EMC Celerra Or VNX Device Configuration Guide Stealthaudit® Stealthbits Activity Monitor®

Total Page:16

File Type:pdf, Size:1020Kb

EMC Celerra Or VNX Device Configuration Guide Stealthaudit® Stealthbits Activity Monitor® 2021 EMC Celerra or VNX Device Configuration Guide StealthAUDIT® Stealthbits Activity Monitor® TOC EMC Celerra or VNX Device Configuration Overview 4 Supported File System Platforms 5 Supported Network Attached Storage Devices 5 StealthAUDIT Console Server Permissions 6 File System Applet Deployment Permissions 7 File System Proxy Service Permissions 8 StealthAUDIT File System Scan Options 9 StealthAUDIT File Activity Auditing 11 Local Mode Scans 12 Firewall Rules for Local Mode Scans 12 File System Data Collection Configuration for Local Mode Scans 13 Proxy Mode with Applet Scans 13 Firewall Rules for Proxy Mode with Applet Scans 15 File System Data Collection Configuration for Proxy Mode with Applet Scans 15 Proxy Mode as a Service Scans: with RPC or Secure RPC 17 Firewall Rules for Proxy Mode as a Service Scans 19 File System Data Collection Configuration for Proxy Mode as a Service Scans 20 Additional Parameters for File System Proxy Service 22 Activity Monitor Configuration 23 Activity Monitor Activity Agent Deployment 24 Prepare for Activity Monitoring 24 Monitored Host Configuration 25 Firewall Rules for Activity Monitoring 27 Additional Firewall Rules for Dell EMC Unity, EMC Celerra, & EMC VNX Devices 28 StealthAUDIT Integration 28 Identify an Activity Log for StealthAUDIT 29 Doc_ID 694 2 Copyright 2021 STEALTHBITS, NOW PART OF NETWRIX, ALL RIGHTS RESERVED StealthAUDIT® Stealthbits Activity Monitor® StealthAUDIT Data Collection Configuration for File Activity Scans 29 StealthINTERCEPT Integration 30 SI Agent Deployment 30 StealthDEFEND Integration 31 Sensitive Data to StealthDEFEND 32 SIEM Integration 33 EMC Celerra & VNX Device Configuration for Access Auditing 35 Group Membership for EMC Devices 35 Disable Secure Negotiate 36 EMC Celerra & VNX Device Configuration for Activity Monitoring 37 Install the EMC CEE 39 Connect Data Movers to EMC CEE Server 39 Validate EMC CEE Registry Key Settings 42 Validate EMC CEE Services are Running 43 StealthAUDIT Connection Profile & Host List 45 File System Custom Connection Profile 45 File System Custom Host List 46 Appendices 48 Appendix: EMC CEE Debug Logs 48 Appendix: EMC Event Mapping 49 Appendix: Configure EMC Registry Key Settings 50 More Information 53 Doc_ID 694 3 Copyright 2021 STEALTHBITS, NOW PART OF NETWRIX, ALL RIGHTS RESERVED StealthAUDIT® Stealthbits Activity Monitor® EMC Celerra or VNX Device Configuration Overview Stealthbits products audit and monitor Microsoft® Windows® file servers and/or Network Attached Storage (NAS) devices. StealthAUDIT employs the File System Solution to execute Access Auditing (FSAA), Activity Auditing (FSAC), and/or Sensitive Data Discovery Auditing scans. The Activity Auditing (FSAC) scans also require the Activity Monitor be deployed to monitor the target environment. Additionally, the Activity Monitor can be configured to provide activity data to StealthINTERCEPT, StealthDEFEND, and/or various SIEM products. This document describes the necessary settings required to audit and monitor the target environment and to allow for successful use of: l StealthAUDIT v11.0 l Stealthbits Activity Monitor v6.0 l StealthINTERCEPT v7.3 (Through integration with Activity Monitor) l StealthDEFEND v2.7 (Through integration with Activity Monitor) NOTE: The Sensitive Data Discovery Auditing requires the StealthAUDIT Sensitive Data Discovery Add-on. The sections of this document align to the products as follows: l StealthAUDIT l StealthAUDIT Scan Options l Activity Monitoring l EMC Celerra & VNX Device Configuration for Access Auditing l EMC Celerra & VNX Device Configuration for Activity Monitoring l StealthAUDIT Connection Profile & Host List l Stealthbits Activity Monitor l Activity Monitoring l EMC Celerra & VNX Device Configuration for Activity Monitoring l StealthINTERCEPT l Activity Monitoring l EMC Celerra & VNX Device Configuration for Activity Monitoring Doc_ID 694 4 Copyright 2021 STEALTHBITS, NOW PART OF NETWRIX, ALL RIGHTS RESERVED StealthAUDIT® Stealthbits Activity Monitor® l StealthDEFEND l Activity Monitoring l EMC Celerra & VNX Device Configuration for Activity Monitoring Supported File System Platforms The versions and devices listed below are supported for Access Auditing, Activity Monitoring, and Sensitive Data