HP StorageWorks 4000/6000/8000 .HP StorageWorks SAN Design Reference Guide, Pa - Page 359

Security, Software and hardware iSCSI initiators, Bridging and routing

Page 359 highlights

• Maximum size of the data payload • Support for unsolicited data • Time-out values During iSCSI login, the initiator and target also exchange nonnegotiable values such as names and aliases. During an iSCSI session, unique session IDs are created for the initiator and target: 1. An initiator creates a unique ID by combining its iSCSI name with an ISID. 2. During login, the initiator sends the ISID to the target. 3. The target creates a unique ID by combining its iSCSI name with a TSID. The target sends the TSID to the initiator. When login is complete, the iSCSI session enters the full-feature phase with normal iSCSI transactions. Security Because iSCSI must accommodate untrusted IP environments, the specification for the iSCSI protocol defines multiple security methods: • Encryption solutions that reside below the iSCSI protocol, such as IPsec, require no special nl negotiation between iSCSI end devices and are transparent to the upper layers. • The iSCSI protocol, which has several encryption solutions including: • Kerberos • Public/private key exchanges Security solutions can include an iSNS server that acts as a repository for public keys. Text fields mediate the negotiation for the type of security supported by the end devices. If the negotiation is successful, the devices format their communications to follow the negotiated security routine. Software and hardware iSCSI initiators An IP host can access an iSCSI environment using one of the following initiators: • Software iSCSI initiator-The iSCSI code runs on the host and allows an Ethernet NIC to handle iSCSI traffic. Software iSCSI offers low cost with a performance penalty and CPU overhead. Software iSCSI initiators are available from many vendors. • TOE NIC-Shifts processing of the communications protocol stack (TCP/IP) from the server processor to the NIC, lowering CPU overhead and use. • Hardware iSCSI initiator (iSCSI HBA)-A high-performance HBA integrates both TCP/IP and iSCSI functions. Although integration adds cost to the HBA, it also provides high-speed iSCSI transport and minimal CPU overhead. The HBA transfers SCSI commands and data encapsulated by iSCSI directly to the host. Bridging and routing iSCSI routers and bridges are gateway devices that connect storage protocols such as Fibre Channel or SCSI to IP networks. iSCSI routers and bridges enable block-level access across networks. Routing data requests from an IP network device to a Fibre Channel device involves these steps: 1. An iSCSI host makes a storage data request. SAN Design Reference Guide 359

