Module 2
Implementing Advanced File
Services
Module Overview
Configuring iSCSI Storage
Configuring BranchCache
• Optimizing Storage Usage
Lesson 1: Configuring iSCSI Storage
What Is iSCSI?
iSCSI Target Server and iSCSI Initiator
Implementing High Availability for iSCSI
iSCSI Security Options
Demonstration: Configuring an iSCSI Target
Demonstration: Connecting to the iSCSI Storage
• Considerations for Implementing iSCSI Storage
What Is iSCSI?
iSCSI transmits SCSI commands over IP networks
Component Description
Provides high performance and iSCSI client that
IP network runs the iSCSI
redundancy
TCP/IP protocol
Initiator
Run on the storage device and
iSCSI targets
enable access to the disks
A software component or host
iSCSI
adapter on the server that Storage
initiators
provides access to iSCSI targets Array
A globally unique identifier used
IQN to address initiators and targets iSCSI Target Server
on an iSCSI network
iSCSI Target Server and iSCSI Initiator
The iSCSI target server
• Is available as a role service in Windows Server 2012
• Provides the following features:
• Network/diskless boot
• Server application storage
• Heterogeneous storage
• Lab environments
• Windows Server 2012 R2 features include:
• Virtual disks
• Manageability
• Scalability limits
• Local mount functionality
• Support for VHDX
• Improved manageability
• Improved scalability
• Local mount functionality deprecated
iSCSI Target Server and iSCSI Initiator
The iSCSI initiator
• Runs as a service in the operating system
• Is installed by default on Windows 8 and Windows
Server 2012
• iSCSI targets can be discovered using multiple methods
that include:
• SendTargets
• iSNS
• Manually configured targets
• HBA discovery
Implementing High Availability for iSCSI
Two technologies for implementing iSCSI for high
availability are:
• MCS, in the event of a failure, all outstanding iSCSI
commands are reassigned to another connection
automatically
• MPIO, if you have multiple network interface cards in your
iSCSI initiator and iSCSI target server, you can use MPIO to
provide failover redundancy in the event of network
outages
iSCSI Security Options
Mitigate security risks to iSCSI by the following best
practices:
• Segregate the iSCSI SAN channel
• Secure management consoles
• Disable unneeded services
• Use CHAP authentication
• Use IPsec authentication
• Use IPsec encryption
Demonstration: Configuring an iSCSI Target
In this demonstration, you will see how to:
• Add the iSCSI target server role service
• Create two iSCSI virtual disks and an iSCSI target
Demonstration: Connecting to the iSCSI Storage
In this demonstration, you will see how to:
• Connect to the iSCSI target
• Verify the presence of the iSCSI drive
Considerations for Implementing iSCSI Storage
Consider the following when designing your iSCSI
storage solution:
• Deploy the solution on fast networks
• Design a highly available network infrastructure for your iSCSI storage
solution.
• Design an appropriate security strategy for the iSCSI storage solution
• Follow the vendor-specific best practices for different types of
deployments
• The iSCSI storage solution team must contain IT administrators from
different areas of specialization
• Design application-specific iSCSI storage solutions together with
application-specific adminstrators, such as Exchange Server and SQL
Server administrators
Lesson 2: Configuring BranchCache
How Does BranchCache Work?
BranchCache Requirements
Configuring BranchCache Server Settings
Configuring BranchCache Client Settings
Demonstration: Configuring BranchCache
• Monitoring BranchCache
How Does BranchCache Work?
Branch Office
Head Office
(Hosted Cache Mode)
Branch Office
(Distributed Cache Mode)
BranchCache Requirements
Requirements for using Requirements for the
BranchCache modes
• Install the BranchCache feature • In distributed cache mode, the
or the BranchCache for Network content cache at a branch office is
Files feature on the server that is distributed between client
hosting the content computers
• Configure client computers by • In hosted cache mode, the content
using either Group Policy or the cache at the branch office is hosted
netsh command on one or more server computers
that are hosted cache servers
• Content versions:
• V1 uses fixed file segment sizes
• V2 uses smaller, variable size segments
Configuring BranchCache Server Settings
1. Install BranchCache for Network
Files role service
2. Enable BranchCache on the server
3. Enable BranchCache on file shares
Install the BranchCache
feature
Configuring the Web Configuring the File Server
Server
Install the BranchCache 1. Install BranchCache for Network
feature Files role service
2. Enable BranchCache on the server
3. Enable BranchCache on file shares
Add the BranchCache feature to the Windows Server
2012 server
Configuring the Hosted Cache Server
Add the BranchCache feature to the Windows Server
2012 server
Configuring BranchCache Client Settings
To enable and configure BranchCache, do the
following:
1. Enable BranchCache
2. Enable distributed cache mode or hosted cache mode
3. Configure the client firewall
You can modify BranchCache settings and perform
additional configuration tasks, such as:
• Setting the cache size
• Setting the location of the hosted cache server
• Clearing the cache
• Creating and replicating a shared key for using in a server cluster
Demonstration: Configuring BranchCache
In this demonstration, you will see how to:
• Add BranchCache for the Network Files role service
• Configure BranchCache in Local Group Policy Editor
• Enable BranchCache for a file share
Monitoring BranchCache
The BranchCache monitoring tools include:
• Get-BCStatus Windows Powershell cmdlet
• Netsh branchcache shows status command
• Event Viewer
• Performance monitor counters
Lesson 3: Optimizing Storage Usage
What Is FSRM?
