Dell Compellent FS8600

Similar documents
Dell Fluid File System Version 6.0 Support Matrix

Dell Fluid File System. Version 6.0 Support Matrix

Dell Compellent FS8600. Dell Compellent Best Practices

DELL EQUALLOGIC FS7500 INTEGRATION WITHIN A LINUX ENVIRONMENT

Dell Compellent Storage Center

Dell FluidFS Version 6.0 FS8600 Appliance Deployment Guide

Dell FS8600 with VMware vsphere

DELL POWERVAULT NX3500 INTEGRATION WITHIN A MICROSOFT WINDOWS ENVIRONMENT

DELL POWERVAULT NX3500. A Dell Technical Guide Version 1.0

Configuring a Microsoft Windows Server 2012/R2 Failover Cluster with Storage Center

Dell Fluid File System Version 5.0 Support Matrix

Reference Architecture for Dell VIS Self-Service Creator and VMware vsphere 4

Dell FluidFS Version 6.0. FS8600 Appliance. Firmware Update Guide

Dell FluidFS 6.0 FS8600 Appliance CLI Reference Guide

Cisco Nexus Switch Configuration Guide for Dell SC Series SANs. Dell Storage Engineering August 2015

Deployment of Dell M6348 Blade Switch with Cisco 4900M Catalyst Switch (Simple Mode)

FluidFS Antivirus Integration

Deployment of VMware Infrastructure 3 on Dell PowerEdge Blade Servers

Configuring Direct-Connect between a DR Series System and Backup Media Server

Dell Networking S60 and Dell Force10 S60

Maintaining High Availability for Enterprise Voice in Microsoft Office Communication Server 2007

EMC Unity Family EMC Unity All Flash, EMC Unity Hybrid, EMC UnityVSA

IBM Spectrum NAS Version Network Guide IBM SC

Best Practices for Deploying a Mixed 1Gb/10Gb Ethernet SAN using Dell EqualLogic Storage Arrays

Dell Storage Manager 2016 R3 Installation Guide

Configuring Web Cache Services By Using WCCP

Storage Manager 2018 R1. Installation Guide

Dell Compellent FS8600: CIFS File Server Consolidation Guide. A Dell Compellent Technical Tip

Using Dell Repository Manager to Update Your Local Repository

OnCommand Cloud Manager 3.2 Deploying and Managing ONTAP Cloud Systems

A Dell Interoperability Whitepaper Victor Teeter

Deployment of VMware ESX 2.5.x Server Software on Dell PowerEdge Blade Servers

Lenovo ThinkSystem NE Release Notes. For Lenovo Cloud Network Operating System 10.6

CounterACT 7.0 Single CounterACT Appliance

Dell Compellent Storage Center. Microsoft Server 2008 R2 Hyper-V Best Practices for Microsoft SCVMM 2012

Gigabit Managed Ethernet Switch

Using Switches with a PS Series Group

vsphere Networking Update 1 ESXi 5.1 vcenter Server 5.1 vsphere 5.1 EN

Dell Networking S4048-ON

Dell Fluid File System Overview

Cisco ISE Ports Reference

Microsoft SharePoint Server 2010 on Dell Systems

SCOM 2012 with Dell Compellent Storage Center Management Pack 2.0. Best Practices

EqualLogic Storage and Non-Stacking Switches. Sizing and Configuration

Microsoft SQL Server in a VMware Environment on Dell PowerEdge R810 Servers and Dell EqualLogic Storage

Cisco ISE Ports Reference

Gigabit Managed Ethernet Switch

Gigabit Managed Ethernet Switch

Configuring Cache Services Using the Web Cache Communication Protocol

Cisco ISE Ports Reference

Hitachi HQT-4210 Exam

A Dell technical white paper By Fabian Salamanca, Javier Jiménez, and Leopoldo Orona

Dell PowerVault Best Practices Series. Deploying the Dell PowerVault NX3500 in a CIFS Environment A Dell Technical White Paper

vstart 50 VMware vsphere Solution Specification

Dell OpenManage Essentials Device Support

Disaster Recovery Solutions Guide

GUIDE. Optimal Network Designs with Cohesity

UDP Director Virtual Edition Installation and Configuration Guide (for Stealthwatch System v6.9.0)