Discovery Auditing. NOTE: Access Auditing and Sensitive Data Discovery Auditing support CIFS and NFSv3 (and below). Supported Network Attached Storage Devices StealthAUDIT for File Systems is compatible with scanning the following Network Attached Storage (NAS) devices as targets: l EMC® Celerra® 6.0+ l EMC® VNX®: l VNX® 7.1 l VNX® 8.1 Doc_ID 694 5 Copyright 2021 STEALTHBITS, NOW PART OF NETWRIX, ALL RIGHTS RESERVED StealthAUDIT® Stealthbits Activity Monitor® StealthAUDIT Console Server Permissions In most cases the StealthAUDIT user is a member of the local Administrators group on the StealthAUDIT Console server. However, if the Role Based Access model of StealthAUDIT usage is employed, then the user assigned the role of Job Initiator (for manual execution) or the credential used for the Schedule Service Account (for scheduled execution) must have the following permissions to execute File System scans in local mode, applet mode, or proxy mode with applet: l Group membership in either of the following local groups: l Backup Operators l Administrators These permissions grant the credential the ability to create a high integrity token capable of leveraging the “Back up files and directories” from where the StealthAUDIT executable is run. Additionally, the credential must have WRITE access to the …\StealthAUDIT\FSAA folder in the installation directory. This is required by either the user account running the StealthAUDIT application, when manually executing jobs within the console, or the Schedule Service Account assigned within StealthAUDIT, when running jobs as a scheduled tasks. Doc_ID 694 6 Copyright 2021 STEALTHBITS, NOW PART OF NETWRIX, ALL RIGHTS RESERVED StealthAUDIT® Stealthbits Activity Monitor® File System Applet Deployment Permissions If executing the File System scans in either applet mode or proxy mode with applet, then the credential must have permissions to deploy and start the applet. Remember, the applet can only be deployed to a Windows server. Configure the credential(s) with the following rights on the proxy server(s): l Group membership in the local Administrators group l Granted the “Backup files and directories” local policy privilege l Granted the “Log on as a batch” privilege l If running FSAC, the service account in the credential profile requires access to the admin share (e.g. C$) where the sbtfilemon.ini file exists CAUTION: The local policy, “Network access: Do not allow storage of passwords and credentials for network authentication” must be disabled in order for the applet to start. Doc_ID 694 7 Copyright 2021 STEALTHBITS, NOW PART OF NETWRIX, ALL RIGHTS RESERVED StealthAUDIT® Stealthbits Activity Monitor® File System Proxy Service Permissions If executing the File System scans in proxy mode as a service with RPC or secure RPC, then the File System Proxy Service should be installed on the Windows proxy server(s) prior to executing the scans. The version of the proxy service must match the major version of StealthAUDIT. The service can be run either as LocalSystem or with a domain account supplied during the installation of the File System Proxy Service with the following permission on the proxy server: l Membership in the local Administrators group l Granted the “Log on as a service” privilege (Local Security Policies > Local Policies > User Rights Assignment > Log on as a service) l If running FSAC, the service account in the credential profile requires access to the admin share (e.g. C$) where the sbtfilemon.ini file exists Additionally, the credential must have WRITE access to the …\StealthAUDIT\FSAA folder in the installation directory. NOTE: The File System Proxy Service can be installed ad hoc through a data collector configuration option. In that case, the credential in the assigned Connection Profile must have permissions to install and run the service. Remember, it is not possible to enable secure RPC while using this option. For secure RPC, a credential is supplied during installation to provide secured communications between the StealthAUDIT server and the proxy server. This credential must be a domain account, but no additional permissions are required. However, this account must be included as a StealthAUDIT Task (Domain) type credential in the Connection Profile to be used by the File System Solution. It is recommended to use the same domain account configured to run the proxy service for the secure RPC account. If secure RPC will be enabled and the service configured to run as