Enterprise Storage Network Management



Similar documents
SAN Conceptual and Design Basics

EMC Invista: The Easy to Use Storage Manager

Customer Education Services Course Overview

Vicom Storage Virtualization Engine. Simple, scalable, cost-effective storage virtualization for the enterprise

EMC Connectrix Manager Software

Storage Area Network Configurations for RA8000/ESA12000 on Windows NT Intel

HBA Virtualization Technologies for Windows OS Environments

Cisco MDS 9000 Family Highlights: Storage Virtualization Series

How To Virtualize A Storage Area Network (San) With Virtualization

Backup Exec 9.1 for Windows Servers. SAN Shared Storage Option

EMC PowerPath Family

Storage Networking Management & Administration Workshop

EMC FEDERATED TIERED STORAGE (FTS) Allows Seamless Integration Between EMC Symmetrix VMAX Series and Third-Party Storage Arrays

Using High Availability Technologies Lesson 12

Storage Area Network

: HP HP0-X02. : Designing & Implementing HP Enterprise Backup Solutions. Version : R6.1

SCSI vs. Fibre Channel White Paper

N_Port ID Virtualization

Application-Oriented Storage Resource Management

SAN Backup Best Practices

Using Multipathing Technology to Achieve a High Availability Solution

Data-at-Rest Encryption Addresses SAN Security Requirements

Best practices for data migration.

Choosing the best architecture for data protection in your Storage Area Network

Storage Networking Foundations Certification Workshop

Dell PowerVault MD32xx Deployment Guide for VMware ESX4.1 Server

Service Level Agreement SAN Storage

CompTIA Storage+ Powered by SNIA

Fibre Channel and iscsi Configuration Guide

IMPLEMENTING EMC FEDERATED LIVE MIGRATION WITH MICROSOFT WINDOWS SERVER FAILOVER CLUSTERING SUPPORT

Fibre Channel HBA and VM Migration

Enterprise Class Storage System, Unified NAS. Enterprise Tape Library & Virtual Tape Library. SAN Fabric Management along with SAN Switches

Large SAN Design Best Practices

HP Serviceguard Cluster Configuration for Partitioned Systems

Storage Systems Performance Testing

VERSION 2.5. VMware ESX Server. SAN Configuration Guide

How To Use Visualsan On A Server With A Memory Card (For A Non-Procedure)

hp StorageWorks DS-KGPSA-CA/CX and FCA2354 PCI host bus adapters

Cascade Profiler Fibre Channel SAN Attached Storage Installation Guide. Version 8.2 March 2009

Virtualizing Microsoft SQL Server 2008 on the Hitachi Adaptable Modular Storage 2000 Family Using Microsoft Hyper-V

List of Figures and Tables

WHITEPAPER: Understanding Pillar Axiom Data Protection Options

CONFIGURATION BEST PRACTICES FOR MICROSOFT SQL SERVER AND EMC SYMMETRIX VMAXe

Virtualization, Business Continuation Plan & Disaster Recovery for EMS -By Ramanj Pamidi San Diego Gas & Electric

How To Connect Virtual Fibre Channel To A Virtual Box On A Hyperv Virtual Machine

Deploying Global Clusters for Site Disaster Recovery via Symantec Storage Foundation on Infortrend Systems

Simple, Fast, Guaranteed

IBM Tivoli Storage Productivity Center (TPC)

Designing HP SAN Networking Solutions

Storage Area Network and Fibre Channel Protocol Primer

Virtual Server-SAN connectivity The emergence of N-Port ID Virtualization

M.Sc. IT Semester III VIRTUALIZATION QUESTION BANK Unit 1 1. What is virtualization? Explain the five stage virtualization process. 2.

Scalable NAS for Oracle: Gateway to the (NFS) future

Hitachi Path Management & Load Balancing with Hitachi Dynamic Link Manager and Global Link Availability Manager

Practical Challenges in Scaling Storage Networks

HP Enhanced Implementation Service for SANs

Case Studies Using EMC Legato NetWorker for OpenVMS Backups

MICROSOFT HYPER-V SCALABILITY WITH EMC SYMMETRIX VMAX

Deploying SAP on Microsoft SQL Server 2008 Environments Using the Hitachi Virtual Storage Platform

FlexArray Virtualization

Martin County Administration. Information Technology Services. Proposal For. Storage Area Network Systems. Supporting WinTel Server Consolidation

EMC Symmetrix V-Max and Microsoft SQL Server

IBM BladeCenter H with Cisco VFrame Software A Comparison with HP Virtual Connect

