Celerra Security Configuration Guide P/N 300-009-990 REV A01

Total Page:16

File Type:pdf, Size:1020Kb

Celerra Security Configuration Guide P/N 300-009-990 REV A01 EMC® Celerra® Network Server Release 6.0 Celerra Security Configuration Guide P/N 300-009-990 REV A01 EMC Corporation Corporate Headquarters: Hopkinton, MA 01748-9103 1-508-435-1000 www.EMC.com 2 of 102 Release 6.0 Celerra Security Configuration Guide Contents Introduction . .5 System requirements . .5 Cautions and warnings . .5 User interface choices . .5 Terminology . .6 Related information . .8 Concepts. .10 Planning considerations for user identification and authentication . .20 Planning considerations for using an external LDAP-based directory server for user identification and authentication . .22 Planning considerations for role-based user access . .25 Planning considerations for password security . .29 Planning considerations for Public Key Infrastructure. .30 Configuring the use of an external LDAP-based directory server for user identification and authentication . .34 Configuring password policy . .37 Define password policy interactively . .37 Define specific password policy definitions . .38 Set password expiration period . .38 Configuring session timeout . .39 Prerequisites . .39 Change the session timeout value . .39 Customizing a login banner . .41 Creating a message of the day (MOTD) . .42 Protecting session tokens . .43 Configuring network encryption and authentication using the SSL protocol . .44 Using HTTPS . .44 Using SSL with LDAP. .44 Change the default SSL protocol . .44 Change the default SSL cipher suite . .45 Postrequisites . .46 Configuring PKI . .47 Creating the certificate provided by the persona . .47 Obtaining CA certificates. .47 Using the Control Station as the CA. .47 Generate a key set and certificate request. .48 Send the certificate request to the CA . .51 Import a CA-signed certificate. .52 List the available CA certificates . .54 Acquire a CA certificate . .54 Import a CA certificate . .57 Generate a new Control Station CA certificate . .57 Display the certificate. .58 Distribute the Control Station CA certificate . .60 Managing PKI . .61 Display key set and certificate properties . .61 Check for expired key sets . .62 Clear key sets . .62 Celerra Security Configuration Guide Release 6.0 3 of 102 Display CA certificate properties . .63 Check for expired CA certificates . .63 Delete CA certificates. .64 Troubleshooting. .65 Where to get help . .65 EMC E-Lab Interoperability Navigator . .65 Troubleshooting the Control Station connection to a LDAP-based directory server . .65 Troubleshooting local user accounts. .66 Troubleshooting domain-mapped user accounts . .68 Troubleshooting certificate imports . .68 Error messages. .70 Training and Professional Services . .70 Appendix A: CLI role-based access setup . .71 Appendix B: Supported SSL cipher suites . .81 Appendix C: Understanding your LDAP-based directory server configuration . .83 Active Directory Users & Computers . .83 Ldap Admin . .90 Index . .99 4 of 102 Release 6.0 Celerra Security Configuration Guide Introduction The EMC® Celerra® Network Server implements a variety of security features to control user and network access, monitor system access and use, and support the transmission of encrypted data. These security features are implemented on the Control Station and Data Movers. This document explains why, when, and how to use these security features. A basic understanding of these features is important to understanding Celerra security. "Concepts" on page 10 provides more details. This document is part of the Celerra Network Server documentation set and is intended for administrators responsible for the overall configuration and operation of the Celerra. System requirements Table 1 on page 5 describes the Celerra Network Server software, hardware, network, and storage configurations. Table 1 Security system requirements Software Celerra Network Server version 6.0 Hardware No specific hardware requirements Network No specific network requirements Storage No specific storage requirements Cautions and warnings If any of this information is unclear, contact your EMC Customer Support Representative for assistance. If you do not change the default passwords during installation, you should change them as soon as possible. User interface choices The Celerra Network Server offers flexibility in managing networked storage that is based on your support