Time
9 hours 48 minutes
Difficulty
Intermediate
CEU/CPE
10

Video Transcription

00:00
all right. So many times when we think of servers, we also, of course,
00:04
think of storage. Right. And we might think storage area networks. We might think of clusters. You know, this particular slide talks about storage area networks. You don't have to get really deep here, but, you know, when we're looking at storage area networks, what you'll see on the the exam
00:23
is you're gonna see I scuzzy. You're not gonna see Fibre Channel for whatever reason. So, you know, I scuzzy is really just an extension of the traditional scuzzy technologies, whereas,
00:37
you know, the scuzzy bus goes across the network as opposed to a cross controller within a controller.
00:43
But it's the same ideas. So the benefits here we still use the same protocols, the same technologies, the same cable types. It generally feels invisible to the user, right. They don't know that the
00:59
the storage network is at another location. It's just all very seamless.
01:04
One of the ways that we protect when we talk about the target, that's the actual storage location. And we want to protect that. We don't want to give out any more information that's necessary, because that's where our dad ever sides.
01:15
So with thy scuzzy, we use one's logical unit numbers, and that's basically a logical mapping to the actual physical
01:25
device. Avoid over oversubscription in scuzzy. You know, many times we say, OK, I've got 100 users, but what are the chances all 100 are gonna be using at that time? Just really not a good idea for efficiency
01:41
on that off chance it would happen. Scuzzy does not handle that well at all. So we make sure that we have, um,
01:49
that we have the resource is and we don't oversubscribed. We want our storage network on a dedicated network. Of course, we don't want this on the same network. Slowing traffic down. We want to keep efficiency and productivity up.
02:07
I scuzzy traffic is unencrypted,
02:10
as is almost everything by default. So we add encryption. I p sec is one of the ways that we encrypt traffic. Like we said, we're still using I p traffic. So
02:23
I was involved in setting up the communication managing the communication's key management. But we have to talk attack on security with ice scuzzy
02:32
and then for authentication. You know, we're gonna use the standard authentication mechanisms that we have core. Bruce, you know, chaps a little dated there, but there's, ah, secure public. He management there couple of other areas or other authentication protocols that we can use.
02:53
But the bottom line is we look to one that's secure because many are not secure
03:00
by default.

Up Next

Certified Cloud Security Professional (CCSP)

This Certified Cloud Security Professional (CCSP) certification course covers topics across six domains, to ensure the candidate has a wide range of competencies and is capable in the assessment and implementation of cloud service solutions.

Instructed By

Instructor Profile Image
Kelly Handerhan
Senior Instructor