Solved

Protocols required or useful on iSCSI NIC/HBA?

Posted on 2010-11-11
5
1,914 Views
Last Modified: 2012-05-10
We have a NIC dedicated to WAN traffic, management, etc (this NIC has the gateway in it). We have separate NICs for iSCSI traffic. Right now they are in the same subnet though that may change.

In looking at the NIC properties for the iSCSI NICs, the following are enabled/checked and we are wondering if they are needed or useful (for traffic, access, monitoring, etc):

Client for Microsoft Networks
QOS Packet Scheduler
File and Print Sharing for Microsoft Networks
IPv4 (yes of course it's needed)
Link-Layer Topology Discovery Mapper I/O Driver
Link-Layer Topology Discovery Responder
0
Comment
Question by:MrVault
  • 3
  • 2
5 Comments
 
LVL 23

Accepted Solution

by:
jakethecatuk earned 250 total points
ID: 34112585
If you have a dedicated NIC for iSCSU, you only need IPv4 - everything else is just MS bloat.



0
 

Author Comment

by:MrVault
ID: 34112626
do you know if I turn off all the extras the NIC will reset it's connection or anything? our servers are on 24/7.
0
 
LVL 23

Expert Comment

by:jakethecatuk
ID: 34112657
the NIC shouldn't reset itself or the connection.

0
 

Author Comment

by:MrVault
ID: 34136104
Thanks Jake. I did that and it didn't cause any issues.
0
 

Author Comment

by:MrVault
ID: 34136108
We also disabled netbios and set the NIC to not register with DNS.
0

Featured Post

Google Storage: Standard vs. Nearline vs. Coldline

Google Cloud Storage has a number of classes to choose from. Although there are a lot in common, they vary in price and usage terms. This post explains Google Cloud Storage classes and helps to understand which  one to choose.

Join & Write a Comment

Even if you have implemented a Mobile Device Management solution company wide, it is a good idea to make sure you are taking into account all of the major risks to your electronic protected health information (ePHI).
When it comes to security, there are always trade-offs between security and convenience/ease of administration. This article examines some of the main pros and cons of using key authentication vs password authentication for hosting an SFTP server.
This tutorial will walk an individual through the process of installing the necessary services and then configuring a Windows Server 2012 system as an iSCSI target. To install the necessary roles, go to Server Manager, and select Add Roles and Featu…
This video gives you a great overview about bandwidth monitoring with SNMP and WMI with our network monitoring solution PRTG Network Monitor (https://www.paessler.com/prtg). If you're looking for how to monitor bandwidth using netflow or packet s…

746 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

12 Experts available now in Live!

Get 1:1 Help Now