environment and interface preferences. This document describes how to configure security features by using the command line interface (CLI). You can also perform many of these tasks by using the EMC Unisphere™ software. The Unisphere online help contains additional information about managing your Celerra. The Celerra Network Server Release Notes contain additional, late-breaking information about Celerra management applications. Celerra Security Configuration Guide Release 6.0 5 of 102 Terminology The Celerra Glossary provides a complete list of Celerra terminology. access control entry (ACE): In a Microsoft Windows environment, an element of an access control list (ACL). This element defines access rights to a file for a user or group. access control list (ACL): A list of access control entries (ACEs) that provide information about the users and groups allowed access to an object. access policy: The policy that defines what access control methods (NFS permissions and/or Windows ACLs) are enforced when a user accesses a file on a Celerra system in an environment configured to provide multiprotocol access to some file systems. The access policy is set with the server_mount command and also determines what actions a user can perform against a file or directory. authentication: The process for verifying the identity of a user trying to access a resource or object, such as a file or a directory. Certificate Authority (CA): A trusted third party that digitally signs public key certificates. Certificate Authority Certificate: A digitally signed association between an identity (a Certificate Authority) and a public key to be used by the host to verify digital signatures on Public Key Certificates. command line interface (CLI): An interface for entering commands through the Control Station to perform tasks that include the management and configuration of the database and Data Movers and the monitoring of statistics for the Celerra cabinet components. Common Internet File System (CIFS): A file-sharing protocol based on the Microsoft Server Message Block (SMB). It allows users to share file systems over the Internet and intranets. Control Station: A hardware and software component of the Celerra Network Server that manages the system and provides an administrative user interface to Celerra components. Data Mover: A Celerra Network Server cabinet component running its own operating system that retrieves files from a storage device and makes them available to a network client. digital certificate: An electronic ID issued by a certificate authority that establishes a user’s credentials. It contains the user’s identity (a hostname), a serial number, expiration dates, a copy of the certificate holder's public key (used for encrypting messages and digital signatures), and a digital signature from the certificate-issuing authority so that a recipient can verify that the certificate is valid. directory server: A server that stores and organizes information about a computer network's users and network resources, and that allows network administrators to manage users' access to the resources. X.500 is the best-known open directory service. Proprietary directory services include Microsoft’s Active Directory. Hypertext Transfer Protocol (HTTP): The communications protocol used to connect to servers on the World Wide Web. Hypertext Transfer Protocol Secure (HTTPS): HTTP over SSL. All network traffic between the client and server system is encrypted. In addition, there is the option to 6 of 102 Release 6.0 Celerra Security Configuration Guide verify server and client identities. Typically server identities are verified and client identities are not. Kerberos: An authentication, data integrity, and data privacy encryption mechanism used to encode authentication information. Kerberos coexists with NTLM (Netlogon services) and, using secret-key cryptography, provides authentication for client/server applications. LDAP-based directory: A directory server that provides access by LDAP. Examples of LDAP-based directory servers include OpenLDAP or iPlanet (also known as Sun Java System Directory Server and Sun ONE Directory Server). Lightweight Directory Access Protocol (LDAP): An industry-standard information access protocol that runs directly over TCP/IP. It is the primary access protocol for Active Directory and LDAP-based directory servers. LDAP Version 3 is defined by a set of Proposed Standard documents in Internet Engineering Task