it to automatically
discover all of the iSCSI targets present, essentially making manual configuration of
T
his unnecessary for your initiator. Th
portals do
is
do
cu cu
me me
nt nt
be be
ax lon ax lon
No . gs N . gs
To perform
un iSNS
b la ga server
t o A
registration, use the following
o un Windows
b la ga toPowerShell
Ale
au @ lex au @ xa
th o gm an th o gm nd
commands, iwhich r ze
dc
amanage
il.c d ru Windows Management Instrumentation r ize
dc
a il.c (WMI)ru objects:
om Bla om Bla
op g a. o p g a.
ies ies
all all
ow ow
ed ed
To add an iSNS server, use ! the following command: !
T
his his T
To deletedo an iSNS server, use the following command:do
cu cu
me me
nt nt
be be
ax lon lon ax
No .b l gs . bla No gs
u to
ag ga u to
na a@ Ale na @ Ale
u th g x an u th o g xa
Get-WmiObjecto ri m-Namespace
a d root\wmi -Class WT_iSNSServer
r ma nd
-Filter
ze il.c ru ize il.c ru
dc om Bla dc om Bla
op g a op ga
“ServerName =’iSNS ies
all
-server-name’ . | Remove-WmiInstance ies
all
.
ow ow
ed ed
! !
What is DCB?
Th Th
is is
do do
cu cu
me me
nt nt
be be
ax lon ax lon
No .b l gs No .b l gs
u ag to u ag to
na a@ Ale na a@ Ale
u th gm xan u th g xa
o ri ail d ru o ri ma nd
ze .co ze il.c ru
dc m Bla dc om Bla
op g a. op ga
ies ies .
all all
ow ow
ed ed
! !
Th Th
is is
do do
cu cu
me me
nt nt
be be
ax lon ax lon
No .b l gs No .b l gs
u ag to u ag to
na a@ Ale na a@ Ale
u th gm xan u th g xa
o ri ail d ru o ri ma nd
ze .co ze il.c ru
dc m Bla dc om Bla
op g a. op ga
ies ies .
Most existing datacenters
all
ow typically have several physical networks all that
ow
ed ed
! !
accommodate different organizational needs. For example, system administrators
and users might use an Ethernet network, data storage might use a separate
physical Fibre Channel network, and high-performance computers might use an
InfiniBand network. However, having separate networks increases costs and
management
Th
i
overhead when you are building and
Th maintaining the networks.
i
sd sd
oc oc
um um
en en
tb tb
elo elo
ng ng
st st
oA oA
41 of 75 lex lex 19/03/2019, 07:46
an an
d ru d ru
Bla Bla
g a. g a.
about:blank
• Priority-based
Th flow control. This is a link-layerTflow
h
control mechanism that you
is is
oc d oc d
can control
um
e
based on the type of data being transmitted
um
e
on the network. You can
nt nt
b
elo to target flow control instead of stoppingelodata flow without regard b
use
N
thisaxfeature
. ng N
ax
. ng
ou bla st ou st bla
na oA ga na ga oA
for what
uth is being@
g ma
transmitted.
le x an This last practice was u t a
ho feature
@
g ma
oflexthe
an original
o ri d ru riz d ru
ze il.c e il. c
Ethernet flow d c control. om Bla dc om Bla
op g a. o pie ga
ies s .
all all
ow ow
ed ed
• Enhanced transmission ! selection. This enables the system to reserve ! bandwidth
for iSCSI and other network protocols. You can use enhanced transmission
selection to set aside a specific amount of bandwidth for iSCSI as dictated by
your requirements or usage. This helps to increase performance.
T
his Center Bridging Capabilities eXchange (DCBX)
his T
• Data do do protocol. This enables
cu cu
en m en communicate and share m
devices such
t b as the network adapters and switches to
e
tb
e
a lon ax lon
No x.b g No .b l gs
capabilities
un lag ands configuration
a
to
A
information. u na
ag
a@
to
Ale
au @ lex u th x
th o gm an o ri gm an
riz ail d ru ze ail d ru
ed .co Bla dc .co Bla
co m g op m g
pie a. ies a.
sa all
llo ow
we ed
Installing and configuring d! DCB !
DCB is a Windows Server 2016 feature that you can install from Windows
PowerShell or by using Server Manager. To install DCB from Windows PowerShell,
open a command prompt, type Install-WindowsFeature "Data-Center-Bridging",
Th Th
is is
do press Enter.
and then do
cu cu
m en me
tb nt
elo be
ng lon
st gs
oA to
lex Ale
42 of 75 an xan 19/03/2019, 07:46
d ru d ru
Bla Bla
g a. g a.
about:blank
Configuring DCB
You use Windows PowerShell to manage the QoS functionality in DCB. The cmdlets
are in the NetQos, DcbQos, and NetAdapter modules. To view all cmdlets that
relate to DCB QoS, run the Get-Help *Qos* command. Alternately, to retrieve the
cmdlets
Th Th Get-Command -Module
that are available in each module, run the
i sd i sd
oc oc
DcbQos, uNetAdapter,
me
nt
NetQos command. um
en
be tb
lon elo
ax gs ax ng
No .b l to No .b l st
un ag u ag oA
au a@ Ale na a@ lex
What is MPIO?
th o
riz
ed
g ma
il.c
xa
nd
ru
u th
o ri
ze
g ma
il.c
an
d ru
co o m Bla dc om Bla
pie ga op ga
sa . ies .
llo all
we ow
d! ed
!
Th Th
is is
do do
cu cu
me me
nt nt
be be
ax lon ax lon
No .b l gs No .b l gs
u ag to u ag to
na a@ Ale na a@ Ale
u th gm x an u th g xa
o ri ail d ru o ri ma nd
ze .co ze il.c ru
dc m Bla dc om Bla
op g a. op ga
ies ies .
all all
ow ow
ed ed
! !
MPIO
Th is a storage network enhancement that provides
is
Th
is multiple physical paths from
do do
um c um c
a computer eto
n a block storage provider, regardless of whether
en the storage attaches
tb tb
lon e lon e
directly
No to the
ax
.bl storage
gs
t
provider or is available over
No a network.
ax
.b l gMPIO
st has been built
un ag oA un ag oA
a lex a@ lex a a@
u th
into Windows an Windows Server 2008 anduthwas
ori Server
gm
a
since d ori available
gm
a
aas
nd a separate
ze il.c ru ze il.c ru
m lag d o m B d o B
component for cWindows
op
ie Server co
a. 2003. In addition to this support
pie built intolagWindows
a.
sa sa
ow ll ow ll
Server operating systems,
ed many storage vendors offer their own MPIO
!
ed
!
software that
can be installed on computers running Windows Server that connect to the backend
storage. You use MPIO mainly in these situations:
Demonstration steps
Th Th
2. After
is
do installation is complete, restart LON-SVR1
is
do and sign in as
cu cu
me me
Adatum\Administrator
nt
be with the password Pa55w.rd. nt
be
ax lo ng ax lon
No .b l s N . b gs
un a ga t o o un la ga to
A Ale
3. au
In Serverth o Manager,
@
gm lex on the Tools menu, open MPIO.
an
au
th o
@
gm xa
nd
riz ail d ru r ize a il.c ru
ed .co B d o Bla
co m lag co m ga
pie a. p ie .