SECURITY SUMMIT 06/06/2013 Roma STORAGE FORENSICS. Litiano Piccin (NCDA-NCIE/SAN)

EVOLUTION OF NETWORKED STORAGE

HP Serviceguard Cluster Configuration for HP-UX 11i or Linux Partitioned Systems April 2009

Managing a Fibre Channel Storage Area Network

GiantLoop Testing and Certification (GTAC) Lab

Best Practices Guide: Network Convergence with Emulex LP21000 CNA & VMware ESX Server

Storage System. Planning Checklist. EC E1, First Edition

IBM TotalStorage SAN Switch F16

Using NAS as a Gateway to SAN

Using VMWare VAAI for storage integration with Infortrend EonStor DS G7i

HP Storage Virtual Volume Design and Implementation Service

Using EonStor FC-host Storage Systems in VMware Infrastructure 3 and vsphere 4

HP Converged Infrastructure Solutions

Preparing for Data Migration

8Gb Delivers Enhanced Storage Area Network (SAN) Data Security

FUJITSU Storage ETERNUS DX Configuration Guide -Server Connection-

Violin Memory Arrays With IBM System Storage SAN Volume Control

HP StorageWorks Modular Smart Array 1000 Small Business SAN Kit Hardware and Software Demonstration

Configuring and Deploying a Private Cloud with System Center 2012

VERITAS VERTEX Initiative

STORAGE AREA NETWORKS MEET ENTERPRISE DATA NETWORKS

Windows Host Utilities Installation and Setup Guide

Unleash the Performance of vsphere 5.1 with 16Gb Fibre Channel

HiCommand Dynamic Link Manager (HDLM) for Windows Systems User s Guide

VERITAS Backup Exec 9.0 for Windows Servers

Network Storage AN ALCATEL EXECUTIVE BRIEF

ENTERPRISE VIRTUALIZATION ONE PLATFORM FOR ALL DATA

HP StorageWorks Enterprise Backup Solution and Direct Attach Solutions

Storage Area Network (SAN)

Direct Attached Storage

EMC Symmetrix V-Max with Veritas Storage Foundation

Network-based Intelligent Data Protection Yossi Mossel, Product Manager

Optimizing Large Arrays with StoneFly Storage Concentrators

An Integrated End-to-End Data Integrity Solution to Protect Against Silent Data Corruption

A COMPARISON OF TAPE POOLING TECHNOLOGIES

Transcription:

Enterprise Storage Network Management Lou Przystas EMC Corporation 171 South Street Hopkinton, MA 01748 (508) 435-1000 Przystas_Lou@EMC.com

Managing the Enterprise Storage Network Storage network growth requires scaleable storage management tools As larger Enterprise Storage Networks (ESN) are being deployed faster than anyone could have anticipated, it is important to implement the proper management tools. The cost of managing the storage, and the storage network, is much greater than simply the cost of acquiring hardware and software. In an ESN environment, storage resources are truly shared, and can be reallocated as needed to meet changing business needs. This environment allows any-to-any connectivity, providing the most-flexible storage infrastructure. The ESN must be managed for access control and contention for the common resources. To successfully implement a shared switched fabric environment, administrators need tools that can help with managing the storage network. Access control is required for security of the data, and partitioning is necessary to meet service-level agreements. LUN masking at the storage device provides centralized access control of the data volumes. The control is placed in the storage array, as close to the data as possible. If a particular host requests data to which it does not have access, the request is denied. This is particularly important when adding new Windows NT servers to the ESN. Partitioning of the Fibre Channel switches through zoning reduces risk and allows each server to have its own virtual ESN. The combination of access control and zoning provides the solution for such various aspects as: Data Integrity As more and more systems are introduced to the ESN, the danger of encroaching into each other s storage area increases, and invites potential data corruption and information loss. Security While increasing connectivity is desired, it should not be accomplished without the ability to enforce information accessibility per the security policies of individual businesses. Most businesses today rely on vast amounts of information, management of which must adhere to the security policies of those businesses. Utilizing the proper tools allows storage and storage network administrators to easily enforce these policies.