Force (IETF) RFC 2251. Network File System (NFS): A distributed file system providing transparent access to remote file systems. NFS allows all network systems to share a single copy of a directory. OpenLDAP: The open source implementation of an LDAP-based directory service. persona: A means of providing an identity for a Data Mover as either a server or a client through a private key and associated public key certificate. Each persona can maintain up to two sets of keys (current and next), to allow for the generation of new keys and certificates prior to the expiration of the current certificate. Public Key Infrastructure (PKI): A means of managing private keys and associated public key certificates for use in Public Key Cryptography. Simple Network Management Protocol (SNMP): Method
Recommended publications
  • Tabela De Manutenção E Garantia De Produto Da
    EMC PRODUCT WARRANTY AND MAINTENANCE T ABLE The table below sets forth EMC® product-specific warranty and maintenance terms and information. Each product identified as equipment also includes its related operating system, operating environment or microcode (also defined in many contracts as “Core Software”), if any, unless the table indicates that such operating system is licensed as a separate product. Any EMC software that is licensed as a separate product and is not specifically identified on this table is governed by the terms stated in the row entitled “software.” EMC recommends that you locate products on the following table by simultaneously pressing the “Control” key and the letter “f” key to activate the “Find” feature, and then typing in the name of the applicable product. Additional information about available Support Options as well as other important information can be found by clicking the link found here. Notice: In accordance with widely used business practices in the IT industry and in support of EMC’s worldwide sustainability and recycling initiatives, Equipment may contain components that are (i) previously unused; or (ii) re-manufactured to contain the most current updates, meet all relevant test specifications and be functionally equivalent to previously unused components. Spare, upgrade and/or replacement components may be re-manufactured. EMC warranty terms apply equally to all components. For information on EMC’s recycling and sustainability efforts please click here. Product Standard Warranty Available Support
    [Show full text]
  • STORAGE CAPACITY OPTIMIZATION Truesight Capacity Optimization for Storage
    STORAGE CAPACITY OPTIMIZATION TrueSight Capacity Optimization for Storage EMC SMI-S Agent ETL TrueSight Capacity Optimization Architecture SAN EMC Disk Arrays Symmetrix, CLARiiON, VNX Native EMC (over FC or IP) BMC TrueSight Capacity Optimization SMI-S Provider SAN WBEM EMC Disk Arrays VNX EMC SMI-S Agent ETL for TrueSight Capacity Optimization Native EMC EMC SMI-S Provider (over FC or IP) Scheduler WBEM CONTROL STATION NAS EMC Disk Arrays Celerra, VNX Architecture Diagram for EMC SMI-S Provider EMC SMI-S Agent ETL for TrueSight Capacity Optimization WBEM CONTROL STATION MAIN FEATURES • Unmatched visibility into storage realm • Detailed capacity metrics on storage systems, storage pools, volumes, and hosts • Valuable performance and capacity reporting, trending, and modeling for all supported systems • Leverage existing BMC TrueSight Capacity Optimization storage-related dashboards, views, and report FEATURED PRODUCTS • Dell Compellent Enterprise Manager ETL for TrueSight Capacity Optimization • IBM SVC-Storwize ETL for TrueSight Capacity Optimization • Dell EMC Elastic Cloud Storage ETL for TrueSight Capacity Optimization • IBM XiV ETL for TrueSight Capacity Optimization • Dell EMC Unity CIM Server ETL for TrueSight Capacity Optimization • NetApp Capacity Views for TrueSight Capacity Optimization • EMC SMI-S Agent ETL for TrueSight Capacity Optimization • NetApp Data ONTAP ETL for TrueSight Capacity Optimization • EMC XtremIO Management Server ETL for TrueSight Capacity Optimization • Pure Storage REST API ETL for TrueSight Capacity Optimization • Hitachi Device Manager ETL for TrueSight Capacity Optimization • Storage All-in-One ETL for TrueSight Capacity Optimization • HP 3PAR ETL for TrueSight Capacity Optimization • Storage Capacity Views and Reports for TrueSight Capacity Optimization SUPPORTED PLATFORMS • Any Dell Compellent Storage Center compatible with Dell Compellent Enterprise Manager 6.3 and higher.