LocalSystem, then the installer automatically adds the necessary service principal names (SPNs) to the computer object in Active Directory. If secure RPC will be enabled and the service configured to run as a supplied domain account, then it is necessary to manually configure the SPNs on the user object in Active Directory prior to installing the File System Proxy. See the StealthAUDIT File System Proxy Service Installation Guide for additional information. If installing the File System Proxy Service on multiple servers, then a custom host list of proxy servers should also be created. See the FSAA: Scan Server Selection section of the StealthAUDIT User Guides v11.0 for additional information. Doc_ID 694 8 Copyright 2021 STEALTHBITS, NOW PART OF NETWRIX, ALL RIGHTS RESERVED StealthAUDIT® Stealthbits Activity
Recommended publications
  • Tabela De Manutenção E Garantia De Produto Da
    EMC PRODUCT WARRANTY AND MAINTENANCE T ABLE The table below sets forth EMC® product-specific warranty and maintenance terms and information. Each product identified as equipment also includes its related operating system, operating environment or microcode (also defined in many contracts as “Core Software”), if any, unless the table indicates that such operating system is licensed as a separate product. Any EMC software that is licensed as a separate product and is not specifically identified on this table is governed by the terms stated in the row entitled “software.” EMC recommends that you locate products on the following table by simultaneously pressing the “Control” key and the letter “f” key to activate the “Find” feature, and then typing in the name of the applicable product. Additional information about available Support Options as well as other important information can be found by clicking the link found here. Notice: In accordance with widely used business practices in the IT industry and in support of EMC’s worldwide sustainability and recycling initiatives, Equipment may contain components that are (i) previously unused; or (ii) re-manufactured to contain the most current updates, meet all relevant test specifications and be functionally equivalent to previously unused components. Spare, upgrade and/or replacement components may be re-manufactured. EMC warranty terms apply equally to all components. For information on EMC’s recycling and sustainability efforts please click here. Product Standard Warranty Available Support
    [Show full text]
  • STORAGE CAPACITY OPTIMIZATION Truesight Capacity Optimization for Storage
    STORAGE CAPACITY OPTIMIZATION TrueSight Capacity Optimization for Storage EMC SMI-S Agent ETL TrueSight Capacity Optimization Architecture SAN EMC Disk Arrays Symmetrix, CLARiiON, VNX Native EMC (over FC or IP) BMC TrueSight Capacity Optimization SMI-S Provider SAN WBEM EMC Disk Arrays VNX EMC SMI-S Agent ETL for TrueSight Capacity Optimization Native EMC EMC SMI-S Provider (over FC or IP) Scheduler WBEM CONTROL STATION NAS EMC Disk Arrays Celerra, VNX Architecture Diagram for EMC SMI-S Provider EMC SMI-S Agent ETL for TrueSight Capacity Optimization WBEM CONTROL STATION MAIN FEATURES • Unmatched visibility into storage realm • Detailed capacity metrics on storage systems, storage pools, volumes, and hosts • Valuable performance and capacity reporting, trending, and modeling for all supported systems • Leverage existing BMC TrueSight Capacity Optimization storage-related dashboards, views, and report FEATURED PRODUCTS • Dell Compellent Enterprise Manager ETL for TrueSight Capacity Optimization • IBM SVC-Storwize ETL for TrueSight Capacity Optimization • Dell EMC Elastic Cloud Storage ETL for TrueSight Capacity Optimization • IBM XiV ETL for TrueSight Capacity Optimization • Dell EMC Unity CIM Server ETL for TrueSight Capacity Optimization • NetApp Capacity Views for TrueSight Capacity Optimization • EMC SMI-S Agent ETL for TrueSight Capacity Optimization • NetApp Data ONTAP ETL for TrueSight Capacity Optimization • EMC XtremIO Management Server ETL for TrueSight Capacity Optimization • Pure Storage REST API ETL for TrueSight Capacity Optimization • Hitachi Device Manager ETL for TrueSight Capacity Optimization • Storage All-in-One ETL for TrueSight Capacity Optimization • HP 3PAR ETL for TrueSight Capacity Optimization • Storage Capacity Views and Reports for TrueSight Capacity Optimization SUPPORTED PLATFORMS • Any Dell Compellent Storage Center compatible with Dell Compellent Enterprise Manager 6.3 and higher.
