12.07.2015 Views

Strategies for Data Protection - Brocade

Strategies for Data Protection - Brocade

Strategies for Data Protection - Brocade

SHOW MORE
SHOW LESS
  • No tags were found...

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

ContentsIntroduction ..................................................................................................iPart One .......................................................................................................1Chapter 1: Building the Foundation ........................................................3Storage-Centric vs. Network-Centric SAN Architectures .....................................4Flat SAN Topologies ......................................................................................4Mesh SAN Topologies ...................................................................................7Core-Edge SAN Topologies ...........................................................................9Inter-Fabric Routing ....................................................................................11Virtual Fabrics .............................................................................................13Additional SAN Design Considerations .....................................................14Highly Available Storage .....................................................................................16Local Mirroring (RAID 1) .............................................................................16Other RAID Levels .......................................................................................18RAID as a Form of Storage Virtualization ..................................................20Alternate Pathing and Failover ...................................................................20Additional High Availability Storage Features ...........................................22Storage and Fabric Consolidation .....................................................................22SAN Security ........................................................................................................24Securing the SAN <strong>Data</strong> Transport ..............................................................25Securing Storage <strong>Data</strong> Placement ............................................................31Securing the Management Interface ........................................................34Going to the Next Level: The <strong>Brocade</strong> <strong>Data</strong> Center Fabric ...............................35Chapter 2: Backup <strong>Strategies</strong> ............................................................... 37Conventional Local Backup ................................................................................37Backup Fabrics ...........................................................................................42Disk-to-Disk (D2D) Tape Emulation ...........................................................43Disk-to-Disk-to-Tape (D2D2T) .....................................................................44Remote Backup ..................................................................................................45<strong>Data</strong> Restoration from Tape .......................................................................49<strong>Strategies</strong> <strong>for</strong> <strong>Data</strong> <strong>Protection</strong>vii

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!