    [Show full text]
  • VCE Vblock™ System 720 Gen 4.1 Architecture Overview Revision History
    VCE Vblock™ System 720 Gen 4.1 Architecture Overview Revision history www.vce.com VCE Vblock™ System 720 Gen 4.1 Architecture Overview Document revision 4.3 June 2013 © 2013 VCE Company, LLC. © 2013 VCE Company,1 LLC. All Rights Reserved. All Rights Reserved. Revision history VCE Vblock™ System 720 Gen 4.1 Architecture Overview Revision history Date Vblock Document Author Description of changes System revision February Gen 4.0 4.0 Julie Gen 4.0 release 2013 Hamm March 2013 Gen 4.0 4.1 Julie Updated for VCE rebranding Hamm April 2013 Gen 4.1 4.2 Julie • Added VCE Vision™ Intelligent Hamm Operations • Updated VMware vSphere information • Integrated into the Gen 4.1 release June 2013 Gen 4.1 4.3 Julie Updated the bare metal support policy Hamm 2 © 2013 VCE Company, LLC. All Rights Reserved. VCE Vblock™ System 720 Gen 4.1 Architecture Overview Table of contents Table of contents Introduction ................................................................................................................................................. 6 Accessing VCE documentation ................................................................................................................. 7 Overview ...................................................................................................................................................... 8 Vblock™ System 720 overview .............................................................................................................. 8 Base configurations and scaling ..........................................................................................................
    [Show full text]
  • Micro Focus Security Arcsight Connectors Smartconnector for Dell EMC Unity and Vnxe Storage
    Micro Focus Security ArcSight Connectors SmartConnector for Dell EMC Unity and VNXe Storage Configuration Guide June, 2018 Configuration Guide SmartConnector for Dell EMC Unity and VNXe Storage June, 2018 Copyright © 2010 – 2017; 2018 Micro Focus and its affiliates and licensors. Warranty The only warranties for products and services of Micro Focus and its affiliates and licensors (“Micro Focus”) are set forth in the express warranty statements accompanying such products and services. Nothing herein should be construed as constituting an additional warranty. Micro Focus shall not be liable for technical or editorial errors or omissions contained herein. The information contained herein is subject to change without notice. Restricted Rights Legend Confidential computer software. Except as specifically indicated otherwise, a valid license from Micro Focus is required for possession, use or copying. Consistent with FAR 12.211 and 12.212, Commercial Computer Software, Computer Software Documentation, and Technical Data for Commercial Items are licensed to the U.S. Government under vendor's standard commercial license. Trademark Notices Adobe™ is a trademark of Adobe Systems Incorporated. Microsoft® and Windows® are U.S. registered trademarks of Microsoft Corporation. UNIX® is a registered trademark of The Open Group. Revision History Date Description 10/17/2017 Added encryption parameters to Global Parameters. 02/15/2017 Renamed connector from EMC VNXe Storage Systems; changed Device Vendor to 'Dell EMC' and Device Product to 'Unity'. Added mappings for Device Custom Number 1, Bytes In, Bytes Out, and Event Outcome. Added IPv6 support. 11/30/2016 Updated installation procedure for setting preferred IP address mode and for downloading Microsoft Visual C++ Redistributable.
    [Show full text]
  • Dell EMC : Cloud Insights
    Dell EMC Cloud Insights NetApp September 24, 2021 This PDF was generated from https://docs.netapp.com/us- en/cloudinsights/task_dc_emc_datadomain.html on September 24, 2021. Always check docs.netapp.com for the latest. Table of Contents Dell EMC . 1 DELL EMC Data Domain data collector. 1 Configuring the EMC ECS data collector . 2 Dell EMC Isilon data collector . 3 Dell EMC PowerStore data collector . 4 Dell EMC RecoverPoint data collector . 6 DELL EMC ScaleIO data collector . 7 Configuring the EMC Unity data collector . 8 Dell EMC VMAX and PowerMax Family of Devices data collector . 9 Dell EMC VNX Block Storage (NaviCLI) data collector . 13 DELL EMC VNX File (formerly Celerra Unified Storage System) data collector . 15 Configuring the EMC VNX Unified data collector. 17 Configuring the EMC VPLEX data collector. 18 Dell EMC XtremeIO data collector . 20 Dell EMC DELL EMC Data Domain data collector This data collector gathers inventory and performance information from DELL EMC Data Domain deduplication storage systems. To configure this data collector, there are specific configuration instructions and usage recommendations you must follow. Terminology Cloud Insights acquires the following inventory information from the Data Domain data collector. For each asset type acquired by Cloud Insights, the most common terminology used for this asset is shown. When viewing or troubleshooting this data collector, keep the following terminology in mind: Vendor/Model Term Cloud Insights Term Disk Disk Array Storage FC Port Port File System Internal Volume Quota Quota NFS and CIFS share FileShare Note: These are common terminology mappings only and might not represent every case for this data colletor.