Access Control for the ESN is built on top of two foundation elements: 1. The Storage Subsystem Access Control Policy is provided by the storage subsystem to define and enforces access control policy nearest to where the information is being managed. 2. The Storage Network Access Control Policy that defines and manages the connectivity access controls. Other more abstract and granular level of access control capabilities can then be added. Storage Subsystem Access Control Policy The storage subsystem access control policy Storage Network Access Control Policy In a storage network where point-to-point cabling keeps each host s storage volumes separate from those of other hosts, each host detects only the volumes to which it is directly connected. In ESN environments in where multiple hosts are connected to a single Storage port, a problem arises when all hosts have the potential to see and use the same storage volumes. In a typical Fibre Channel topology, each host is connected to the Fibre Channel hub or switch through one or more Host Bus Adapter () ports. Each Storage port is connected to the Fibre Channel hub or switch through one or more Fibre Channel Adapter (FA) ports, each FA port providing access to a given set of volumes. Each port in the Fibre Channel topology ( and FA) is uniquely identified by its World Wide Name (WWN). VCM is the volume configuration management software that controls access to logical volumes. Unlike host-based access control mechanisms that are error prone (since each host must be trusted not to conflict with others), the storage based access control mechanism avoids such conflicts by single centralized monitoring. Using volume configuration management software, you can define a virtual channel connecting each host with its storage volumes, even though there may be many hosts sharing the same storage fibre port. The figure illustrates access control applied to three hosts in a multi-initiator environment. When a host attempts to access a storage volume on the storage subsystem, the host s WWN, as supplied during login to the Fabric or Arbitrated Loop, is passed to the storage FA port. The storage subsystem records the connection, stores the WWN in a login history 3 2 1 Servers FC Switch Virtual Channels table, and builds a filter listing the volumes available to that WWN through that FA port. The port then sends I/O requests directed at particular volumes to the FA port. Each request includes the identity of the requesting (from which its WWN can be determined) and the identity of the requested volume, with its FA and Logical Unit Number (LUN). The volume configuration management software that runs on the storage subsystem processes each I/O request to verify that the is allowed to access that volume. Any request for a volume that an does not have access to, returns an error to the host. FA2 FA1 V C M Storage

Zoning provides access control of the Enterprise Storage Network Zoning is a technique used to partition a switched Fibre Channel environment. Zones are used to create and manage subsets of logical devices (host bus adapters and storage devices). Devices in the same zone can communicate with one another but not with devices that are not members of that zone. Zoning is often used to restrict access to shared storage network resources, in order to provide higher levels of access control, performance, and availability. NT_Zone Symmetrix Storage Windows DB_Zone Sun_Zone_ Switched Fibre Channel Fabric Test_Zone Backup_Zone Solaris Tape Library Symmetrix Storage Most Fibre Channel switches provide management utilities that allow zoning of the specific switches. Switch zoning and other fabric control is typically SunO HP/UX HP/UX managed in a vendor-specific manner. Each switch Sun_Zone_ HP Zone_2 stores its own configuration data. Local switch management is adequate when the ESN contains only one or two switches; however, when more switches are added, some kind of centralized management software becomes necessary. RAID Zoning with LUN Masking An Example Consider the example shown in the figure below. Each host has two ports, and there are two switches, each connected to a Storage FA port. Each FA can access devices 0 through 20 on the storage subsystem. In an unmanaged environment, each could access all of the volumes on the storage subsystem, but the administrator chooses to use zoning and LUN masking together to control each s access to the Storage devices. _1 _2 Host 1 _2 _1 Host 2 Switch 1 Switch 2 Symmetrix FA_1A Devices 0-20 FA_2A First, the administrator uses Zoning to create a set of single- zones. These zones dictate which on the host side can talk to which FA on the Storage side. In this example, the user created four zones, each of which contains two members consisting of an and a Fibre Adapter (FA). There are 2 zone Sets with one switch in each. After configuring the paths, the user can set up the Storage system using LUN masking to restrict access to specific logical volumes. In this case, although both FA ports can access devices 0 through 20, the administrator restricts the devices seen by the s on Host1 to devices 1 through 10 and the devices seen by the on Host2 to devices 11 through 20.

Summary These are the basic functions that are required to provide access control in an Enterprise Storage Network. The proper tools can greatly reduce the labor required to manage the storage infrastructure. As Enterprise Storage Networks grow larger, it is imperative that good management practices are implemented. These are key best practices for managing an enterprise storage network: Centralize the administration Utilize tools that can manage a multi-vendor ESN/SAN environment. Provide access control to constantly growing volumes of information. Access control is most effective at the storage level, where the data resides. Utilize centralized zoning tools to provide access control of the storage network. Deploy interoperability-tested Fibre Channel hardware and software components. Utilize hardware and software that comply with industry standards.