4. In MPIO Properties, sa
llo on the Discover Multi-Paths tab, add s a support for
llo iSCSI
we we
d! d!
devices, and then restart when prompted.
Th Th
is is
do do
cu cu
me me
nt nt
be be
lon lon
gs gs
to to
Ale Ale
44 of 75 x an x an 19/03/2019, 07:46
d ru d ru
Bla Bla
g a. g a.
about:blank
You can use iSNS to manage both iSCSI and Fibre Channel storage.
16
32
Check
T
answer Show solution Reset Th
his is
do do
MicrosoftcMPIO
um cu
en is capable of identifying up to 32 paths. men
tb tb
elo elo
ax ng ax ng
No .b l st No .b l st
u ag oA u ag oA
na a@ na a@
Lesson 4: Configuring sharing in Windows Server
u th g lex u th gm lex
o ri ma an o ri an
ze il.c d ru ze ail d ru
dc om Bla dc .co Bla
op ga op m ga
2016 ies
all
ow
. ies
all
ow
.
ed ed
! !
File sharing is a core service that Windows Server 2016 provides. Each new version
of Windows Server includes enhanced file-sharing capabilities for untraditional
scenarios, such as storing virtual-machine files on a shared folder instead of a SAN
Th Th
or locally
is
d attached storage. You can use Server Manager
is
d to create SMB shares for
oc oc
um um
en en
tb tb
elo elo
ng ng
st st
oA oA
45 of 75 lex lex 19/03/2019, 07:46
an an
d ru d ru
Bla Bla
g a. g a.
about:blank
Windows clients or NFS shares for Linux clients. In this lesson, you will learn how to
create and manage shared folders.
Lesson objectives
After completing this lesson, you will be able to:
Th Th
is is
do do
cu cu
me me
nt nt
• Describe the
loSMB
be file-sharing protocol. be
lon
ax n gs a x.b gs
No .b l t N o l to
un ag oA un ag
au a@ le a a @ Ale
x u xa
• Identifythconfiguration
o ri
ze
g ma
il.c
anoptions for SMB shares.
d ru
th o
r ize
g ma
il.c
nd
ru
dc om Bla dc om Bla
op g a op ga
ies . ies .
• Configure SMB shares. all
ow
all
ow
ed ed
! !
• Configure
T NFS shares. Th
his is
do do
cu cu
me me
nt nt
be be
ax lon ax lon
No .b l gs No .b l gs
ag to ag to
What nis
au SMB?
u
th o
a@
gm
Ale
x an
u na
u th
o ri
a@
g ma
Ale
xa
nd
riz ail d ru ze il.c ru
ed .co Bla dc om Bla
co m g op ga
pie a. ies .
sa all
llo ow
we ed
d ! !
Th Th
is is
do do
cu cu
me me
nt nt
be be
ax lon ax lon
No .b l gs No .b l gs
u ag to u ag to
na a@ Ale na a@ Ale
u th gm x an u th g xa
o ri ail d ru o ri ma nd
ze .co ze il.c ru
dc m Bla dc om Bla
op g a. op ga
ies ies .
all all
ow ow
ed ed
! !
terms SMB and CIFS are used interchangeably to refer to the same file-sharing
protocol. This lesson uses the term SMB to refer to the technology.
Th
Windows Th
is 10 and Windows Server 2016 SMB 3.1.1
is
do do
cu cu
me me
nt nt
Windows 8.1 andbeWindows Server 2012 R2 SMB 3.0.2 be
ax lon ax lon
No .b l gs No .b l gs
u ag to u ag to
n a@ A na a@ Ale
Windowsa8uthand Windows
g lex
Server
a 2012 SMB 3.0 u th g xa
o ri ma nd o ri ma nd
ze il.c ru ze il.c ru
dc o m Bla dc om Bla
ga R2 op op ga
Windows 7 and Windows
ies Server 2008 . SMB 2.1 ies .
all all
ow ow
ed ed
! !
Windows Vista and Windows Server 2008 SMB 2.0.2
Th Th
is is
do do
cu cu
me me
nt nt
be be
lon lon
gs gs
to to
Ale Ale
47 of 75 x an xan 19/03/2019, 07:46
d ru d ru
Bla Bla
g a. g a.
about:blank
Th Th
is is
do do
cu cu
me en $false m
Set-SMBServerConfiguration
nt
be
-EnableSMB1Protocol tb
lon elo
ax gs ax ng
No .b l t No . b l st
un ag o u ag oA
au a@ Ale na a@ lex
th o g x an u th o g an
riz m ail d r m a d ru
ed .co ru ize il.c
SMB 3.x features co m Blag d co o m Bla
pie a. pie ga
s s .
all all
ow ow
ed ed
! !
Each new SMB version provides additional functionality that supports new features
in Windows Server. Some of the most significant enhancements started with the
introduction of SMB 3.0, which offers significant performance improvements,
including support for storage of SQL Server databases and Hyper-V virtual machines
Th
on SMB Th
is 3.0 shares. is
d oc do
um cu
en me
tb nt
elo be
ax ng lon ax
SMB o3.0.2
N
un
provided
. b la ga
s t o the functionality that enabled No you
un
to
. b laimplement
ga
gs
to the Scale-Out
au @ Ale a @ Ale
th o gm xa u th g x an
File Server rfeatureize aifor
l.c highly
nd
ru available file shares that store
o ri
ze SQL
ma Server
il.c dru databases
dc om Bla dc om Bla
op g o pie ga
and Hyper-V virtual ies machines. aAdditionally,
all
. it enables bandwidth s all
limitations, . and was
ow ow
the first version to allowedyou ! to disable SMB 1.x. ed
!
• Preauthentication
T
integrity. Protects from man-in-the-middle
T
attacks by using a
his his
do Hash Algorithm 512 (SHA-512) hash to verify
Secure do
cu cu packet contents during
m en m en
tb tb
sessiona setup.
elo
n ax
elo
ng
No x.b gs No .b l st
u lag to u oA ag
na a@ Ale na le a@
u th x u th
• SMB encryption
o ri a
ailimprovements.
nd gm
SMB encryption now g
ori defaults ma toxause nd the
ze .co r u z ed il.co ru
dc m Bla c m Bla
op g o ga
AES-128-GCMieencryption
sa algorithm
a. that has significantly better
p ie sa performance .
llo llo
we we
than AES-128-CCM, dwhich ! was used in SMB 3.0.2. d!
Th Th
is is
do do
cu cu
me me
nt nt
be be
ax lon ax lon
No .b l gs No .b l gs
u ag to u ag to
na a@ Ale na a@ Ale
u th gm xan u th g xa
o ri ail d ru o ri ma nd
ze .co ze il.c ru
dc m Bla dc om Bla
op g a. op ga
ies ies .
all all
ow ow
ed ed
The creation and configuration
! of file shares has long been a core part of network !
administration. The ability to share files is one of the reasons that computer
networks first became popular. Most administrators are aware that you can create
shared folders from within File Explorer. However, in Windows Server 2016, you also
can create
T shares by using Server Manager and TWindows PowerShell. In Server
his his
do do
Manager, cuthe terms file share and SMB refer to the same
m component.
cu
m en en
tb tb
elo elo
ax ng ax ng
No .b l st No .b l st
u agoA u ag oA
na NTFS
Share and a@ permissions lex na a@ lex
u th g an u th gm an
o ri ma d ru o ri ail d ru
ze il.c ze .co
dc om Bla dc m Bla
op ga op ga
ies . ies .
all all
The permissions a user ow has to access
ed
files on an SMB share are aowcombinationed
of
! !
share permissions and NTFS permissions. The most restrictive set of permissions
always applies. For example, if you give a user Full Control NTFS permissions, but
he or she has only Read share permissions, the user’s access is Read.