What Is File Classification Management?
What Are File Classification Properties?
What Is a File Classification Rule?
Demonstration: How to Configure Classification
Management
Considerations for Using File Classification Options for
Storage Optimization in Windows Server 2012
Options for Storage Optimization
Demonstration: Configuring Data Deduplication
• What Is Tiered Storage?
What Is FSRM?
You can use the FSRM to manage and classify data that
is stored on file servers
FSRM features New FSRM features
•File classification •DAC
infrastructure •Manual classification
•File management tasks •Access-denied assistance
•Quota management •File management tasks
•File screening management •Automatic classification
•Storage reports
What Is File Classification Management?
• Classification management allows you to use an
automated mechanism to create and assign classification
properties to files
Classification Rule
Payroll.xlsx
IsConfidential
What Are File Classification Properties?
Classification properties are configurable values
that can be assigned to files
• Classification properties can be any of the following:
• Yes/No
• Date/Time
• Number
• Multiple choice list
• Ordered list
• String
• Multi-string
What Is a File Classification Rule?
A rule applies classification properties to files based
on information about the file
A classification rule contains the following
information:
• Rule enabled/disabled
• Rule scope
• Classification mechanism
• Property to assign
• Additional classification parameters
Demonstration: How to Configure Classification
Management
In this demonstration, you will see how to:
• Create a classification property
• Create a classification rule
• Modify the classification schedule
Considerations for Using File Classification Options for
Storage Optimization in Windows Server 2012
• When using file classification, consider the following:
• How classification properties are stored
• Movement can affect a file classification’s properties
• The classification management process exists only in Windows
Server 2008 R2 and newer
• Classification rules can conflict
• Classification management cannot classify certain files
Options for Storage Optimization
The following options are available for storage
optimization:
• File access auditing allows for auditing of files for
regulatory compliance, forensic analysis, monitoring and
troubleshooting access issues
• NFS data stores allows a Windows-based computer to
act as an NFS server and share files in heterogeneous
environments
• Data deduplication allows more data to be stored using
less space by replacing redundant copies of files with a
reference to a single copy
Demonstration: Configuring Data Deduplication
In this demonstration, you will see how to:
• Add the Data Deduplication role service
• Enable data deduplication
• Test data deduplication
What Is Tiered Storage?
• Tiered storage uses a virtual disk that consists of
at least one SSD and one hard disk drive
• Two tiers are created:
• Faster Tier (all the SSDs)
• Standard Tier (all the hard disk drives)
• Heavily accessed files are automatically moved to
the faster tier
• Parallelized repair allows data to be rebuilt after a
disk failure
• The virtual disk may be fixed or thin provisioned
• Thin provisioning and trim is enabled by default
Lab A: Implementing Advanced File Services
Exercise 1: Configuring iSCSI Storage
• Exercise 2: Configuring the File Classification
Infrastructure
Logon Information
Virtual machines: 20412C-LON-DC1
20412C-LON-SVR1
20412C-LON-SVR2
User name: Adatum\Administrator
Password: Pa$$w0rd
Estimated Time: 75 minutes
Lab Scenario
As the A. Datum Corporation has expanded, the requirements for
managing storage and shared file access have also expanded.
Although the cost of storage has decreased significantly over recent
years, the amount of data produced by the A. Datum business groups
has increased even faster. The organization is considering alternate
ways to decrease the cost of storing data on the network, and is
considering options for optimizing data access in the new branch
offices. The organization would also like to ensure that data that is
stored on the shared folders is limited to company data, and that it
does not include unapproved file types.
As a senior server administrator at A. Datum, you are responsible for
implementing the new file storage technologies for the organization.
You will implement iSCSI storage to provide a less complicated option
for deploying large amounts of storage.
Lab Review
Why would you implement MPIO together with
iSCSI? What problems would you solve with this
approach?
Why must you have the iSCSI initiator component?
• Why would you configure file classification for
documents located in a folder such as a Corporate
Documentation folder?
Lab B: Implementing BranchCache
Exercise 1: Configuring the Main Office Servers for
BranchCache
Exercise 2: Configuring the Branch Office Servers for
BranchCache
Exercise 3: Configuring Client Computers for BranchCache
• Exercise 4: Monitoring BranchCache
Logon Information
Virtual machines: 20412C-LON-DC1
20412C-LON-SVR2
20412C-LON-CL1
20412C-LON-CL2
User name: Adatum\Administrator
Password: Pa$$w0rd
Estimated Time: 40 Minutes
Lab Scenario
The A. Datum Corporation has deployed a new
branch office, which has a single server. To
optimize file access in branch offices, you must
configure BranchCache. To reduce WAN use out to
the branch office, you must configure
BranchCache to cache data retrieved from the
head office. You will also implement FSRM to
assist in optimizing file storage.
Lab Review
• When would you consider implementing
BranchCache into your own organization?