SlideShare a Scribd company logo
SECURING THE LOCAL AREA
NETWORK
Which should be protected?
 Securing the edge device because of itsWAN
connection?
 Securing the internal LAN?
 Securing the internal LAN is just as important
as securing the perimeter of a network
Securing Endpoint Devices
 A LAN connects many network endpoint
devices that act as a network clients.
 Endpoint devices include:
 Laptops
 Desktops
 IP phones
Securing Non-Endpoint Devices
 A LAN also requires many intermediary
devices to interconnect endpoint devices.
 Non-endpoint LAN devices:
 Switches
 Wireless devices
 IP telephony devices
Network Admission Control
NAC
 NAC helps maintain network stability by
providing two important features:
 Authentication and authorization
 Posture assessment
 Quarantining of noncompliant systems
 Remediation of noncompliant systems
 NAC can be implemented in two ways:
 NAC Framework
 Cisco NAC Appliance
San Networks
STORAGE AREA NETWORKS
(SANS)
Network and server downtime costs companies large sums of money in business
and productivity losses.
At the same time, the amount of information to be
managed and stored is increasing dramatically every year.
A SAN is a specialized network that enables fast, reliable access among servers
and external storage resources.
A storage device is not the exclusive property of any one
server.
They are shared among all networked servers as peer
resources.
A SAN does not need to be a physically separate network.
It can be a dedicated subnet that carries only business-
critical I/O traffic such as reading / writing a file from / to a
disk, between servers and storage devices.
Storage Area Networks (SANs)
 Cisco SAN solutions provide a preferred
means of accessing, managing, and
protecting information resources across a
variety of SAN transport technologies.
 For example:
 Fiber Channel
 Fiber Channel over IP (FCIP)
 Internet Small Computer Systems Interface (iSCSI)
 Gigabit Ethernet
 Optical network
SAN Transport Technologies
 Fiber Channel:
 The primary SAN transport for host-to-SAN connectivity.
 Fiber Channel networks provide a serial transport for the SCSI protocol.
 Uses a world wide name (WWN) to uniquely identify each element.
 iSCSI:
 Maps SCSI overTCP/IP and is typically used in the LAN.
 Leverages existing IP networks to build and extend SANs by usingTCP/IP to
transport SCSI commands, data, and status between hosts or initiators and
storage devices or targets, such as storage subsystems and tape devices.
 Uses a logical unit number (LUN) which is a 64-bit address as a way to
differentiate individual disk drives within a common SCSI target device such as
a disk array.
 FCIP:
 Popular SAN-to-SAN connectivity model that is used over the WAN or MAN.
 SAN designers can use the open-standard FCIP protocol to break the distance
barrier of current Fiber Channel solutions and enable interconnection of SAN
islands over extended distances.


More Related Content

Viewers also liked

Security policy
Security policySecurity policy
Security policy
Abdullah Bakhashwain
 
Secure your LAN
Secure your LANSecure your LAN
Secure your LAN
Cadariu Cristian
 
3852 wlan revised
3852 wlan revised3852 wlan revised
3852 wlan revised
Steven Habuda
 
Security threats in the LAN
Security threats in the LANSecurity threats in the LAN
Security threats in the LAN
Agora Group
 
LAN Security
LAN Security LAN Security
LAN Security
Syed Ubaid Ali Jafri
 
Lecture 11 wifi security
Lecture 11 wifi securityLecture 11 wifi security
Lecture 11 wifi security
rajakhurram
 
Wlan security
Wlan securityWlan security
Wlan security
Upasona Roy
 
Securing the LAN Best practices to secure the wired access network
Securing the LAN Best practices to secure the wired access networkSecuring the LAN Best practices to secure the wired access network
Securing the LAN Best practices to secure the wired access network
Aruba, a Hewlett Packard Enterprise company
 
Open Source vs. Enterprise Solutions
Open Source vs. Enterprise SolutionsOpen Source vs. Enterprise Solutions
Open Source vs. Enterprise Solutions
RMMcPherson
 
Wireless security presentation
Wireless security presentationWireless security presentation
Wireless security presentation
Muhammad Zia
 
Wireless LAN security
Wireless LAN securityWireless LAN security
Wireless LAN security
Rajan Kumar
 

Viewers also liked (11)

Security policy
Security policySecurity policy
Security policy
 
Secure your LAN
Secure your LANSecure your LAN
Secure your LAN
 
3852 wlan revised
3852 wlan revised3852 wlan revised
3852 wlan revised
 
Security threats in the LAN
Security threats in the LANSecurity threats in the LAN
Security threats in the LAN
 
