IP Storage Protocols: iscsi. John L Hufferd, Consultant Hufferd Enterprises

Size: px
Start display at page:

Download "IP Storage Protocols: iscsi. John L Hufferd, Consultant Hufferd Enterprises"

Transcription

1 John L Hufferd, Consultant Hufferd Enterprises

2 SNIA Legal Notice The material contained in this tutorial is copyrighted by the SNIA. Member companies and individual members may use this material in presentations and literature under the following conditions: Any slide or slides used must be reproduced in their entirety without modification The SNIA must be acknowledged as the source of any material used in the body of any document containing material from these presentations. This presentation is a project of the SNIA Education Committee. Neither the author nor the presenter is an attorney and nothing in this presentation is intended to be, or should be construed as legal advice or an opinion of counsel. If you need legal advice or a legal opinion please contact your attorney. The information presented herein represents the author's personal opinion and current understanding of the relevant issues involved. The author, the presenter, and the SNIA do not assume any responsibility or liability for damages arising out of any reliance on or use of this information. NO WARRANTIES, EXPRESS OR IMPLIED. USE AT YOUR OWN RISK. 2

3 Abstract This session will explain the various parts of Network encapsulations of PDUs Session Relationship to SCSI and TCP/IP Connections flow from Initiator to Target Error Recovery, Discovery and Security It will also explain Companion Processes Boot SLP isns And the session will describe Environments From the small office, to the High End Enterprise This session is appropriate for end user and developers of technologies 3

4 Terms - Internet SCSI NAS - Network Attached Storage Supports CIFS (Common Internet File System) protocols Supports NFS (Network File System) protocols FAN File Area Networks Utilize IP Networks and NAS protocols HBA - Host Bus Adapter TOE - TCP/IP Offload Engine FC - Fibre Channel SAN - Storage Area Network Supports Block Storage Protocols (FC and ) isan A Storage Area Network made up of connections PDU - Protocol Data Unit 4

5 Agenda Introduction Features Error handling, Boot, Discovery usage models Security Q & A 5

6 Agenda Introduction Features Error Handling, Boot, Discovery usage models Security Q & A 6

7 Small Computer System Interconnect (SCSI) Scanners Legacy SCSI BUS (Almost completely replaced by Serial-SCSI for single system storage connections) Printers Desktop / Server Computer ATA/SATA Disk SCSI Disks Note: ATA and SCSI drives with Serial attachments are called SATA and SAS Tapes There are 2 main hard drive interface classes available today: ATA (used mostly in desktop and laptop systems) Includes SATA which is becoming a larger presence in server class systems/arrays SCSI (used in server-class systems) includes PSCSI, FC & SAS 7

8 Systems with SCSI over Networks Application File System Application File System Application File System Fibre Channel or Storage Area Network (SAN) With Block I/O Both Fibre Channel and can makeup a SAN Replaces shared bus with switched fabric 8

9 is: Internet SCSI: internet Small Computer System Interconnect is a SCSI transport protocol for mapping of block-oriented storage data over TCP/IP networks The protocol enables universal access to storage devices and Storage Area Networks (SANs) over standard TCP/IP networks On Ethernet LANs: Copper & Optical On ATM WANs On SONET WANs Wireless Etc. 9

10 Data Encapsulation Into Network Packets Ethernet Header IP TCP SCSI Cmds Optional DATA FCS (CRC) Protocol Data Unit (PDU): Provides ordering and control information. Contains control info, with optional SCSI Commands &/or Data Provides Reliable data transport and delivery (TCP Windows, ACKs, ordering, etc.) Also demux within node (port numbers) Provides IP routing capability so that packet can find its way through the network Provides physical network capability (Cat 5, MAC, etc.) 10

11 Mapping Control Header (with optional SCSI Command) PDU Optional Header CRC Optional Data Optional Data CRC PDU PDU PDU PDU Header & SCSI Command Header Data Header with SCSI Cmd Data Header with Only Control Info IP packet IP packet IP packet IP packet IP packet IP packet IP packet IP packet PDU alignment with packets varies 11

12 - Layered Model Application Layer Application I/O Request Logical Unit SCSI Interface SCSI Layer SCSI Class Driver (SCSI Initiator) SCSI Application Protocol SCSI Device (SCSI Target) SCSI CDB Protocol Layer Protocol Services Interface Protocol Services PDU TCP/IP TCP/IP TCP/IP TCP/IP Transport Interface TCP/IP Protocol session TCP/IP TCP/IP TCP/IP TCP segments in IP Datagrams Ethernet Data link + Physical Data link + Physical Ethernet Frame Ethernet Transparently encapsulates SCSI Command Descriptor Blocks (CDBs) 12

13 Application to LU Command Flow Application File System Disk ortape Driver (SCSI Class Driver) Device Driver HBA Chip/HBA Device Driver SCSI Layer Target Function (CDB Passthrough) SCSI HBA Device Driver HBA HBA LU#1 LU#2 LU#3 (LU = Logical Unit) 13

14 Multiple Connections Between Hosts and Storage Controllers Application Application File System Disk or Tape Driver (SCSI Class Driver) File System Disk or Tape Driver (SCSI Class Driver) WedgeDriver Device Driver Device Driver Device Driver one Session two Sessions 15

15 Integrity adds Cyclic Redundancy Check (CRC) CRC-32C - A 32 bit check word algorithm End to End Checking In addition to TCP/IP Checksums In addition to Ethernet Link layer Frame Check Sequence (FCS) s CRC check word is called a Digest can have Digests for Headers and Data Header Digest is optional to use (MUST implement) Insures correct operation and data placement Data Digest is optional to use (MUST implement) Insures data is unmodified through-out network path 16

16 Message Types Called Protocol Data Units (PDUs) Initiator to Target NOP-out SCSI Command Encapsulates a SCSI CDB SCSI Task Mgmt Cmd Login Command Text Command Including SendTargets Used in Discovery SCSI data-out Output Data for Writes Logout Command Target to Initiator NOP-in SCSI Response Can contain status SCSI Task Mgmt Rsp Login Response Text Response SCSI data-in Input Data from Reads Logout Response Ready to transfer R2T Async Event 17

