Accelerate and Secure Dell Equallogic Iscsi Replication with the F5 BIG-IP WAN Optimization Module
Total Page:16
File Type:pdf, Size:1020Kb
STORAGE ACCELERATE AND SECURE DELL EQUALLOGIC iSCSI REPLICATION WITH THE F5 BIG-IP WAN OPTIMIZATION MODULE By Fred Johnson Combining Dell™ EqualLogic™ PS Series Internet SCSI Ujjwal Rajbhandari (iSCSI) arrays with F5® BIG-IP® application delivery Puneet Dhawan systems and WAN Optimization Module™ technology can have significant performance and security benefits for iSCSI replication over wide area networks (WANs)— accelerating and encrypting traffic between sites, decreasing data transfer times and recovery times, and helping reduce WAN-related costs. pplication availability, data center capacity, F5 BIG-IP WAN OPTIMIZATION FEATURES and business continuity can all depend on the F5 BIG-IP application delivery controllers provide the Atimely movement of applications and data flexibility to support multiple feature sets on a single between remote sites. The low throughput and long platform. For example, a BIG-IP device providing high data transfer completion times typical of wide area availability, traditional load balancing, and Secure networks (WANs) can make remote WAN replication Sockets Layer (SSL) offload can also incorporate difficult or even impossible. Additionally, the need to WAN optimization, Web acceleration, application meet regulatory and compliance standards—including security, and other features without the need for controlled access to and encryption of replicated additional dedicated appliances—helping to simplify data—is often a paramount consideration for enter- management and save on hardware, rack space, and prise storage administrators. power consumption. With these challenges in mind, Dell and F5 have F5 BIG-IP WOM technology is designed to acceler- completed proof-of-concept (POC) lab testing to ate TCP traffic for data center applications, with the demonstrate how organizations can help accelerate ability to scale to meet high bandwidth requirements. and secure Dell EqualLogic PS Series Internet SCSI The module includes special acceleration profiles for (iSCSI) storage area network (SAN) replication over Common Internet File System (CIFS) and Messaging WANs using version 10.1 of the F5 BIG-IP WAN Application Programming Interface (MAPI), and sup- Optimization Module (WOM). By overcoming the ports Web Cache Communication Protocol version 2 effects of limited bandwidth, high latency, and (WCCPv2); because it must be deployed symmetri- packet loss, WOM technology helps to dramatically cally, it requires two or more BIG-IP devices. increase throughput, reduce replication completion A variety of features help to boost performance, times, and enhance bandwidth utilization and secure communications, and manage traffic, including efficiency. When taking into account the costs of the following: WAN bandwidth, equipment, and administration, these performance advantages can quickly lead to ■■ iSessions: The F5 iSessions network tunneling fea- bottom-line savings. ture integrates security, acceleration, and traffic 1 DELL POWER SOLUTIONS | 2010 Issue 2 Preprinted from Dell Power Solutions, 2010 Issue 2. Copyright © 2010 Dell Inc. All rights reserved. management. This feature is designed to work through firewalls: for example, iSCSI requires only TCP port 443 for the secure control channel and TCP port 3260 for iSCSI, and iSessions encryption can be enabled without changes to the port assignments. ■■ Symmetric encryption: iSessions can be secured by controlling access, encrypt- ing the control channel, and optionally encrypting the iSCSI replication traffic; the SSL encryption is designed to oper- Figure 1. F5 BIG-IP WOM performance dashboard ate with only minimal impact on perfor- mance. Administrators can easily enable ■■ TCP Express: The BIG-IP network stack look at real-time data, performance, and encryption by modifying the iSCSI vir- implements a variety of TCP optimiza- bandwidth gains for WOM-optimized traf- tual server using the Web browser– tion techniques and performance- fic (see Figure 1). based BIG-IP management interface. related IETF Request for Comments ■■ Symmetric data deduplication: In the (RFC) enhancements designed to PROOF-OF-CONCEPT TEST WOM context, deduplication means offload and optimize TCP network traf- ENVIRONMENT preventing redundant data patterns fic, helping to reduce TCP overhead The goal of the Dell and F5 POC testing from crossing the WAN. A cache is and increase network performance and was to demonstrate Dell EqualLogic iSCSI built on the device at each end, and reliability. SAN replication throughput and comple- when a duplicate pattern in the net- ■■ Layer 7 (L7) quality-of-service (QoS) tion times when using F5 BIG-IP WOM work traffic is found, a small reference rate shaping: L7 QoS rate shaping technology to accelerate and encrypt to the cache is transmitted instead of allows for the enforcement of band- iSCSI traffic as it crossed a WAN. The the entire pattern—an important way width minimums and maximums per tests were performed in November 2009 to help reduce the amount of WAN application, including burst control, at the