    [Show full text]
  • SOLUTION OVERVIEW EMC Celerra Multi-Path File System (MPFS) with Telestream Trafficmanager Solution
    SOLUTION OVERVIEW EMC Celerra Multi-Path File System (MPFS) with Telestream TrafficManager Solution The Big Picture: • Maximize performance – EMC’s Celerra Multi-Path File System, combines the benefits of NAS file sharing with the performance and scalability attributes of a SAN. As more Telestream TrafficManager video encoding nodes are added, more performance throughput is delivered resulting in shorter video conversion time. • Cost reduction - Moving video files from locally attached storage, to a consolidated Celerra Unified Storage solution with Telestream TrafficManager allows greater cost savings, while accelerating the application performance with Celerra MPFS. • Redundancy - MPFS-enabled storage combined with Telestream’s peer-to-peer fully redundant server arrays provide a highly resilient, fully redundant video processing platform. • Optimized environment - Consolidate redundant locally attached storage to high performance NAS thereby improving transaction throughput and reducing elapsed video encoding runtimes. • Application transparency - MPFS works seamlessly with TrafficManager, so no application changes are required. Celerra MPFS with Telestream TrafficManager The conversion of video files between different formats is a complex computing task. High Definition (HD) video files can be hundreds of gigabytes in size, and converting files for use between different systems typically requires a great deal of CPU power, RAM, and I/O throughput. Further, the speed of conversion and creation of video files is a critical metric for many media companies. Typically video production processes run against hard deadlines, and last-minute changes may require that hours of video content be converted in minutes. Telestream develops products that create and transform video files, including tools that automate video processes. The Celerra MPFS with Telestream’s TrafficManager™ solution is used to automate the video processes for video advertising and syndication content for broadcast, cable, and other media companies.
    [Show full text]
  • Evaluation Guides Workbooks SAN Storage NAS Storage
    The following technologies and products are covered in SAN Storage our research. All matrices and products are updated with • Dell EMC Compellent Storage Center, EQualLogic Storage announcements and product changes. Last updated: System, Unity, VMAX All Flash, VMAX3, VNX SAN, XtremIO January 2018 • Fujitsu ETERNUS DX Systems, DX8700-8900 S3, DX500 S3, Comparison Matrices (Standard PDF & DX600 S3, DX200 S3, DX100 S3 • Interactive) HDS VSP G-1500 and F-1500, VSP Midrange, HUSVM HPE StoreServ 3Par 20000, 10000, 8000 (All Flash), • Archive Software • HPE StoreServ 8000, 20000, XP7, StoreVirtual 4000, MSA • Data Protection Systems Virtual 2040 • Data Protection Systems (Entry, Midrange, High End) • Huawei OceanStor 1800, 6800, S2200T • Hyper-Converged • IBM DS8000, XIV, V7000, V5000, V3700, DCS3700, DS3500 • NAS Storage (Entry, Midrange, High End) • IBM FlashSystem 900 • Software Defined Storage • IBM FlashSystem A9000 and A9000R • Object Storage • InfiniDAT InfiniBox • SAN Storage (Entry, Midrange, High End) • NetApp AFF, FAS, EF550 Flash Array, EF560 Flash Array, • Storage Virtualization Solutions E2800 Storage System, FAS2500, FAS8000 & AFF8000 • Storage Resource Management E2600, E2700, E5400, E5500, E5600 SolidFire • HPE Nimble AF Series, CS Series Evaluation Guides • Nimbus Data Gemini • Archive Systems • Oracle FS1 • Data Protection Systems • Pure Storage FlashArray • Hyperconverged • Tegile IntelliFlash (bought by Western Digital) • NAS Storage • Tintri VMStore • Object Storage • Violin Memory All-Flash Array (Archived) • Software Defined
    [Show full text]
  • Download This Article in PDF Format