17 Agenda Introduction Features Error Handling, Boot, Discovery usage models Security Q & A 18

18 Error Handling ErrorRecoveryLevel = 0 When detects errors it will bring down the Session (all TCP connections within the Session) and restart it will let the SCSI layer retry the operation ErrorRecoveryLevel = 1 Detected errors (Header or Data) causes PDUs to be discarded will retransmit discarded commands will retransmit discarded data ErrorRecoveryLevel = 2 Caused by loss of the TCP/IP connection Connection & Allegiance reestablishment Uses ErrorRecoveryLevel 1 to recover lost PDUs 19

19 Discovery via SendTargets Targets : :3260 SendTargets Targets : :3260 SendTargets Targets : :3260 SendTargets Set Discovery Target Addrs isan Sessions between Initators and Targets : :3260 Set IP Addrs and ACLs 20

20 Discovery via SLP SLP Directory Agent (DA) Multicast to find SLP DA & Get Addr of Storage Cntrls DHCP Get Addr of SLP DA from DHCP Get Addrs of Storage Cntrls from SLP DA via Unicast SA Advertises its existence to DA via Multicast Sessions between Initiators and Targets :3260 Set Addr of Storage Cntlrs + ACLs, and place Addr of SLP DA into DHCP :3260 SA gets DA Addr from DHCP then Advertises its existence to DA Note: Service Agent (SA) exist within Target Storage Ctlrs 21

21 Discovery via isns Gets location of isns from DHCP & Get Addr of Storage Cntrls from isns Gets location of isns from DHCP & Get Addr of Storage Cntrls from isns DHCP isns Server Str Ctlr gets isns Svr Addr from DHCP then sends its profile to isns Str Ctlr gets isns Svr Addr from DHCP then sends its profile to isns :3260 Set Addr of Storage Cntlrs + ACLs and place Addr of isns into DHCP :3260 Sessions between Initiators and Targets 22

22 Redirection After attempting to Login at specified location: The specified Target may signal a redirection Temporary redirection Permanent redirection Redirection used for: Corrections between Discovery DB updates Admin or automatic Hardware disablement for Service Because of HW problems For load balancing 23

23 Boot Static configuration information for Boot Admin sets authorized Target Node Name and Address, Optional LUN Default LUN is 0 Dynamic configuration via use of DHCP, SLP, isns DHCP can be used by Host to get an IP address DHCP can hold the Boot Service Option (Admin Set) May contain all that is needed to reach the Boot device May only contain Target Node Name, then use SLP/iSNS to resolve to address SLP, or isns can also be used to find the Boot location The Boot load process The Admin. or DHCP, SLP or isns can enable the access BootP/PXE is also possible as part of a SW two phase process HW HBA can act as a normal SCSI HBA for system BIOS use 24

24 Agenda Introduction Features Boot, Discovery, Error Handling usage models IP Security Q & A 25

25 Now let s look at the various environments where is appropriate 26

26 Small Office Interconnect Ethernet Print Server Switch Office Server NAS 27

27 IP Storage Combo -- NAS & Ethernet Print Server Switch NAS Office Server Dual Dialect Block and File I/O 28

28 & TOE Dhip & TOE Dhip & TOE Dhip & TOE Dhip & TOE Dhip Midrange Environment Desktops and Laptops HBA Servers Ethernet Switch HBA HBA HBA & TOE Chip Cat.5 Ethernet Cables Ethernet Switch HBA to FC Bridge FC NAS HBA & TOE Dhip & TOE Chip Dual Dialect FC Disk Storage 29

29 Combining of FC and Tape Library 2 Initiator 2 FC- Router registers FC devices WWN and Name alias. Both and FC identities are stored in the isns server isns Server Management Platform Tape Library 1 Management Platforms can view and manage both and FC devices by interacting with isns server Initiator 1 IP Network FC- Gateway FC Fabric FC JBOD: WWN = X FC JBOD: WWN=X, Name = abc FC Server: WWN=Y, FC Server: Name = xyz WWN = Y FC JBOD: WWN = X FC- Gateway FC Fabric FC Server: WWN = Z Other FC fabrics can be joined over common IP network. Other gateways can discover open mapping by querying isns 30

30 High-End Environment 31

31 Campus Network 32

32 Satellite and Central System/Storage 33

33 At-Distance * Special Tuning/Equipment usually required for large distances 34

34 & TOE Chip Web Server Installation Internet Links Ethernet Links NAS Web Server Systems Ethernet Switch SAN HBA Dual Dialect HBA & TOE Chip & TOE Chip FC SAN to/from FC Routing Switches & TOE Chip SATA Disk and Tape FC Storage Controllers 35

35 Peaceful Co-existence isan & NAS Note: File Area Network (FAN) utilizes IP Networks and NAS protocols NAS -Gateway Supports both and NAS (a Dual Dialect combination) RAID Ctlrs 36

36 Agenda Introduction Features Boot, Discovery, Error Handling usage models Security Q & A 37

37 Security Properties Connection Authentication: Who are you? Prove it! Mutual Authentication: Initiator to Target AND vice-versa Packet Integrity: Has this data been tampered with? Cryptographic Packet by Packet authentication & integrity check, not just checksum or CRC Anti-Replay to prevent regeneration attack Privacy: Encryption of the Data Authorization: What are you allowed to do? : Who can connect to which Target LUN masking & mapping handled by SCSI, not Security Features: Must be implemented but are Optional to use Subject to negotiation 38

38 Security Considerations Connection Authentication is way to determine trustworthiness via CHAP -- Challenge Handshake Authentication Protocol with strong secrets is required Can t use passwords Stronger than basic CHAP when specification is followed SRP -- Secure Remote Password Kerberos -- A Third Party Authentication protocol SPKM-1,SPKM-2 -- Simple Public Key Mechanism Connection Security may be used with or without IPsec s Packet Security: Packet Authentication Origin assurance Anti-Reply protection Privacy Encryption 39