Dell Interoperability Lab in Round traffic. The Dell and F5 POC testing and supports terms-of-service and dif- Rock, Texas. used a memory deduplication data ferentiated services code point (DSCP) As shown in Figure 2, the lab configu- store, an approach well suited for rep- features. For example, the bandwidth ration included two EqualLogic PS6000XV lication traffic. The deduplication cache associated with an iSCSI BIG-IP virtual iSCSI SAN arrays with sixteen 420 GB, can also be stored on disk to support server can be limited, helping prevent 15,000 rpm Serial Attached SCSI (SAS) increased cache sizes. iSCSI replication from affecting other hard drives in a RAID-50 configuration ■■ Symmetric adaptive compression: As critical applications that share the connected by two Dell PowerConnect™ with symmetric deduplication, compres- same WAN link. 6248 L3 switches. F5 BIG-IP 3600 appli- sion helps to reduce the amount of ances with WOM technology were con- WAN traffic and increase bandwidth The WOM performance dashboard nected to the switches at each simulated usage efficiency. Adaptive means that offers integrated monitoring and reporting site. A WAN emulator interconnected the BIG-IP devices can intelligently select tools, providing administrators with a quick switches; the emulator functions included compression based on the type of data. Compression can also be offloaded to Dell PowerConnect Dell PowerConnect hardware compression cards on high- 6248 switch 6248 switch end F5 platforms to help reduce pro- iSessions cessor usage and increase throughput. The Dell and F5 POC testing used Dell EqualLogic F5 BIG-IP 3600 F5 BIG-IP 3600 Dell EqualLogic PS6000XV devices with WOM devices with WOM PS6000XV adaptive compression, yielding a com- iSCSI SAN array technology technology iSCSI SAN array bination of LZO and Deflate (level 1) Encryption, compression, symmetric deduplication, and TCP optimizations compression. Volume data set charac- teristics such as compressibility influ- Simulated data center 1 WAN emulator Simulated data center 2 ence the performance gains associated with WOM technology. Figure 2. Proof-of-concept test environment incorporating F5 BIG-IP WOM technology Preprinted from Dell Power Solutions, 2010 Issue 2. Copyright © 2010 Dell Inc. All rights reserved. DELL.COM/PowerSolutions 2 STORAGE bandwidth, seamlessly recover from 800 packet loss, and enable WANs to provide 700 15m10s performance characteristics similar to 16m40s 17m20s LANs. Figure 3 shows Dell EqualLogic 600 19m36s iSCSI replication throughput and comple- 500 tion times with F5 BIG-IP WOM accelera- 1m20s 2m35s 13m55s 400 tion over a 45 Mbps WAN with 100 ms of 300 latency and 1 percent packet loss (10,000 packets per million) across a variety of Throughput (MB/min) Throughput 200 volume sizes. The WOM-accelerated tests 100 for the 10 GB volume additionally show 0 the throughput and completion times for 500 MB 1 GB 5 GB 10 GB 10 GB 10 GB 10 GB (1:1) (1:1) (1:1) (1:1) (2:1) (4:1) (4:1 with 2:1 and 4:1 volume data compressibility encryption) Volume size and data compressibility as well as 4:1 compressibility with encryption. Figure 3. Dell EqualLogic replication throughput and completion times with F5 BIG-IP WOM acceleration over a To put these results in context, using 45 Mbps WAN with 100 ms latency and 1 percent packet loss WOM technology enabled the WAN link at 45 Mbps with 100 ms of latency and 1 percent packet loss to provide results Typical latency range Typical average latency roughly comparable to what could be Regional within the United States or 10–40 ms 30 ms expected of a 100 Mbps LAN with no Europe latency or packet loss, even when using U.S. East Coast to West Coast 80–120 ms 100 ms encryption—helping make remote replica- tion of large data volumes possible in a South America to North America 90–170 ms 150 ms much shorter period of time than they Asia Pacific to Europe 250–400 ms 300 ms would otherwise require. As an additional point of reference when evaluating the Figure 4. Typical latencies that might be expected across a variety of WAN link distances results, Figure 4 shows typical latencies that might be expected across a variety limiting bandwidth, injecting latency, and to observe WAN optimization statistics, of WAN link distances. dropping packets to simulate two remote network throughput, and processor and Organizations can further increase data centers connected over a WAN. The memory utilization during the test runs. iSCSI WAN data transfer throughput by two arrays then replicated volumes over configuring concurrent replication of the emulated WAN, benefiting from WOM F5 BIG-IP WOM ACCELERATION more than one volume at a time, helping acceleration and encryption. TEST RESULTS maximize overall bandwidth utilization. The test team used the Web browser– The goal of WAN optimization is to They can also enhance network efficiency based EqualLogic Group Manager user increase performance by minimizing by using remote point-in-time replication, interface to configure the volumes, latency—helping to increase the perceived which helps minimize the amount of data manage the replication jobs, and report throughput and completion times.