Brands
3Com
Alcatel-Lucent
Allied-Telesis
Avaya
Brocade
Cisco
D-Link
Dell
Emulex
Enterasys
Extreme
Force10
Foundry
H3C
HP
Huawei
Intel
Juniper
Linksys
Marconi
McAfee
Netgear
Nortel
Planet
Qlogic
Redback
SMC
Sun
TRENDnet
Vixel
ZTE
ZyXEL

Logical network isolation

To ensure that only valid initiators connect to storage arrays, administrators most commonly run iSCSI only over logically-isolated backchannel networks.

In this deployment architecture, only the management ports of storage arrays are exposed to the general-purpose internal network, and the iSCSI protocol itself is run over dedicated network segments or virtual LANs (VLAN). This mitigates authentication concerns; unauthorized users aren't physically provisioned for iSCSI, and thus can't talk to storage arrays. However, it also creates a transitive trust problem, in that a single compromised host with an iSCSI disk can be used to attack storage resources for other hosts.

July 27, 2011
Bestsellers
10GBASE-SR SFP+ 850nm 300m
SFP-10G-SR
5 out of 5 Stars! $175.00
5 out of 5 Stars!
1000BASE-SX SFP 850nm 550m
GLC-SX-MM
5 out of 5 Stars! $25.00
5 out of 5 Stars!
1000BASE-T SFP RJ45 100m
GLC-T
0 out of 5 Stars! $45.00
0 out of 5 Stars!
10GBASE-LR SFP+ 1310nm 10km
SFP-10G-LR
0 out of 5 Stars! $399.00
0 out of 5 Stars!