-
Essay / LUN Security Considerations in a SAN Environment
To my understanding, LUN security starts step by step1) In the storage array2) In the Fabric switch zoning3) Using host softwareLUN security in a storage array: Lun (logical unit number) Security starts in the storage array through 1) Registering the HBA in a storage array. 2) In Raid group (for data security) 3) Lun Masking: Registering the HBA in a storage array: A SCSI cable or Fiber Channel cable is connected to the front of the storage array. port directly from the HBA card or through the Fabric switch. We can register an HBA manually or the storage array host agent will automatically identify the WWN number of the HBA. For each storage array, there will be a failover mode to avoid single path failures. By registering HBAs in a storage array, no one else can access the data in the array except the hosts. When a LUN is mapped using the WWN number to the front-end ports of the storage array and to the WWN of the HBA. During the mapping, the server can see the storage LUN through the HBA WWN and storage front end port that were in the mapping. The server team can identify the LUN using its unique number to mount the drive on the server. To mount the LUN on the server, the server must be restarted or must be scanned using the host software (power path). Even if the storage node is moved, the server can still see the storage using other storage nodes added in the mapping. When installing or modifying more servers, we must be extremely careful. We need to be careful when adding the wwn and storage front-end ports of the HBA to the mapping. Sometimes the base servers do not support and coordinate with the remaining servers. The solution to this type of problem lies in masking. Create a storage group and add the LUN, HBA, and front-end port to it. Raid type: Mon data...... middle of paper ...... is done using the wwns node. The HBA node wwn and the storage node wwn are used to perform zoning. We can add additional HBA nodes if we want the server to see the storage array. Hard zoning is more secure than soft zoning. But software zoning is more flexible. Security using host software: Host software such as power path is used to manage multipathing and HBA node. It manages the paths between the storage array and the HBA server, it also performs load balancing. By using power path or any other host software, we can save data loss and maintain continuous data flow without any difficulty even after a path fails. Conclusion: The main problem faced in a one-to-one or one-to-many SAN connection environment is secure data. By implementing these methods with careful study, we will resolve and secure providing 99.99% security for LUN data protection..