Upload
computer-networking
View
518
Download
7
Embed Size (px)
Citation preview
Module 2Implementing Advanced File
Services
Module Overview
Configuring iSCSI StorageConfiguring BranchCache•Optimizing Storage Usage
Lesson 1: Configuring iSCSI Storage
What Is iSCSI?iSCSI Target Server and iSCSI InitiatorImplementing High Availability for iSCSIiSCSI Security OptionsDemonstration: Configuring an iSCSI TargetDemonstration: Connecting to the iSCSI Storage•Considerations for Implementing iSCSI Storage
What Is iSCSI?iSCSI transmits SCSI commands over IP networks
Component Description
IP network Provides high performance and redundancy
iSCSI targets
Run on the storage device and enable access to the disks
iSCSI initiators
A software component or host adapter on the server that provides access to iSCSI targets
IQNA globally unique identifier used to address initiators and targets on an iSCSI network
iSCSI client that runs the iSCSI Initiator
iSCSI Target Server
Storage Array
TCP/
IP p
roto
col
iSCSI Target Server and iSCSI Initiator
The iSCSI target server• Is available as a role service in Windows Server 2012• Provides the following features:
• Network/diskless boot• Server application storage• Heterogeneous storage• Lab environments
• Windows Server 2012 R2 features include:• Virtual disks• Manageability• Scalability limits• Local mount functionality
• Support for VHDX• Improved manageability• Improved scalability• Local mount functionality deprecated
iSCSI Target Server and iSCSI Initiator
The iSCSI initiator• Runs as a service in the operating system• Is installed by default on Windows 8 and Windows Server 2012• iSCSI targets can be discovered using multiple methods that include:• SendTargets• iSNS• Manually configured targets• HBA discovery
Implementing High Availability for iSCSI
Two technologies for implementing iSCSI for high availability are:• MCS, in the event of a failure, all outstanding iSCSI commands are reassigned to another connection automatically• MPIO, if you have multiple network interface cards in your iSCSI initiator and iSCSI target server, you can use MPIO to provide failover redundancy in the event of network outages
iSCSI Security Options
Mitigate security risks to iSCSI by the following best practices:•Segregate the iSCSI SAN channel•Secure management consoles•Disable unneeded services•Use CHAP authentication•Use IPsec authentication•Use IPsec encryption
Demonstration: Configuring an iSCSI TargetIn this demonstration, you will see how to:•Add the iSCSI target server role service•Create two iSCSI virtual disks and an iSCSI target
Demonstration: Connecting to the iSCSI StorageIn this demonstration, you will see how to:•Connect to the iSCSI target•Verify the presence of the iSCSI drive
Considerations for Implementing iSCSI StorageConsider the following when designing your iSCSI storage solution:• Deploy the solution on fast networks• Design a highly available network infrastructure for your iSCSI
storage solution.• Design an appropriate security strategy for the iSCSI storage
solution• Follow the vendor-specific best practices for different types of
deployments• The iSCSI storage solution team must contain IT
administrators from different areas of specialization • Design application-specific iSCSI storage solutions together
with application-specific adminstrators, such as Exchange Server and SQL Server administrators
Lesson 2: Configuring BranchCache
How Does BranchCache Work?BranchCache RequirementsConfiguring BranchCache Server SettingsConfiguring BranchCache Client SettingsDemonstration: Configuring BranchCache•Monitoring BranchCache
How Does BranchCache Work?
Head Office Branch Office(Hosted Cache Mode)
Branch Office(Distributed Cache Mode)
BranchCache Requirements
Requirements for using BranchCache
Requirements for the modes
•Install the BranchCache feature or the BranchCache for Network Files feature on the server that is hosting the content
•Configure client computers by using either Group Policy or the netsh command
•In distributed cache mode, the content cache at a branch office is distributed between client computers
•In hosted cache mode, the content cache at the branch office is hosted on one or more server computers that are hosted cache servers
• Content versions:• V1 uses fixed file segment sizes• V2 uses smaller, variable size segments
Configuring BranchCache Server Settings
Install the BranchCache feature
Configuring the Web Server
1. Install BranchCache for Network Files role service
2. Enable BranchCache on the server
3. Enable BranchCache on file shares
Configuring the File Server
Add the BranchCache feature to the Windows Server 2012 server
Configuring the Hosted Cache Server
Configuring BranchCache Client Settings
To enable and configure BranchCache, do the following:
1. Enable BranchCache2. Enable distributed cache mode or hosted cache mode3. Configure the client firewall
You can modify BranchCache settings and perform additional configuration tasks, such as:• Setting the cache size• Setting the location of the hosted cache server• Clearing the cache• Creating and replicating a shared key for using in a server
cluster
Demonstration: Configuring BranchCache
In this demonstration, you will see how to:• Add BranchCache for the Network Files role service•Configure BranchCache in Local Group Policy Editor• Enable BranchCache for a file share
Monitoring BranchCache
The BranchCache monitoring tools include:•Get-BCStatus Windows Powershell cmdlet•Netsh branchcache shows status command• Event Viewer• Performance monitor counters
Lesson 3: Optimizing Storage Usage
What Is FSRM?What Is File Classification Management?What Are File Classification Properties?What Is a File Classification Rule?Demonstration: How to Configure Classification ManagementConsiderations for Using File Classification Options for Storage Optimization in Windows Server 2012Options for Storage OptimizationDemonstration: Configuring Data Deduplication• What Is Tiered Storage?