Th
To simplify
is
d
data access, when you use the QuickThprofile
is
d
for creating an SMB share,
oc oc
um um
en en
tb tb
elo elo
ng ng
st st
oA oA
49 of 75 lex lex 19/03/2019, 07:46
an an
d ru d ru
Bla Bla
g a. g a.
about:blank
the share permission is set to Everyone Full Control. Effectively this means that
share permissions are not restricting access to the share and NTFS permissions are
used to control access.
Th
enumeration access T
is his
do do
cu cu
me me
nt nt
be be
lon lon
gs gs
to to
Ale Ale
50 of 75 xan x an 19/03/2019, 07:46
d ru d ru
Bla Bla
g a. g a.
about:blank
Th
Advanced Yes Yes Yes Th Yes Yes Yes
is is
do do
cu cu
e m me
Applications nNotb
elo No Yes No nt be No Yes
ax n ax lon
No .b l gs No .b l gs
u ag to u ag to
na a@ Ale na a@ Ale
u th
an gm x u th gm xan
Windows PowerShell
o ri
ze
d
ail
.c cmdlets
d ru in the SmbShare module
o ri
ze
d
ail
.co d ru
co om Bla co m Bla
pie g a. pie g a.
sa sa
llo llo
we we
The SmbShare module for
! Windows PowerShell contains 35 cmdlets d
! in Windows d
Server 2016. This includes commonly used cmdlets such as New-SmbShare, Set-
SmbShare, and Remove-SmbShare. If you use the SmbShare cmdlets, you can
configure any share properties, even those that are not available in Server Manager.
Th Th
is is
do do
If you want
cu to identify the shares that exist on a server,
m
cu and view the properties of
m
en en
be t be t
those shares,
ax youlon can use Get-SmbShare. The default lon displays the Name,
ax output
No g .b l st g No .b l st
u ag o u ag o
na
ScopeName, Path,
a@ Ale Description. ScopeNamenis
au onlya@ Ale when the server
u th gm andxa
o ri th relevant
gm xa
nd o ri nd
z ail ru z ail ru
ed co . ed
Bla as * for unclustered file servers. .co
is part of a cluster
co and
p
m displaysga co
p
m Bla
g a.
ies . ies
all all
ow ow
ed ed
! !
You can use Get-SmbSession to identify users that are connected to SMB shares. If
the users have open files, then you can use Get-SmbOpenFile to identify open files.
If you are concerned about controlling the bandwidth allocated to SMB shares on a
Th T
server,is you can use Set-SMBBandwidthLimit to hdefine
is a maximum throughput level
d oc d oc
um um
that is allocatede n t b to SMB traffic on a server for different categories.
en
tb This is useful for
elo elo
ax n g ax n g
Hyper-V
No
un hosts
.bl to ensure
ag st
oA that certain categories of
No traffic
un
.bldo not
ag s t overwhelm the host
oA
au a@ le a a@ lex
th o gm xa u t h g an
and affect other riz
ed
categories,
ail
.co
nd including:
r u
o ri
z ed
ma
il.co d ru
co m Blag co m Bla
pie a. pie ga
sa sa .
llo llo
we we
• Default. This refers to d! all SMB traffic that does not relate to Hyper-V d! or Live
Migration, such as standard file shares.
• Hyper-V. This refers to SMB traffic that you use for running virtual machines,
such as accessing virtual hard drivesdisks on an SMB share.
Th Th
is is
do do
cu cu
me me
nt nt
be be
lon lon
gs gs
to to
Ale Ale
51 of 75 xan xan 19/03/2019, 07:46
d ru d ru
Bla Bla
g a. g a.
about:blank
• Live Migration. This refers to SMB traffic that generates when you perform a live
migration from one Hyper-V host to another.
Note: To explore all of the cmdlets in the SmbShare module, run the Get-
ThCommand -Module SmbShare command. Th
is is
do do
cu cu
me me
nt nt
be be
ax lon ax lon
No .b l gs No .b l gs
ag to ag to
Demonstration:
na u
u th
o ri
a@
gm
Ale
Configuring
xa
nd
SMB shares by using Server u na
u th
o ri
a@
g ma
Ale
xa
nd
ze a il.c ru ze il.c ru
Manager and dc
op Windows
ie
om Bla
ga PowerShell
.
dc
op
ies
om Bla
ga
.
sa all
llo ow
we ed
d! will see how to:
In this demonstration, you !
Th Th
2. Create
is
do a new share with the following settings: is
do
cu cu
me me
nt nt
be be
o
No
axFile share
.b l
lo ng profile: SMB Share - QuickN ax
.
lon
gs
a s t o b la to
un ga o A un ga Ale
au @ lex au @ xa
th o gm an th o gm nd
o r
Server:
ize a
LON-SVR1
il.c d ru r ize a il.c ru
dc om Bla dc om Bla
op g a. o p ga
ies ies .
all all
ow ow
o Select by volume: ed
! D: ed
!
Th Th
ois do
Permissions: default is
do
cu cu
me me
nt nt
be be
lon lon
gs gs
to to
Ale Ale
52 of 75 xan xan 19/03/2019, 07:46
d ru d ru
Bla Bla
g a. g a.
about:blank
1. At the Windows PowerShell prompt, type the following command, and then
press Enter:
Th Th
iMkdir
sd D:\Shares\DemoShare2 is
oc do
um cu
en me
tb nt
elo be
ax n a lon
No .b l gs N x.b gs
un ag t oA o un lag to
au a@ le a a @ Ale
2. Typeththe ori following
g ma x acommand,
nd and then press Enter:u th o
r
g ma xa
nd
ze il.c ru ize il.c ru
dc om Bla dc om Bla
op g a op ga
ies . ies .
all all
ow ow
ed ed
New-SmbShare -Name ! DemoShare2 -Path D:\Shares\DemoShare2 !
-FolderEnumerationMode AccessBased
Get-SmbShare DemoShare | FL *
Th Th
is is
do do
cu cu
View SMBmsession
en
t
information me
nt
be be
ax lon ax lon
No .b l gs No .b l gs
u ag to u ag to
na a@ Ale na a@ Ale
u thxa gm u th g xa
1. o ri
z ail openndFile
On LON-DC1, ru Explorer, and then browse ori to \\LON-
ze
ma
il.c
nd
ru
. ed co Bla dc om Bla
op c m g op ga
SVR1\DemoShare.
ies a. ies .
all all
ow ow
ed ed
! !
2. On LON-SVR1, at the Windows PowerShell prompt, type the following
command, and then press Enter:
Get-SmbSession
Th Th
is is
do do
cu cu
me me
nt nt
be be
lon lon
gs gs
to to
Ale Ale
53 of 75 x an xan 19/03/2019, 07:46
d ru d ru
Bla Bla
g a. g a.
about:blank
What is NFS?