A Dell Technical White Paper PowerVault MD32X0, MD32X0i, and MD36X0i Series of Arrays

Cisco ISE Ports Reference

Dell Networking N4000 Series and Dell PowerConnect 8100 Series

Reference Architecture: XenMobile with NetScaler

A Dell Technical White Paper Dell Virtualization Solutions Engineering

vsphere Networking Update 2 VMware vsphere 5.5 VMware ESXi 5.5 vcenter Server 5.5 EN

Running Milestone XProtect with the Dell FS8600 Scale-out File System

Cloud Services. Introduction

ASIT-33018PFM. 18-Port Full Gigabit Managed PoE Switch (ASIT-33018PFM) 18-Port Full Gigabit Managed PoE Switch.

Ports and Protocols. Clearswift SECURE ICAP Gateway v4.8. Version 2.0. July Clearswift Public

Cisco HyperFlex Systems

Dell Compellent Storage Center with CommVault Simpana 9.0. Best Practices

Reference Architecture

CounterACT 7.0. Quick Installation Guide for a Single Virtual CounterACT Appliance

Firepower Threat Defense Cluster for the Firepower 4100/9300

Ports and Protocols. Clearswift SECURE ICAP Gateway v4.9. Version 2.3. November Clearswift Public

Cisco Nexus 1000V for KVM Interface Configuration Guide, Release 5.x

Best Practices for Configuring the Dell Compellent SMI-S Provider for Microsoft SCVMM 2012

Network Configuration Example

Reference Architecture. Modified on 17 AUG 2017 vrealize Operations Manager 6.6

VMware vsphere 4. Architecture VMware Inc. All rights reserved

Network-attached storage (NAS) is an

Microsoft Technical Solutions

IOPStor: Storage Made Easy. Key Business Features. Key Business Solutions. IOPStor IOP5BI50T Network Attached Storage (NAS) Page 1 of 5

24-Port: 20 x (100/1000M) SFP + 4 x Combo (10/100/1000T or 100/1000M SFP)

GS-2610G L2+ Managed GbE Switch

Veritas NetBackup Appliance Initial Configuration Guide

Dell Networking S3048-ON

Actual4Test. Actual4test - actual test exam dumps-pass for IT exams

Deployment of VMware ESX 2.5 Server Software on Dell PowerEdge Blade Servers

Cisco Nexus 1000V InterCloud

UDP Director Virtual Edition

Pass-Through Technology

vcloud Air - Virtual Private Cloud OnDemand Networking Guide

Ports and Protocols. Clearswift SECURE ICAP Gateway v4.3. Version 01 14/03/2016. Clearswift Public

Dell Networking N2000 Series

Setting Up the Dell DR Series System on Veeam

FGS-2616X L2+ Managed GbE Fiber Switches

Dell Networking S6000

Virtualization with Protection for SMBs Using the ReadyDATA 5200

Citrix XenServer with Dell SC Series Storage Configuration and Deployment

OpenManage TM Integration for VMware vcenter FAQ

Transcription:

Dell Compellent FS8600 Network-Attached Storage (NAS) Networking Best Practices Guide Dell Compellent Technical Solutions Group July 2013

THIS BEST PRACTICES GUIDE IS FOR INFORMATIONAL PURPOSES ONLY, AND MAY CONTAIN TYPOGRAPHICAL ERRORS AND TECHNICAL INACCURACIES. THE CONTENT IS PROVIDED AS IS, WITHOUT EXPRESS OR IMPLIED WARRANTIES OF ANY KIND. 2013 Dell Inc. All rights reserved. Reproduction of this material in any manner whatsoever without the express written permission of Dell Inc. is strictly forbidden. For more information, contact Dell. Dell, the DELL logo, and the DELL badge are trademarks of Dell Inc. Microsoft and Windows are either trademarks or registered trademarks of Microsoft Corporation in the United States and/or other countries. Other trademarks and trade names may be used in this document to refer to either the entities claiming the marks and names or their products. Dell disclaims any proprietary interest in the marks and names of others. ii

