기존의 NAS(Network Attached Storage) Node는 시스템당 최대 2개이며, Active-Standby로 동작.
NAS Node 한 개에서만 스토리지 볼륨에 접근할 수 있으며, 2개의 NAS Node에서 동시에 스토리지 볼륨 접근이 불가능 했습니다. 또한 Client는 한 개의 NAS Node를 통해서만 데이터에 Access할 수 있었으며, NAS Node, NIC에 Bottle Neck이 쉽게 발생 할 수 있었습니다.
SAN(Storage Area Network)에서는 Client 마다 독립적으로 스토리지 볼륨을 사용하고 File System을 관리 하였으며, SAN 구축비용(SAN Switch, HBA등)과 데이터 공유를 위한 비용이 과다하게 치출되며, Client 사용자가 많은 환경에서는 적용에 어려움이 있었다.
하지만 SCALEWAY(Cluster NAS Gateway)기존의 스토리지가 가지고 있던 성능과 확장성의 한계를 근본적으로 개선한 클러스터 파일시스템 기반의 NAS 솔루션 입니다.
Scaleway는 모든 NAS Node에서 스토리지 볼류에 접근이 가능하며, Client는 모든 NAS Node를 통해 스토리지 볼륨에 Access가 가능. NAS Node를 1000대 까지 확장 할 수 있고, 모든 Node가 Active로 동작 합니다.
NAS Node 장애시에는 다른 NAS Node를 통해 I/O가 유지되도록 자동 Fail-Over되며, 무중단 NAS Node 및 스토리지의 증설/감설이 가능 합니다.
특징
1. 병렬 I/O
Client의 data가 다수의 NAS Node에 병렬 I/O수행
Client의 I/O성능이 획기적으로 개선
다수의 NAS Node에 분산되므로 특정 NAS Node의 부하에 영향을 받지 않는 안정적인 성능 보장
지원 OS(MS Windows, Linux(64bit)
2, 유연한 성능 향상 구조
Scaleway는 NAS Node 추가를 통해 선형적으로 성능이 향상
Client 사용자수, I/O량 증가시 NAS Node 추가를 통해 성능향상 문제를 쉽게 해결
Product OverView The ISG Series Integrated Security Gateways are ideally suited for securing enterprise, carrier, and data enter environments where advanced applications, such as VoIP and streaming media, demand consistent, scalable performance. The Juniper Networks ISG1000 and ISG2000 Integrated Security Gateways are purpose-built security solutions that leverage a fourth-generation security ASIC, along with high-speed microprocessors to deliver unmatched firewall and VPN performance. Integrating best-in-class firewall, VPN, and optional Intrusion Detection and Prevention, the ISG1000 and ISG2000 enable secure, reliable connectivity along with network-and applicationlevel protection for critical, high-traffic network segments.
Product Description The Juniper Networks® ISG1000 and ISG2000 Integrated Security Gateways are fully integrated firewall/VPN systems that offer multi-gigabit performance, modular architecture and rich virtualization capabilities. They are an ideal security solution for large enterprise, data center and service provider networks. The ISG Series Integrated Security Gateways are firewall/VPN-based systems that deliver security features such as intrusion prevention system (IPS), antispam, Web filtering, and Internet Content Adaptation Protocol (ICAP) antivirus redirection support. The advanced system is further expandable with optionally integrated Intrusion Detection and Prevention (IDP) or as a General Packet Radio Service (GPRS) firewall/VPN for mobile network service provider environments. The ISG Series modular architecture enables deployment with a wide variety of copper and fiber interface options. Highly flexible segmentation and isolation of traffic belonging to different trust levels can be achieved using advanced features such as virtual systems, virtual LANs, and security zones. The ISG Series Integrated Security Gateways allow multiple, separate firewall inspection or routing policies to simplify network design. This enables the enforcement of security policies to traffic streams—even in highly complex environments—without significant impact on the network itself. The flexibility and efficiency offered by the ISG Series architecture provides state-ofthe- art performance and best-in-class functionality as a firewall/VPN or integrated firewall/VPN/IDP solution with optional security modules. The ISG1000 supports up to two security modules, while the ISG2000 can support up to three security modules. The security modules maintain their own dedicated processing and memory, and incorporate technology designed to accelerate IDP packet processing. This reduces the number of separate security devices and management applications, and simplifies deployment effort and network complexity. The result is higher cost savings. The ISG Series with IDP utilizes the same award-winning software found on Juniper Networks IDP Series Intrusion Detection and Prevention Appliances. The IDP security module supports multi-method detection, combining eight different detection mechanisms—including stateful signatures and protocol anomaly detection. In addition to helping businesses defend against security threats such as worms, trojans, malware,