Solved

How can i set up separate vlan for iscsi backups using unmanaged switches

Posted on 2014-11-10
2
206 Views
Last Modified: 2014-12-06
Hoping you can help me (and walk me through) a possible solution for each of our locations. I would like to separate the iscsi backups that are running (primarily at night) to an iscsi lun from the normal network lan traffic . I believe the best way would be to use managed switches, but if we have a few unmanaged GB switches is this possible? Can you provide an example or scenario on how to accomplish this? Do i need to set up a server or something to route traffic through since most of our switches are unmanaged at our locations? We are only backing up One Hyper-V server at each location to a synology diskstation nas. We can provide each location with a gb switch. Any help would be greatly appreciated.
0
Comment
Question by:GroundskeeperIt
2 Comments
 
LVL 20

Accepted Solution

by:
Svet Paperov earned 500 total points
ID: 40435174
Traffic isolation on a single switch is done via VLAN. On unmanaged switch VLAN cannot be configured. Another recommended (but not required) configuration for an iSCSI traffic is setting the Jumbo frames. This is also available on a managed switch only.

So, your only option is to use different switches for each iSCSI segment connected to different network adapters on the server side within dedicated IP subnets.

If the external device where the backup should go has two adapters, you can configure one in your primary network for management and another in the dedicated backup iSCSI subnet connected to the backup iSCSI switch and server NIC.
0
 

Author Closing Comment

by:GroundskeeperIt
ID: 40484856
Sorry for the late reply and closing of the issue. I'm going to apply all your suggestions as soon as i can budget in some unmanaged switches for each of our office's backups.
Thanks!
0

Featured Post

Is Your Active Directory as Secure as You Think?

More than 75% of all records are compromised because of the loss or theft of a privileged credential. Experts have been exploring Active Directory infrastructure to identify key threats and establish best practices for keeping data safe. Attend this month’s webinar to learn more.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Suggested Solutions

If you're not part of the solution, you're part of the problem.   Tips on how to secure IoT devices, even the dumbest ones, so they can't be used as part of a DDoS botnet.  Use PRTG Network Monitor as one of the building blocks, to detect unusual…
ADCs have gained traction within the last decade, largely due to increased demand for legacy load balancing appliances to handle more advanced application delivery requirements and improve application performance.
After creating this article (http://www.experts-exchange.com/articles/23699/Setup-Mikrotik-routers-with-OSPF.html), I decided to make a video (no audio) to show you how to configure the routers and run some trace routes and pings between the 7 sites…
Get a first impression of how PRTG looks and learn how it works.   This video is a short introduction to PRTG, as an initial overview or as a quick start for new PRTG users.

896 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

14 Experts available now in Live!

Get 1:1 Help Now