39 Conclusions

40 is the Network Storage Alternative The performance on 1Gb Ethernet networks is Good Enough for many applications Host systems can use the cost effective software Initiators to great effect at 1Gb Host system can use the low overhead of HW HBA for Initiators to great effect at 10Gb With link aggregation and Ethernet networks moving to 10Gb, most storage networking needs can be handled by is not just a Low-End protocol but will also apply to the High End environments. 41

41 References Both Books Published by Addison-Wesley Available in Book Stores and Amazon.com Volume purchases available The detail specification can be found at 42

42 Q&A / Feedback Please send any questions or comments on this presentation to SNIA: tracknetworking@snia.org Many thanks to the following Group and individuals for their contributions to this tutorial. SNIA Education Committee Members of the SNIA IP Storage Forum David Black David Dale John Hufferd Peter Hunt Howard Goldstein Gary Orenstein Ahmad Zamer 43

43 Appendix 44

44 CHAP Authentication Protocol Based on shared secret, random challenge Uses a secure (one-way) hash, usually MD5 One-way hash: Computationally infeasible to invert Secret Challenge Secret Hash Response Host Hash Storage =? Can be outsourced to RADIUS server 45

45 with IPsec Initiator Opens Socket connection to Target IKE (Internet Key Exchange) is performed to authenticate & obtain encryption key for IPSec Pre-shared Key (or Certificate) Target Port is engaged Create encryption key Message Message is sent on Open Socket Create encryption key Message Message is delivered to Target's Listening Port 46

46 Spreading v. Centralizing the File System Overhead Block I/O (including ) spread the File System overhead across all the Clients NAS Clients move the File System overhead to the NAS server Block I/O (including ) Storage Controllers just store the I/O blocks where the Client File System requests (perhaps with Virtualizing LUN Mapping) NAS Servers centralizes the File System functions (and overhead) for all its clients into the NAS Server Plus the NAS Server still must map the resultant Blocks onto the Storage (perhaps with Virtualizing LUN Mapping) The non TCP/IP Server side overhead can be many times higher in NAS Servers than Block I/O () Storage Controllers Therefore, as a rule of thumb: use NAS for File Sharing and for Block IP Storage 47

IP SAN Fundamentals: An Introduction to IP SANs and iscsi

IP SAN Fundamentals: An Introduction to IP SANs and iscsi IP SAN Fundamentals: An Introduction to IP SANs and iscsi Updated April 2007 Sun Microsystems, Inc. 2007 Sun Microsystems, Inc., 4150 Network Circle, Santa Clara, CA 95054 USA All rights reserved. This

More information

SCSI The Protocol for all Storage Architectures

SCSI The Protocol for all Storage Architectures SCSI The Protocol for all Storage Architectures David Deming, Solution Technology April 12, 2005 Abstract SCSI: The Protocol for All Storage Architectures This session will appeal to System Administrators,

More information

iscsi Security ELEN 689 Network Security John Price Peter Rega

iscsi Security ELEN 689 Network Security John Price Peter Rega iscsi Security ELEN 689 Network Security John Price Peter Rega Outline iscsi Basics iscsi and NAS Differences iscsi Security Current Vulnerabilities References iscsi Basics Internet Small Computer Storage

More information

Best Practice and Deployment of the Network for iscsi, NAS and DAS in the Data Center

Best Practice and Deployment of the Network for iscsi, NAS and DAS in the Data Center Best Practice and Deployment of the Network for iscsi, NAS and DAS in the Data Center Samir Sharma, Juniper Networks Author: Samir Sharma, Juniper Networks SNIA Legal Notice The material contained in this

More information

CCT vs. CCENT Skill Set Comparison

CCT vs. CCENT Skill Set Comparison Operation of IP Data Networks Recognize the purpose and functions of various network devices such as Routers, Switches, Bridges and Hubs Select the components required to meet a given network specification

More information

Dell PowerVault MD Series Storage Arrays: IP SAN Best Practices

Dell PowerVault MD Series Storage Arrays: IP SAN Best Practices Dell PowerVault MD Series Storage Arrays: IP SAN Best Practices A Dell Technical White Paper Dell Symantec THIS WHITE PAPER IS FOR INFORMATIONAL PURPOSES ONLY, AND MAY CONTAIN TYPOGRAPHICAL ERRORS AND

More information

IP SAN Best Practices

IP SAN Best Practices IP SAN Best Practices A Dell Technical White Paper PowerVault MD3200i Storage Arrays THIS WHITE PAPER IS FOR INFORMATIONAL PURPOSES ONLY, AND MAY CONTAIN TYPOGRAPHICAL ERRORS AND TECHNICAL INACCURACIES.

More information

SAN Conceptual and Design Basics

SAN Conceptual and Design Basics TECHNICAL NOTE VMware Infrastructure 3 SAN Conceptual and Design Basics VMware ESX Server can be used in conjunction with a SAN (storage area network), a specialized high speed network that connects computer

More information

IP SAN BEST PRACTICES

IP SAN BEST PRACTICES IP SAN BEST PRACTICES PowerVault MD3000i Storage Array www.dell.com/md3000i TABLE OF CONTENTS Table of Contents INTRODUCTION... 3 OVERVIEW ISCSI... 3 IP SAN DESIGN... 4 BEST PRACTICE - IMPLEMENTATION...

More information

White Paper Technology Review

White Paper Technology Review White Paper Technology Review iscsi- Internet Small Computer System Interface Author: TULSI GANGA COMPLEX, 19-C, VIDHAN SABHA MARG, LUCKNOW 226001 Uttar Pradesh, India March 2004 Copyright 2004 Tata Consultancy

More information

Benefits of Networked Storage: iscsi & Fibre Channel SANs. David Dale, NetApp

Benefits of Networked Storage: iscsi & Fibre Channel SANs. David Dale, NetApp Benefits of Networked Storage: iscsi & Fibre Channel SANs David Dale, NetApp SNIA Legal Notice The material contained in this presentation is copyrighted by the SNIA. Member companies and individuals may

More information

PCI Express IO Virtualization Overview

PCI Express IO Virtualization Overview Ron Emerick, Oracle Corporation Author: Ron Emerick, Oracle Corporation SNIA Legal Notice The material contained in this tutorial is copyrighted by the SNIA unless otherwise noted. Member companies and

More information

Storage Networking Foundations Certification Workshop

Storage Networking Foundations Certification Workshop Storage Networking Foundations Certification Workshop Duration: 2 Days Type: Lecture Course Description / Overview / Expected Outcome A group of students was asked recently to define a "SAN." Some replies

More information

Server and Storage Virtualization with IP Storage. David Dale, NetApp

Server and Storage Virtualization with IP Storage. David Dale, NetApp Server and Storage Virtualization with IP Storage David Dale, NetApp SNIA Legal Notice The material contained in this tutorial is copyrighted by the SNIA. Member companies and individuals may use this

More information

100-101: Interconnecting Cisco Networking Devices Part 1 v2.0 (ICND1)

100-101: Interconnecting Cisco Networking Devices Part 1 v2.0 (ICND1) 100-101: Interconnecting Cisco Networking Devices Part 1 v2.0 (ICND1) Course Overview This course provides students with the knowledge and skills to implement and support a small switched and routed network.