Table of Contents 1 Preface... 2 1.1 Audience... 2 1.2 Purpose... 2 1.2.1 Disclaimer... 2 1.3 Customer Support... 2 2 Introduction... 3 2.1 FS8600 networks... 3 2.2 FS8600 Internal Network... 4 2.3 FS8600 Primary Network (Client network)... 4 3 Network Switches Configuration... 5 3.1 Internal Switch Configuration... 5 3.2 Primary Switch Configuration... 6 4 Load Balancing... 9 4.1 Flat Network Configuration... 9 4.2 Routed Network Configuration... 10 4.3 Routed Network and Static Routes... 11 To add a static route via the FS8600 CLI run the following command:... 11 5 Additional Subnets... 12 5.1 Additional Subnets... 12 6 Network Services... 13 6.1 NTP... 13 7 Network Security... 14 7.1 Firewalled Environments... 14 8 Additional Resources... 17 iii

Document Revisions Table 1: Document revisions Date Revision Author Comments 7/2/13 1.0 Mordi Shushan Initial Release July 2013 FS8600 Networking Best Practices 1

1 Preface 1.1 Audience The audience for this document is intended to be systems, networking, storage or backup administrators who are responsible for the day-to-day management responsibilities of a Dell Compellent FS8600 environment. Proper management of an FS8600 requires administrators or teams of administrators capable of managing and configuring enterprise-class Fibre Channel SAN and Ethernet networks, any enterprise-grade backup software intended to be used, the Dell Compellent Storage Center itself, as well as general purpose NAS administration. 1.2 Purpose The purpose of this document is to cover specific implementation concepts or specifics related to the Dell Compellent FS8600 networking environment. It is not intended to be a primer or Dell Compellent FS8600 introductory resource for any of the subject matters involved, and it assumes at least introductory knowledge of many of the subjects covered in this document. This document should be used in conjunction with other Dell Compellent resources, such as the Dell Compellent Storage Center Connectivity Guide, FS8600 Admin Guide and Hardware Manual, Enterprise Manager 6 User Guide, or any other available documentation resources. 1.2.1 Disclaimer The information contained within this best practices document is intended to provide general recommendations only. Actual configurations in customer environments may vary due to individual circumstances, budget constraints, service level agreements, applicable industry-specific regulations, or other factors. Configurations should be tested before implementing them in a production environment. 1.3 Customer Support Dell Compellent provides live support at 1-866-EZSTORE (866.397.8673), 24 hours a day, 7 days a week, 365 days a year for current customers. For additional support, email Dell Compellent at support@compellent.com. Dell Compellent responds to emails during normal business hours. July 2013 FS8600 Networking Best Practices 2

2 Introduction 2.1 FS8600 networks The FS8600 utilizes three separate logical networks and two physical network segments to achieve maximum performance and security. Internal Network o Interconnect o Management Primary Network (Client Network) Figure 1: FS8600 networks diagram July 2013 FS8600 Networking Best Practices 3

2.2 FS8600 Internal Network The interconnect network s role is to provide communication between the cluster controllers to enable internal data transfer and heartbeat mechanism while maintaining low latency and maximum throughput. The interconnect segment is comprised of redundant gigabit Ethernet (1GbE) switches or 10GbE (depending on a model purchased) with dual connection to each controller creating a fully redundant mesh. In one appliance configuration the interconnect network is comprised of two back to back links. To achieve full high-availability and future easy scalability it s recommended to use redundant external switches. The management network s role is to provide internal logging, syslog mirroring and in some cases option for remote access. 2.3 FS8600 Primary Network (Client network) The primary network, also known as the client network, connects the FS8600 system to the customer network via gigabit Ethernet or 10GbE (depending on a model purchased) multiple ports. The primary network provides access to data from NFS and CIFS clients and also access to the NAS administration virtual IP (VIP). July 2013 FS8600 Networking Best Practices 4