Th Th
is is
do do
cu cu
me me
nt nt
be be
ax lon ax lon
No .b l gs No .b l gs
u ag to u ag to
na a@ Ale na a@ Ale
u th gm xan u th g xa
o ri ail d ru o ri ma nd
ze .co ze il.c ru
dc m Bla dc om Bla
op g a. op ga
ies ies .
all all
ow ow
ed ed
! !
Th Th
is is
do do
cu cu
me me
nt tb n
NFS is a file-system
a
be
lo protocol, which is based on opena standards
elo and allows access
N x.b ng N x.b ng
ou lag t s ou lag to s
to a file nsystem
au a@overo a
Alenetwork. NFS has been developed
na actively,
a@ Aleand the current
th o gm u xa th o gm xa
riz a nd
riz a nd
version is 4.1. il.c
edThe core ru edNFS ilprotocol
ru are:
c om releases
Bla and characteristics of the c
.co
m Bla
op ga op ga
ies . ies .
all all
ow ow
ed ed
! !
• NFS version 1. Sun Microsystems developed version 1 in 1984, and used it
primarily internally. Initially, NFS was used on UNIX operating systems, but was
subsequently supported on other operating systems, including Windows.
• NFS version 2. Request for Comments (RFC) 1094, "NFS: Network File System
Th Th
sdi sd i
Protocol
oc Specification," defines version 2. This version
u
oc
u
focused on improving
me me
nt n
performance.
be There is a file-size limit of 2 GB, becauset bite was a 32-bit
lo lo
ax ng ax ng
N
ou lag to .b s No .b l st
implementation.
na
u
a@ Ale uoA na
lex u th
ag
a@
th o gm xa an gm
riz ail nd o ri ail d ru
ed .co r u z ed .co
co m Blag co m Bla
• NFS version 3.pieRFCsa
1813, "NFS
a. Version 3 Protocol Specification,"
pie
sa
defines ga
. version
llo llo
we we
3, and it introduced support d! for larger file sizes, because it was ad64-bit !
implementation. It also had performance enhancements, such as better
protection from unsafe writes, and increased transfer sizes. It also included
security enhancements, such as over-the-wire permission checks by the server.
Th Th
is is
do do
cu cu
me me
nt nt
be be
lon lon
gs gs
to to
Ale Ale
54 of 75 xan xan 19/03/2019, 07:46
d ru d ru
Bla Bla
g a. g a.
about:blank
• NFS version 4. RFC 3530, "Network File System (NFS) version 4 Protocol,"
defines version 4, which provided enhanced security and improved performance.
• NFS version 4.1. RFC 5661, "Network File System (NFS) Version 4 Minor Version
1 Protocol," defines version 4.1, which added support for clustering.
Th Th
is is
do do
cu cu
me me
In UNIX, NFSt works n
be based on exports. Exports are similar nt to folder shares in
be
ax lon a lon
No .b l gs N x.b gs
Windows,un because ag
a@
tthey
oA are shared UNIX file-system o un paths. lag
a
to
Ale
au le x a u @ xa
th o g ma an th o g ma nd
riz il.c d ru r ize il.c ru
ed o B d o Bla
co m lag co m ga
pie a. pie
Microsoft began supporting s all NFS by introducing the Microsoft Windows s all NT .Services
ow ow
ed ed
for the UNIX Add-On Pack ! in 1998. The product was used to integrate ! Windows-
based computers with UNIX-based computers. One such integration feature was
support for NFS. Microsoft continued to develop the product under the original
name until 2004 when Microsoft Windows Services for UNIX 3.5 was released. At
that Ttime, the product was renamed Subsystem for
T UNIX-based Applications (SUA)
his his
and thedfunctionality
oc
um was split as follows: do
cu
me
en nt
tb be
elo lon
ax ng ax
gs
No .b l st No
.b l to
u ag o ag
u
• na
The UNIX a@
utilities Ale software development kit (SDK)
and na a@
became Ala
ex free and optional
u th g x an u t ho g an
o ri ma d ru riz m ail d ru
ze il.c ed .co
download from dc
op the omMicrosoft Bla
g a.
Download Center. c o pie
m Bla
ga
ies s .
all all
ow ow
e ed
• A portion of SUA, thed!Client for NFS component, and the Server for ! NFS
of which operating system the client is running. The vast majority of UNIX and
Linux computers have a built-in NFS client.
Support for NFS has been improved and expanded with each iteration of the
Windows
Th Server operating system as follows: Th
is is
d oc do
um cu
en me
tb nt
elo elo b
• Windows
N
ax Server
.b ng 2008 R2 introduced support Nfor Kerberos
s
ax
.b ngversion 5 (v5)
s
ou lag to ou lag to
na a@ Ale na a@ Ale
authentication
u th
o gmin Server
xa
n
for NFS. Kerberos v5 authentication
u th
o gm provides
xa
n
riz ail d ru riz ail d ru
dc Blae
om granting .c dc om Bla e .c
authenticationop before
i ga access to data, it also uses opchecksums
i
to
ga ensure
es . es .
llo a all
that no data tampering
we
d
has occurred. ow
ed
! !
• Windows Server 2012 introduced support for NFS version 4.1. This support
included improved performance with the default configuration, native Windows
PowerShell support, and faster failovers in clustered deployments.
Th Th
is is
do do
cu cu
me me
nt nt
be be
Usage scenarios
ax lon ax lon
No .b l gs No .b l gs
u ag to u ag to
na a@ Ale na a@ Ale
u th gm x an u th g xa
o ri ai dr o ri ma nd
ze ze il.c ru
d c inl.Windows
You can use NFS co
m
uB
lagin many scenarios, and some d c of the ommost Bpopular
lag uses
o pie a. op a.
sa ies
include: llo all
we ow
d ed
! !
• VMWare virtual machine storage. In this scenario, VMWare hosts virtual machines
on NFS exports. You can use Server for NFS to host the data on a Windows
Server 2012 R2 server.
Th Th
is is
do do
• Multiple-operating
cu
m
system environment. In this scenario,
cu
m
your organization uses a
en en
be t beand Mac. The Windows t
variety aof operating
lon systems, including Windows, Linux,
a lon
No x.b gs No gs x.b
u lag to u lag to
file-server
n au
th o
system
a @
gm
can
A lex use Server for NFS and theaubuilt-in n
th o
a @ Windows
gm
Ale
xa sharing
an nd
riz ail d r u r iz a il ru
capabilitiesedto .co .co
co ensure m that Blaall of the operating systems ecan
ga
d c access
op m shared
Bla
ga
data.
pie . ie .
sa sa
llo llo
we we
• Merger or acquisition. d! In this scenario, two companies are merging. d! Each
Th Th
is is
do do
cu cu
me me
nt nt
be be
ax lon ax lon
No .b l gs No .b l gs
u ag to u ag to
na a@ Ale na a@ Ale
u th gm xan u th g xa
o ri ail d ru o ri ma nd
ze .co ze il.c ru
dc m Bla dc om Bla
op g a. op ga
ies ies .
all all
ow ow
ed ed
! !