    [Show full text]
  • VCE Vblock™ System 720 Gen 4.1 Architecture Overview Revision History
    VCE Vblock™ System 720 Gen 4.1 Architecture Overview Revision history www.vce.com VCE Vblock™ System 720 Gen 4.1 Architecture Overview Document revision 4.3 June 2013 © 2013 VCE Company, LLC. © 2013 VCE Company,1 LLC. All Rights Reserved. All Rights Reserved. Revision history VCE Vblock™ System 720 Gen 4.1 Architecture Overview Revision history Date Vblock Document Author Description of changes System revision February Gen 4.0 4.0 Julie Gen 4.0 release 2013 Hamm March 2013 Gen 4.0 4.1 Julie Updated for VCE rebranding Hamm April 2013 Gen 4.1 4.2 Julie • Added VCE Vision™ Intelligent Hamm Operations • Updated VMware vSphere information • Integrated into the Gen 4.1 release June 2013 Gen 4.1 4.3 Julie Updated the bare metal support policy Hamm 2 © 2013 VCE Company, LLC. All Rights Reserved. VCE Vblock™ System 720 Gen 4.1 Architecture Overview Table of contents Table of contents Introduction ................................................................................................................................................. 6 Accessing VCE documentation ................................................................................................................. 7 Overview ...................................................................................................................................................... 8 Vblock™ System 720 overview .............................................................................................................. 8 Base configurations and scaling ..........................................................................................................
    [Show full text]
  • Micro Focus Security Arcsight Connectors Smartconnector for Dell EMC Unity and Vnxe Storage
    Micro Focus Security ArcSight Connectors SmartConnector for Dell EMC Unity and VNXe Storage Configuration Guide June, 2018 Configuration Guide SmartConnector for Dell EMC Unity and VNXe Storage June, 2018 Copyright © 2010 – 2017; 2018 Micro Focus and its affiliates and licensors. Warranty The only warranties for products and services of Micro Focus and its affiliates and licensors (“Micro Focus”) are set forth in the express warranty statements accompanying such products and services. Nothing herein should be construed as constituting an additional warranty. Micro Focus shall not be liable for technical or editorial errors or omissions contained herein. The information contained herein is subject to change without notice. Restricted Rights Legend Confidential computer software. Except as specifically indicated otherwise, a valid license from Micro Focus is required for possession, use or copying. Consistent with FAR 12.211 and 12.212, Commercial Computer Software, Computer Software Documentation, and Technical Data for Commercial Items are licensed to the U.S. Government under vendor's standard commercial license. Trademark Notices Adobe™ is a trademark of Adobe Systems Incorporated. Microsoft® and Windows® are U.S. registered trademarks of Microsoft Corporation. UNIX® is a registered trademark of The Open Group. Revision History Date Description 10/17/2017 Added encryption parameters to Global Parameters. 02/15/2017 Renamed connector from EMC VNXe Storage Systems; changed Device Vendor to 'Dell EMC' and Device Product to 'Unity'. Added mappings for Device Custom Number 1, Bytes In, Bytes Out, and Event Outcome. Added IPv6 support. 11/30/2016 Updated installation procedure for setting preferred IP address mode and for downloading Microsoft Visual C++ Redistributable.