What Is FSRM?
You can use the FSRM to manage and classify data that is stored on file servers
FSRM features New FSRM features
•File classification infrastructure
•File management tasks•Quota management•File screening management
•Storage reports
•DAC•Manual classification•Access-denied assistance•File management tasks•Automatic classification
What Is File Classification Management?
• Classification management allows you to use an automated mechanism to create and assign classification properties to files
Payroll.xlsx
Classification Rule
IsConfidential
What Are File Classification Properties?
Classification properties are configurable values that can be assigned to files• Classification properties can be any of the following:• Yes/No• Date/Time• Number• Multiple choice list• Ordered list• String• Multi-string
What Is a File Classification Rule?
A rule applies classification properties to files based on information about the fileA classification rule contains the following information:• Rule enabled/disabled• Rule scope• Classification mechanism• Property to assign• Additional classification parameters
Demonstration: How to Configure Classification ManagementIn this demonstration, you will see how to:•Create a classification property•Create a classification rule•Modify the classification schedule
Considerations for Using File Classification Options for Storage Optimization in Windows Server 2012• When using file classification, consider the following:• How classification properties are stored• Movement can affect a file classification’s properties• The classification management process exists only in
Windows Server 2008 R2 and newer• Classification rules can conflict• Classification management cannot classify certain files
Options for Storage Optimization
The following options are available for storage optimization:• File access auditing allows for auditing of files for regulatory compliance, forensic analysis, monitoring and troubleshooting access issues• NFS data stores allows a Windows-based computer to act as an NFS server and share files in heterogeneous environments• Data deduplication allows more data to be stored using less space by replacing redundant copies of files with a reference to a single copy
Demonstration: Configuring Data DeduplicationIn this demonstration, you will see how to:•Add the Data Deduplication role service•Enable data deduplication•Test data deduplication
What Is Tiered Storage?
•Tiered storage uses a virtual disk that consists of at least one SSD and one hard disk drive•Two tiers are created:• Faster Tier (all the SSDs)• Standard Tier (all the hard disk drives)
•Heavily accessed files are automatically moved to the faster tier•Parallelized repair allows data to be rebuilt after a disk failure•The virtual disk may be fixed or thin provisioned•Thin provisioning and trim is enabled by default
Lab A: Implementing Advanced File ServicesExercise 1: Configuring iSCSI Storage•Exercise 2: Configuring the File Classification Infrastructure
Logon Information
Virtual machines: 20412C-LON-DC120412C-LON-SVR120412C-LON-SVR2
User name: Adatum\AdministratorPassword: Pa$$w0rd
Estimated Time: 75 minutes
Lab Scenario
As the A. Datum Corporation has expanded, the requirements for managing storage and shared file access have also expanded. Although the cost of storage has decreased significantly over recent years, the amount of data produced by the A. Datum business groups has increased even faster. The organization is considering alternate ways to decrease the cost of storing data on the network, and is considering options for optimizing data access in the new branch offices. The organization would also like to ensure that data that is stored on the shared folders is limited to company data, and that it does not include unapproved file types. As a senior server administrator at A. Datum, you are responsible for implementing the new file storage technologies for the organization. You will implement iSCSI storage to provide a less complicated option for deploying large amounts of storage.
Lab Review
Why would you implement MPIO together with iSCSI? What problems would you solve with this approach?Why must you have the iSCSI initiator component?•Why would you configure file classification for documents located in a folder such as a Corporate Documentation folder?
Lab B: Implementing BranchCache
Exercise 1: Configuring the Main Office Servers for BranchCacheExercise 2: Configuring the Branch Office Servers for BranchCacheExercise 3: Configuring Client Computers for BranchCache• Exercise 4: Monitoring BranchCacheLogon Information
Virtual machines: 20412C-LON-DC120412C-LON-SVR220412C-LON-CL120412C-LON-CL2
User name: Adatum\AdministratorPassword: Pa$$w0rd
Estimated Time: 40 Minutes
Lab Scenario
The A. Datum Corporation has deployed a new branch office, which has a single server. To optimize file access in branch offices, you must configure BranchCache. To reduce WAN use out to the branch office, you must configure BranchCache to cache data retrieved from the head office. You will also implement FSRM to assist in optimizing file storage.
Lab Review
•When would you consider implementing BranchCache into your own organization?