SAN/iQ Remote Copy Networking Requirements OPEN iscsi SANs 1



Similar documents
HP LeftHand SAN Solutions

Deploying Riverbed wide-area data services in a LeftHand iscsi SAN Remote Disaster Recovery Solution

Drobo How-To Guide. Cloud Storage Using Amazon Storage Gateway with Drobo iscsi SAN

Instructions for Activating and Configuring the SAFARI Montage Managed Home Access Software Module

PowerLink Bandwidth Aggregation Redundant WAN Link and VPN Fail-Over Solutions

VPN Solution Guide Peplink Balance Series. Peplink Balance. VPN Solution Guide Copyright 2015 Peplink

How To Configure SSL VPN in Cyberoam

Smart Tips. Enabling WAN Load Balancing. Key Features. Network Diagram. Overview. Featured Products. WAN Failover. Enabling WAN Load Balancing Page 1

HP LeftHand SAN Solutions

Scenario 1: One-pair VPN Trunk

Using Rsync for NAS-to-NAS Backups

Amazon Cloud Storage Options

SILVER PEAK ACCELERATION WITH EMC VSPEX PRIVATE CLOUD WITH RECOVERPOINT FOR VMWARE VSPHERE

Chapter 6 Configuring the SSL VPN Tunnel Client and Port Forwarding

Symantec Endpoint Protection 11.0 Architecture, Sizing, and Performance Recommendations

Cloud Services for Backup Exec. Planning and Deployment Guide

EonStor DS remote replication feature guide

Chapter 12 Supporting Network Address Translation (NAT)

Workflow Guide. Establish Site-to-Site VPN Connection using RSA Keys. For Customers with Sophos Firewall Document Date: November 2015

DEPLOYMENT GUIDE Version 1.2. Deploying the BIG-IP v10.2 to Enable Long Distance Live Migration with VMware vsphere vmotion

How To Configure Apple ipad for Cyberoam L2TP

Network Services Internet VPN

Veeam Cloud Connect. Version 8.0. Administrator Guide

Digi Connect WAN Application Helper NAT, GRE, ESP and TCP/UPD Forwarding and IP Filtering

Performance of VMware vcenter (VC) Operations in a ROBO Environment TECHNICAL WHITE PAPER

DEPLOYMENT GUIDE Version 1.0. Deploying the BIG-IP v10.2 to Enable Long Distance VMotion with VMware vsphere

How To Configure Virtual Host with Load Balancing and Health Checking

Basic ViPNet VPN Deployment Schemes. Supplement to ViPNet Documentation

vsphere Replication for Disaster Recovery to Cloud

VPN Only Connection Information and Sign up

Configuring an IPSec Tunnel between a Firebox & a Check Point FireWall-1

HP StorageWorks Automated Storage Manager User Guide

Lab 4.4.8a Configure a Cisco GRE over IPSec Tunnel using SDM

How to Guide: StorageCraft Cloud Services VPN

Deploying Windows Streaming Media Servers NLB Cluster and metasan

How To Connect To Bloomerg.Com With A Network Card From A Powerline To A Powerpoint Terminal On A Microsoft Powerbook (Powerline) On A Blackberry Or Ipnet (Powerbook) On An Ipnet Box On

Configuring High Availability for Embedded NGX Gateways in SmartCenter

Desktop Central Managing Windows Computers in WAN

efolder BDR for Veeam Cloud Connection Guide

How To Configure L2TP VPN Connection for MAC OS X client

VPN Tracker for Mac OS X

vcloud Director User's Guide

DEPLOYMENT GUIDE Version 1.1. Configuring BIG-IP WOM with Oracle Database Data Guard, GoldenGate, Streams, and Recovery Manager

Internet access for home and business. home business internet

Pre-lab and In-class Laboratory Exercise 10 (L10)

Network Client. Troubleshooting Guide FREQUENTLY ASKED QUESTIONS

Enabling NAT and Routing in DGW v2.0 June 6, 2012

How to Setup PPTP VPN Between a Windows PPTP Client and the DIR-130.