Th Th
is is
do do
cu cu
me me
nt nt
The built-inax
New b elo Share Wizard offers two NFS file share profiles
n a
be
lon from which you can
No .b l gs N x.b gs
a t o o la t o
choose:un
au
ga
@ Ale
xa
un
au
ga
@ Ale
xa
th o gm n th o gm nd
riz ail d ru riz ail ru
ed .co Bla e dc . c om Bla
co m g o ga
pie a. pie .
sa sa
• Quick. Creating alloquick we profile is the fastest way to create an llNFS
o we share, but it
d! d!
does not have some of the customizable share options that are available with
advanced profiles. After you create a quick profile, you can configure the
advanced sharing options manually, outside of the New Share Wizard.
• Advanced. The advanced profile is the most customizable way to create an NFS
Th Th
is is
do You can use it to set folder owners for access-denied
share. do assistance, configure
cu cu
m en m en
tb tb
default adata eclassification,
lon and to enable quotas. Toa create
elo an advanced profile,
n
No x.b gs No x.b gs
ag to l to
un roleagservice l
you umust
na
u install
a@ theAleFile Server Resource Manager
x au a@ Alon
ex the file server.
th o gm an th o gm an
riz ail d ru riz ail d ru
ed .co Bla ed .co Bla
co m g co m g
pie a. pie a.
sa sa
llo llo
we we
! d d !
Installing NFS on the server
You can install NFS on the server by using Server Manager or Windows PowerShell.
When you use Server Manager, you have to add the File and Storage Services role,
and then
Th
is
install the Server for NFS role service. TTo
his use Windows PowerShell to
do do
cu cu
me me
nt nt
be be
lon lon
gs gs
to to
Ale Ale
57 of 75 xan xan 19/03/2019, 07:46
d ru d ru
Bla Bla
g a. g a.
about:blank
hisT Th
Creatingdo an NFS file share
c
is
do
cu
um me
en nt
tb be
elo lon
ax ng gs ax
No .b l s N . b
After you
un install ag NFSo on the server, you can create an
a@
t
Ale
o un NFS lag file share
a@
to
Ale by using either
au x a u xa
th o g m an th o g m nd
Server Manager riz
ed or Windows
ail
.co dru PowerShell. To create an NFS
B
riz fileashare
e d
il.c
o
byru using
Bla
co m lag co m ga
pie a. pie
Windows PowerShell, s all run the following command to configure an s all NFS file share
.
ow ow
ed ed
named Share1 for the directory ! located at d:\shares\share1: !
Th Th
is is
do do
cu cu
me me
Authentication
nt for an NFS share can use Kerberos v5 authentication
b
nt
b
or No server
elo elo
x.b gsa n x.b Active
gs Directory Domain a n
authentication.
No
u lag Whento you use Kerberos v5 authentication,
No
u lag to
na a@ Ale Ale na a@
u th
gm a x u th gm xa
Services (ADrizeDS) isail.used dto
o n
ru authenticate the user account.
o riz When
e
ail you
.
nduse No server
ru
dc c om Bla dc c om Bla
op g o ga
authentication, you ies can map user
all
a. ID (UID) and group ID (GID)pifrom es
all
a Linux system
. to
ow ow
AD DS accounts to assign ed
! permissions.
ed
!
When you configure share permissions for an NFS share, you typically define hosts
that are allowed to access the share. To allow all hosts, you can select All
Machines. You also can allow and deny specify hosts.
Th Th
is is
do do
cu cu
me me
nt nt
Best Practices
ax
be
lon ax
be
lon
No .b l gs No .b l gs
un a ga to u ag to
au @ Ale na a@ Ale
th o gm xa u th g xa
riz ail nd o ri ma nd
ru ze il.c ru
You should consider ed
co
.cseveral
o m Blbest
ag practices before you implement dc
op
omNFS in
Blayour
ga
pie a. ies .
sa
environment, including: llo
we
all
ow
d! ed
!
• Using the latest version of NFS servers and clients. Currently, NFS version 4.1 is
the latest version and is supported on Windows Server 2012 and later, and
Windows 8 and later. By using the latest version of server and client operating
systems,
Th
is you can take advantage of the latestThperformance
is and security
do do
cu cu
me me
nt nt
be be
lon lon
gs gs
to to
Ale Ale
58 of 75 xan xan 19/03/2019, 07:46
d ru d ru
Bla Bla
g a. g a.
about:blank
• Using all available security enhancements. Since NFS version 3.0, NFS has
offered Kerberos security options to strengthen NFS communication. You should
use the following options when possible:
Th Th
is is
do do
cu um c
o Kerberos
me
n v5 authentication protocol. This is the recommended
en authentication
tb tb
elo elo
Noprotocol .bl to nmaintain the highest authentication security.
ax gs ax ng
t No . b l st
un ag o u ag oA
au a@ Ale na a@ lex
th o g x an u th o g an
riz m ail d r m a d ru
ru izintegrity il.c checking
o Kerberos ed v5 authentication
co
.co
m Blag and integrity. This adds ed
co o m Bla by using
pie a. pie ga
sa sa .
checksums to ensure llo
we
that data has not been altered. llo
we
d! d!
Th Th
Some isofdothe
c
is
most often used cmdlets from the NFS domodule are:
c
um um
en en
tb tb
elo elo
ax ng ax
ng
No .b l s tThis N ou . b lag st
• New-NfsShare.
nau ag
a@ oA
le
cmdlet creates an NFS file share.
n a a @
oA
lex
u th g x a u t h g an
o ri ma nd o ri ma d ru
ze il.c ru ze il.c
dc om Bla dc om Bla
• Remove-NfsShare. op This cmdlet ga removes an NFS file share. op ga
ies . ies .
all all
ow ow
ed ed
! !
• Get-NfsShare. This cmdlet retrieves information about the configuration of an
NFS file share.
• New-NfsClientGroup.
Th
is This cmdlet creates a new
Th
is client group on an NFS server.
do do
cu cu
me me
nt nt
• Revoke-NfsSharePermission. be be
ax lon
g
This cmdlet revokes
ax NFSlofile
ng share permissions
No .b l st No .b l st
a o ag oA
fromunanth
ga
au NFS @file share.
g
Ale
xa
u na
u th
a@
gm lex
an
o ri ma nd o ri ail d ru
ze il.c ru ze .co
dc o m Bla dc m Bla
op g op ga
• Set-NfsShare.ieThis
sa cmdlet achanges
. the configuration settings
ies
all of an NFS . share.
llo ow
we ed
d ! !
• Set-NfsClientConfiguration. This cmdlet changes the configuration settings of
an NFS client.
Demonstration:
Th
is
do
cu
Configuring an NFS
Th
is share by using Server
do
cu
me me
Managernt belo nt
be
lo
ax ng ax ng
No .b l st No .b l st
u ag oA u ag o
na a@ na Ale a@
In this demonstration,
u th
o ri g ma
leyou
xa will see
nd
how to configure an
uth NFS share
o gm byxa using Server
n
ze il.c ru riz ail d ru
d Bla ed .co Bla
Manager. c op
o m ga co
pie
m g a.
ies . sa
all llo
ow we
ed d
! !
Demonstration steps
o Permissions: default
Check
Th
is Your Knowledge
d
Th
is
do
oc cu
um me
en nt
tb be
elo lon
Select
No the
ax best
.b l nganswer
st No
ax
.b l gs
un ag oA u ag to
au a@ lex na a@ Ale
u
Which version
th o
riz
of gSMB
m ail
doanWindows
d ru
10 and Windows Servertho 2016
riz
g mause?xand
ed .co ed il.c ru
co m Bla co om Bla
pie ga pie ga
SMB 2.1 sa . sa .
llo llo
we we
d! d!