More information

Server and Storage Consolidation with iscsi Arrays. David Dale, NetApp

Server and Storage Consolidation with iscsi Arrays. David Dale, NetApp Server and Consolidation with iscsi Arrays David Dale, NetApp SNIA Legal Notice The material contained in this tutorial is copyrighted by the SNIA. Member companies and individual members may use this

More information

ESSENTIALS. Understanding Ethernet Switches and Routers. April 2011 VOLUME 3 ISSUE 1 A TECHNICAL SUPPLEMENT TO CONTROL NETWORK

ESSENTIALS. Understanding Ethernet Switches and Routers. April 2011 VOLUME 3 ISSUE 1 A TECHNICAL SUPPLEMENT TO CONTROL NETWORK VOLUME 3 ISSUE 1 A TECHNICAL SUPPLEMENT TO CONTROL NETWORK Contemporary Control Systems, Inc. Understanding Ethernet Switches and Routers This extended article was based on a two-part article that was

More information

An Introduction to Storage Management. Raymond A. Clarke, Oracle

An Introduction to Storage Management. Raymond A. Clarke, Oracle An Introduction to Storage Management Raymond A. Clarke, Oracle SNIA Legal Notice The material contained in this tutorial is copyrighted by the SNIA. Member companies and individual members may use this

More information

"Charting the Course...

Charting the Course... Description "Charting the Course... Course Summary Interconnecting Cisco Networking Devices: Accelerated (CCNAX), is a course consisting of ICND1 and ICND2 content in its entirety, but with the content

More information

Course Overview: Learn the essential skills needed to set up, configure, support, and troubleshoot your TCP/IP-based network.

Course Overview: Learn the essential skills needed to set up, configure, support, and troubleshoot your TCP/IP-based network. Course Name: TCP/IP Networking Course Overview: Learn the essential skills needed to set up, configure, support, and troubleshoot your TCP/IP-based network. TCP/IP is the globally accepted group of protocols

More information

HP Education Services Course Overview

HP Education Services Course Overview HP Education Services Course Overview SAN Boot Camp (U4235S) This five-day course provides a comprehensive understanding of the leading SAN technologies and the hands-on experience needed to tackle the

More information

Data Center Convergence. Ahmad Zamer, Brocade

Data Center Convergence. Ahmad Zamer, Brocade Ahmad Zamer, Brocade SNIA Legal Notice The material contained in this tutorial is copyrighted by the SNIA unless otherwise noted. Member companies and individual members may use this material in presentations

More information

Overview of Modern SCSI Networking Protocols

Overview of Modern SCSI Networking Protocols C H A P T E R 4 Overview of Modern SCSI Networking Protocols The goal of this chapter is to quickly acclimate readers to the standard upper-layer storage protocols currently being deployed. To that end,

More information

CCNA R&S: Introduction to Networks. Chapter 5: Ethernet

CCNA R&S: Introduction to Networks. Chapter 5: Ethernet CCNA R&S: Introduction to Networks Chapter 5: Ethernet 5.0.1.1 Introduction The OSI physical layer provides the means to transport the bits that make up a data link layer frame across the network media.

More information

Evaluation of Storage Area Network (SAN) Security and Performance

Evaluation of Storage Area Network (SAN) Security and Performance MASTER THESIS Evaluation of Storage Area Network (SAN) Security and Performance Master Thesis in Computer Network Engineering November 2013 Author: Siavash Hajirostam Supervisor: Tony Larsson Examiner:

More information

Customer Education Services Course Overview

Customer Education Services Course Overview Customer Education Services Course Overview Accelerated SAN Essentials (UC434S) This five-day course provides a comprehensive and accelerated understanding of SAN technologies and concepts. Students will

More information

PCI Express Impact on Storage Architectures and Future Data Centers. Ron Emerick, Oracle Corporation

PCI Express Impact on Storage Architectures and Future Data Centers. Ron Emerick, Oracle Corporation PCI Express Impact on Storage Architectures and Future Data Centers Ron Emerick, Oracle Corporation SNIA Legal Notice The material contained in this tutorial is copyrighted by the SNIA. Member companies

More information

Networking Test 4 Study Guide

Networking Test 4 Study Guide Networking Test 4 Study Guide True/False Indicate whether the statement is true or false. 1. IPX/SPX is considered the protocol suite of the Internet, and it is the most widely used protocol suite in LANs.