Cisco Application Networking for IBM WebSphere

Backup Exec Private Cloud Services. Planning and Deployment Guide

Configuration Procedure

VMware vsphere Data Protection

VPN Wizard Default Settings and General Information

How To - Configure Virtual Host using FQDN How To Configure Virtual Host using FQDN

Getting Started Guide

VPN Configuration of ProSafe VPN Lite software and NETGEAR ProSafe Router:

Fireware How To VPN. Introduction. Is there anything I need to know before I start? Configuring a BOVPN Gateway

1:1 NAT in ZeroShell. Requirements. Overview. Network Setup

Parallels Plesk Panel. VPN Module for Parallels Plesk Panel 10 for Linux/Unix Administrator's Guide. Revision 1.0

Virtual Data Centre. User Guide

IBM Security QRadar SIEM Version High Availability Guide IBM

Protecting the Home Network (Firewall)

Appendix A: Configuring Firewalls for a VPN Server Running Windows Server 2003

White Paper. Accelerating VMware vsphere Replication with Silver Peak

Configuring a FortiGate unit as an L2TP/IPsec server

Creating client-server setup with multiple clients

M2M Series Routers. Port Forwarding / DMZ Setup

Arcserve Cloud. Arcserve Cloud Getting Started Guide

VPN. VPN For BIPAC 741/743GE

Internet access for home and business. home business internet

Integration Guide. EMC Data Domain and Silver Peak VXOA Integration Guide

Continuous Data Protection. PowerVault DL Backup to Disk Appliance

Technical Glossary from Frontier

Workflow Guide. Establish Site-to-Site VPN Connection using Digital Certificates. For Customers with Sophos Firewall Document Date: November 2015

How To Establish Site-to-Site VPN Connection. using Preshared Key. Applicable Version: onwards. Overview. Scenario. Site A Configuration

CREATING AN IKE IPSEC TUNNEL BETWEEN AN INTERNET SECURITY ROUTER AND A WINDOWS 2000/XP PC

Note: This case study utilizes Packet Tracer. Please see the Chapter 5 Packet Tracer file located in Supplemental Materials.

How To Use An Hpl Storage Manager On A 2Tb Server On A Microsoft Server On An Ubuntu 2Tv 2Tva 2Tfs 2 (Ahem) Or 2Tvi 2 (I386) On A Server

IP Storage On-The-Road Seminar Series

Using LISP for Secure Hybrid Cloud Extension

Storage Backup and Disaster Recovery: Using New Technology to Develop Best Practices

Based on the VoIP Example 1(Basic Configuration and Registration), we will introduce how to dial the VoIP call through an encrypted VPN tunnel.

Application Notes for Configuring a SonicWALL VPN with an Avaya IP Telephony Infrastructure - Issue 1.0

Configuration Guide. How to Configure SSL VPN Features in DSR Series. Overview

Configure ISDN Backup and VPN Connection

Virtual Appliance Setup Guide

Intego Enterprise Software Deployment Guide

Edgewater Routers User Guide

AppSense Environment Manager. Enterprise Design Guide

How To Configure Syslog over VPN

1 of 10 1/31/2014 4:08 PM

Kaseya 2. User Guide. Version 7.0. English

Configuring IPSec VPN Tunnel between NetScreen Remote Client and RN300

Configuring a VPN for Dynamic IP Address Connections

SmartFiler Backup Appliance User Guide 2.0

WAN Failover Scenarios Using Digi Wireless WAN Routers

Web Drive Limited TERMS AND CONDITIONS FOR THE SUPPLY OF SERVER HOSTING

Online Backup Frequently Asked Questions

GPRS / 3G Services: VPN solutions supported

How To Load balance traffic of Mail server hosted in the Internal network and redirect traffic over preferred Interface

Transcription:

SAN/iQ Remote Copy Networking Requirements OPEN iscsi SANs 1 Application Note: SAN/iQ Remote Copy Networking Requirements SAN/iQ Remote Copy provides the capability to take a point in time snapshot of a volume and copy that data to a remote location. This application note provides an overview of best practices for implementing SAN/iQ Remote Copy into your IP networking environment. Overview The SAN/iQ Remote Copy technology is built off the SAN/iQ snapshot implementation. When a snapshot is taken, a read-only volume is created, containing only the changed blocks. This read-only snapshot volume is then copied, block for block, to a designated SAN/iQ cluster, which can reside anywhere IP communication is possible. The remote copy is an asynchronous operation which can use existing IP infrastructure. By capturing and copying only changed blocks, SAN/iQ limits the amount of bandwidth required. Administrators create and schedule SAN/iQ Remote Copy jobs by selecting a specific start time, occurrence interval, and retention policy. Understanding bandwidth limitations and the amount of data to be copied is imperative to creating a successful SAN/iQ Remote Copy implementation and to meting organizational data protection and recovery mandates. As with all other features, SAN/iQ manages the remote copy operation at the volume level. SAN/iQ allows administrators to select the individual volumes, frequency to perform the operation, and retention policies. Figure 1. iscsi SAN Storage Configuration using SAN/iQ Remote Copy Copyright LeftHand Networks Networks Inc., 2/14/2006 Inc. Page 1 www.lefthandnetworks.com

