Topic > LUN Security Considerations in the SAN Environment

As I understand it, LUN security starts step by step1) In the storage array2) In the fabric zoning3) Using host software LUN security in a storage array: Lun (logical drive number) security starts in the storage array by 1) Registering the HBA in a storage array.2) In the Raid group (for data security)3) Lun masking: registering the 'HBA in a storage array: A SCSI cable or fiber optic cable is connected to the front end of the storage array port directly from the HBA card or through the Fabric switch. You can register an HBA manually, or the storage array host agent will automatically identify the HBA's WWN number. Each storage array will have fail over mode to avoid single path disruptions. By registering HBAs in a storage array, no one else can access the data from the array except the hosts. When a LUN is mapped using WWN to the front-end ports of the storage array and to the wwn of the HBA. In the mapping, the server can see the storage LUN via HBA WWN and storage front-end port present in the mapping. The server team can identify the LUN by using its unique number to mount the drive in the server. To mount the LUN in the server, you need to reboot the server or scan using the host software (power path). Even if the storage node is moved, the server can still see the storage using other storage nodes added in the mapping. When installing or making changes to a larger number of servers, you need to be especially careful. We need to be careful when adding wwn HBA and storage front-end ports to the mapping. Sometimes the rough servers do not support and coordinate with the remaining servers. The solution to this type of problem is with masking. Creating a storage group and adding LUN, HBA, and front-end port. Raid type: data Mon...... center of sheet...... is done using the wwns node. The wwn HBA node and wwn storage node are used to perform zoning. We can add additional HBA node wwns if we want the server to see the storage array. Hard zoning is more secure than soft zoning. But soft zoning is more flexible. Security via host software: Host software such as power path is used to manage multipathing and HBA node. It manages the paths between the storage array and the server HBA, and performs load balancing. By using power path or any other host software we can avoid data loss and maintain continuous data flow without any risk even after one path fails. Conclusion: The main problem facing a SAN with one-to-one or one-to-many environment is secure data. Implementing these methods with careful study will resolve and ensure providing 99.99% security for LUN data protection.