Are there any notable security considerations or challenges specific to blade server deployments?

charlesdevis
Just browsing

Are there any notable security considerations or challenges specific to blade server deployments?

Hello everyone,

 

I am currently researching blade server deployments and I was wondering if there are any notable security considerations or challenges specific to this type of deployment. I have read some resources that suggest the security issues with any blade server are pretty much the same as with rack servers or standalone servers. However, I have also come across some discussions that suggest there may be some unique security issues with blade servers

 

I would appreciate any insights or experiences you may have with blade server security. Are there any specific security measures that need to be taken into account when deploying blade servers? What are the best practices for securing blade server environments? Any advice or recommendations would be greatly appreciated.

 

Thank you in advance for your help!

1 Reply 1
Brash
Kind of a big deal
Kind of a big deal

I've worked with Cisco UCS blade servers quite a bit and have no idea why there would be any difference in security requirements than rack servers. They're both just compute with an out of band management and utilize the same network principles.

 

The main advantage of blade servers is that you can:

 - Aggregate compute into a smaller formfactor

 - Multiplex their connectivity through the chassis backplane for (in theory) faster east-west communication

 - Have less individual connections to a TOR or DC switch.

 - Typically, they have a "profile" type of management software that allows for quick and easy replacement of blades in the event of a failure.

 

In my opinion, these are the considerations you need to take into account, especially if connecting directly into a Meraki switch. What I often see people get wrong is underestimating (or not fully understanding) their network requirements for the blade servers and the oversubscription on the physical links (especially in a converged network)

Get notified when there are additional replies to this discussion.
Welcome to the Meraki Community!
To start contributing, simply sign in with your Cisco account. If you don't yet have a Cisco account, you can sign up.
Labels