    [Show full text]
  • Celerra Security Configuration Guide P/N 300-009-990 REV A01
    EMC® Celerra® Network Server Release 6.0 Celerra Security Configuration Guide P/N 300-009-990 REV A01 EMC Corporation Corporate Headquarters: Hopkinton, MA 01748-9103 1-508-435-1000 www.EMC.com 2 of 102 Release 6.0 Celerra Security Configuration Guide Contents Introduction . .5 System requirements . .5 Cautions and warnings . .5 User interface choices . .5 Terminology . .6 Related information . .8 Concepts. .10 Planning considerations for user identification and authentication . .20 Planning considerations for using an external LDAP-based directory server for user identification and authentication . .22 Planning considerations for role-based user access . .25 Planning considerations for password security . .29 Planning considerations for Public Key Infrastructure. .30 Configuring the use of an external LDAP-based directory server for user identification and authentication . .34 Configuring password policy . .37 Define password policy interactively . .37 Define specific password policy definitions . .38 Set password expiration period . .38 Configuring session timeout . .39 Prerequisites . .39 Change the session timeout value . .39 Customizing a login banner . .41 Creating a message of the day (MOTD) . .42 Protecting session tokens . .43 Configuring network encryption and authentication using the SSL protocol . .44 Using HTTPS . .44 Using SSL with LDAP. .44 Change the default SSL protocol . .44 Change the default SSL cipher suite . .45 Postrequisites . .46 Configuring PKI . .47 Creating the certificate provided by the persona . .47 Obtaining CA certificates. .47 Using the Control Station as the CA. .47 Generate a key set and certificate request. .48 Send the certificate request to the CA . .51 Import a CA-signed certificate. .52 List the available CA certificates . .54 Acquire a CA certificate .
    [Show full text]
  • Dell EMC : Cloud Insights
    Dell EMC Cloud Insights NetApp September 24, 2021 This PDF was generated from https://docs.netapp.com/us- en/cloudinsights/task_dc_emc_datadomain.html on September 24, 2021. Always check docs.netapp.com for the latest. Table of Contents Dell EMC . 1 DELL EMC Data Domain data collector. 1 Configuring the EMC ECS data collector . 2 Dell EMC Isilon data collector . 3 Dell EMC PowerStore data collector . 4 Dell EMC RecoverPoint data collector . 6 DELL EMC ScaleIO data collector . 7 Configuring the EMC Unity data collector . 8 Dell EMC VMAX and PowerMax Family of Devices data collector . 9 Dell EMC VNX Block Storage (NaviCLI) data collector . 13 DELL EMC VNX File (formerly Celerra Unified Storage System) data collector . 15 Configuring the EMC VNX Unified data collector. 17 Configuring the EMC VPLEX data collector. 18 Dell EMC XtremeIO data collector . 20 Dell EMC DELL EMC Data Domain data collector This data collector gathers inventory and performance information from DELL EMC Data Domain deduplication storage systems. To configure this data collector, there are specific configuration instructions and usage recommendations you must follow. Terminology Cloud Insights acquires the following inventory information from the Data Domain data collector. For each asset type acquired by Cloud Insights, the most common terminology used for this asset is shown. When viewing or troubleshooting this data collector, keep the following terminology in mind: Vendor/Model Term Cloud Insights Term Disk Disk Array Storage FC Port Port File System Internal Volume Quota Quota NFS and CIFS share FileShare Note: These are common terminology mappings only and might not represent every case for this data colletor.
    [Show full text]
  • SOLUTION OVERVIEW EMC Celerra Multi-Path File System (MPFS) with Telestream Trafficmanager Solution
    SOLUTION OVERVIEW EMC Celerra Multi-Path File System (MPFS) with Telestream TrafficManager Solution The Big Picture: • Maximize performance – EMC’s Celerra Multi-Path File System, combines the benefits of NAS file sharing with the performance and scalability attributes of a SAN. As more Telestream TrafficManager video encoding nodes are added, more performance throughput is delivered resulting in shorter video conversion time. • Cost reduction - Moving video files from locally attached storage, to a consolidated Celerra Unified Storage solution with Telestream TrafficManager allows greater cost savings, while accelerating the application performance with Celerra MPFS. • Redundancy - MPFS-enabled storage combined with Telestream’s peer-to-peer fully redundant server arrays provide a highly resilient, fully redundant video processing platform. • Optimized environment - Consolidate redundant locally attached storage to high performance NAS thereby improving transaction throughput and reducing elapsed video encoding runtimes. • Application transparency - MPFS works seamlessly with TrafficManager, so no application changes are required. Celerra MPFS with Telestream TrafficManager The conversion of video files between different formats is a complex computing task. High Definition (HD) video files can be hundreds of gigabytes in size, and converting files for use between different systems typically requires a great deal of CPU power, RAM, and I/O throughput. Further, the speed of conversion and creation of video files is a critical metric for many media companies. Typically video production processes run against hard deadlines, and last-minute changes may require that hours of video content be converted in minutes. Telestream develops products that create and transform video files, including tools that automate video processes. The Celerra MPFS with Telestream’s TrafficManager™ solution is used to automate the video processes for video advertising and syndication content for broadcast, cable, and other media companies.