More information

How To Learn Cisco Cisco Ios And Cisco Vlan

How To Learn Cisco Cisco Ios And Cisco Vlan Interconnecting Cisco Networking Devices: Accelerated Course CCNAX v2.0; 5 Days, Instructor-led Course Description Interconnecting Cisco Networking Devices: Accelerated (CCNAX) v2.0 is a 60-hour instructor-led

More information

PCI Express Impact on Storage Architectures. Ron Emerick, Sun Microsystems

PCI Express Impact on Storage Architectures. Ron Emerick, Sun Microsystems PCI Express Impact on Storage Architectures Ron Emerick, Sun Microsystems SNIA Legal Notice The material contained in this tutorial is copyrighted by the SNIA. Member companies and individual members may

More information

IP Networking. Overview. Networks Impact Daily Life. IP Networking - Part 1. How Networks Impact Daily Life. How Networks Impact Daily Life

IP Networking. Overview. Networks Impact Daily Life. IP Networking - Part 1. How Networks Impact Daily Life. How Networks Impact Daily Life Overview Dipl.-Ing. Peter Schrotter Institute of Communication Networks and Satellite Communications Graz University of Technology, Austria Fundamentals of Communicating over the Network Application Layer

More information

iscsi Security (Insecure SCSI) Presenter: Himanshu Dwivedi

iscsi Security (Insecure SCSI) Presenter: Himanshu Dwivedi iscsi Security (Insecure SCSI) Presenter: Himanshu Dwivedi Agenda Introduction iscsi Attacks Enumeration Authorization Authentication iscsi Defenses Information Security Partners (isec) isec Partners Independent

More information

SECURITY SUMMIT 06/06/2013 Roma STORAGE FORENSICS. Litiano Piccin (NCDA-NCIE/SAN) litiano@studiopiccin.it

SECURITY SUMMIT 06/06/2013 Roma STORAGE FORENSICS. Litiano Piccin (NCDA-NCIE/SAN) litiano@studiopiccin.it SECURITY SUMMIT 06/06/2013 Roma STORAGE FORENSICS Litiano Piccin (NCDA-NCIE/SAN) litiano@studiopiccin.it 1. Introduction: SAN vs NAS. 2. SAN. 3. NAS. 4. SNAPSHOT. 5. Data Acquisition. INTRODUCTION STORAGE:

More information

Optimizing Large Arrays with StoneFly Storage Concentrators

Optimizing Large Arrays with StoneFly Storage Concentrators Optimizing Large Arrays with StoneFly Storage Concentrators All trademark names are the property of their respective companies. This publication contains opinions of which are subject to change from time

More information

Network Access Security. Lesson 10

Network Access Security. Lesson 10 Network Access Security Lesson 10 Objectives Exam Objective Matrix Technology Skill Covered Exam Objective Exam Objective Number Firewalls Given a scenario, install and configure routers and switches.

More information

Cisco Certified Network Associate Exam. Operation of IP Data Networks. LAN Switching Technologies. IP addressing (IPv4 / IPv6)

Cisco Certified Network Associate Exam. Operation of IP Data Networks. LAN Switching Technologies. IP addressing (IPv4 / IPv6) Cisco Certified Network Associate Exam Exam Number 200-120 CCNA Associated Certifications CCNA Routing and Switching Operation of IP Data Networks Operation of IP Data Networks Recognize the purpose and

More information

Interconnecting Cisco Network Devices 1 Course, Class Outline

Interconnecting Cisco Network Devices 1 Course, Class Outline www.etidaho.com (208) 327-0768 Interconnecting Cisco Network Devices 1 Course, Class Outline 5 Days Interconnecting Cisco Networking Devices, Part 1 (ICND1) v2.0 is a five-day, instructorled training course

More information

Chapter 4 Network Layer

Chapter 4 Network Layer Chapter 4 Network Layer A note on the use of these ppt slides: We re making these slides freely available to all (faculty, students, readers). They re in PowerPoint form so you can add, modify, and delete

More information

SCSI Security Nuts and Bolts. Ralph Weber, ENDL Texas

SCSI Security Nuts and Bolts. Ralph Weber, ENDL Texas SCSI Ralph Weber, ENDL Texas SNIA Legal Notice The material contained in this tutorial is copyrighted by the SNIA. Member companies and individuals may use this material in presentations and literature

More information

PCI Express and Storage. Ron Emerick, Sun Microsystems

PCI Express and Storage. Ron Emerick, Sun Microsystems Ron Emerick, Sun Microsystems SNIA Legal Notice The material contained in this tutorial is copyrighted by the SNIA. Member companies and individuals may use this material in presentations and literature

More information

Storage Area Network

Storage Area Network Storage Area Network 2007 Infortrend Technology, Inc. All rights Reserved. Table of Contents Introduction...3 SAN Fabric...4 Advantages of SAN Solution...4 Fibre Channel SAN vs. IP SAN...4 Fibre Channel

More information

Storage Protocol Comparison White Paper TECHNICAL MARKETING DOCUMENTATION

Storage Protocol Comparison White Paper TECHNICAL MARKETING DOCUMENTATION Storage Protocol Comparison White Paper TECHNICAL MARKETING DOCUMENTATION v 1.0/Updated APRIl 2012 Table of Contents Introduction.... 3 Storage Protocol Comparison Table....4 Conclusion...10 About the

More information

EDUCATION. PCI Express, InfiniBand and Storage Ron Emerick, Sun Microsystems Paul Millard, Xyratex Corporation

EDUCATION. PCI Express, InfiniBand and Storage Ron Emerick, Sun Microsystems Paul Millard, Xyratex Corporation PCI Express, InfiniBand and Storage Ron Emerick, Sun Microsystems Paul Millard, Xyratex Corporation SNIA Legal Notice The material contained in this tutorial is copyrighted by the SNIA. Member companies

More information

Interconnecting Cisco Networking Devices, Part 1 (ICND1) v3.0

Interconnecting Cisco Networking Devices, Part 1 (ICND1) v3.0 Interconnecting Cisco Networking Devices, Part 1 (ICND1) v3.0 COURSE OVERVIEW: Interconnecting Cisco Networking Devices, Part 1 (ICND1) v3.0 is a five-day, instructor-led training course that teaches learners

More information

The proliferation of the raw processing

The proliferation of the raw processing TECHNOLOGY CONNECTED Advances with System Area Network Speeds Data Transfer between Servers with A new network switch technology is targeted to answer the phenomenal demands on intercommunication transfer

More information

Using High Availability Technologies Lesson 12

Using High Availability Technologies Lesson 12 Using High Availability Technologies Lesson 12 Skills Matrix Technology Skill Objective Domain Objective # Using Virtualization Configure Windows Server Hyper-V and virtual machines 1.3 What Is High Availability?