3 Network Switches Configuration 3.1 Internal Switch Configuration The FS8600 requires the internal network switch configuration to support the following configuration: VLAN The interconnect network must live on a dedicated VLAN that is isolated from all other traffic and solely purposed for an individual cluster s interconnect traffic. This VLAN must be untagged on all switch ports connected to the FS8600 interconnect connectivity ports. MTU All switch ports connected to FS8600 interconnect connectivity ports must be enabled for Jumbo Frames (MTU equal to or greater than 9000). Spanning Tree Spanning tree must be disabled for all FS8600 interconnect ports. For many network vendor implementations, this will be called portfast or edge in the switch configuration semantics. Flow Control The FS8600 requires that all switch ports connected to the FS8600 interconnect interfaces have flow control enabled. The following is an example of how to configure Dell Force10 switches and Dell PowerConnect series (the same commands are applied to Dell PowerConnect series) s60>enable s60#configure s60(conf)#interface range gigabitethernet 0/0 47 s60(conf-if-range-gi-0/0-47)#mtu 9216 s60(conf-if-range-gi-0/0-47)#switchport s60(conf-if-range-gi-0/0-47)#flowcontrol rx on s60(conf-if-range-gi-0/0-47)#spanning-tree rstp edge-port s60(conf-if-range-gi-0/0-47)#no shutdown s60(conf-if-range-gi-0/0-47)#exit s60(conf)#exit s60#wr s60#reload July 2013 FS8600 Networking Best Practices 5

3.2 Primary Switch Configuration The FS8600 requires the primary network switch configuration to support the following configuration: VLAN The FS8600 primary network is VLAN-aware, meaning it is capable of understanding and communicating with VLAN tagged Ethernet frames, allowing it to address multiple networks across multiple VLANs at a time. VLAN Tagging If only tagged VLANs will be used for management and data, the FluidFS controllers need to be able to communicate with each other on the Client Network using untagged traffic. In other words, even if there is not a subnet configured to use untagged traffic, the switch must still allow untagged traffic/packets to pass. Blocking untagged traffic can cause issues with FluidFS during maintenance activities such as service pack upgrades, and controller replacement. The switch must be configured properly in its present state, otherwise the untagged and/or tagged VLAN would not be accessible. On Dell PowerConnect switches, this correlates to setting all of the frontend network ports to general mode, and then allowing the specific VLAN tags that are to be allowed to pass through. On Force10 switches, this correlates to using hybrid port mode. General mode (Dell PowerConnect) and hybrid mode (Dell Force10) will permit untagged traffic to pass through in addition to the tagged VLANs you specifically allowed. DO not use trunk mode, as trunk mode will only pass tagged traffic, and will disallow untagged traffic. MTU The FS8600 primary network supports Ethernet jumbo frames.environments can expect a degree of performance improvement, particularly where throughput is concerned. To change the MTU value (Defaults is set to 1500) on the cluster from the FS8600 CLI, run the following command: CLI> networking client-network-interface edit -MTU 9000 July 2013 FS8600 Networking Best Practices 6

Flow Control It is recommended, but not required, that all switch ports connected to the FS8600 primary network interfaces have flow control enabled. For more information regarding flow control and Storage Center, consult any Copilot Support Tech Alerts for the Storage Center configuration in question. Switch Topology An FS8600 appliance or cluster can only be as highly available or high performing as the switch infrastructure supporting it. Architecturally, three guiding principles can be used to construct a best practice switch connectivity topology: Avoid any single points of failure Ensure sufficient inter-switch throughput Make every client connectivity port in an FS8600 cluster available to any potential client ALB and LACP Mode An FS8600 appliance equipped with multiple network interface cards are bonded to sustain seamless link failure. FS8600 supports two bonding modes: Adaptive Load Balancing (ALB) Link Aggregation Control Protocol (LACP) The default bonding mode for the FS8600 is ALB which requires no switch configuration and exposes all bonded MAC addresses. For LACP, some switch configuration is required and only a single MAC address is exposed. The main benefit of using LACP in FluidFS is to reduce the number of required VIPs while maintaining efficient load balancing. July 2013 FS8600 Networking Best Practices 7

Setting up LACP mode When setting LACP you will need to perform the following configuration changes: In FluidFS, set one primary network VIP per FS8600 controller. In FluildFS, set up the bonding mode to LACP. In the primary network switch, all switches must be stacks and define one LACP trunk per FS8600 controller. Figure 2: FS8600 LACP configuration. To change the default bonding mode from ALB to LACP from the FluidFS CLi: CLI> networking client-network-interface edit -Mode LACP July 2013 FS8600 Networking Best Practices 8