    [Show full text]
  • Evaluation Guides Workbooks SAN Storage NAS Storage
    The following technologies and products are covered in SAN Storage our research. All matrices and products are updated with • Dell EMC Compellent Storage Center, EQualLogic Storage announcements and product changes. Last updated: System, Unity, VMAX All Flash, VMAX3, VNX SAN, XtremIO January 2018 • Fujitsu ETERNUS DX Systems, DX8700-8900 S3, DX500 S3, Comparison Matrices (Standard PDF & DX600 S3, DX200 S3, DX100 S3 • Interactive) HDS VSP G-1500 and F-1500, VSP Midrange, HUSVM HPE StoreServ 3Par 20000, 10000, 8000 (All Flash), • Archive Software • HPE StoreServ 8000, 20000, XP7, StoreVirtual 4000, MSA • Data Protection Systems Virtual 2040 • Data Protection Systems (Entry, Midrange, High End) • Huawei OceanStor 1800, 6800, S2200T • Hyper-Converged • IBM DS8000, XIV, V7000, V5000, V3700, DCS3700, DS3500 • NAS Storage (Entry, Midrange, High End) • IBM FlashSystem 900 • Software Defined Storage • IBM FlashSystem A9000 and A9000R • Object Storage • InfiniDAT InfiniBox • SAN Storage (Entry, Midrange, High End) • NetApp AFF, FAS, EF550 Flash Array, EF560 Flash Array, • Storage Virtualization Solutions E2800 Storage System, FAS2500, FAS8000 & AFF8000 • Storage Resource Management E2600, E2700, E5400, E5500, E5600 SolidFire • HPE Nimble AF Series, CS Series Evaluation Guides • Nimbus Data Gemini • Archive Systems • Oracle FS1 • Data Protection Systems • Pure Storage FlashArray • Hyperconverged • Tegile IntelliFlash (bought by Western Digital) • NAS Storage • Tintri VMStore • Object Storage • Violin Memory All-Flash Array (Archived) • Software Defined
    [Show full text]
  • Download This Article in PDF Format
    E3S Web of Conferences 135, 04076 (2019) https://doi.org/10.1051/e3sconf/201913504076 ITESE-2019 State of current data storage market and development of tools for increasing data storage systems reliability Marina Bolsunovskaya1*, Svetlana Shirokova1, and Aleksandra Loginova1 1Peter the Great St. Petersburg Polytechnic University, 195251, 29, Polytechnicheskaya str., St.Petersburg, Russia Abstract. This paper is devoted to the problem of developing and application of data storage systems (DSS) and tools for managing such systems to predict failures and provide fault tolerance specifications. Nowadays DSS are widely used for collecting data in Smart Home and Smart Cites management systems. For example, large data warehouses are utilized in traffic management systems. The results of the current data storage market state analysis are shown, and the project the purpose of which is to develop a hardware and software complex to predict failures in the storage system is presented. 1 Introduction 1.1 Smart city data warehouses Nowadays there are emerging more and more examples of “smart cities” information infrastructures, both in Europe and in Russia. At the beginning of 2019, the National competence center “Smart city” was established in our country. However successful projects of “smart cities” systems management appeared earlier, one example is the data processing center for “Smart city” in Nizhny Novgorod (since 2018), the volume of data storage of which is up to 900 Petabytes [1]. Automated traffic management systems, security systems, energy systems and others are an important part of the “smart city” infrastructure. Such systems require collecting of large amounts of data in real time, therefore, the problem of * Corresponding author: [email protected] © The Authors, published by EDP Sciences.
