{"id":158,"date":"2010-06-13T18:16:15","date_gmt":"2010-06-14T00:16:15","guid":{"rendered":"http:\/\/www.unifiedcomputingblog.com\/?p=158"},"modified":"2010-06-13T18:16:15","modified_gmt":"2010-06-14T00:16:15","slug":"private-isolated-vsans","status":"publish","type":"post","link":"http:\/\/www.unifiedcomputingblog.com\/?p=158","title":{"rendered":"Private Isolated VSANs?"},"content":{"rendered":"<p>Ok, so this isn&#8217;t really UCS related.\u00a0\u00a0 Just a random thought I had today while working on a lab project&#8230; why don&#8217;t we have Private VSANs?\u00a0\u00a0 As in, the same type of technology as Private VLANs (PVLANs)?<\/p>\n<p>First, some background.\u00a0\u00a0 Standard SAN best practice for access control is to use single-initiator\/single-target zoning.\u00a0\u00a0 This means that there&#8217;s one zone for each combination of host and storage, tape, virtualization platform, etc port.\u00a0\u00a0\u00a0 Some administrators think this is overkill, and create just a few zones of lots of initiators to single targets, but this is overall a bad idea.\u00a0\u00a0 The purpose of this post is not to argue for single-initiator zoning, since it&#8217;s accepted recommended practice.<\/p>\n<p>Private VLANs provide a method for simplifying access control within a L2 Ethernet domain, restricting access between nodes.\u00a0\u00a0 Community PVLANs allow communication only between members of the same community, and the promiscuous port(s).\u00a0\u00a0 This is actually fairly close to the idea of a fibre channel zone, with the distinction that fibre channel doesn&#8217;t have promiscuous ports.\u00a0\u00a0 Isolated PVLANs allow communication only between each individual node and the promiscuous port(s).\u00a0\u00a0 In a way, you could compare this to having a lot of nodes (initiators) zoned only to a single target node (target) in fibre channel &#8211; but without the administrative overhead of zoning.<\/p>\n<p>So, why not combine these approaches?\u00a0\u00a0 Having the concept of an Isolated Private VSAN would simplify some types of fibre channel deployments, by enforcing recommended practices around access control without the administrative overhead.\u00a0 In a smaller environment, you could simply create an Isolated Private VSAN to contain the ports for a given fabric &#8211; set the storage ports as promiscuous, and all node ports would be restricted to connecting only to the storage ports &#8211; and prevented from communicating with each other.\u00a0\u00a0 In fact, I&#8217;d imagine that this would be enforced with standard FC zoning (since that&#8217;s the hosts are expecting when they query the name server anyway) &#8211; really we&#8217;d just be automating the creation of the zones.\u00a0\u00a0 Cisco already does something similar by automatically creating zones when doing Inter-VSAN Routing (IVR).<\/p>\n<p>For slightly larger environments, I could even see adding in the idea of Community Private VSANs &#8211; whereby you group initiators and specify specific target (promiscuous) ports per community &#8211; without having to add additional VSANs.<\/p>\n<p>Now that I&#8217;m thinking out-loud, why not have isolated zones instead?\u00a0\u00a0 Mark a zone as &#8220;isolated&#8221;, and tag any necessary WWNs\/ports\/etc as promiscuous, and enforce the traditional zoning behind the scenes.<\/p>\n<p>True, this approach wouldn&#8217;t accomplish anything that traditional VSANs and zoning do not.\u00a0 The implementation would likely have to use traditional zoning behind the scenes.\u00a0\u00a0 Just as PVLANs aren&#8217;t used in every situation, nor would PVSANs, but I could definitely see some use cases here.\u00a0 So what do you think?\u00a0\u00a0 Am I completely insane?\u00a0\u00a0 Thoughts, comments, rebukes are all welcome.\u00a0 \ud83d\ude42<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Ok, so this isn&#8217;t really UCS related.\u00a0\u00a0 Just a random thought I had today while working on a lab project&#8230; why don&#8217;t we have Private VSANs?\u00a0\u00a0 As in, the same type of technology as Private VLANs (PVLANs)? First, some background.\u00a0\u00a0 Standard SAN best practice for access control is to use single-initiator\/single-target zoning.\u00a0\u00a0 This means that &hellip; <a href=\"http:\/\/www.unifiedcomputingblog.com\/?p=158\" class=\"more-link\">Continue reading <span class=\"screen-reader-text\">Private Isolated VSANs?<\/span><\/a><\/p>\n","protected":false},"author":2,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[5],"tags":[22,62],"class_list":["post-158","post","type-post","status-publish","format-standard","hentry","category-miscellaneous","tag-fc","tag-vsan"],"jetpack_featured_media_url":"","jetpack_sharing_enabled":true,"_links":{"self":[{"href":"http:\/\/www.unifiedcomputingblog.com\/index.php?rest_route=\/wp\/v2\/posts\/158","targetHints":{"allow":["GET"]}}],"collection":[{"href":"http:\/\/www.unifiedcomputingblog.com\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"http:\/\/www.unifiedcomputingblog.com\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"http:\/\/www.unifiedcomputingblog.com\/index.php?rest_route=\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"http:\/\/www.unifiedcomputingblog.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=158"}],"version-history":[{"count":0,"href":"http:\/\/www.unifiedcomputingblog.com\/index.php?rest_route=\/wp\/v2\/posts\/158\/revisions"}],"wp:attachment":[{"href":"http:\/\/www.unifiedcomputingblog.com\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=158"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"http:\/\/www.unifiedcomputingblog.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=158"},{"taxonomy":"post_tag","embeddable":true,"href":"http:\/\/www.unifiedcomputingblog.com\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=158"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}