Relacionar Columnas Ch. 8-9 Sumn idk Versión en línea this is why we cant have nice things por Vince Chadrick Dunn 1 Initiator 2 Network-Attached Storage (NAS) 3 Host Bus Adapter (HBA) 4 Firewall 5 Access Control List (ACL) 6 Network Ports 7 Target 8 Jumbo Frame 9 Unified Threat Management (UTM) Device 10 Internet Small Computer Systems Interface (iSCSI) logical connections provided by the TCP or UDP protocols at the Transport layer. They are used by protocols in the upper layers of the OSI model. The TCP/IP protocol stack uses port numbers to determine which protocol incoming traffic should be directed to. a self-contained storage appliance designed to allow clients to store and share files over the network. It can also be used for backups and media streaming. The servers that connect to the shared storage device An Ethernet packet larger than 1500 bytes combines multiple security features into a single network appliance a software- or hardware-based network security system that allows or denies network traffic according to a set of rules. All SAN storage devices a hardware device, such as a circuit board or integrated circuit adapter, that provides I/O processing and physical connectivity between a host system, such as a server, and a storage device. Filtering rules firewalls use to identify which traffic to allow and which traffic to block. uses network protocols that encapsulates SCSI commands within IP packets and transmits them over a standard Ethernet network.