    E3S Web of Conferences 135, 04076 (2019) https://doi.org/10.1051/e3sconf/201913504076 ITESE-2019 State of current data storage market and development of tools for increasing data storage systems reliability Marina Bolsunovskaya1*, Svetlana Shirokova1, and Aleksandra Loginova1 1Peter the Great St. Petersburg Polytechnic University, 195251, 29, Polytechnicheskaya str., St.Petersburg, Russia Abstract. This paper is devoted to the problem of developing and application of data storage systems (DSS) and tools for managing such systems to predict failures and provide fault tolerance specifications. Nowadays DSS are widely used for collecting data in Smart Home and Smart Cites management systems. For example, large data warehouses are utilized in traffic management systems. The results of the current data storage market state analysis are shown, and the project the purpose of which is to develop a hardware and software complex to predict failures in the storage system is presented. 1 Introduction 1.1 Smart city data warehouses Nowadays there are emerging more and more examples of “smart cities” information infrastructures, both in Europe and in Russia. At the beginning of 2019, the National competence center “Smart city” was established in our country. However successful projects of “smart cities” systems management appeared earlier, one example is the data processing center for “Smart city” in Nizhny Novgorod (since 2018), the volume of data storage of which is up to 900 Petabytes [1]. Automated traffic management systems, security systems, energy systems and others are an important part of the “smart city” infrastructure. Such systems require collecting of large amounts of data in real time, therefore, the problem of * Corresponding author: [email protected] © The Authors, published by EDP Sciences.
    [Show full text]
  • Ampex Storage Models
    Storage Makes Models As of 02.03.2010 Page 1 of 6 Apple Storage Models X_ Serve Models Raid Storage Device Ampex Storage Models Ampex_Series DST712 Compellent Storage Models Series 30 Series_30_SAN Storage Makes Models As of 02.03.2010 Page 2 of 6 ***** Dell ***** Dell ***** Dell ***** Dell *** Storage Models *** Dell ***** Dell ***** EqualLogic_SAN_PS5 EqualLogic_SAN_P EMC_SAN_Arrays_ SAN_Arrays_AX PowerVault_DAS EqualLogic_SAN_PS6000_Series 000_Series S4000_Series CX4_CX_Series _Series NAS_NX_Series Models Models Models Models Models Models Models MD3000 PS6000E PS5500E iSCSI Array PS4000E Array CX200 AX4-5F NF100 MD1120 PS6500E PS5000E iSCSI Array PS4000X Array CX300 AX4-5I NF500 MD1000 PS6000X PS5000XV iSCSI Array PS4000XV Array CX380 NF600 220S PS6000XV CX4-120 NX1950 PS6000S CX4-240 NX3000 CX4-480 NX4 CX4-960 Dell Storage Models PowerVault_Tape_Library Models PowerVault_NAS 100T/110T/L to 4-120 745N 112T 220S 114T 114X RD1000 122T 124T 132T 200S 220S 650F DL2000 ML600 ML6000 Storage Makes Models As of 02.03.2010 Page 3 of 6 ML6020 RD1000 TL2000 TL4000 ***** EMC ***** EMC *** Storage Models *** EMC ***** EMC ***** Celerra Centerra CLARiiON Connectrix DataDomain Symmetrix Models Models Models Models Models Models NS-120 Backup & Recovery Module 10 ED-48000B DS-5300B DD430 DMX-4 NS-40 Compliance Edition 20 ED-DCX-4S-B ES-5832B DMX-4 950 NS-480 Compliance Edition Plus 40 ED-DCX-B MDS-9124 SRDF NS-602G SDK for XAM 80 MDS-9506-V2 MDS-9134 V-MAX NS-960 Seek & EMC Chargeback Reporter 120 MDS-9509-V2 MDS-9222i NS-G2 480 MDS-9513 MP-7500B
    [Show full text]
  • EMC VNX with the Cloud Tiering Appliance a Detailed Review
    White Paper EMC VNX with the Cloud Tiering Appliance A Detailed Review Abstract This paper describes the EMC Cloud Tiering Appliance (CTA), which enables NAS data tiering. CTA allows administrators to move inactive data from high-performance storage to less- expensive archival storage, enabling cost-effective use of file storage. CTA also facilitates data migration, or moving data to new shares or exports. March 2015 Copyright © 2013 EMC Corporation. All Rights Reserved. EMC believes the information in this publication is accurate as of its publication date. The information is subject to change without notice. The information in this publication is provided “as is.” EMC Corporation makes no representations or warranties of any kind with respect to the information in this publication, and specifically disclaims implied warranties of merchantability or fitness for a particular purpose. Use, copying, and distribution of any EMC software described in this publication requires an applicable software license. For the most up-to-date listing of EMC product names, see EMC Corporation Trademarks on EMC.com. VMware and VMware ESX are registered trademarks or trademarks of VMware, Inc. in the United States and/or other jurisdictions. All other trademarks used herein are the property of their respective owners. Part Number H10777.2 VNX with the Cloud Tiering Appliance 2 Table of Contents Executive summary.................................................................................................. 4 Business case ...................................................................................................................
