Cisco Systems SN 5428-2 manual 1-13, 4 Transparent SCSI Routing Mapping Example

Page 13
Table 1-4 Transparent SCSI Routing Mapping Example

Chapter 1 Before Configuring SN 5428-2 Storage Router Software

Transparent SCSI Routing Overview

For example, if an iSCSI target were created for WWPN 3100112233445566 in a storage array, and that WWPN contained LUNs 0 through 2, those LUNs would become available to an IP host as LUNs 0 through 2. An iSCSI driver would see the iSCSI target named eui.3100112233445566 as a controller with three iSCSI LUNs identified as LUN 0, LUN 1, and LUN 2. Each iSCSI LUN would appear as a separate storage device to an IP host.

Mapping each IP host to a Fibre Channel address consists of assigning a WWPN to an IP host that is requesting access to storage; the WWPN is used for presenting the IP host as an FC host to a storage array. The SN 5428-2 maintains a pool of 62 WWPNs that are assigned to IP hosts requesting access to storage. When an IP host is granted access, a WWPN is assigned to the IP host and the SN 5428-2 presents the host as an FC host to the storage array. That host continues using that WWPN until it is finished using the storage. When transparent SCSI routing is deployed in dynamic mode, once the host is finished using the storage (logged out), the WWPN becomes available for assignment to other IP hosts requiring access to storage. In static mode, the IP host/WWPN mapping is retained throughout IP host logins and logouts and throughout storage router reboots.

See Table 1-4for an example of transparent SCSI routing mapping. In this mapping example, the WWPN, 200100023D000100, is assigned to the IP host. Using that WWPN, the SN 5428-2 presents the IP host as an FC host to the storage array. Three devices are made available as local storage devices: Local Disk (E:), Local Disk (F:), and Local Disk (G:). (Microsoft Windows devices are used as examples.) The iSCSI target, eui.3100112233445566, has been automatically created and mapped to a WWPN, 3100112233445566, that was made available by the storage array. To the IP host, the iSCSI target appears as a controller with LUNs 0, 1, and 2 available. The LUNs are apparent as they are with the WWPN in the storage array.

Table 1-4 Transparent SCSI Routing Mapping Example

 

 

 

LUNs

 

 

 

 

 

Apparent

 

Physical

WWPN assigned to IP

Apparent to IP

 

with iSCSI

WWPN of Storage Array

LUNs

Host

Host

iSCSI Target Name

Target

Target

Available

 

 

 

 

 

 

200100023D000100

Local Disk (E:)

eui.3100112233445566

LUN 0

3100112233445566

LUN 0

 

 

 

 

 

 

 

Local Disk (G:)

eui.3100112233445566

LUN 1

3100112233445566

LUN 1

 

 

 

 

 

 

 

Local Disk (H:)

eui.3100112233445566

LUN 2

3100112233445566

LUN 2

 

 

 

 

 

 

Access for transparent SCSI routing is controlled in the IP hosts and the intelligent storage array. In an IP host, the iSCSI driver is configured with the Gigabit Ethernet IP address of the SCSI routing instance in the storage router with which the host is to transport SCSI requests and responses. In the intelligent storage array, access is controlled through its storage management tools. Additionally, access can be further controlled in the SN 5428-2 through authentication. See the “Authentication Overview” section on page 1-24for more information about authentication.

Once the access is configured in the hosts and the intelligent storage array, the SN 5428-2 transparently routes SCSI requests and responses between hosts and the mapped storage devices.

Figure 1-13represents the concept of storage mapping and access control for transparent SCSI routing. In the figure, the SN 5428-2 Storage Router provides three IP hosts with access to disk drives made available by the intelligent storage array. A single SCSI routing instance in the storage router is configured with IP address 10.1.2.3 for the Gigabit Ethernet interface. The iSCSI driver in each IP host is configured to access that SCSI routing instance by its IP address 10.1.2.3 through the Gigabit Ethernet interface on the storage router. From the perspective of an IP host, each disk drive mapped to it appears as a locally attached disk drive. From the perspective of the storage array, each host is connected directly

Cisco SN 5428-2 Storage Router Software Configuration Guide

 

OL-4691-01

1-13

 

 

 