SMB 3.0.2
SMB 3.1.1
SMB 3.2
Th Th
sd i is
Check answer
oc Show solution Reset do
cu
um me
en nt
tb b
Windows 10 e elo
ax andloWindows
ng Server 2016 use SMB 3.1.1 when
ax communicating
ng with other
No .b l st No .b l st
u ag o u ag oA
na thata@
computers are Ale
running Windows 10 and WindowsnaServer a@
2016. lex
ut g ho x an u th g an
riz ma d ru o ri ma d ru
ed il.c ze il.c
co o m Bla dc om Bla
pie g a. op ga
sa ies .
llo all
we ow
Check Your Knowledge
! d ed
!
Scenario
Th Th
You areis a Storage Administrator in Adatum Corporation,
d
is
d and part of your job is to
oc oc
um um
en en
tb tb
elo elo
ng ng
st st
oA oA
61 of 75 lex lex 19/03/2019, 07:46
an an
d ru d ru
Bla Bla
g a. g a.
about:blank
ensure that your data storage systems meet both short-term and long-term business
needs that evolve regularly.
Objectives
After completing this lab, you will be able to:
Th Th
is is
do do
cu cu
me me
• Plan storage nt requirements.
be
nt
be
ax lon ax lon
No .b l gs No .b l gs
un ag to u ag to
au a@ Ale na a@ Ale
• Configure tho iSCSI
riz
g ma storage. xa
nd
u th
o ri g ma xa
nd
ed il.c ru ze il.c ru
co o m Bla dc om Bla
pie ga op ga
s . ies .
• Configure and manage all
ow shares. all
ow
ed ed
! !
Lab setup
For this lab, you will use the available virtual machine environment. Before you begin
the lab, you must complete the following steps:
Th Th
is is
do d
1. cu host computer, start Hyper-V Manager.ocu
On the
m m
en en
tb tb
elo elo
ax ng ng ax
2. No .b l N .
InunHyper-V ag Manager,
a
s to
A
click 20470B-LON-DC1,
o u and then
n
b lag
a o A Actions pane,
ins tthe
au @ le xa a u @ lex
th o gm nd t h o ri g ma an
click Start.riz
ed
ail
.co r u B
z ed il.co d ru
Bla
co m lag co m ga
pie a. pie .
sa sa
llo llo
3. In the Actions pane, w ed click Connect. Wait until the virtual machine w ed starts.
! !
o Domain: Adatum
• External customers are using web applications more, and these customers need
more and new business services.
• The amount of data produced by A. Datum business groups has increased even
Th Th
faster.
is
d
is
do
oc cu
um me
en nt
tb be
elo lon
ax ng ax gs
No .b l st No .b l to
u ag
oA u ag
na a@
lex na a@ Ale
u th gm u th g xa
Requirementso ri
ze ail
an
d ru o ri
ze
ma
il.c
nd
ru
dc .co Bla dc om Bla
op m ga op ga
ies . ies .
all all
ow ow
In general, the new system ed
! should be low-cost, have reasonable performance, ed
! and
the storage administrators in A. Datum and the newly acquired company should be
able to manage it easily.
• Support for applications that require large amounts of storage for SQL databases.
• You plan to evaluate how iSCSI, Fibre Channel, and InfiniBand solutions meet the
requirements. Which solution do you expect to select?
Th Th
is is
do do
cu cu
me me
• Which storage—block-level
nt
b
storage or file-level storage—do
nt
b
you plan to
elo elo
a
x.b fornthe ax ng
implement
No
u lag
gs SQL databases?
to No
u
.b l
ag
oA
st
na a@ Ale na a@
lex
u th gm xan u th angm
o ri ail d ru o ri ail d ru
ed .co z ze .co
• How will yourco solution
p
m minimize
Bla
g administrative overhead cfor
d
op the m storage Bla
ga
ies a. ies .
all all
administrators? ow
ed
ow
ed
! !
• Which server role(s) do you plan to use for the provisioning of VMWare ESX/ESXi
virtual machines?
• Which file sharing protocol will you use for UNIX clients that require access?
• How do you plan to disable legacy SMB access for existing SMB file shares?
• Read
Th the supporting documentation in the lab exerciseTscenario.
h
is is
d oc d oc
um um
en en
tb tb
elo elo
ax ng ax ng
No .b l st No .b l st
ag ag
nu a@▲ o Ale u na a@ oA
DetailedauSteps
th o gm xa
nd
u th
o ri gm lex
an
riz ail ru ze ail d ru
ed .co Bla dc .co Bla
co m ga op m ga
pie . of action ies .
Task 2: Record your planned s all course all
ow ow
ed ed
! !
2. TWhich storage type do you plan to implement for theTSQL databases, block-level storage or file-
his his
d o
level cstorage? do
um cu
en me
tb nt
elo be
ax your solution lon
3. NHow will. b
ng
s minimize administrative overhead N foraxstorage
. b gadministrators?
st
ou lag to ou lag oA
na a@ Ale na a@ lex
u th g x a u t h g an
o ri ma nd o ma
4. Which server ze role(s)
il.c do you ru plan to use for the provisioning ofrizVMWare ed il ESX/ESXi
.co dru virtual
dc om Bla c m Bla
machines? opies ga
.
op
ies ga
.
all all
ow ow
ed ed
5. Will you run the Hyper-V ! virtual machines on NFS or SMB? !
6. Which file sharing protocol will you use for UNIX clients that require access?
7. How do you plan to disable legacy SMB access for existing SMB file shares?
Th Th
is is
do do
cu cu
me me
nt nt
be be
lon lon
gs gs
to to
Ale Ale
65 of 75 xan xan 19/03/2019, 07:46
d ru d ru
Bla Bla
g a. g a.
about:blank
Result: After completing this exercise, you should have successfully planned a
storage solution that will meet your organization’s requirements.
Detailed Steps ▲
hisT Th
Task 1: Install the iSCSI target feature is
do do
cu cu
me me
nt nt
be be
ax lon ax lon
No .b l gs N . b gs
• On LON-DC1, a in t
Server Manager, install the iSCSI o
Target Server la role to
service
un
au
ga
@
o A lex
un
au
ga
@ Ale in File and Storage
th o gm an th o gm xa
Services. rize ail d ru riz ail nd
.co ed .co ru
dc m Bla c m Bla
op g a. o p ga
ies ies .
all all
ow ow
ed ed
! !
Detailed Steps ▲
Th Th
1. Onis LON-DC1, in Server Manager, in File and Storage
do
isServices, browse to iSCSI.
do
cu cu
me me
nt nt
be be
lon lon
gs gs
to to
Ale Ale
66 of 75 xa xa 19/03/2019, 07:46
nd nd
ru ru
Bla Bla
ga ga
. .
about:blank
o Name: iSCSIDisk1
o Disk size: 5 GB
To
his Target name: LON-DC1 Th
is
do do
cu cu
me me
o Access n t b servers: 10.100.100.3,10.200.100.3 nt
elo be
ax n a lon
No .b l gs N x.b gs
un ag t oA o un lag to
3. Create
au a second a@ iSCSI le virtual disk with the following settings:
a a @ Ale
th o g x an u th o g xa
riz ma d r ma nd
ed il.c ru ize il.c ru
o m Blag d o m Bla
o Name:ciSCSIDisk2
op
ies a .
co
p ies ga
.
all all
ow ow
e ed
o Disk size: 5 GB d! !