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • 148
  • 149
  • 150
  • 151
  • 152
  • 153
  • 154
  • 155
  • 156
  • 157
  • 158
  • 159
  • 160
  • 161
  • 162
  • 163
  • 164
  • 165
  • 166
  • 167
  • 168
  • 169
  • 170
  • 171
  • 172
  • 173
  • 174
  • 175
  • 176
  • 177
  • 178
  • 179
  • 180
  • 181
  • 182
  • 183
  • 184
  • 185
  • 186
  • 187
  • 188
  • 189
  • 190
  • 191
  • 192
  • 193
  • 194
  • 195
  • 196
  • 197
  • 198
  • 199
  • 200
  • 201
  • 202
  • 203
  • 204
  • 205
  • 206
  • 207
  • 208
  • 209
  • 210
  • 211
  • 212
  • 213
  • 214
  • 215
  • 216
  • 217
  • 218
  • 219
  • 220
  • 221
  • 222
  • 223
  • 224
  • 225
  • 226
  • 227
  • 228
  • 229
  • 230
  • 231
  • 232
  • 233
  • 234
  • 235
  • 236
  • 237
  • 238
  • 239
  • 240
  • 241
  • 242
  • 243
  • 244
  • 245
  • 246
  • 247
  • 248
  • 249
  • 250
  • 251
  • 252
  • 253
  • 254
  • 255
  • 256
  • 257
  • 258
  • 259
  • 260
  • 261
  • 262
  • 263
  • 264
  • 265
  • 266
  • 267
  • 268
  • 269
  • 270
  • 271
  • 272
  • 273
  • 274
  • 275
  • 276
  • 277
  • 278
  • 279
  • 280
  • 281
  • 282
  • 283
  • 284
  • 285
  • 286
  • 287
  • 288
  • 289
  • 290
  • 291
  • 292
  • 293
  • 294
  • 295
  • 296
  • 297
  • 298
  • 299
  • 300
  • 301
  • 302
  • 303
  • 304
  • 305
  • 306
  • 307
  • 308
  • 309
  • 310
  • 311
  • 312
  • 313
  • 314
  • 315
  • 316
  • 317
  • 318
  • 319
  • 320
  • 321
  • 322
  • 323
  • 324
  • 325
  • 326
  • 327
  • 328
  • 329
  • 330
  • 331
  • 332
  • 333
  • 334
  • 335
  • 336
  • 337
  • 338
  • 339
  • 340
  • 341
  • 342
  • 343
  • 344
  • 345
  • 346
  • 347
  • 348
  • 349
  • 350
  • 351
  • 352
  • 353
  • 354
  • 355
  • 356
  • 357
  • 358
  • 359
  • 360
  • 361
  • 362
  • 363
  • 364
  • 365
  • 366
  • 367
  • 368
  • 369
  • 370
  • 371
  • 372
  • 373
  • 374
  • 375
  • 376
  • 377
  • 378
  • 379
  • 380
  • 381
  • 382
  • 383
  • 384
  • 385
  • 386
  • 387
  • 388
  • 389
  • 390
  • 391
  • 392
  • 393
  • 394
  • 395
  • 396
  • 397
  • 398
  • 399
  • 400
  • 401
  • 402
  • 403
  • 404
  • 405
  • 406
  • 407
  • 408
  • 409
  • 410
  • 411
  • 412
  • 413
  • 414
  • 415
  • 416
  • 417
  • 418
  • 419
  • 420
  • 421
  • 422
  • 423
  • 424
  • 425
  • 426
  • 427
  • 428
  • 429
  • 430
  • 431
  • 432
  • 433
  • 434
  • 435
  • 436
  • 437
  • 438
  • 439
  • 440
  • 441
  • 442
  • 443
  • 444
  • 445
  • 446
  • 447
  • 448
  • 449
  • 450
  • 451
  • 452
  • 453
  • 454
  • 455
  • 456

Maximum size of the data payload
Support for unsolicited data
Time-out values
During iSCSI login, the initiator and target also exchange nonnegotiable values such as names and
aliases.
During an iSCSI session, unique session IDs are created for the initiator and target:
1.
An initiator creates a unique ID by combining its iSCSI name with an ISID.
2.
During login, the initiator sends the ISID to the target.
3.
The target creates a unique ID by combining its iSCSI name with a TSID. The target sends the
TSID to the initiator.
When login is complete, the iSCSI session enters the full-feature phase with normal iSCSI transactions.
Security
Because iSCSI must accommodate untrusted IP environments, the specification for the iSCSI protocol
defines multiple security methods:
Encryption solutions that reside below the iSCSI protocol, such as IPsec, require no special
nl
negotiation between iSCSI end devices and are transparent to the upper layers.
The iSCSI protocol, which has several encryption solutions including:
Kerberos
Public/private key exchanges
Security solutions can include an iSNS server that acts as a repository for public keys.
Text fields mediate the negotiation for the type of security supported by the end devices. If the
negotiation is successful, the devices format their communications to follow the negotiated security
routine.
Software and hardware iSCSI initiators
An IP host can access an iSCSI environment using one of the following initiators:
Software iSCSI initiator
The iSCSI code runs on the host and allows an Ethernet NIC to handle
iSCSI traffic. Software iSCSI offers low cost with a performance penalty and CPU overhead.
Software iSCSI initiators are available from many vendors.
TOE NIC
Shifts processing of the communications protocol stack (TCP/IP) from the server processor
to the NIC, lowering CPU overhead and use.
Hardware iSCSI initiator
(iSCSI HBA)
A high-performance HBA integrates both TCP/IP and iSCSI
functions. Although integration adds cost to the HBA, it also provides high-speed iSCSI transport
and minimal CPU overhead. The HBA transfers SCSI commands and data encapsulated by iSCSI
directly to the host.
Bridging and routing
iSCSI routers and bridges are gateway devices that connect storage protocols such as Fibre Channel
or SCSI to IP networks. iSCSI routers and bridges enable block-level access across networks. Routing
data requests from an IP network device to a Fibre Channel device involves these steps:
1.
An iSCSI host makes a storage data request.
SAN Design Reference Guide
359