LAN Security
LAN Security LAN Security
LAN Security
 
Lecture 11 wifi security
Lecture 11 wifi securityLecture 11 wifi security
Lecture 11 wifi security
 
Wlan security
Wlan securityWlan security
Wlan security
 
Securing the LAN Best practices to secure the wired access network
Securing the LAN Best practices to secure the wired access networkSecuring the LAN Best practices to secure the wired access network
Securing the LAN Best practices to secure the wired access network
 
Open Source vs. Enterprise Solutions
Open Source vs. Enterprise SolutionsOpen Source vs. Enterprise Solutions
Open Source vs. Enterprise Solutions
 
Wireless security presentation
Wireless security presentationWireless security presentation
Wireless security presentation
 
Wireless LAN security
Wireless LAN securityWireless LAN security
Wireless LAN security
 

Similar to Securing the local area network

Storage Primer
Storage PrimerStorage Primer
Storage Primer
sriramr
 
Cisco --introduction-to-storage-area-networking-technologies
Cisco --introduction-to-storage-area-networking-technologiesCisco --introduction-to-storage-area-networking-technologies
Cisco --introduction-to-storage-area-networking-technologies
ssuser79fc19
 
Storage Area networking and upcoming trends
Storage Area networking and upcoming trendsStorage Area networking and upcoming trends
Storage Area networking and upcoming trends
Deepanshu Lulla
 
Introduction To San
Introduction To SanIntroduction To San
Introduction To San
prakashjjaya
 
Introduction to Enterprise Data Storage, Direct Attached Storage, Storage Ar...
Introduction to Enterprise Data Storage,  Direct Attached Storage, Storage Ar...Introduction to Enterprise Data Storage,  Direct Attached Storage, Storage Ar...
Introduction to Enterprise Data Storage, Direct Attached Storage, Storage Ar...
ssuserec8a711
 
final-unit-ii-cc-cloud computing-2022.pdf
final-unit-ii-cc-cloud computing-2022.pdffinal-unit-ii-cc-cloud computing-2022.pdf
final-unit-ii-cc-cloud computing-2022.pdf
Samiksha880257
 
Storage Area Networks, Networks, Networking, Computer Networks
Storage Area Networks, Networks, Networking,  Computer NetworksStorage Area Networks, Networks, Networking,  Computer Networks
Storage Area Networks, Networks, Networking, Computer Networks
Seraphic Nazir
 
iSCSi , FCSAN ,FC protocol stack and Infini band
iSCSi , FCSAN ,FC protocol stack and Infini bandiSCSi , FCSAN ,FC protocol stack and Infini band
iSCSi , FCSAN ,FC protocol stack and Infini band
Akash Gupta
 
Storage networks
Storage networksStorage networks
Storage networks
Ahmed Nour
 
Storage area network
Storage area networkStorage area network
Storage area network
Neha Agarwal
 
SDN 101: Software Defined Networking Course - Sameh Zaghloul/IBM - 2014
SDN 101: Software Defined Networking Course - Sameh Zaghloul/IBM - 2014SDN 101: Software Defined Networking Course - Sameh Zaghloul/IBM - 2014
SDN 101: Software Defined Networking Course - Sameh Zaghloul/IBM - 2014
SAMeh Zaghloul
 
Detailed iSCSI presentation
Detailed iSCSI presentationDetailed iSCSI presentation
Detailed iSCSI presentation
Sheel Sindhu Manohar
 
Cloud storage infrastructures
Cloud storage infrastructuresCloud storage infrastructures
Cloud storage infrastructures
NIKHILKUMAR SHARDOOR
 
Computer networks - CBSE New Syllabus (083) Class - XII
Computer networks - CBSE  New Syllabus (083) Class - XIIComputer networks - CBSE  New Syllabus (083) Class - XII
Computer networks - CBSE New Syllabus (083) Class - XII
Deepak Singh
 
SAN PPT.ppt
SAN PPT.pptSAN PPT.ppt
SAN PPT.ppt
ankitakarale2
 
Network Built For Local Area Networks Essay
Network Built For Local Area Networks EssayNetwork Built For Local Area Networks Essay
Network Built For Local Area Networks Essay
Katyana Londono
 
Introduction to Storage.ppt
Introduction to Storage.pptIntroduction to Storage.ppt
Introduction to Storage.ppt
Param Eswaran
 
IFD30104 Chapter 1
IFD30104 Chapter 1IFD30104 Chapter 1
IFD30104 Chapter 1
MdmArfah Baharudin
 
