The Latest Gartner® Magic Quadrant™Hyperconverged Infrastructure Software
Moderators: anton (staff), art (staff), Max (staff), Anatoly (staff)
AFAIK, the advice to team NICs was for the sync channel only, and I'm not sure if it still applies to Starwind 5.5.dmansfield wrote:hixont, thank you for your reply
Constantin, I am confused to why you have this Technical Paper "StarWind iSCSI SAN Software: Implementing NIC Teaming on a StarWind Machine". When would nic teaming be used?
If you have a dedicated switch(es) for iSCSI, you don't need VLANs at all. Example set up:dmansfield wrote:As a follow up to your post, I am using dedicated iSCSI switches. To clarify your comment I don't need to use VLAN tagging at the StarWind and VM nics but should establish VLANs at the switch? Or do I just rely on the IP addressing to take care of the VLAN such as xxx.xxx.101.xxx for VLAN 1 and xxx.xxx.102.xxx for VLAN 2? Also do recommend not having a connection to the LAN switch from the iSCSI switch?
Aitor_Ibarra wrote:There are some things that can only be done by using VLANs. E.g say you are connecting two physical locations together over just one connection(or two for diversity), you can run multiple, logically seperate networks over that same connection using VLANs.
Performance: in my experience there has been no impact on performance, but that's going to come down to the switch performance and how many VLANs you have defined. But at the ethernet level, a VLAN means 4 bytes on every frame, which is almost nothing (only 12 bits of those four bytes are for the VLAN id). So the performance impact is more the extra processing the switch has to do, rather than bandwidth consumed. Certainly, on my switches, which have maybe 20 VLANs defined, I have no trouble getting wire speed performance.
Security: there should be no difference betwen a switch divided up into VLANs and seperate switches, but there is indeed a greater risk - if there's a security bug in the firmware that allows one VLANs packets to cross into another without you explicitly permitting it; and more likely, if you make a mistake in configuration.
Reliability: here's where you start to get into the drawbacks. Let's say that a switch running 2 VLANs fails. You've got to replace it with an identical switch and restore the config from a backup. Or, if you can't get an identical switch, you have to configure your new switch exactly the same way. If you had a dedicated switch for each network, you can swap a failed switch much more easily.
The bottom line is: if your switch is a proper managed switch (e.g. pretty much every 10G capable switch on the market) then you shouldn't see a performance hit, however the price is that you have a more complex setup. As always, make sure you understand what you are doing, test your configuration to confirm that it is doing what you expected, and have a backup of the configuration as well as documentation.