0% found this document useful (0 votes)
15 views

Microsoft Official Course: Implementing Advanced File Services

Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
15 views

Microsoft Official Course: Implementing Advanced File Services

Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
You are on page 1/ 35

Microsoft Official Course

Module 2
Implementing Advanced File
Services
Module Overview

Configuring iSCSI Storage


Configuring BranchCache
• Optimizing Storage Usage
Lesson 1: Configuring iSCSI Storage

What Is iSCSI?
iSCSI Target Server and iSCSI Initiator
Implementing High Availability for iSCSI
iSCSI Security Options
Demonstration: Configuring an iSCSI Target
Demonstration: Connecting to the iSCSI Storage
• Considerations for Implementing iSCSI Storage
What Is iSCSI?

iSCSI transmits SCSI commands over IP networks

Component Description

Provides high performance and iSCSI client that


IP network runs the iSCSI
redundancy

TCP/IP protocol
Initiator

Run on the storage device and


iSCSI targets
enable access to the disks
A software component or host
iSCSI
adapter on the server that Storage
initiators
provides access to iSCSI targets Array

A globally unique identifier used


IQN to address initiators and targets iSCSI Target Server
on an iSCSI network
iSCSI Target Server and iSCSI Initiator

The iSCSI target server


• Is available as a role service in Windows Server 2012
• Provides the following features:
• Network/diskless boot
• Server application storage
• Heterogeneous storage
• Lab environments
• Windows Server 2012 R2 features include:
• Virtual disks
• Manageability
• Scalability limits
• Local mount functionality
• Support for VHDX
• Improved manageability
• Improved scalability
• Local mount functionality deprecated
iSCSI Target Server and iSCSI Initiator

The iSCSI initiator


• Runs as a service in the operating system
• Is installed by default on Windows 8 and Windows
Server 2012
• iSCSI targets can be discovered using multiple methods
that include:
• SendTargets
• iSNS
• Manually configured targets
• HBA discovery
Implementing High Availability for iSCSI

Two technologies for implementing iSCSI for high


availability are:
• MCS, in the event of a failure, all outstanding iSCSI
commands are reassigned to another connection
automatically
• MPIO, if you have multiple network interface cards in your
iSCSI initiator and iSCSI target server, you can use MPIO to
provide failover redundancy in the event of network
outages
iSCSI Security Options

Mitigate security risks to iSCSI by the following best


practices:
• Segregate the iSCSI SAN channel
• Secure management consoles
• Disable unneeded services
• Use CHAP authentication
• Use IPsec authentication
• Use IPsec encryption
Demonstration: Configuring an iSCSI Target

In this demonstration, you will see how to:


• Add the iSCSI target server role service
• Create two iSCSI virtual disks and an iSCSI target
Demonstration: Connecting to the iSCSI Storage

In this demonstration, you will see how to:


• Connect to the iSCSI target
• Verify the presence of the iSCSI drive
Considerations for Implementing iSCSI Storage

Consider the following when designing your iSCSI


storage solution:
• Deploy the solution on fast networks
• Design a highly available network infrastructure for your iSCSI storage
solution.
• Design an appropriate security strategy for the iSCSI storage solution
• Follow the vendor-specific best practices for different types of
deployments
• The iSCSI storage solution team must contain IT administrators from
different areas of specialization
• Design application-specific iSCSI storage solutions together with
application-specific adminstrators, such as Exchange Server and SQL
Server administrators
Lesson 2: Configuring BranchCache

How Does BranchCache Work?


BranchCache Requirements
Configuring BranchCache Server Settings
Configuring BranchCache Client Settings
Demonstration: Configuring BranchCache
• Monitoring BranchCache
How Does BranchCache Work?

Branch Office
Head Office
(Hosted Cache Mode)

Branch Office
(Distributed Cache Mode)
BranchCache Requirements

Requirements for using Requirements for the


BranchCache modes
• Install the BranchCache feature • In distributed cache mode, the
or the BranchCache for Network content cache at a branch office is
Files feature on the server that is distributed between client
hosting the content computers
• Configure client computers by • In hosted cache mode, the content
using either Group Policy or the cache at the branch office is hosted
netsh command on one or more server computers
that are hosted cache servers

• Content versions:
• V1 uses fixed file segment sizes
• V2 uses smaller, variable size segments
Configuring BranchCache Server Settings
1. Install BranchCache for Network
Files role service
2. Enable BranchCache on the server
3. Enable BranchCache on file shares

Install the BranchCache


feature

Configuring the Web Configuring the File Server


Server

Install the BranchCache 1. Install BranchCache for Network


feature Files role service
2. Enable BranchCache on the server
3. Enable BranchCache on file shares

Add the BranchCache feature to the Windows Server


2012 server

Configuring the Hosted Cache Server

Add the BranchCache feature to the Windows Server


2012 server
Configuring BranchCache Client Settings

To enable and configure BranchCache, do the


following:
1. Enable BranchCache
2. Enable distributed cache mode or hosted cache mode
3. Configure the client firewall
You can modify BranchCache settings and perform
additional configuration tasks, such as:
• Setting the cache size
• Setting the location of the hosted cache server
• Clearing the cache
• Creating and replicating a shared key for using in a server cluster
Demonstration: Configuring BranchCache

In this demonstration, you will see how to:


• Add BranchCache for the Network Files role service
• Configure BranchCache in Local Group Policy Editor
• Enable BranchCache for a file share
Monitoring BranchCache

The BranchCache monitoring tools include:


• Get-BCStatus Windows Powershell cmdlet
• Netsh branchcache shows status command
• Event Viewer
• Performance monitor counters
Lesson 3: Optimizing Storage Usage

What Is FSRM?
What Is File Classification Management?
What Are File Classification Properties?
What Is a File Classification Rule?
Demonstration: How to Configure Classification
Management
Considerations for Using File Classification Options for
Storage Optimization in Windows Server 2012
Options for Storage Optimization
Demonstration: Configuring Data Deduplication
• What Is Tiered Storage?
What Is FSRM?