Ip san-best-practices-en
Ip san-best-practices-enIp san-best-practices-en
Ip san-best-practices-en
Oscar Gil Merino
 
Network architecture - part-I
Network architecture - part-INetwork architecture - part-I
Network architecture - part-I
csk selva
 

Similar to Securing the local area network (20)

Storage Primer
Storage PrimerStorage Primer
Storage Primer
 
Cisco --introduction-to-storage-area-networking-technologies
Cisco --introduction-to-storage-area-networking-technologiesCisco --introduction-to-storage-area-networking-technologies
Cisco --introduction-to-storage-area-networking-technologies
 
Storage Area networking and upcoming trends
Storage Area networking and upcoming trendsStorage Area networking and upcoming trends
Storage Area networking and upcoming trends
 
Introduction To San
Introduction To SanIntroduction To San
Introduction To San
 
Introduction to Enterprise Data Storage, Direct Attached Storage, Storage Ar...
Introduction to Enterprise Data Storage,  Direct Attached Storage, Storage Ar...Introduction to Enterprise Data Storage,  Direct Attached Storage, Storage Ar...
Introduction to Enterprise Data Storage, Direct Attached Storage, Storage Ar...
 
final-unit-ii-cc-cloud computing-2022.pdf
final-unit-ii-cc-cloud computing-2022.pdffinal-unit-ii-cc-cloud computing-2022.pdf
final-unit-ii-cc-cloud computing-2022.pdf
 
Storage Area Networks, Networks, Networking, Computer Networks
Storage Area Networks, Networks, Networking,  Computer NetworksStorage Area Networks, Networks, Networking,  Computer Networks
Storage Area Networks, Networks, Networking, Computer Networks
 
iSCSi , FCSAN ,FC protocol stack and Infini band
iSCSi , FCSAN ,FC protocol stack and Infini bandiSCSi , FCSAN ,FC protocol stack and Infini band
iSCSi , FCSAN ,FC protocol stack and Infini band
 
Storage networks
Storage networksStorage networks
Storage networks
 
Storage area network
Storage area networkStorage area network
Storage area network
 
SDN 101: Software Defined Networking Course - Sameh Zaghloul/IBM - 2014
SDN 101: Software Defined Networking Course - Sameh Zaghloul/IBM - 2014SDN 101: Software Defined Networking Course - Sameh Zaghloul/IBM - 2014
SDN 101: Software Defined Networking Course - Sameh Zaghloul/IBM - 2014
 
Detailed iSCSI presentation
Detailed iSCSI presentationDetailed iSCSI presentation
Detailed iSCSI presentation
 
Cloud storage infrastructures
Cloud storage infrastructuresCloud storage infrastructures
Cloud storage infrastructures
 
Computer networks - CBSE New Syllabus (083) Class - XII
Computer networks - CBSE  New Syllabus (083) Class - XIIComputer networks - CBSE  New Syllabus (083) Class - XII
Computer networks - CBSE New Syllabus (083) Class - XII
 
SAN PPT.ppt
SAN PPT.pptSAN PPT.ppt
SAN PPT.ppt
 
Network Built For Local Area Networks Essay
Network Built For Local Area Networks EssayNetwork Built For Local Area Networks Essay
Network Built For Local Area Networks Essay
 
Introduction to Storage.ppt
Introduction to Storage.pptIntroduction to Storage.ppt
Introduction to Storage.ppt
 
IFD30104 Chapter 1
IFD30104 Chapter 1IFD30104 Chapter 1
IFD30104 Chapter 1
 
Ip san-best-practices-en
Ip san-best-practices-enIp san-best-practices-en
Ip san-best-practices-en
 
Network architecture - part-I
Network architecture - part-INetwork architecture - part-I
Network architecture - part-I
 

Recently uploaded

Hematology Analyzer Machine - Complete Blood Count
Hematology Analyzer Machine - Complete Blood CountHematology Analyzer Machine - Complete Blood Count
Hematology Analyzer Machine - Complete Blood Count
shahdabdulbaset
 
Electric vehicle and photovoltaic advanced roles in enhancing the financial p...
Electric vehicle and photovoltaic advanced roles in enhancing the financial p...Electric vehicle and photovoltaic advanced roles in enhancing the financial p...
Electric vehicle and photovoltaic advanced roles in enhancing the financial p...
IJECEIAES
 
Transformers design and coooling methods
Transformers design and coooling methodsTransformers design and coooling methods
Transformers design and coooling methods
Roger Rozario
 
Generative AI leverages algorithms to create various forms of content
Generative AI leverages algorithms to create various forms of contentGenerative AI leverages algorithms to create various forms of content
Generative AI leverages algorithms to create various forms of content
Hitesh Mohapatra
 
NATURAL DEEP EUTECTIC SOLVENTS AS ANTI-FREEZING AGENT
NATURAL DEEP EUTECTIC SOLVENTS AS ANTI-FREEZING AGENTNATURAL DEEP EUTECTIC SOLVENTS AS ANTI-FREEZING AGENT
NATURAL DEEP EUTECTIC SOLVENTS AS ANTI-FREEZING AGENT
Addu25809
 
Unit-III-ELECTROCHEMICAL STORAGE DEVICES.ppt
Unit-III-ELECTROCHEMICAL STORAGE DEVICES.pptUnit-III-ELECTROCHEMICAL STORAGE DEVICES.ppt
Unit-III-ELECTROCHEMICAL STORAGE DEVICES.ppt
KrishnaveniKrishnara1
 
Engineering Drawings Lecture Detail Drawings 2014.pdf
Engineering Drawings Lecture Detail Drawings 2014.pdfEngineering Drawings Lecture Detail Drawings 2014.pdf
Engineering Drawings Lecture Detail Drawings 2014.pdf
abbyasa1014
 
UNLOCKING HEALTHCARE 4.0: NAVIGATING CRITICAL SUCCESS FACTORS FOR EFFECTIVE I...
UNLOCKING HEALTHCARE 4.0: NAVIGATING CRITICAL SUCCESS FACTORS FOR EFFECTIVE I...UNLOCKING HEALTHCARE 4.0: NAVIGATING CRITICAL SUCCESS FACTORS FOR EFFECTIVE I...
UNLOCKING HEALTHCARE 4.0: NAVIGATING CRITICAL SUCCESS FACTORS FOR EFFECTIVE I...
amsjournal
 
Redefining brain tumor segmentation: a cutting-edge convolutional neural netw...
Redefining brain tumor segmentation: a cutting-edge convolutional neural netw...Redefining brain tumor segmentation: a cutting-edge convolutional neural netw...
Redefining brain tumor segmentation: a cutting-edge convolutional neural netw...
IJECEIAES
 
Use PyCharm for remote debugging of WSL on a Windo cf5c162d672e4e58b4dde5d797...
Use PyCharm for remote debugging of WSL on a Windo cf5c162d672e4e58b4dde5d797...Use PyCharm for remote debugging of WSL on a Windo cf5c162d672e4e58b4dde5d797...
Use PyCharm for remote debugging of WSL on a Windo cf5c162d672e4e58b4dde5d797...
shadow0702a
 
Introduction to AI Safety (public presentation).pptx
Introduction to AI Safety (public presentation).pptxIntroduction to AI Safety (public presentation).pptx
Introduction to AI Safety (public presentation).pptx
MiscAnnoy1
 
22CYT12-Unit-V-E Waste and its Management.ppt
22CYT12-Unit-V-E Waste and its Management.ppt22CYT12-Unit-V-E Waste and its Management.ppt
22CYT12-Unit-V-E Waste and its Management.ppt
KrishnaveniKrishnara1
 
学校原版美国波士顿大学毕业证学历学位证书原版一模一样
学校原版美国波士顿大学毕业证学历学位证书原版一模一样学校原版美国波士顿大学毕业证学历学位证书原版一模一样
学校原版美国波士顿大学毕业证学历学位证书原版一模一样
171ticu
 
ACEP Magazine edition 4th launched on 05.06.2024
ACEP Magazine edition 4th launched on 05.06.2024ACEP Magazine edition 4th launched on 05.06.2024
ACEP Magazine edition 4th launched on 05.06.2024
Rahul
 
Casting-Defect-inSlab continuous casting.pdf
Casting-Defect-inSlab continuous casting.pdfCasting-Defect-inSlab continuous casting.pdf
Casting-Defect-inSlab continuous casting.pdf
zubairahmad848137
 
CompEx~Manual~1210 (2).pdf COMPEX GAS AND VAPOURS
CompEx~Manual~1210 (2).pdf COMPEX GAS AND VAPOURSCompEx~Manual~1210 (2).pdf COMPEX GAS AND VAPOURS
CompEx~Manual~1210 (2).pdf COMPEX GAS AND VAPOURS
RamonNovais6
 