    [Show full text]
  • Ampex Storage Models
    Storage Makes Models As of 02.03.2010 Page 1 of 6 Apple Storage Models X_ Serve Models Raid Storage Device Ampex Storage Models Ampex_Series DST712 Compellent Storage Models Series 30 Series_30_SAN Storage Makes Models As of 02.03.2010 Page 2 of 6 ***** Dell ***** Dell ***** Dell ***** Dell *** Storage Models *** Dell ***** Dell ***** EqualLogic_SAN_PS5 EqualLogic_SAN_P EMC_SAN_Arrays_ SAN_Arrays_AX PowerVault_DAS EqualLogic_SAN_PS6000_Series 000_Series S4000_Series CX4_CX_Series _Series NAS_NX_Series Models Models Models Models Models Models Models MD3000 PS6000E PS5500E iSCSI Array PS4000E Array CX200 AX4-5F NF100 MD1120 PS6500E PS5000E iSCSI Array PS4000X Array CX300 AX4-5I NF500 MD1000 PS6000X PS5000XV iSCSI Array PS4000XV Array CX380 NF600 220S PS6000XV CX4-120 NX1950 PS6000S CX4-240 NX3000 CX4-480 NX4 CX4-960 Dell Storage Models PowerVault_Tape_Library Models PowerVault_NAS 100T/110T/L to 4-120 745N 112T 220S 114T 114X RD1000 122T 124T 132T 200S 220S 650F DL2000 ML600 ML6000 Storage Makes Models As of 02.03.2010 Page 3 of 6 ML6020 RD1000 TL2000 TL4000 ***** EMC ***** EMC *** Storage Models *** EMC ***** EMC ***** Celerra Centerra CLARiiON Connectrix DataDomain Symmetrix Models Models Models Models Models Models NS-120 Backup & Recovery Module 10 ED-48000B DS-5300B DD430 DMX-4 NS-40 Compliance Edition 20 ED-DCX-4S-B ES-5832B DMX-4 950 NS-480 Compliance Edition Plus 40 ED-DCX-B MDS-9124 SRDF NS-602G SDK for XAM 80 MDS-9506-V2 MDS-9134 V-MAX NS-960 Seek & EMC Chargeback Reporter 120 MDS-9509-V2 MDS-9222i NS-G2 480 MDS-9513 MP-7500B
    [Show full text]
  • EMC VNX with the Cloud Tiering Appliance a Detailed Review
    White Paper EMC VNX with the Cloud Tiering Appliance A Detailed Review Abstract This paper describes the EMC Cloud Tiering Appliance (CTA), which enables NAS data tiering. CTA allows administrators to move inactive data from high-performance storage to less- expensive archival storage, enabling cost-effective use of file storage. CTA also facilitates data migration, or moving data to new shares or exports. March 2015 Copyright © 2013 EMC Corporation. All Rights Reserved. EMC believes the information in this publication is accurate as of its publication date. The information is subject to change without notice. The information in this publication is provided “as is.” EMC Corporation makes no representations or warranties of any kind with respect to the information in this publication, and specifically disclaims implied warranties of merchantability or fitness for a particular purpose. Use, copying, and distribution of any EMC software described in this publication requires an applicable software license. For the most up-to-date listing of EMC product names, see EMC Corporation Trademarks on EMC.com. VMware and VMware ESX are registered trademarks or trademarks of VMware, Inc. in the United States and/or other jurisdictions. All other trademarks used herein are the property of their respective owners. Part Number H10777.2 VNX with the Cloud Tiering Appliance 2 Table of Contents Executive summary.................................................................................................. 4 Business case ...................................................................................................................
    [Show full text]
  • VNX - the STORAGE [R]EVOLUTION a COMPARATIVE APPROACH with OTHER STORAGE PLATFORMS Siva Shankari Chandrasekaran Systems Engineer Tata Consultancy Services
    VNX - THE STORAGE [R]EVOLUTION A COMPARATIVE APPROACH WITH OTHER STORAGE PLATFORMS Siva Shankari Chandrasekaran Systems Engineer Tata Consultancy Services Table of Contents Introduction ................................................................................................................................ 3 Various Data Access Solutions .................................................................................................. 4 Block Level Access................................................................................................................. 4 File Level Access ................................................................................................................... 4 Object-Based Access ............................................................................................................. 4 Various Storage Network Architectures ...................................................................................... 5 Direct Attached Storage ......................................................................................................... 5 Network Attached Storage ...................................................................................................... 6 Storage Area Network ...........................................................................................................11 Unified Storage Infrastructure ...................................................................................................15 What is VNX? ...........................................................................................................................16
    [Show full text]