More information

Ethernet. Ethernet. Network Devices

Ethernet. Ethernet. Network Devices Ethernet Babak Kia Adjunct Professor Boston University College of Engineering ENG SC757 - Advanced Microprocessor Design Ethernet Ethernet is a term used to refer to a diverse set of frame based networking

More information

PCI Express Impact on Storage Architectures and Future Data Centers

PCI Express Impact on Storage Architectures and Future Data Centers PCI Express Impact on Storage Architectures and Future Data Centers Ron Emerick, Oracle Corporation Author: Ron Emerick, Oracle Corporation SNIA Legal Notice The material contained in this tutorial is

More information

Owner of the content within this article is www.msexchange.org Written by Marc Grote www.it-training-grote.de

Owner of the content within this article is www.msexchange.org Written by Marc Grote www.it-training-grote.de Owner of the content within this article is www.msexchange.org Written by Marc Grote www.it-training-grote.de Exchange 2003 Implementing iscsi for Exchange Server 2003 Written by Marc Grote - mailto:grotem@it-training-grote.de

More information

NATIONAL SECURITY AGENCY Ft. George G. Meade, MD

NATIONAL SECURITY AGENCY Ft. George G. Meade, MD NATIONAL SECURITY AGENCY Ft. George G. Meade, MD 18 October 2007 Systems and Network Analysis Center Best Practices for Storage Networks This document contains 30 sheets. Table of Contents 1. Executive

More information

UCD IT Services. Data Storage in the UCD Cloud

UCD IT Services. Data Storage in the UCD Cloud UCD IT Services Data Storage in the UCD Cloud Customer Policy, Procedures & Information Project: Description: Data Storage in the UCD Cloud Customer Policy, Procedure & Information Document Version: 10

More information

AX4 5 Series Software Overview

AX4 5 Series Software Overview AX4 5 Series Software Overview March 6, 2008 This document presents an overview of all software you need to configure and monitor any AX4 5 series storage system running the Navisphere Express management

More information

cnds@napier Slide 1 Introduction cnds@napier 1 Lecture 6 (Network Layer)

cnds@napier Slide 1 Introduction cnds@napier 1 Lecture 6 (Network Layer) Slide 1 Introduction In today s and next week s lecture we will cover two of the most important areas in networking and the Internet: IP and TCP. These cover the network and transport layer of the OSI

More information

Note: This case study utilizes Packet Tracer. Please see the Chapter 5 Packet Tracer file located in Supplemental Materials.

Note: This case study utilizes Packet Tracer. Please see the Chapter 5 Packet Tracer file located in Supplemental Materials. Note: This case study utilizes Packet Tracer. Please see the Chapter 5 Packet Tracer file located in Supplemental Materials. CHAPTER 5 OBJECTIVES Configure a router with an initial configuration. Use the

More information

7.1. Remote Access Connection

7.1. Remote Access Connection 7.1. Remote Access Connection When a client uses a dial up connection, it connects to the remote access server across the telephone system. Windows client and server operating systems use the Point to

More information

Guide to TCP/IP, Third Edition. Chapter 3: Data Link and Network Layer TCP/IP Protocols

Guide to TCP/IP, Third Edition. Chapter 3: Data Link and Network Layer TCP/IP Protocols Guide to TCP/IP, Third Edition Chapter 3: Data Link and Network Layer TCP/IP Protocols Objectives Understand the role that data link protocols, such as SLIP and PPP, play for TCP/IP Distinguish among various

More information

Datagram-based network layer: forwarding; routing. Additional function of VCbased network layer: call setup.

Datagram-based network layer: forwarding; routing. Additional function of VCbased network layer: call setup. CEN 007C Computer Networks Fundamentals Instructor: Prof. A. Helmy Homework : Network Layer Assigned: Nov. 28 th, 2011. Due Date: Dec 8 th, 2011 (to the TA) 1. ( points) What are the 2 most important network-layer

More information

Storage Networking Management & Administration Workshop

Storage Networking Management & Administration Workshop Storage Networking Management & Administration Workshop Duration: 2 Days Type: Lecture Course Summary & Description Achieving SNIA Certification for storage networking management and administration knowledge

More information

Data Communication Networks and Converged Networks

Data Communication Networks and Converged Networks Data Communication Networks and Converged Networks The OSI Model and Encapsulation Layer traversal through networks Protocol Stacks Converged Data/Telecommunication Networks From Telecom to Datacom, Asynchronous

More information

Implementing Storage Concentrator FailOver Clusters

Implementing Storage Concentrator FailOver Clusters Implementing Concentrator FailOver Clusters Technical Brief All trademark names are the property of their respective companies. This publication contains opinions of StoneFly, Inc. which are subject to

More information

ASUS WL-5XX Series Wireless Router Internet Configuration. User s Guide

ASUS WL-5XX Series Wireless Router Internet Configuration. User s Guide ASUS WL-5XX Series Wireless Router Internet Configuration User s Guide Contents Chapter 1 Introduction:...1 Chapter 2 Connecting the wireless router...1 Chapter 3 Getting to know your Internet connection

More information

Tech Note Cisco IOS SNMP Traps Supported and How to Conf

Tech Note Cisco IOS SNMP Traps Supported and How to Conf Tech Note Cisco IOS SNMP Traps Supported and How to Conf Table of Contents Cisco IOS SNMP Traps Supported and How to Configure Them...1 Introduction...1 Before You Begin...1 Conventions...1 Prerequisites...1

More information

INTERCONNECTING CISCO NETWORK DEVICES PART 1 V2.0 (ICND 1)

INTERCONNECTING CISCO NETWORK DEVICES PART 1 V2.0 (ICND 1) INTERCONNECTING CISCO NETWORK DEVICES PART 1 V2.0 (ICND 1) COURSE OVERVIEW: Interconnecting Cisco Networking Devices, Part 1 (ICND1) v2.0 is a five-day, instructor-led training course that teaches learners

More information

Overview of Computer Networks

Overview of Computer Networks Overview of Computer Networks Client-Server Transaction Client process 4. Client processes response 1. Client sends request 3. Server sends response Server process 2. Server processes request Resource

More information

Transport and Network Layer

Transport and Network Layer Transport and Network Layer 1 Introduction Responsible for moving messages from end-to-end in a network Closely tied together TCP/IP: most commonly used protocol o Used in Internet o Compatible with a

More information

PCI Express Impact on Storage Architectures and Future Data Centers. Ron Emerick, Oracle Corporation

PCI Express Impact on Storage Architectures and Future Data Centers. Ron Emerick, Oracle Corporation PCI Express Impact on Storage Architectures and Future Data Centers Ron Emerick, Oracle Corporation SNIA Legal Notice The material contained in this tutorial is copyrighted by the SNIA. Member companies

More information

Serial ATA in Servers and Networked Storage

Serial ATA in Servers and Networked Storage Serial ATA in Servers and Networked Storage Serial ATA (SATA) in Servers and Networked Storage Introduction Serial ATA (SATA) is a storage interface technology developed by a group of the industry s leading

More information

Windows Host Utilities 6.0.2 Installation and Setup Guide

Windows Host Utilities 6.0.2 Installation and Setup Guide Windows Host Utilities 6.0.2 Installation and Setup Guide NetApp, Inc. 495 East Java Drive Sunnyvale, CA 94089 U.S.A. Telephone: +1 (408) 822-6000 Fax: +1 (408) 822-4501 Support telephone: +1 (888) 463-8277

More information

Hewlett Packard - NBU partnership : SAN (Storage Area Network) или какво стои зад облаците

Hewlett Packard - NBU partnership : SAN (Storage Area Network) или какво стои зад облаците Hewlett Packard - NBU partnership : SAN (Storage Area Network) или какво стои зад облаците Why SAN? Business demands have created the following challenges for storage solutions: Highly available and easily

More information

1.264 Lecture 37. Telecom: Enterprise networks, VPN

1.264 Lecture 37. Telecom: Enterprise networks, VPN 1.264 Lecture 37 Telecom: Enterprise networks, VPN 1 Enterprise networks Connections within enterprise External connections Remote offices Employees Customers Business partners, supply chain partners Patients

More information

Analysis to develop an ISCSI Layer inside Microsoft Windows NT/2K/XP

Analysis to develop an ISCSI Layer inside Microsoft Windows NT/2K/XP Analysis to develop an ISCSI Layer inside Microsoft Windows NT/2K/XP Ing. Franco Ometti While1 S.r.l. Description The activity is related to develop a special device driver that implements a SCSI miniport

More information

CompTIA Storage+ Powered by SNIA

CompTIA Storage+ Powered by SNIA CompTIA Storage+ Powered by SNIA http://www.snia.org/education/courses/training_tc Course Length: 4 days 9AM 5PM Course Fee: $2,495 USD Register: https://www.regonline.com/register/checkin.aspx?eventid=635346

More information

Virtualization, Business Continuation Plan & Disaster Recovery for EMS -By Ramanj Pamidi San Diego Gas & Electric

Virtualization, Business Continuation Plan & Disaster Recovery for EMS -By Ramanj Pamidi San Diego Gas & Electric Virtualization, Business Continuation Plan & Disaster Recovery for EMS -By Ramanj Pamidi San Diego Gas & Electric 2001 San Diego Gas and Electric. All copyright and trademark rights reserved. Importance

More information

Fiber Channel Over Ethernet (FCoE)

Fiber Channel Over Ethernet (FCoE) Fiber Channel Over Ethernet (FCoE) Using Intel Ethernet Switch Family White Paper November, 2008 Legal INFORMATION IN THIS DOCUMENT IS PROVIDED IN CONNECTION WITH INTEL PRODUCTS. NO LICENSE, EXPRESS OR

More information

BASIC ANALYSIS OF TCP/IP NETWORKS

BASIC ANALYSIS OF TCP/IP NETWORKS BASIC ANALYSIS OF TCP/IP NETWORKS INTRODUCTION Communication analysis provides powerful tool for maintenance, performance monitoring, attack detection, and problems fixing in computer networks. Today networks

More information

Security (II) ISO 7498-2: Security Architecture of OSI Reference Model. Outline. Course Outline: Fundamental Topics. EE5723/EE4723 Spring 2012

Security (II) ISO 7498-2: Security Architecture of OSI Reference Model. Outline. Course Outline: Fundamental Topics. EE5723/EE4723 Spring 2012 Course Outline: Fundamental Topics System View of Network Security Network Security Model Security Threat Model & Security Services Model Overview of Network Security Security Basis: Cryptography Secret

More information

IT Networking and Security

IT Networking and Security elearning Course Outlines IT Networking and Security powered by Calibrate elearning Course Outline CompTIA A+ 801: Fundamentals of Computer Hardware/Software www.medallionlearning.com Fundamentals of Computer

More information

ICTTEN8195B Evaluate and apply network security

ICTTEN8195B Evaluate and apply network security ICTTEN8195B Evaluate and apply network security Release 1 ICTTEN8195B Evaluate and apply network security Modification History Release Release 2 Comments This version first released with ICT10 Integrated

More information

ZyWALL 5. Internet Security Appliance. Quick Start Guide Version 3.62 (XD.0) May 2004

ZyWALL 5. Internet Security Appliance. Quick Start Guide Version 3.62 (XD.0) May 2004 ZyWALL 5 Internet Security Appliance Quick Start Guide Version 3.62 (XD.0) May 2004 Introducing the ZyWALL The ZyWALL 5 is the ideal secure gateway for all data passing between the Internet and the LAN.

More information

Computer Networks - Xarxes de Computadors

Computer Networks - Xarxes de Computadors Computer Networks - Xarxes de Computadors Teacher: Llorenç Cerdà Slides: http://studies.ac.upc.edu/fib/grau/xc Outline Course Syllabus Unit 2. IP Networks Unit 3. TCP Unit 4. LANs Unit 5. Network applications

More information

Protocols and Architecture. Protocol Architecture.

Protocols and Architecture. Protocol Architecture. Protocols and Architecture Protocol Architecture. Layered structure of hardware and software to support exchange of data between systems/distributed applications Set of rules for transmission of data between

More information

Internet Access to a DVR365

Internet Access to a DVR365 Configuration Details : Internet Access to DVR365 Page : 1 Internet Access to a DVR365 These instructions will show you how to connect your DVR365 to the internet via an ADSL broadband modem/router. The

More information

Overview of Routing between Virtual LANs

Overview of Routing between Virtual LANs Overview of Routing between Virtual LANs This chapter provides an overview of virtual LANs (VLANs). It describes the encapsulation protocols used for routing between VLANs and provides some basic information

More information

iscsi: Accelerating the Transition to Network Storage

iscsi: Accelerating the Transition to Network Storage iscsi: Accelerating the Transition to Network Storage David Dale April 2003 TR-3241 WHITE PAPER Network Appliance technology and expertise solve a wide range of data storage challenges for organizations,

More information

PePWave Surf Series PePWave Surf Indoor Series: Surf 200, AP 200, AP 400

PePWave Surf Series PePWave Surf Indoor Series: Surf 200, AP 200, AP 400 PePWave Surf Series PePWave Surf Indoor Series: Surf 200, AP 200, AP 400 PePWave Surf Outdoor Series: Surf AP 200/400-X, PolePoint 400-X, Surf 400-DX User Manual Document Rev. 1.2 July 07 COPYRIGHT & TRADEMARKS

More information

Securing an IP SAN. Application Brief

Securing an IP SAN. Application Brief Securing an IP SAN Application Brief All trademark names are the property of their respective companies. This publication contains opinions of StoneFly, Inc., which are subject to change from time to time.

More information

FUJITSU Storage ETERNUS DX Configuration Guide -Server Connection-

FUJITSU Storage ETERNUS DX Configuration Guide -Server Connection- FUJITSU Storage ETERNUS DX Configuration Guide -Server Connection- (iscsi) for Linux This page is intentionally left blank. Preface This manual briefly explains the operations that need to be performed

More information

Scale and Availability Considerations for Cluster File Systems. David Noy, Symantec Corporation

Scale and Availability Considerations for Cluster File Systems. David Noy, Symantec Corporation Scale and Availability Considerations for Cluster File Systems David Noy, Symantec Corporation SNIA Legal Notice The material contained in this tutorial is copyrighted by the SNIA unless otherwise noted.

More information

iscsi Protocol Concepts and Implementation

iscsi Protocol Concepts and Implementation WHITE PAPER iscsi Protocol Concepts and Implementation Introduction This white paper describes the concepts and implementation of the Internet draft proposal for the mapping of Small Computer Systems Interface

More information

Course. Contact us at: Information 1/8. Introducing Cisco Data Center Networking No. Days: 4. Course Code

Course. Contact us at: Information 1/8. Introducing Cisco Data Center Networking No. Days: 4. Course Code Information Price Course Code Free Course Introducing Cisco Data Center Networking No. Days: 4 No. Courses: 2 Introducing Cisco Data Center Technologies No. Days: 5 Contact us at: Telephone: 888-305-1251

More information

Introduction to Security and PIX Firewall

Introduction to Security and PIX Firewall Introduction to Security and PIX Firewall Agenda Dag 28 Föreläsning LAB PIX Firewall VPN A Virtual Private Network (VPN) is a service offering secure, reliable connectivity over a shared, public network

More information

VTrak 15200 SATA RAID Storage System

VTrak 15200 SATA RAID Storage System Page 1 15-Drive Supports over 5 TB of reliable, low-cost, high performance storage 15200 Product Highlights First to deliver a full HW iscsi solution with SATA drives - Lower CPU utilization - Higher data

More information

Enhancing the Dell iscsi SAN with Dell PowerVault TM Tape Libraries and Chelsio Unified Storage Router iscsi Appliance

Enhancing the Dell iscsi SAN with Dell PowerVault TM Tape Libraries and Chelsio Unified Storage Router iscsi Appliance Enhancing the Dell iscsi SAN with Dell PowerVault TM Tape Libraries and Chelsio Unified Storage Router April 12, 2012 Table of Contents 1.0 Introduction... 4 2.0 Chelsio Unified Storage Router (USR) SAS-to-...

More information

Implementing and Managing Security for Network Communications

Implementing and Managing Security for Network Communications 3 Implementing and Managing Security for Network Communications............................................... Terms you ll need to understand: Internet Protocol Security (IPSec) Authentication Authentication

More information

HP iscsi storage for small and midsize businesses

HP iscsi storage for small and midsize businesses HP iscsi storage for small and midsize businesses IP SAN solution guide With data almost doubling in volume every year, businesses are discovering that they need to take a strategic approach to managing

More information

Traditionally, a typical SAN topology uses fibre channel switch wiring while a typical NAS topology uses TCP/IP protocol over common networking

Traditionally, a typical SAN topology uses fibre channel switch wiring while a typical NAS topology uses TCP/IP protocol over common networking Network Storage for Business Continuity and Disaster Recovery and Home Media White Paper Abstract Network storage is a complex IT discipline that includes a multitude of concepts and technologies, like

More information

Configuring and Monitoring Hitachi SAN Servers

Configuring and Monitoring Hitachi SAN Servers Configuring and Monitoring Hitachi SAN Servers eg Enterprise v5.6 Restricted Rights Legend The information contained in this document is confidential and subject to change without notice. No part of this

More information

WAN Optimization and Thin Client: Complementary or Competitive Application Delivery Methods? Josh Tseng, Riverbed

WAN Optimization and Thin Client: Complementary or Competitive Application Delivery Methods? Josh Tseng, Riverbed WAN Optimization and Thin Client: Complementary or Competitive Application Delivery Methods? Josh Tseng, Riverbed SNIA Legal Notice The material contained in this tutorial is copyrighted by the SNIA. Member

More information

21.4 Network Address Translation (NAT) 21.4.1 NAT concept

21.4 Network Address Translation (NAT) 21.4.1 NAT concept 21.4 Network Address Translation (NAT) This section explains Network Address Translation (NAT). NAT is also known as IP masquerading. It provides a mapping between internal IP addresses and officially

More information

Network Security [2] Plain text Encryption algorithm Public and private key pair Cipher text Decryption algorithm. See next slide

Network Security [2] Plain text Encryption algorithm Public and private key pair Cipher text Decryption algorithm. See next slide Network Security [2] Public Key Encryption Also used in message authentication & key distribution Based on mathematical algorithms, not only on operations over bit patterns (as conventional) => much overhead

More information