Properties Railway Sleepers and Test.pptx
Properties Railway Sleepers and Test.pptxProperties Railway Sleepers and Test.pptx
Properties Railway Sleepers and Test.pptx
MDSABBIROJJAMANPAYEL
 
Harnessing WebAssembly for Real-time Stateless Streaming Pipelines
Harnessing WebAssembly for Real-time Stateless Streaming PipelinesHarnessing WebAssembly for Real-time Stateless Streaming Pipelines
Harnessing WebAssembly for Real-time Stateless Streaming Pipelines
Christina Lin
 
Material for memory and display system h
Material for memory and display system hMaterial for memory and display system h
Material for memory and display system h
gowrishankartb2005
 
gray level transformation unit 3(image processing))
gray level transformation unit 3(image processing))gray level transformation unit 3(image processing))
gray level transformation unit 3(image processing))
shivani5543
 

Recently uploaded (20)

Hematology Analyzer Machine - Complete Blood Count
Hematology Analyzer Machine - Complete Blood CountHematology Analyzer Machine - Complete Blood Count
Hematology Analyzer Machine - Complete Blood Count
 
Electric vehicle and photovoltaic advanced roles in enhancing the financial p...
Electric vehicle and photovoltaic advanced roles in enhancing the financial p...Electric vehicle and photovoltaic advanced roles in enhancing the financial p...
Electric vehicle and photovoltaic advanced roles in enhancing the financial p...
 
Transformers design and coooling methods
Transformers design and coooling methodsTransformers design and coooling methods
Transformers design and coooling methods
 
Generative AI leverages algorithms to create various forms of content
Generative AI leverages algorithms to create various forms of contentGenerative AI leverages algorithms to create various forms of content
Generative AI leverages algorithms to create various forms of content
 
NATURAL DEEP EUTECTIC SOLVENTS AS ANTI-FREEZING AGENT
NATURAL DEEP EUTECTIC SOLVENTS AS ANTI-FREEZING AGENTNATURAL DEEP EUTECTIC SOLVENTS AS ANTI-FREEZING AGENT
NATURAL DEEP EUTECTIC SOLVENTS AS ANTI-FREEZING AGENT
 
Unit-III-ELECTROCHEMICAL STORAGE DEVICES.ppt
Unit-III-ELECTROCHEMICAL STORAGE DEVICES.pptUnit-III-ELECTROCHEMICAL STORAGE DEVICES.ppt
Unit-III-ELECTROCHEMICAL STORAGE DEVICES.ppt
 
Engineering Drawings Lecture Detail Drawings 2014.pdf
Engineering Drawings Lecture Detail Drawings 2014.pdfEngineering Drawings Lecture Detail Drawings 2014.pdf
Engineering Drawings Lecture Detail Drawings 2014.pdf
 
UNLOCKING HEALTHCARE 4.0: NAVIGATING CRITICAL SUCCESS FACTORS FOR EFFECTIVE I...
UNLOCKING HEALTHCARE 4.0: NAVIGATING CRITICAL SUCCESS FACTORS FOR EFFECTIVE I...UNLOCKING HEALTHCARE 4.0: NAVIGATING CRITICAL SUCCESS FACTORS FOR EFFECTIVE I...
UNLOCKING HEALTHCARE 4.0: NAVIGATING CRITICAL SUCCESS FACTORS FOR EFFECTIVE I...
 
Redefining brain tumor segmentation: a cutting-edge convolutional neural netw...
Redefining brain tumor segmentation: a cutting-edge convolutional neural netw...Redefining brain tumor segmentation: a cutting-edge convolutional neural netw...
Redefining brain tumor segmentation: a cutting-edge convolutional neural netw...
 
Use PyCharm for remote debugging of WSL on a Windo cf5c162d672e4e58b4dde5d797...
Use PyCharm for remote debugging of WSL on a Windo cf5c162d672e4e58b4dde5d797...Use PyCharm for remote debugging of WSL on a Windo cf5c162d672e4e58b4dde5d797...
Use PyCharm for remote debugging of WSL on a Windo cf5c162d672e4e58b4dde5d797...
 