4 Load Balancing KATANA_11 Host(A) record 172.16.26.42 KATANA_11 Host(A) record 172.16.26.51... Remote users DNS server Router/Firewall Layer 3 Switch Layer 3 Switch Application server Local Production Site KATANA_11 Figure 3: FS8600 in a routed network diagram 4.1 Flat Network Configuration In case of a flat network, meaning there are no Layer 3 switches or routers between the FS8600 and the clients on the primary network, the FS8600 will use an internal ARP-based load balancing mechanism. To achieve load balancing across multiple interfaces, the system uses a virtual IP and proxy ARP. This workload balancing method supports both inbound and outbound workloads. The proxy-arp protocol enables a host to provide ARP responses on behalf of other hosts. In order to support this, the destination hosts need to be configured with the proxy IP address, but should not answer broadcast ARP requests for that address. The system uses arp-filter and arp-tables to hide the proxy address so unicast ARP and other traffic are still served. To verify that clients connecting to the FS8600 are balanced across all system controllers from the FS8600 CLI, run the following command: July 2013 FS8600 Networking Best Practices 9

CLI> networking client-load-balancing list To verify a specific client connection to the FS8600, from the FS8600 CLI, run the following command (you will need to provide the client IP and the virtual IP used): CLI>networking client-load-balancing view 172.23.136.1 172.23.136.75 4.2 Routed Network Configuration Since ARP load balancing is only able to balance local network clients, the FS8600 utilizes DNS load balancing to balance clients connected across Layer 3 switches and routers. In essence the FS8600 storage system will serve several virtual IP addresses, based on the number of interfaces attached to the client network. The virtual IP addresses are distributed and balanced among the nodes and interfaces. The administrator defines these addresses as a round-robin group in the DNS server in the site. Clients use DNS lookup and thereby are balanced across all of the available nodes and NICs. When implementing a round robin DNS system, it is important to understand the caching relationships of all subsequent DNS systems between the round robin DNS server and the clients. July 2013 FS8600 Networking Best Practices 10

For example, if ns0.local and ns1.local are configured for Round Robin DNS but clients use ns0.office.local as their primary DNS target, ns0.office.local could possibly poll ns0.local to satisfy the request, but then cache the request and return the same value to the next client, hence removing the benefit of implementing Round Robin DNS. Some environments may see a benefit in keeping a short TTL value for the relevant DNS records for added overall flexibility. When allocating IPs and creating A record pools for round robin DNS, there should be at a minimum as many IPs and associated A records as there are interfaces in the FS8600 cluster. 4.3 Routed Network and Static Routes Routed networks provide an opportunity to enhance performance through a feature called static routes. This feature allows you to configure the exact paths in which the FS8600 storage system communicates with various clients on a routed network. To add a static route via the FS8600 CLI run the following command: CLI>networking static-routes add <DestinationNetworkID> <DestinationNetMask> <GatewayIP> July 2013 FS8600 Networking Best Practices 11

5 Additional Subnets 5.1 Additional Subnets The FS8600 is capable of supporting or living on large numbers of separate or distinct networks, also referred to as subnets. This can be beneficial for reasons such as consolidating established or legacy file servers, as well as following best practices for providing dedicated resources to specific client groups or environments. NDMP backups and replication should also be isolated to a dedicated network, and it is also suggested that where possible, networks should be isolated in a one to one fashion with VLANs. To add additional subnets you will need the following information: Subnet mask VLAN information, if applicable Private IPs one IP per FS8600 controller Public IP will be used as Virtual IP (VIP) CLI>networking subnets add 255.255.255.0 -VLANTag 0 -PrivateIPs 192.168.200.1,192.168.200.2 -PublicIPs 192.168.200.3 July 2013 FS8600 Networking Best Practices 12

6 Network Services 6.1 NTP The FS8600 can use the NTP to poll time information from authoritative outside sources. Generally, it is recommended that a minimum of two sources be used. Three or more sources is the suggested configuration. For FS8600 environments that will be integrated with Active Directory, the NTP sources should be the Active Directory domain controllers for the domain in question. To configure the time server for the Active Directory environment please refer to the following link: http://technet.microsoft.com/en-us/library/cc784800%28v=ws.10%29.aspx Cluster Quorum In the event that both the configured gateway and DNS hosts are unreachable, the ability to reach the configured NTP hosts is used as a cluster quorum voting mechanism. Because this mechanism is used in the event that DNS is unreachable, at least one of the time servers should be configured by IP as opposed to DNS. July 2013 FS8600 Networking Best Practices 13