SAN/iQ Remote Copy Networking Requirements OPEN iscsi SANs 2 Remote copies can serve many purposes depending on their intended use. Typical uses include disaster recovery at a fail over site, off-site centralized backups, and a split-mirror configuration for data migration and content distribution. Figure 1shows an example business that has two primary sites of operation. SAN/iQ Remote Copy is being used between the sites as both a means of disaster recovery and for off-site backups. In order to establish a DR site, the primary volume in Site 1 is being remote copied to a remote snapshot in Site 2, and the primary volume in Site 2 is being remote copied to a remote snapshot in Site 1. This creates identical read-only environments in geographically separate locations. Should a disaster take down Site 1, the data that was remote copied to Site 2 is ready to be promoted to a primary, read-write volume and resume activity. Additionally, a tape backup is being created for both volumes at site 2 by mounting up the snapshots to a separate backup server. With this scenario, not only are there redundant copies of data and means to a quick and simple recovery, but there is also no need to configure another backup environment at Site 1. IP Networking Requirements SAN/iQ Remote Copy from one cluster to another cluster may occur on a single IP subnet as well as across routed environments. In the routed environment, the two IP subnets must have IP routes to each target network without Network Address Translation (NAT) or Port Forwarding. Private WAN connections using point-to-point protocols can be used or a VPN tunnel must be setup between two networks that are separated by the public internet. The VPN tunnel effectively acts as one hop on a router and will allow the use of private IP space on each side. Site A Site B Private IP Addresses 192.168.1.1 192.168.1.2 192.168.1.3 192.168.1.4 192.168.1.5 192.168.1.6 Private LAN #1 Public or Private WAN Private LAN #2 Private IP Addresses 192.168.2.1 192.168.2.2 192.168.2.3 192.168.2.4 VPN Gateway #1 Public IP Address: 207.215.111.111 VPN Gateway #2 Public IP Address: 66.150.92.1 Figure 2. Example IP Network configuration for SAN/iQ Remote Copy using VPN gateways to route TCP and UDP traffic between the two private networks. Copyright LeftHand Networks Networks Inc., 2/14/2006 Inc. Page 2 www.lefthandnetworks.com

SAN/iQ Remote Copy Networking Requirements OPEN iscsi SANs 3 SAN/iQ solutions use both TCP and UDP protocols to communicate between the storage modules and to the clients initiating volumes. The amount of connections to each storage module dictates the quantity of UDP ports used. UDP protocol uses port ranges and must not be restricted. TCP ports 13838, 13840, 13841, and 13843 are used by the management console to manage SAN/iQ Remote Copy tasks. Figure 2 shows how two private LANs can connect using VPN devices over the public internet. Each storage module uses the inside interface of the VPN device as its default gateway. The VPN device encapsulates and encrypts storage module traffic across the public WAN connection allowing the storage modules to communicate with remote peers. The management console must be able to communicate with all of the Private IP Addresses. Best Practices Use a Dial-Up VPN Client on a remote host running the management console to manage SAN/iQ Remote Copy tasks. Tasks may also be managed from either Private LAN. Use Private Line Point-To-Point or VPN connections for your SAN/iQ Remote Copy implementations. If using existing VPN solutions, dedicate an interface on each end of the VPN for storage traffic. Scheduling Bandwidth Usage The size and frequency of the remote copy snapshots are the two main factors affecting the amount of bandwidth needed for an implementation. You can determine the sizes of your snapshots by using the management console and following these steps: - Setup a local snapshot schedule with the frequency you plan to use, and let this run for a couple days. - Highlight the Cluster in the management console and click on the Disk Usage tab in the tab pane. - Monitor the sizes of the snapshots, and use this size to calculate the amount of bandwidth required. Figure 3. Remote Snapshot Creation. Only changes recorded in the primary site snapshots are copied to the remote site after the initial copy. Copyright LeftHand Networks Networks Inc., 2/14/2006 Inc. Page 3 www.lefthandnetworks.com