Introduction to AI Safety (public presentation).pptx
Introduction to AI Safety (public presentation).pptxIntroduction to AI Safety (public presentation).pptx
Introduction to AI Safety (public presentation).pptx
 
22CYT12-Unit-V-E Waste and its Management.ppt
22CYT12-Unit-V-E Waste and its Management.ppt22CYT12-Unit-V-E Waste and its Management.ppt
22CYT12-Unit-V-E Waste and its Management.ppt
 
学校原版美国波士顿大学毕业证学历学位证书原版一模一样
学校原版美国波士顿大学毕业证学历学位证书原版一模一样学校原版美国波士顿大学毕业证学历学位证书原版一模一样
学校原版美国波士顿大学毕业证学历学位证书原版一模一样
 
ACEP Magazine edition 4th launched on 05.06.2024
ACEP Magazine edition 4th launched on 05.06.2024ACEP Magazine edition 4th launched on 05.06.2024
ACEP Magazine edition 4th launched on 05.06.2024
 
Casting-Defect-inSlab continuous casting.pdf
Casting-Defect-inSlab continuous casting.pdfCasting-Defect-inSlab continuous casting.pdf
Casting-Defect-inSlab continuous casting.pdf
 
CompEx~Manual~1210 (2).pdf COMPEX GAS AND VAPOURS
CompEx~Manual~1210 (2).pdf COMPEX GAS AND VAPOURSCompEx~Manual~1210 (2).pdf COMPEX GAS AND VAPOURS
CompEx~Manual~1210 (2).pdf COMPEX GAS AND VAPOURS
 
Properties Railway Sleepers and Test.pptx
Properties Railway Sleepers and Test.pptxProperties Railway Sleepers and Test.pptx
Properties Railway Sleepers and Test.pptx
 
Harnessing WebAssembly for Real-time Stateless Streaming Pipelines
Harnessing WebAssembly for Real-time Stateless Streaming PipelinesHarnessing WebAssembly for Real-time Stateless Streaming Pipelines
Harnessing WebAssembly for Real-time Stateless Streaming Pipelines
 
Material for memory and display system h
Material for memory and display system hMaterial for memory and display system h
Material for memory and display system h
 
gray level transformation unit 3(image processing))
gray level transformation unit 3(image processing))gray level transformation unit 3(image processing))
gray level transformation unit 3(image processing))
 

Securing the local area network

  • 1. SECURING THE LOCAL AREA NETWORK
  • 2. Which should be protected?  Securing the edge device because of itsWAN connection?  Securing the internal LAN?  Securing the internal LAN is just as important as securing the perimeter of a network
  • 3. Securing Endpoint Devices  A LAN connects many network endpoint devices that act as a network clients.  Endpoint devices include:  Laptops  Desktops  IP phones
  • 4. Securing Non-Endpoint Devices  A LAN also requires many intermediary devices to interconnect endpoint devices.  Non-endpoint LAN devices:  Switches  Wireless devices  IP telephony devices
  • 6. NAC  NAC helps maintain network stability by providing two important features:  Authentication and authorization  Posture assessment  Quarantining of noncompliant systems  Remediation of noncompliant systems  NAC can be implemented in two ways:  NAC Framework  Cisco NAC Appliance
  • 8. STORAGE AREA NETWORKS (SANS) Network and server downtime costs companies large sums of money in business and productivity losses. At the same time, the amount of information to be managed and stored is increasing dramatically every year. A SAN is a specialized network that enables fast, reliable access among servers and external storage resources. A storage device is not the exclusive property of any one server. They are shared among all networked servers as peer resources. A SAN does not need to be a physically separate network. It can be a dedicated subnet that carries only business- critical I/O traffic such as reading / writing a file from / to a disk, between servers and storage devices.
  • 9. Storage Area Networks (SANs)  Cisco SAN solutions provide a preferred means of accessing, managing, and protecting information resources across a variety of SAN transport technologies.  For example:  Fiber Channel  Fiber Channel over IP (FCIP)  Internet Small Computer Systems Interface (iSCSI)  Gigabit Ethernet  Optical network
  • 10. SAN Transport Technologies  Fiber Channel:  The primary SAN transport for host-to-SAN connectivity.  Fiber Channel networks provide a serial transport for the SCSI protocol.  Uses a world wide name (WWN) to uniquely identify each element.  iSCSI:  Maps SCSI overTCP/IP and is typically used in the LAN.  Leverages existing IP networks to build and extend SANs by usingTCP/IP to transport SCSI commands, data, and status between hosts or initiators and storage devices or targets, such as storage subsystems and tape devices.  Uses a logical unit number (LUN) which is a 64-bit address as a way to differentiate individual disk drives within a common SCSI target device such as a disk array.  FCIP:  Popular SAN-to-SAN connectivity model that is used over the WAN or MAN.  SAN designers can use the open-standard FCIP protocol to break the distance barrier of current Fiber Channel solutions and enable interconnection of SAN islands over extended distances. 