7 Network Security 7.1 Firewalled Environments Many enterprise organizations have various layers of security within their network, often at their border, across different branches and work groups. Firewalls are used to implement access restrictions and Individual rules When deploying Dell F8600 in a firewalled environment we need to make sure that specific ports are allowing traffic. The list of ports are divided to two groups: Enterprise Manager and Data Collector ports FluidFS ports Data Collector Inbound Ports Port Protocol Name Purpose 514 UDP syslog Receiving logs forwarded from Storage Centers 3033 TCP Web Server port Receiving: Communication from all clients, including the Enterprise Manager client and Storage Replication Adapter (SRA) 5.5.3 Alerts from FluidFS clusters 8080 TCP Legacy web services port 7342 TCP Legacy client listener port 5988 TCP SMI-S over HTTP 5989 TCP SMI-S over HTTPS Receiving: Communication from Server Agents Alerts forwarded from Storage Centers Communication from Storage Replication Adapter (SRA) 3.3.1 Communicating with the remote Data Collector Providing automatic upgrade functionality for previous versions of the Enterprise Manager client Receiving unencrypted SMI-S communication Receiving encrypted SMI-S communication July 2013 FS8600 Networking Best Practices 14

Data Collector Outbound Ports Port Protocol Name Purpose 25 TCP SMTP Sending email notifications 443 TCP Storage center Communicating with: Managed Storage Centers Managed znas servers 514 UDP syslog Forwarding Storage Center logs to syslog servers 1433 TCP MS SQL server Connecting to an external Microsoft SQL Server database 3306 TCP MySQL Connecting to an external MySQL database 8080 TCP Vmware SDK Communicating with VMware servers 27355 TCP Server agent socket listening port Communicating with Server Agents 35451 TCP FluidFS Communicating with managed FluidFS clusters Enterprise Manager Client Ports Port Protocol name purpose 33 TCP Web Service Data Collector communication FluidFS Basic Ports Port Protocol Name 445 UDP CIFS/SMB 427 TCP and UDP SLP 2049-2049+(domain number - 1) TCP and UDP NFS 5001-5001+(domain number - 1) TCP and UDP mount 5051-5051+(domain number - 1) TCP and UDP quota 4050-4050+(domain number - 1) TCP and UDP NLM (lock manager) 4000-4000+(domain number - 1) TCP and UDP statd 111 TCP and UDP portmap 44421 TCP FTP 22 TCP SSH 80 TCP HTTP Web management HTTPS Web 443 TCP management 53 UDP DNS July 2013 FS8600 Networking Best Practices 15

FluidFS Additional Ports (Depends on NAS environment and services): Port Protocol Name 138 UDP NetBIOS 139 TCP NetBIOS 88 TCP Kerberos 88 UDP Kerberos 464 TCP Kerberos v5 464 UDP Kerberos v5 543 TCP Kerberos login 544 TCP Kerberos remote shell 749 TCP Kerberos administration 749 UDP Kerberos administration 135 TCP AD - RPC 711 UDP NIS 714 TCP NIS 389 TCP LDAP 389 UDP LDAP 3268 TCP LDAP global catalog 3269 TCP LDAP global catalog over TLS/SSL 636 TCP LDAP over TLS/SSL 123 UDP NTP 161 UDP SNMP Agent 162 TCP SNMP trap 10000 TCP NDMP 10560-10568 TCP Replication 1344 TCP Antivirus - ICAP 8004 TCP ScanEngine server WebUI (AV host) July 2013 FS8600 Networking Best Practices 16

8 Additional Resources Below are some links to additional resources: Dell Compellent Documentation Dell Compellent Replay Manager 7 Administrator's Guide Dell Compellent Enterprise Manager 6.3 Users Guide Dell Compellent Storage Center 6.3 Users Guide http://kc.compellent.com July 2013 FS8600 Networking Best Practices 17