    [Show full text]
  • VNX - the STORAGE [R]EVOLUTION a COMPARATIVE APPROACH with OTHER STORAGE PLATFORMS Siva Shankari Chandrasekaran Systems Engineer Tata Consultancy Services
    VNX - THE STORAGE [R]EVOLUTION A COMPARATIVE APPROACH WITH OTHER STORAGE PLATFORMS Siva Shankari Chandrasekaran Systems Engineer Tata Consultancy Services Table of Contents Introduction ................................................................................................................................ 3 Various Data Access Solutions .................................................................................................. 4 Block Level Access................................................................................................................. 4 File Level Access ................................................................................................................... 4 Object-Based Access ............................................................................................................. 4 Various Storage Network Architectures ...................................................................................... 5 Direct Attached Storage ......................................................................................................... 5 Network Attached Storage ...................................................................................................... 6 Storage Area Network ...........................................................................................................11 Unified Storage Infrastructure ...................................................................................................15 What is VNX? ...........................................................................................................................16
    [Show full text]
  • File System Auditing with Dell EMC Powerscale and Dell EMC Common Event Enabler
    Technical White Paper File System Auditing with Dell EMC PowerScale and Dell EMC Common Event Enabler Abstract This white paper outlines best practices to configure a File System Audit solution in an SMB or NFS environment with Dell EMC™ PowerScale™ and Common Event Enabler (CEE). July 2021 H12428.3 Revisions Revisions Date Description March 2019 Initial release Dec 2019 Update the detailed audit event May 2020 Update OneFS 9.0.0 Sept 2020 Update OneFS 9.1.0.0 July 2021 Update Veritas from Symantec Acknowledgments Author: [email protected] The information in this publication is provided “as is.” Dell Inc. makes no representations or warranties of any kind with respect to the information in this publication, and specifically disclaims implied warranties of merchantability or fitness for a particular purpose. Use, copying, and distribution of any software described in this publication requires an applicable software license. This document may contain certain words that are not consistent with Dell's current language guidelines. Dell plans to update the document over subsequent future releases to revise these words accordingly. This document may contain language from third party content that is not under Dell's control and is not consistent with Dell's current guidelines for Dell's own content. When such third party content is updated by the relevant third parties, this document will be revised accordingly. Copyright © 2019-2021 Dell Inc. or its subsidiaries. All Rights Reserved. Dell, EMC, Dell EMC and other trademarks are trademarks of Dell Inc. or its subsidiaries. Other trademarks may be trademarks of their respective owners.
    [Show full text]