In a standard IP network the delay of packets to and from an application or browser is unlikely to cause an issue.The...
By submitting your email address, you agree to receive emails regarding relevant topic offers from TechTarget and its partners. You can withdraw your consent at any time. Contact TechTarget at 275 Grove Street, Newton, MA.
same cannot be said for storage where a consistent response time and guaranteed delivery is essential for providing transparent disk I/O. Isolating IP and iSCSI traffic will help to reduce the potential impact to storage performance of unpredictable traffic.
Considering security, iSCSI can be run in a completely open fashion. Data packets can be visible on the network for anyone with a standard piece of software such as Ethereal. To counter this, iSCSI offers server/target validation and the suggested use of IPsec to encrypt traffic, which inevitably adds to the CPU load on both server and storage. Isolating iSCSI hosts from a physical perspective improves security and provides the choice as to whether IPsec needs to be used.
Taking the above points into consideration, a customer may choose to completely isolate iSCSI traffic into separate switches or to provide dedicated VLANs for iSCSI connections. Both approaches help to mitigate against performance and security issues and give the added benefit of making problem resolution easier to achieve.
Related Q&A from Chris Evans
Learn about space reclamation in a VMware environment, including how vSphere's Thin Provisioning Stun primitive works.continue reading
Storage expert Chris Evans explains the best process for handling oversubscription in a VMware environment, to avoid running out of space.continue reading
Learn about the disk provisioning options in vSphere and the process for changing a thick-provisioned VMDK to a thin-provisioned one.continue reading
Have a question for an expert?
Please add a title for your question
Get answers from a TechTarget expert on whatever's puzzling you.