Solved

SAN - physical vs logical distinction of LUNs

Posted on 2013-06-14
4
299 Views
Last Modified: 2013-06-20
Let's say 10 organizations have their SAN storage in one central location. Their LUNs are all logically seperated out, but they are all part of the same physical SAN.

1)If the 10 entities are all maintaining their own private data collections, is there any vulnerability for the data? Is Logical seperation enough?

2)Would it be cost-prohibitive for each organization to have their own SAN physically distinct from the others.

Thanks.
0
Comment
Question by:25112
  • 2
4 Comments
 
LVL 119

Assisted Solution

by:Andrew Hancock (VMware vExpert / EE MVE^2)
Andrew Hancock (VMware vExpert / EE MVE^2) earned 333 total points
ID: 39248783
1. Yes, you would need very tight security controls, to prevent LUNs be accessible from other organisations.

2. Storage virtualisation is much cheaper, than all organisations having their own SAN.
0
 
LVL 5

Author Comment

by:25112
ID: 39249247
>>1. Yes, you would need very tight security controls, to prevent LUNs be accessible from other organisations.

what would be the standards for these tight security controls.. can you suggest any link i can read about this?

>>2. Storage virtualisation is much cheaper, than all organisations having their own SAN.
can you please give a money figure example (approximate) so i can understand what extent
0
 
LVL 119

Assisted Solution

by:Andrew Hancock (VMware vExpert / EE MVE^2)
Andrew Hancock (VMware vExpert / EE MVE^2) earned 333 total points
ID: 39249290
depends on the SAN, Fibre Channel or iSCSI.

If Fibre Channel it would be controlled by Zoning and HBA WWNN, if iSCSI it would be controlled by CHAP Secrets (a password to access the iSCSI LUN), and IQN/HBA node names.

see here
vSphere Storage Guide

£20-£25k per Single SAN approx 14TB RAW - e.g. Dell EqualLogic 4100
0
 
LVL 55

Accepted Solution

by:
andyalder earned 167 total points
ID: 39253193
Data security is covered by LUN masking so they can't access each others LUN. That doesn't do anything for performance though, if one of them runs IOmeter all day (or stressful SQL queries) performance for the other companies may suffer.
0

Featured Post

Ransomware-A Revenue Bonanza for Service Providers

Ransomware – malware that gets on your customers’ computers, encrypts their data, and extorts a hefty ransom for the decryption keys – is a surging new threat.  The purpose of this eBook is to educate the reader about ransomware attacks.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Suggested Solutions

Title # Comments Views Activity
Power and BTU ratings calculation 13 74
HP Server -- RAID health, etc ? 2 33
VMware 6.5:  USB devices 16 62
Changing partitions on external drive, Windows 10 12 35
This is an issue that we can get adding / removing permissions in the vCSA 6.0. We can also have issues searching for users / groups in the AD (using your identify sources). This is how one of the ways to handle this issues and fix it.
In this article we will learn how to backup a VMware farm using Nakivo Backup & Replication. In this tutorial we will install the software on a Windows 2012 R2 Server.
This tutorial will walk an individual through the process of installing the necessary services and then configuring a Windows Server 2012 system as an iSCSI target. To install the necessary roles, go to Server Manager, and select Add Roles and Featu…
How to install and configure Citrix XenApp 6.5 - Part 1. In this video tutorial we have explained step by step installation of Citrix XenApp 6.5 Server on Windows Server 2008 R2 is explained in this video. We have explained the difference between…

823 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question