You can use the FSRM to manage and classify data that
is stored on file servers

FSRM features New FSRM features

•File classification •DAC


infrastructure •Manual classification
•File management tasks •Access-denied assistance
•Quota management •File management tasks
•File screening management •Automatic classification
•Storage reports
What Is File Classification Management?

• Classification management allows you to use an


automated mechanism to create and assign classification
properties to files
Classification Rule

Payroll.xlsx

IsConfidential
What Are File Classification Properties?

Classification properties are configurable values


that can be assigned to files
• Classification properties can be any of the following:
• Yes/No
• Date/Time
• Number
• Multiple choice list
• Ordered list
• String
• Multi-string
What Is a File Classification Rule?

A rule applies classification properties to files based


on information about the file
A classification rule contains the following
information:
• Rule enabled/disabled
• Rule scope
• Classification mechanism
• Property to assign
• Additional classification parameters
Demonstration: How to Configure Classification
Management

In this demonstration, you will see how to:


• Create a classification property
• Create a classification rule
• Modify the classification schedule
Considerations for Using File Classification Options for
Storage Optimization in Windows Server 2012

• When using file classification, consider the following:


• How classification properties are stored
• Movement can affect a file classification’s properties
• The classification management process exists only in Windows
Server 2008 R2 and newer
• Classification rules can conflict
• Classification management cannot classify certain files
Options for Storage Optimization

The following options are available for storage


optimization:
• File access auditing allows for auditing of files for
regulatory compliance, forensic analysis, monitoring and
troubleshooting access issues
• NFS data stores allows a Windows-based computer to
act as an NFS server and share files in heterogeneous
environments
• Data deduplication allows more data to be stored using
less space by replacing redundant copies of files with a
reference to a single copy
Demonstration: Configuring Data Deduplication

In this demonstration, you will see how to:


• Add the Data Deduplication role service
• Enable data deduplication
• Test data deduplication
What Is Tiered Storage?

• Tiered storage uses a virtual disk that consists of


at least one SSD and one hard disk drive
• Two tiers are created:
• Faster Tier (all the SSDs)
• Standard Tier (all the hard disk drives)

• Heavily accessed files are automatically moved to


the faster tier
• Parallelized repair allows data to be rebuilt after a
disk failure
• The virtual disk may be fixed or thin provisioned
• Thin provisioning and trim is enabled by default
Lab A: Implementing Advanced File Services

Exercise 1: Configuring iSCSI Storage


• Exercise 2: Configuring the File Classification
Infrastructure
Logon Information

Virtual machines: 20412C-LON-DC1


20412C-LON-SVR1
20412C-LON-SVR2
User name: Adatum\Administrator
Password: Pa$$w0rd

Estimated Time: 75 minutes


Lab Scenario

As the A. Datum Corporation has expanded, the requirements for


managing storage and shared file access have also expanded.
Although the cost of storage has decreased significantly over recent
years, the amount of data produced by the A. Datum business groups
has increased even faster. The organization is considering alternate
ways to decrease the cost of storing data on the network, and is
considering options for optimizing data access in the new branch
offices. The organization would also like to ensure that data that is
stored on the shared folders is limited to company data, and that it
does not include unapproved file types.
As a senior server administrator at A. Datum, you are responsible for
implementing the new file storage technologies for the organization.
You will implement iSCSI storage to provide a less complicated option
for deploying large amounts of storage.
Lab Review

Why would you implement MPIO together with


iSCSI? What problems would you solve with this
approach?
Why must you have the iSCSI initiator component?
• Why would you configure file classification for
documents located in a folder such as a Corporate
Documentation folder?
Lab B: Implementing BranchCache

Exercise 1: Configuring the Main Office Servers for


BranchCache
Exercise 2: Configuring the Branch Office Servers for
BranchCache
Exercise 3: Configuring Client Computers for BranchCache
• Exercise 4: Monitoring BranchCache
Logon Information

Virtual machines: 20412C-LON-DC1


20412C-LON-SVR2
20412C-LON-CL1
20412C-LON-CL2
User name: Adatum\Administrator
Password: Pa$$w0rd
Estimated Time: 40 Minutes
Lab Scenario

The A. Datum Corporation has deployed a new


branch office, which has a single server. To
optimize file access in branch offices, you must
configure BranchCache. To reduce WAN use out to
the branch office, you must configure
BranchCache to cache data retrieved from the
head office. You will also implement FSRM to
assist in optimizing file storage.
Lab Review

• When would you consider implementing


BranchCache into your own organization?
Module Review and Takeaways

Review Questions
Real-world Issues and Scenarios
Tools
• Best Practice

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy