NCSU. We deserve a 2012 exam for 12. Configure an advanced Windows server
2012 Service's module two mile due to we're gonna talk about implementing advanced file service is
unless and warned, we're gonna talk about configure a nice cars the Internet stomachs Internets causes storage
is a lesson to you. Wanna talk about configured in branch cash?
There we are. The lab Come for guys cause its target on configuring brain cash clients, settings Unless you want conflict, guys causes storage.
I go where? The story is very important
to most organizations today.
One of the great concern is connection between the storage on the remote
between the storage between the clients.
Storage on the remote disc
ice caused the story you in December 2012. It's cost effective
that allow you to create connection between the server and storage.
forced to be able to properly Lana by ice, causing most room.
We must be friendly with ice cosy architecture and components.
You have to also be a familiar with tools that provided
the Windows server to implement ice cause it based storage.
Ice cores Your internist causes his protocol
that support access to remove its scars. EBay storage devices over TCP Happy Network.
So this ice caused the protocol arc and carry Scotty commands over I p Networks.
You can use it to facilitate data transfer over the Internet,
Internet on to manage storage over long distances.
So I suppose it can be used to transfer data over your land, local area network or by your wine. Why they were network on over the Internet.
There's a good news of ice cosy. This reason wise, a little bit cost it cost effective. It relies on your Internet network architecture.
Ah, most organized. A shar is out the Ethernet network architecture. Anyway, that's just empty you're using. You don't need any specialized hardware such as H B A or specialized network devices. You don't need them.
Then we were gonna look at ice cosy.
I scored the component of ice causes. Next. What are the components of ice? Kasey,
you have I P Network. He provides I performance of redundancy.
We have ice cozy target.
It's one of storage devices.
I'm provide access to the disk
ice cores initiator most.
This also adapted on the server or or software component I provide. I access
toe ice, cozy our tests,
I be I Q and his global unique Identify. Used to address initiators on target on ice causing networks.
Ice cozy Tag IT server.
This is available as a roll service in Windows Server 2012.
High scores. His target server can be used to create ice cores, the Target
You're several manager can be used to manage I scores the target on Virtual disc
in December 2012. Also provide additional features such as lab environment to test software.
Okay, bye. Uses ice cosy. Allow you to test software the lab environment.
Also the network this less boot Also
ice cause initiator,
this is a star By devote for the fall since Windows Server
you can use to connect your computer to a nice cosy target.
All you have to do started Microsoft vice our skulls initiator service. Then come figure it
if you're on the window. Several 2012 you have new futures such as
such as a tent occassion using Chapo are a neighbor. Reverse chap ice coz he also give you my availability.
What does that mean? You have to create more than one connection to your scores. This story to provide redundancy. Kiss one line goes down.
We have two technologies we can use for I availability. One of them is the M C s
You feel there are call outstanding ice cores It commands are reassigned to another connection automatically If it using M C s
the connections are be routed
so another connection automatically
If you have multiple network interface cards,
your ice cores initiators and stop target server, you can use M p I O
to provide for tolerance,
Philo, fault, tolerance in case of network failure.
Let's look our security options. We have a nice cozy.
For example, we are nice cozy provide access to historic device of a T c p I. P.
Because of that is, um is a high target for militias attacks all Hakkas.
Okay, they like your target
that well, you must have some of security to protect your data.
Well, to protect, use an I P sec encryption.
Hi, P circle. Happy security. I'd be sick.
Gives you a 10 tiki or 10 to city
Your days and krypton if you use I p sick. Also, you can use I p sec authentication.
I placed a call to indication. Includes capers. Capers
certificates. Appreciate key.
You can also use chap authentication.
No, it was Chappell is challenge on shake authentication protocol.
When you are using chopper, you wanna access a resource? Resource it JJ, it's sense you challenge Question
those challenge question. If you answer them correctly, you be given access.
Are the security option We have a nice causes. Disable are needed on necessary Service is your service is you don't need disabled them.
Nothing. You can also do secure your management console console used to manage ice cause you make sure you secure it.
You can also segregate ice causes Sanchar No,
you can have multiple china and also segregate them