Home | Troubleshooting |  Quick Setup  |  Cisco How to  |  Wireless  |  Forums   | Site Map | Services  | About Us | Chicagotech MVP  | Search  | Contact Us  |              

 

 

iSCSI How to

 

Connecting and using iSCSI volumes

How to add iSCSI Initiator to EqualLogic SAN Group Manager


How to Configure EqualLogic iSCSI SAN Volumes for Cluster

How to Connect Cluster Nodes to iSCSI Volumes

How to Configure Basic iSCSI SAN

How to configure iSCSI Backup

How to configure iSCSI Cluster

How to create iSCSI storage in VMware ESX Server

Network Design Guidelines of Configuring EqualLogic iSCSI

Planning Network Redundancy in Windows cluster with iSCSI

Redundant iSCSI in Hyper-V Environment
Setup cluster without SAN
The basic clustering requirements for Exchange or SQL applications
vSphere Networking for iSCSI

What's iSCSI

 

What's iSCSI

Internet Small Computer System Interface (iSCSI) is an Internet Protocol (IP)-based storage networking standard for linking data storage facilities. iSCSI networks, which are based on the mature TCP/IP technology is used to facilitate data transfers over intranets and to manage storage over long distances.

 

The advantages of iSCSI are:

 

Connectivity over long distances: iSCSI can be used over metropolitan area networks (MANs) and WANs.

 

Lower costs: iSCSI SAN solutions capitalize on the preexisting LAN infrastructure and make use of the much more ubiquitous IP expertise available in most organizations, which reduces specialized technical expertise and specialized hardware for troubleshooting.

 

Simpler implementation and management: iSCSI solutions require little more than the installation of the Microsoft iSCSI initiator on the host server, a target iSCSI storage device, and a Gigabit Ethernet switch in order to deliver block storage over IP.

 

Built-in security: the iSCSI protocol provides security for devices on the network by using the Challenge Handshake Authentication Protocol (CHAP) for authentication and the Internet Protocol security (IPSec) standard for encryption.

 

Post your questions, comments, feedbacks and suggestions

Contact a consultant

Related Topics

What's iSCSI

How to Configure Basic iSCSI SAN

How to configure iSCSI Backup

How to configure iSCSI Cluster
 

 


 

 

Hit Counter   This web is provided "AS IS" with no warranties.
Copyright 2002-2017 ChicagoTech.net, All rights reserved. Unauthorized reproduction forbidden.