Module 3
Module 3
Module 3
Implementing enterprise
storage solutions
Overview of DAS, NAS, and SANs
Comparing Fibre Channel, iSCSI, and Fibre Channel over
Ethernet
Module
Overview Understanding iSNS, DCB
• Configuring sharing in Windows Server
• Securing Files and Folders
• Protecting Shared Files and Folders by Using Shadow
Copies
Lesson 1: Overview of DAS, NAS, and SANs
Advantages:
• Easy to configure
• Inexpensive solution
Disadvantages:
Disadvantages:
Advantages:
Disadvantages:
• More expensive
• Requires specialized skills
Block-level storage:
• Is high-performing
• Is often SAN-based
• Presents LUNs to servers
• Is not the most cost-effective
File-level storage:
• Is delivered via NAS, a storage server, or a file server
• Uses CIFS/SMB (shared folders) or NFS (exports)
• Uses block-level storage on the storage backend
Lesson 2: Comparing Fibre Channel, iSCSI, and
Fibre Channel over Ethernet
Costs
• Fibre Channel is often more expensive than other solutions
• Large initial investment required
• Initial and ongoing training might add considerably to the cost
What is iSCSI?
iSCSI transmits SCSI commands over IP networks
Component Description
IP network Network that provides high performance and
redundancy
iSCSI targets Servers that run on the storage device and enable
access to the disks
• Is available as a role service in Windows Server • Runs as a service in the operating system
• Provides the following functionality: • Is installed by default on Windows Vista and
• Network or diskless boot Windows Server 2008 and newer operating
systems
• Server application storage
• Requires only to be started and configured to
• Heterogeneous storage connect the computer to the iSCSI target
• Lab environments
• Has the following features:
• Authentication
• Query initiator computer for ID
• Virtual hard drives
• Scalability
• Manageability
Considerations for implementing iSCSI
The primary factors to consider when planning on using iSCSI are:
• Network speeds and performance
• High availability
• Security
• Vendor information
• Infrastructure staff
• Application teams
Alternative solutions to iSCSI are Fibre Channel, Fibre Channel over Ethernet,
and InfiniBand
Core storage components
What is SMB?
Configuring SMB shares
Demonstration: Configuring SMB shares by using Server Manager and Windows PowerShell
What is NFS?
Configuring NFS shares
• Demonstration: Configuring an NFS share by using Server Manager
What is SMB?
• SMB is the file-sharing protocol that Windows client and server operating systems use
• Each new version has additional features
• SMB 3.0 introduced large performance benefits
• SMB 3.0.2 added:
• Scale-Out File Server
• Removable SMB 1.x
• SMB 3.1.1 added:
• Pre-authentication integrity
• SMB encryption improvements
• Cluster dialect fencing
Configuring SMB shares
• There are three SMB share profiles:
• Quick
• Advanced
• Applications
• Authentication options:
• Kerberos v5 authentication
• No server authentication
In this demonstration, you will see how to configure an NFS share by using Server
Manager
Lab A: Planning and configuring storage technologies and components
Lab scenario
You are a Storage Administrator in Adatum Corporation, and part of your job is to ensure that your
data storage systems meet both short-term and long-term business needs that evolve regularly.
Objectives
File permissions control access for files and folders on NTFS or ReFS formatted storage volumes
• File Permissions:
• Are configured for files or folders
• Can be granted or denied
• Are inherited from parent folders
• When combining file system and shared folder permissions, the most restrictive
permission is applied
• Example: If a user or group has the shared folder permission of Read and the file
system permission of Write, the user or group will only be able to read the files in the
folder because it is the more restrictive permission
• The user must have both file system and shared folder permissions, otherwise
the user will be denied access to the resource
What Is Access-Based Enumeration?
• Previous versions are accessible from the Properties dialog box of a file or folder
• Administrators can restore previous versions
directly on the server
• Users can restore previous versions over the network
• All users can:
• Restore a file or folder
• Browse previous versions to select the correct one
• Copy a file or folder to an alternate location
Demonstration: Restoring Data from a
Shadow Copy
In this demonstration, you will see how to:
Objectives
Exercise 1: Exercise 2:
Creating and Configuring Shadow
Configuring a File Copies
Share
How does implementing access-based enumeration benefit the
users of the Data shared folder in this lab?
Lab Review
Is there another way you could recover the file in the shadow
copy exercise? What benefit do shadow copies provide in
comparison?
Review Questions
Module Review
and Takeaways Tools
• Common Issues and Troubleshooting Tips
End of presentation