SAN/iQ Remote Copy Networking Requirements OPEN iscsi SANs 4 Once the amount of change in your volumes over time is characterized, it is time to determine if the amount of bandwidth you have available is adequate to keep up with the frequency. Figure 3 depicts the creation of a remote volume. Understanding the sizes of the snapshots that are created and transferred is the key to having a successful remote copy implementation. Estimate Time to Copy Link speeds are commonly listed in mbits/sec or kbits/sec on lower bandwidth connections. First convert the size of the volume to Bytes. Multiplying the GigaBytes by 1024 to get MegaBytes. Multiply MegaBytes again by 1024 to get to KiloBytes, and again, multiply by 1024 to get Bytes. Multiply the Bytes by 8 to yield the amount of bits. Divide the number of bits by 1000 to yield kbits or again by 1000 to yield mbits. Finally, divide your result by the link speed to get the number of seconds to complete the copy. Convert to the correct order of magnitude, kbits or mbits, before dividing by the corresponding units per second of link speed. After determining the amount of time per each remote copy task, a schedule can be developed by verifying that the actual times fit your proposed schedules. GigaBytes (GB) MegaBytes (MB) KiloBytes (KB) Bytes bits Kilobits Megabits Seconds to Copy Hours to Copy GB X 1024 = MB MB X 1024 = KB KB X 1024 = Bytes Bytes X 8 = bits bits / 1000 = kbits kbits / 1000 = mbits mbits / link speed = seconds Seconds / 60 = minutes Minutes / 60 = hours Verify Time to Copy Once you have created a remote copy operation, verify your estimated calculations by selecting the remote copy snapshot, and under the remote snapshot tab looking at the remote copy details. Copyright LeftHand Networks Networks Inc., 2/14/2006 Inc. Page 4 www.lefthandnetworks.com

SAN/iQ Remote Copy Networking Requirements OPEN iscsi SANs 5 Utilize Bandwidth Resources Most commercial internet access connections have symmetric bandwidth both upstream and downstream. Typically, a site will use one stream more than another. Employing Quality of Service technologies can be used to limit the amount of bandwidth your remote copy tasks have available to them. Understanding your link utilization is important when planning your implementation. A table below estimates the time it takes to duplicate 10GB of data to a remote site for particular link speed or bandwidth allocation. Tune Bandwidth Usage SAN/iQ Remote Copy is a pull technology and initiates jobs from the remote side of the task. The remote management group should be configured to use only the amount of bandwidth that has been allocated. Use the management console to edit the remote side by Right-Clicking on the Management Group and selecting Edit Management Group. Use the suggested values in the table below for specifying the Copy Bandwidth setting for use with your link speed. Link Speed Remote IP Copy Bandwidth Estimated Time 10GB 384 kbits/sec 46 KB/sec 62 Hours 768 kbits/sec 93 KB/sec 31 Hours 1.05 mbits/sec 128 KB/sec 23 Hours 1.27 mbits/sec 155 KB/sec 19 Hours 1.54 mbits/sec 188 KB/sec 15 Hours 2.0 mbits/sec 244 KB/sec 12 Hours 3.0 mbits/sec 366 KB/sec 8 Hours 10.0 mbits/sec 1220 KB/sec 2.5 Hours 25.0 mbits/sec 3052 KB/sec 1 Hour 500 mbits/sec 61035 KB/sec 3 minutes 830 mbits/sec 101376 KB/sec 2 minutes Best Practices Limit scheduling of SAN/iQ Remote Copy to three concurrent tasks. Ensure that your remote snapshots can complete the copy prior to the next scheduled snapshot. Initiate your first remote copy on a schedule with members of your remote cluster at the primary site prior to installing at the remote location. Differential changes only will be copied once you have re-addressed the storage modules and connected to them simultaneously with the management console. SAN/iQ Remote Copy can be tuned for high bandwidth, high latency connections (< 250ms). Contact support for detailed information. Copyright LeftHand Networks Networks Inc., 2/14/2006 Inc. Page 5 www.lefthandnetworks.com

SAN/iQ Remote Copy Networking Requirements OPEN iscsi SANs 6 Additional References SAN/iQ Remote Copy bandwidth tool used to determine the bandwidth requirements for a specific volume of data and a specific timeframe. https://www.lefthandnetworks.com/member_area/dl_file.php?fid=213&action=display Support Note SAN/iQ Remote Copy in an Exchange Environment how to deploy remote copy in an Exchange environment, providing best practices, creating schedules and controlling bandwidth usage. https://www.lefthandnetworks.com/member_area/dl_file.php?fid=359&action=display The Information in this article applies to SAN/iQ 6.3 and above OS independent Copyright LeftHand Networks Networks Inc., 2/14/2006 Inc. Page 6 www.lefthandnetworks.com