Solved

netapp filer snapmirror tunneling with ssh

Posted on 2008-10-16
10
1,980 Views
Last Modified: 2013-11-05
Hello all,

Can any one please give me some info if snapmirror can be tunneled over ssh? I am trying to do that and then while searching for some info I came across some comments mentioning that it is not possible.

Thanks
0
Comment
Question by:naufal
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
  • 6
  • 4
10 Comments
 
LVL 30

Expert Comment

by:Duncan Meyers
ID: 22737053
No, it can't. It uses a straight IP connection, so the only way you can send it through an encrypted tunnel is to set up a VPN and send the traffic down that. Having said that, I thought SnapMirror encrypted replication traffic by default - but that may depend on the filer model and version of DataONTAP you're running.
0
 

Author Comment

by:naufal
ID: 22737070
Hi,

Thanks for your reply. Can you please tell me some source from where I can get this documented for my boss!!! Also what exactly do you mean by straight IP conenction? like straight as in straight no tunneling or some thing. I'll check on the netapp website about the filer model and data ontap version to see if encryption is possible in any of the model. Netapp support never mentioned this fact that it might be supoprted on any other filer models or Data ontap version.

Thanks a bunch again! I was trying to do this for days! thought should be pretty straight forward.
0
 
LVL 30

Expert Comment

by:Duncan Meyers
ID: 22737148
My apologies - SnapMirror does not encrypt traffic. See: http://now.netapp.com/NOW/cgi-bin/bol?Type=Detail&Display=75206

SnapMirror either uses a Fibre Channel connection or IP - it expects to be able to talk to another NetApp array either via FC or IP. You configure the IP addresses of the other NetApp array when you configure SnapMirror and it uses TCP to communicate.
0
Edgartown IT Case Study

Learn about Edgartown's quest to ensure the safety and security of the entire town's employee and citizen data. Read the case study!

 

Author Comment

by:naufal
ID: 22737167
Please correct me if I a wrong but does the SSH tunnel also not use IP. ITs just that the traffic is encrypted beneath no? What Ia am doing is that instead of directly giving the IP of the source filer which would be another private IP I am telling the destination filer the IP of my machine which has SSH tunnel up for the source filer.

Regards
0
 
LVL 30

Expert Comment

by:Duncan Meyers
ID: 22738083
Yes, of course it does - but it has to be invisible to the filers - like a VPN tunnel.
0
 

Author Comment

by:naufal
ID: 22741540
so does is invisible in case of SSH tunnel!? May be is it that source filer makes an arbitrary connection back to destination filer which SSH tunnel cannot handle? But as far as I know, its the destination filer which connects to the source at port 10566 to initiate the transfer.



0
 
LVL 30

Expert Comment

by:Duncan Meyers
ID: 22754377
Perhaps you've got a routing issue or port 10566 isn't going across the tunnel. See http://communities.netapp.com/thread/2171;jsessionid=4FFB40AE0AEAB790753734F98B4C5AE8?tstart=0

0
 
LVL 30

Accepted Solution

by:
Duncan Meyers earned 50 total points
ID: 22754390
0
 

Author Comment

by:naufal
ID: 22761664
Hey,

Thanks, I got it!!! it was not only port 10566 but others as well.

Thanks,

0
 
LVL 30

Expert Comment

by:Duncan Meyers
ID: 22761675
Thanks! Glad I could help.
0

Featured Post

[Webinar] Code, Load, and Grow

Managing multiple websites, servers, applications, and security on a daily basis? Join us for a webinar on May 25th to learn how to simplify administration and management of virtual hosts for IT admins, create a secure environment, and deploy code more effectively and frequently.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Suggested Solutions

Title # Comments Views Activity
Dropbox for Free 5 92
Can I clone an SSD to a SATA? 12 93
Dell PowerEdge R620 with Perc H310 Raid Controller 6 105
NAS backup-- 5 63
I previously wrote an article addressing the use of UBCD4WIN and SARDU. All are great, but I have always been an advocate of SARDU. Recently it was suggested that I go back and take a look at Easy2Boot in comparison.
Many businesses neglect disaster recovery and treat it as an after-thought. I can tell you first hand that data will be lost, hard drives die, servers will be hacked, and careless (or malicious) employees can ruin your data.
This video teaches viewers how to encrypt an external drive that requires a password to read and edit the drive. All tasks are done in Disk Utility. Plug in the external drive you wish to encrypt: Make sure all previous data on the drive has been …
Viewers will learn how to properly install and use Secure Shell (SSH) to work on projects or homework remotely. Download Secure Shell: Follow basic installation instructions: Open Secure Shell and use "Quick Connect" to enter credentials includi…
Suggested Courses

710 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question