Home | Tag Archives: iSCSI (page 3)

Tag Archives: iSCSI

SAN Virtual Appliances

LeftHand, FalconStor, Arkeia and Datacore all now offer VMware appliance versions of their products. I’m in the process of downloading them now and I’m hoping to install over the next few days and do some testing. I’ve previously mentioned some VM NAS products which I’ve installed but not reported back on. I’ll try to summarise all my findings together. It ... Read More »

Responding to Comments

I’m not quite sure what the right way is to respond to posts; If I comment after them, then there’s a chance that the responses might be missed. Anyway I will attempt to go back and check all those comments I’ve not responded to. First, here’s a response to Cedric’s question, on VMware; What I was referring to was the ... Read More »

AoE/FCoE/iSCSI

Robin harris discusses AoE from Coraid. I looked at this last year (reminder) as I saw it as a great way to get a FC/iSCSI solution at a low cost. However, before everyone rips out their FC SANs and runs to put an Ethernet solution in place, take one step back and consider the issues. Fibre Channel is successful because ... Read More »

iSCSI Part 3 (or is it part 4)

I’ve done the last part of my iSCSI evaluation. Previously I looked at the protocol itself and the ways to secure data. Transmission needs to be secured by either IPsec for a shared network or a dedicated network infrastructure. The last part of the jigsaw I checked out was how to validate the client; basic iSCSI authentication uses simply the ... Read More »

Storage protocols for VMware

I’ve been doing more VMware work recently. The deployment I’m working on is using SAN presented disk. The storage started as 50GB LUNs, quickly grew to 100GB and now we’re deploying on 200GB LUNs, using VMFS and placing multiple VM guests on each meta volume. Now, this presents a number of problems. Firstly, it was clear the LUN sizes weren’t ... Read More »

iSCSI Security Part 2

To tie down my iSCSI test environment I’ve implemented IPsec between client and server. This allows me to encrypt either the traffic or headers of my IP stream. I chose ESP (Encapsulating Security Payload) as this gives full confidentiality to my data, rather than Authentication Header (AH) which provides integrity as to the source of the data. Implementation on my ... Read More »