Image 13
Contents Authentication Overview, page Mixed Mode Overview, page VLAN Access Overview, pageWhere to Go Next, page SN 5428-2 Storage Router Overview, page SCSI Routing Overview, pageSN 5428-2 Storage Router Overview Figure 1-3 FCIP SCSI Routing Overview SCSI Routing Mapping and Access Control, pageRouting SCSI Requests and Responses, page Basic Network Structure, pageRouting SCSI Requests and Responses Basic Network Structure SCSI Routing Mapping and Access ControlFigure 1-7 SCSI Routing Basic Network Structure Webserver2000 DatabaseTable 1-1 Target-and-LUN Mapping Example Table 1-2 Target-only Mapping ExampleAccess for SCSI routing is controlled in the IP hosts and the storage router. In an IP host, the iSCSI driver is configured with the Gigabit Ethernet IP address of the SCSI routing instance in the storage router with which the host is to transport SCSI requests and responses. In a storage router, access is controlled through an access list and a VLAN identifier VID number of the hosts. Additionally, access can be further controlled in the SN 5428-2 through authentication. See the “Authentication Overview” section on page 1-24 for more information about authentication Figure 1-8 SCSI Routing Storage Mapping and Access Control Concept Available Instances of SCSI RoutingTable 1-3 SCSI Routing Storage Mapping and Access Control Concept Transparent SCSI Routing Overview Transparent SCSI Routing Mapping and Access Control, pageAvailable Instances of Transparent SCSI Routing, page 1-10Figure 1-11 Transparent SCSI Routing Actions 1-111-12 Transparent SCSI Routing Mapping and Access ControlBasic Network Structure Table 1-4 Transparent SCSI Routing Mapping Example 1-13Intelligent Storage Array and 1-14SCSI Routing Drive LUNUsing FCIP to Route Fibre Channel Packets, page Using FCIP to Route Fibre Channel PacketsFCIP Overview Available Instances of Transparent SCSI Routing1-16 FCIP Network StructuresFigure 1-15 FCIP Actions Figure 1-16 FCIP Redundant WAN Configuration 1-17Figure 1-17 FCIP Fully Redundant Configuration 1-18 Mixed Mode OverviewFigure 1-18 Multisite FCIP Configuration Figure 1-19 Mixed Mode Overview SCSI routing and FCIP 1-19Figure 1-20 Mixed Mode Overview Transparent SCSI routing and FCIP 1-20 VLAN Access Overview1-21 Zoning OverviewFigure 1-21 VLAN Access Overview Zoning comprises zones, zone sets, aliases, and zone databases 1-22Gigabit Ethernet Interface Overview Fibre Channel Interface Overview1-23 1-24 Authentication OverviewInterface Naming SN 5428-2 Cluster Management Overview1-25 1-26 Where to Go Nexta a n 1-27 1-28
Related manuals
Manual 78 pages 51.81 Kb Manual 16 pages 56.35 Kb Manual 22 pages 17.61 Kb

SN 5428-2 specifications

Cisco Systems SN 5428-2 is a highly versatile and advanced network storage solution designed to meet the demands of data center environments. This robust storage appliance integrates cutting-edge technologies to provide high performance, reliability, and scalability, making it an ideal choice for organizations looking to enhance their data management capabilities.

One of the main features of the SN 5428-2 is its high-density architecture, which allows for efficient utilization of space while providing ample storage capacity. The system supports multiple drive configurations, including HDDs and SSDs, enabling users to tailor their storage solutions based on performance needs and budget constraints. With a significant amount of raw capacity available, organizations can effortlessly handle large volumes of data and support intensive workloads.

The SN 5428-2 boasts advanced data protection technologies, ensuring that critical information is safeguarded against loss or corruption. Features like RAID support provide redundancy and fault tolerance, while snapshot and cloning capabilities offer quick recovery options in case of data breaches or system failures. Additionally, built-in encryption features help protect sensitive data both at rest and in transit.

The appliance incorporates state-of-the-art networking capabilities as well. With support for various network protocols, including iSCSI and Fibre Channel, the SN 5428-2 can seamlessly integrate into existing infrastructures. This adaptability allows for easy connection with different servers and storage systems, facilitating a more cohesive and efficient operational environment.

Furthermore, the SN 5428-2 is designed with scalability in mind. Organizations can start with a basic configuration and expand as their storage needs grow by adding additional drives or connecting more appliances. This flexibility ensures that businesses can continue to meet their evolving data demands without the need for complete system overhauls.

Management and monitoring of the SN 5428-2 are simplified through a user-friendly interface that provides real-time insights into system performance, capacity utilization, and health status. Administrators can easily configure and manage storage resources, making operational tasks more efficient.

In summary, Cisco Systems SN 5428-2 stands out in the realm of storage solutions by combining high density, robust data protection, advanced networking capabilities, and remarkable scalability. Its thoughtful design and features make it an essential tool for organizations looking to enhance their data storage infrastructure and improve overall performance. With its reliable and efficient performance, the SN 5428-2 is well-suited for a wide array of data center applications.