Detailed
Th
is Steps ▲ Th
is
do do
cu cu
me me
nt nt
Task 3: Configure
be MPIO
lo
be
lon
ax ng ax gs
No .b l st No
.b l to
u ag o u ag
na a@ Ale na a@ Ale
u th g x an u t ho g xa
o ri ma d ru riz m ail nd
ze il.c e . c ru
1. On LON-SVR1, dc in Server
om Manager,
Bla add the Multipath I/O feature. dc om Bla
op g a. o pie ga
ies s .
all all
ow ow
2. After installation is complete, ed restart LON-SVR1, and then sign in as Adatum\Administrator ed
! !
with the password Pa55w.rd.
5. TIn
his Server Manager, on the Tools menu, open MPIO.This
do do
cu cu
me me
6. n t
In MPIO Properties, on the Discover Multi-Paths tab, add support nt
be be for iSCSI devices, and then
ax lo ng ax lon
Nrestart . b s N . b gs
ou when lag prompted. to ou lag to
na a@ Ale na a@ Ale
u th g x a u th g xa
o ri ma nd o ri ma nd
ze il.c r ze il.c ru
7. After restarting, dc sign omin as uAdatum\Administrator
Bla with the password dc Pa55w.rd.
om Bla
op g a. o p ga
ies ies .
all all
8. In Server Manager, open o w o w
ed MPIO, and then verify that MSFT2005iSCSIBusType_0x9 ed is listed as
! !
a device.
Detailed Steps ▲
Th Th
is is
do
Task 4: Connect to the iSCSI target do
cu cu
me me
nt nt
be be
lon lon
gs gs
to to
Ale Ale
67 of 75 xan xan 19/03/2019, 07:46
d ru d ru
Bla Bla
g a. g a.
about:blank
3. Connect again, select the following options, and then enter the Advanced settings:
o Enable multi-path
To
his Th
Add this connection to the list of Favorite Targets.
is
do do
cu cu
me me
4. n
In the Advancedtb Settings dialog box, select the following settings:nt
elo be
ax n a lon
No .b l gs N x.b gs
ag t oA o lag to
o unauLocal
th o
aadapter:
@
g lMicrosoft
e x iSCSI Initiator un
a u th o
a @
g
Ale
xa
ma an ma nd
riz il.c d ru r ize il.c ru
ed o B d o Bla
m lag m
o InitiatorcoIP: pie 10.100.100.3 a.
co
pie ga
.
sa sa
llo llo
we we
o Target Portal IP: 10.100.100.2 d! / 3260 d!
5. Connect a second time, select the following options, and then enter the Advanced settings:
o Enable multi-path
7. On the Volumes and Devices tab, select the Auto Configure option.
Th Th
9. For
is MPIO, verify that:
do
is
do
cu cu
me me
nt nt
o Load bbalance
elo policy: Round Robin be
lon
ax ng ax gs
No .b l s t No . b l to
un a ga o un a ga
A Ale
o auThe tho pathgm
@ details
an
au for source
lexmatch the IP addresses you configure
th o
@
gm and xadestination
riz ail d r i a nd
ed .co r u z ed il.co ru
addresses co m Bla c m Bla
pie ga op ga
sa . ie sa .
llo llo
we we
d! d!
Detailed Steps ▲
Th Th
is is
do do
cu cu
me me
nt nt
be be
lon lon
gs gs
to to
Ale Ale
68 of 75 xan xan 19/03/2019, 07:46
d ru d ru
Bla Bla
g a. g a.
about:blank
2. Select an offline disk with a bus type of iSCSI, and then bring it online.
3. Right-click that disk, and then create a new volume with the following properties:
o GPT disk
To
his Drive letter: J Th
is
do do
cu cu
me me
o Volume n t b label: SMBShares nt
elo be
ax n a lon
No .b l gs N x.b gs
ag t oA o lag to
o unauOther
th o
asettings:
@
g ledefault
x
un
a u th o
a @
g
Ale
xa
ma an ma nd
riz il.c d ru r ize il.c ru
ed o B d o Bla
co m lag co m ga
4. Select an offline pie disk with a bus a. type of iSCSI, and then bring it online. pie .
sa sa
llo llo
we we
d! d!
5. Right-click that disk, and then create a new volume with the following properties:
o GPT disk
o Drive letter: K
Result: After completing this exercise, you should have successfully configured
an iSCSI target that uses MPIO for redundancy.
Th Th
is is
do d
Exercise
cu 3: Configuring and managing theoshare
me
cu
me infrastructure
nt nt
be be
ax lon ax lon
No .b l gs No .b l gs
u ag to u ag to
na a@ Ale na a@ Ale
u th gm xan u th g xa
o ri ail d ru o ri ma nd
Scenario ze
dc .co
m Bla
ze
dc
il.c
om
ru
Bla
op a. g op ga
ies ies .
all all
After configuring iSCSIestorage
o w
d!
for LON-SVR1, you need to create shares o wed to support
!
clients that are running both Windows and Linux operating systems.
Th Th
is is
do do
cu cu
me me
nt nt
be be
lon lon
gs gs
to to
Ale Ale
69 of 75 xan xan 19/03/2019, 07:46
d ru d ru
Bla Bla
g a. g a.
about:blank
Detailed Steps ▲
Th Th
is is
do do
cu
Task 2: Create cu
me an NFS share on iSCSI storage me
nt nt
be be
ax lon lon
ax
No .b l gs No . b gs
u ag to u lag to
na a@ Ale na a@ Ale
1. u th
On LON-SVR1, g in Serverx a Manager, in File and Storage u th
Services, browse
g xto
an Shares.
o ri ma nd o ri ma d ru
ze il.c ru ze il.c
dc om Bla dc om Bla
op ga op ga
2. Create a new share ie .
s a with the following settings: ie sa .
llo llo
we we
d! d!
o File share profile: NFS Share – Quick
o Select by volume: K:
To
his Authentication method: Kerberos v5 authentication(Krb5)
Th
i sd
do oc
cu um
me en
nt tb
be elo
lon ng
gs st
to oA
Ale lex
70 of 75 xan an 19/03/2019, 07:46
d ru d ru
Bla Bla
g a. g a.
about:blank
Detailed Steps ▲
Get-NfsShare
5. TType
his the following command, and then press Enter: Th
is
do do
cu cu
me me
nt nt
be be
ax
Get-NfsShare lon LinuxData | FL * a lon
No .b l gs N x.b gs
un a ga t o o un la ga to
au @ Ale a @ Ale
th o gm xa u th g xa
riz ail n d ru o riz m ail nd
ed .co e . c ru
co m Bla dc om Bla
pie command, and g a. then press Enter: o pie ga
6. Type the following sa sa .
llo llo
we we
d! d!
Get-SmbShare
Th Th
is is
do do
Get-SmbShare
cu
me
Data | FL * cu
me
nt nt
be be
ax lo ng ax lon
No .b l s N . b gs
un a ga t o o un la ga to
A Ale
8. Typeauthe @
tho following gm command, lex
an and then press Enter: au
th o
@
gm xa
nd
riz ail d ru r ize a il.c ru
ed .co B d o Bla
co m lag co m ga
pie a. p ie .
sa sa
llo llo
Get-SmbSession w ed wed
! !
