Being full-featured native iSCSI target software for Citrix and other virtualization environment, Virtual Native SAN can install on thoese virtualization server's host machines. It supports many storage media types to create iSCSI
target for virtual machines, and can provide many features for security, data protection for small
business and enterprise.
Supported Device Types:
- Extremely fast iSCSI RAM disk drives for temporary data storing on network.
- Security disks for each END, each user can use his/her own disk which use CHAP password encrypted.
- Support standard disk image file (.img, RAW mapping to disk) for iSCSI
target.
- Support Virtual Hard Disk image file (.vhd) for iSCSI target.
-
Virtual CD/DVD-ROM emulator which existing CD/DVD ISO9660 (.iso, .bin, .mdf, .cdi, .b5i, .nrg, .ccd, .sub, .img,
.raw) images to mounted as iSCSI CD/DVD-ROM drives on the clients.
- Virtual CD/DVD-RW which allows create an iSCSI target
using virtual burner and burn into ISO file.
- Auto-mount feature for CD/DVD-RW emulator that automatically
mounts new blank disk after previous burning process will finish.
-
Support physical disk (i.e. /dev/disk1) to create iSCSI target.
- Support volume (partition) to create iSCSI target.
- CDP (continuous data protection) for iSCSI target.
- CDP and snapshot linked target which allows to use an intermediate state of
another target.
- Multiple-LUN target, mount more than one existing devices into one iSCSI
target.
- RAID-5 target, mount more than one existing devices into one iSCSI target
with RAID-5 integrated.
- Datacenter, mount more than one existing devices from other server in to one
iSCSI target with RAID-5 integrated
Security and Data Protection:
- Provides CHAP and mutual CHAP user authentication mechanism.
- Provides client's IP address authentication mechanism with additional security.
- Standard image file disk snapshot for incremental backups with
unlimited number of rollback points.
- VHD (virtual hard disk) snapshot.
- True and real-time continuous data protection (CDP).
Replications:
- Synchronous Replication (RAID-1), allows create synchronous replication one
any existing iSCSI target to image file or remote iSCSI target.
- Asynchronous Replication (RAID-1), allows create asynchronous replication
one any existing iSCSI target to image file or remote iSCSI target.
- High availability, allows you can create an high-availability iSCSI SAN by using two or more than two iSCSI
servers.
Protocol Features:
- Volatile and persisted COW protection feature, that automatically create snapshots for each initiators with virtual write permission.
- Read and write caching, which use memory on server as cache to improve data transfers speed and response time.
- iSCSI Target portal address management, which allows you to make iSCSI
server to be able to work behind the firewall.
- Provides remote management mechanism that allows to manage the iSCSI
server from Windows desktop.
- No restrictions on disk capacity, total number of hard disk installed, number of CPUs or CPU cores, and
Ethernet ports or the amount of RAM.
- Supports multiple connections per iSCSI session, which allows you to create
round robin, weighted paths and so on.
- Supports 64-bit LBA, providing more than 2TB of disk space.
- Fully Supports SCSI-2 Reserve/Release.
- Fully Supports SCSI-3 Persistent Reserve clustering and high
availability.
- Fully Supports VMWare Platform and VAAI (ATS, ZERO and XCOPY) interface.
- Fully Supports Citrix XenServer.
- Fully Supports open-iscsi on Linux.
- Fully Supports KernSafe iSCSI initiator on Mac OS X.
- Fully conforms to the latest iSCSI Standard 1.0 (former Draft 20).