Get-SmbOpenFile
Note: There are two entries for Adatum\Administrator. File Explorer creates one, and
Th Notepad creates the other. If NewFile.txt is not
Th included, it is because the file
is is
do connection is maintained only for brief periods when do you open the file initially or save it.
cu cu
me me
If you
nt do not see two entries, switch to LON-DC1, close
be
ntNotepad, and then double-click
be
lon
axNewFile.txt. Then, on LON-SVR1, repeat step 10. a lon
N .b gs N x.b gs
ou lag to ou lag to
na a@ Ale na a@ Ale
u th gm xan u th gm xan
o ri ail d ru o ri ail d ru
ze .co ze .co
dc m Bla dc m Bla
op
a. prompt open for the next task. g op g a.
11. Leave the Windows
ies PowerShell ies
all all
ow ow
ed ed
! !
Detailed Steps ▲
Get-SmbServerConfiguration | FL enable*
Th Th
is is
do do
3. Typecthe
um following command, and then press Enter: cu
me
en nt
tb be
elo lon
ax ng ax gs
No .b l s t No . b l to
un a ga o un a ga
Set-SmbServerConfiguration
au @ A lex -EnableSMB1Protocolau$false@g Ale
th o gm an th o ma xa
riz ail d r ize nd
ed .co ru il.c ru
co m Blag d co o m Bla
pie a. p i ga
sa e sa .
llo llo
4. Type the following command, w ed and then press Enter: wed
! !
Get-WindowsFeature *SMB*
Remove-WindowsFeature FS-SMB1
Detailed Steps ▲
Th Th
Task 5:is Prepare
do for the next module is
do
cu cu
me me
nt nt
be be
ax lon lon ax
No .b l gs N . b gs
un finishathe
After you t
ga lab, orevert o
the virtual machines to their initial
un state l to
agby completing the following
au @ Ale a a@ Ale
th o g x an u th o g xa
steps: riz m ail d ru riz m ail n d ru
ed .co Bla ed .co Bla
co m c o m
1. On the host computer, pie
sa switch gtoa. the Hyper-V Manager console. pies ga
.
llo all
we o we
d d!
2. In the Virtual Machines !list, right-click 20740C-LON-DC1, and then click Revert.
Th Th
is is
do do
cu cu
me me
nt nt
be be
Result: After
ax completing
lon this exercise, you should haveax successfully
lon created SMB
No .b l gs N . b gs
a t o la t
and NFS
un
au shares.
ga
@
o Ale un
au
ga
@
o Ale
th o gm xa th o gm xa
riz ail nd riz ail nd
ed .co ru ed .co ru
co m Bla co m Bla
pie g a. pie g a.
sa sa
llo llo
we we
Review Question(s) ! d d !
Discovery
Th Th
sd i sd i
Implementing
oc
u
MPIO for iSCSI is not as simple as installing
oc
u
MPIO. In this lab, what other
me me
steps did yountperform
be to enable MPIO? be
nt
ax lon ax lon
No .b l gs No .b l gs
u ag to u ag to
Show solution
na
u
a@ Reset
Ale na
u th
a@ Ale
th o gm xa g ma xa
riz nd ail o ri nd
ed ru .co ze il.c ru
Ba dc
After you installed
c m
op MPIO, you lhad ga to enable it for iSCSI. Then MPIO op did notBidentify
om lag
a. all of
ies . ies
all all
the paths automatically. ow You needed
ed
to add the appropriate paths manually ow
ed
from the
! !
iSCSI initiator to the iSCSI target.
No, only recently accessed files display. A few moments after a file is open or a file is
saved, the information that Get-SmbFileOpen provides does not include a file that is
open in an application.
Th Th
is is
do do
cu cu
Module nreview
tb
el
and takeaways
me me
nt
be
lon
ax on ax
No .b l gs No .b l gs
u ag to u ag to
na a@ Ale na a@ Ale
u th gm xan u th g xa
o ri ail d ru o ri ma nd
Review Question(s)
dc
o m
ze .co Bla
g
ze
dc
op
il.c
om
ru
Bla
ga
pie a. ies .
sa all
llo ow
we ed
d ! !
Check Your Knowledge
Discovery
If DAS provides similar performance to SAN, is it suitable to all storage needs?
Th solution
Show Reset Th
is is
do do
cu cu
me me
Although DAS bcan n t provide high performance, managing anntexpansive DAS environment
elo be
ax n a lon
N . b gs N x.b gs
takes oconsiderably
un lag
a@
more
to
Ale
administrative time than centralized
ou
na
lag SANtostorage.
a@ Ale
au xa u th xa
th o gm n o gm nd
riz ail d ru riz ail ru
ed .co Bla e dc . c om Bla
co m g o ga
pie a. pie .
sa sa
Check Your Knowledge llo
we
d!
llo
we
d!
Discovery
Which operating systems must you remove from your environment before you can
disable SMB1?
T
his solution Th
Show d Reset is
do
oc cu
um me
en nt
Windows versions t be that are older than Windows Vista and Windowsbe Server 2008 use
ax lo ng ax lon
No .b l s N . b gs
SMB1. uTherefore, ag to cannot remove SMB1 from your o u environment lag to before you remove
na a@ you Ale na a@ Ale
u th g x a u th g xa
o ma n o ma nd
those operating r ize systems
dc
il.c completely
d ru from your environment. r ize
dc
il.c ru
om Bla om Bla
op g a. o p ga
ies ies .
all all
ow ow
ed ed
Tools ! !
The following table lists the tools that this module references.
• Managing disks
Th Th
is • Viewing event logs is
do do
cu cu
me me
nt nt
be be
ax lon ax lon
N .b l gs No .b l gs
Disk o u ag o t u ag
na In Server a@ Manager,
to on the Tools
na
u th
a@ • AleInitializing
xa
disks u th
Ale
xa
gm g m
Management
o ri
z ail n d ru o
menu,
riz or within
ail n
Computer
d ru
ed .co Bla ed .co Bla
co m c o m
pie g a
. modifying volumes Management pie ga
.
s• a Creating and sa
llo llo
we we
d ! d!
Th Th
is is
d
File and Storage
o do In Server Manager, under File and
cu • Performing basic storage cu
me me
Services nt nt
Storage
be management tasks be Services
ax lon a lon
No .b l gs N x.b gs
un a ga t o o un la ga to
au @ Ale a @ Ale
th o gm xa u th g xa
riz a•il n d ru o riz m ail nd
ed .co Examining Bla
storage configuration e dc . c om
ru
Bla
co m g o ga
pie a. pie .
sa sa
llo llo
• wCreating
ed volumes we
d!
!
Th Th
is is
do do
cu cu
me me
nt nt
be be
ax lon ax lon
No .b l gs No .b l gs
u ag to u ag to
na a@ Ale na a@ Ale
u th gm xan u th g xa
o ri ail d ru o ri ma nd
ze .co ze il.c ru
dc m Bla dc om Bla
op g a. op ga
ies ies .
all all
ow ow
ed ed
! !
Th Th
is is
do do
cu cu
me me
nt nt
be be
lon lon
gs gs
to to
Ale Ale
75 of 75 xan xan 19/03/2019, 07:46
d ru d ru
Bla Bla
g a. g a.