Freenas® 11.2-BETA2 User Guide

Total Page:16

File Type:pdf, Size:1020Kb

Freenas® 11.2-BETA2 User Guide FreeNAS® 11.2-BETA2 User Guide August 2018 Edition FreeNAS® is © 2011-2018 iXsystems FreeNAS® and the FreeNAS® logo are registered trademarks of iXsystems FreeBSD® is a registered trademark of the FreeBSD Foundation Written by users of the FreeNAS® network-attached storage operating system. Version 11.2 Copyright © 2011-2018 iXsystems (https://www.ixsystems.com/) CONTENTS Welcome .............................................................. 1 Typographic Conventions ..................................................... 2 1 Introduction 3 1.1 New Features in 11.2 .................................................... 3 1.2 Path and Name Lengths .................................................. 5 1.3 Hardware Recommendations ............................................... 5 1.3.1 RAM ......................................................... 6 1.3.2 The Operating System Device ........................................... 6 1.3.3 Storage Disks and Controllers ........................................... 7 1.3.4 Network Interfaces ................................................. 8 1.4 Getting Started with ZFS .................................................. 8 2 Installing and Upgrading 9 2.1 Getting FreeNAS® ...................................................... 9 2.2 Preparing the Media .................................................... 9 2.2.1 On FreeBSD or Linux ................................................ 10 2.2.2 On Windows .................................................... 10 2.2.3 On macOS ...................................................... 11 2.3 Performing the Installation ................................................. 11 2.4 Installation Troubleshooting ................................................ 19 2.5 Upgrading .......................................................... 20 2.5.1 Caveats ....................................................... 20 2.5.2 Initial Preparation ................................................. 20 2.5.3 Upgrading Using the ISO .............................................. 21 2.5.4 Upgrading From the GUI .............................................. 23 2.5.5 If Something Goes Wrong ............................................. 23 2.5.6 Upgrading a ZFS Pool ............................................... 25 2.6 Virtualization ......................................................... 27 2.6.1 VirtualBox ...................................................... 27 2.6.2 VMware ESXi .................................................... 35 3 Booting 42 3.1 Obtaining an IP Address .................................................. 43 3.2 Logging In .......................................................... 44 4 Preferences 46 4.1 User Interface Preferences ................................................. 46 4.2 Themes ............................................................ 47 4.2.1 Theme Selector ................................................... 47 4.2.2 Create New Themes ................................................ 48 5 Account 50 5.1 Groups ............................................................ 50 5.2 Users ............................................................. 53 i 6 System 58 6.1 General ............................................................ 58 6.2 NTP Servers ......................................................... 61 6.3 Boot Environments ..................................................... 62 6.3.1 Mirroring the Boot Device ............................................. 65 6.4 Advanced ........................................................... 66 6.4.1 Autotune ...................................................... 68 6.4.2 Self-Encrypting Drives ............................................... 68 6.5 Email ............................................................. 70 6.6 System Dataset ....................................................... 71 6.7 Alert Services ........................................................ 73 6.8 Alert Settings ......................................................... 73 6.9 Cloud Credentials ...................................................... 74 6.10 Tunables ........................................................... 75 6.11 Update ............................................................ 78 6.11.1 Preparing for Updates ............................................... 78 6.11.2 Updates and Trains ................................................ 78 6.11.3 Checking for Updates ............................................... 80 6.11.4 Applying Updates .................................................. 81 6.11.5 Manual Updates .................................................. 81 6.12 CAs .............................................................. 82 6.13 Certificates .......................................................... 85 6.14 Support ............................................................ 90 7 Tasks 92 7.1 Cron Jobs ........................................................... 92 7.2 Init/Shutdown Scripts .................................................... 94 7.3 Rsync Tasks ......................................................... 95 7.3.1 Rsync Module Mode ................................................ 97 7.3.2 Rsync over SSH Mode ............................................... 98 7.4 S.M.A.R.T. Tests ....................................................... 100 7.5 Periodic Snapshot Tasks .................................................. 102 7.6 Replication Tasks ...................................................... 104 7.6.1 Examples: Common Configuration ........................................ 104 Alpha (Source) .................................................... 104 Beta (Destination) .................................................. 105 7.6.2 Example: FreeNAS® to FreeNAS® Semi-Automatic Setup ........................... 105 7.6.3 Example: FreeNAS® to FreeNAS® Dedicated User Replication ........................ 108 7.6.4 Example: FreeNAS® to FreeNAS® or Other Systems, Manual Setup ..................... 109 Encryption Keys ................................................... 110 7.6.5 Replication Options ................................................ 112 7.6.6 Replication Encryption ............................................... 114 7.6.7 Limiting Replication Times ............................................. 114 7.6.8 Troubleshooting Replication ........................................... 115 SSH .......................................................... 115 Compression ..................................................... 115 Manual Testing .................................................... 115 7.7 Resilver Priority ....................................................... 116 7.8 Scrub Tasks ......................................................... 117 7.9 Cloud Sync Tasks ...................................................... 118 7.9.1 Cloud Sync Example ................................................ 121 8 Network 124 8.1 Global Configuration .................................................... 124 8.2 Interfaces .......................................................... 126 8.3 IPMI .............................................................. 128 8.4 Link Aggregations ...................................................... 130 ii 8.4.1 LACP, MPIO, NFS, and ESXi ............................................ 130 8.4.2 Creating a Link Aggregation ............................................ 131 8.5 Static Routes ......................................................... 134 8.6 VLANs ............................................................. 135 9 Storage 137 9.1 Pools ............................................................. 137 9.1.1 Creating Pools ................................................... 137 9.1.2 Managing Encrypted Pools ............................................ 140 9.1.3 Adding Cache or Log Devices ........................................... 143 9.1.4 Adding Spare Devices ............................................... 143 9.1.5 Extending a Pool .................................................. 144 9.1.6 Detaching a Pool .................................................. 144 9.1.7 Importing a Pool .................................................. 146 9.1.8 Adding Datasets .................................................. 147 Deduplication .................................................... 149 Compression ..................................................... 150 9.1.9 Adding Zvols .................................................... 150 9.1.10 Setting Permissions ................................................ 152 9.1.11 View Multipaths ................................................... 154 9.2 Snapshots .......................................................... 154 9.2.1 Browsing a Snapshot Collection ......................................... 156 9.3 VMware-Snapshots ..................................................... 157 9.4 Disks ............................................................. 158 9.4.1 Replacing a Failed Disk ............................................... 160 Replacing an Encrypted Disk ............................................ 162 Removing a Log or Cache Device .......................................... 163 9.4.2 Replacing Disks to Grow a Pool .......................................... 163 9.5 Importing a Disk ....................................................... 163 10 Directory Services 165 10.1 Active Directory ....................................................... 165 10.1.1 Troubleshooting Tips ...............................................
Recommended publications
  • The Equifax Fiasco
    Security Now! Transcript of Episode #628 Page 1 of 28 Transcript of Episode #628 The Equifax Fiasco Description: This week we discuss last Friday's passing of our dear friend and colleague Jerry Pournelle; when AI is turned to evil purpose; whether and when Google's Chrome browser will warn of man-in-the-middle attacks; why Google is apparently attempting to patent pieces of a compression technology they did not invent; another horrifying router vulnerability disclosure including 10 zero-day vulnerabilities; an update on the sunsetting of Symantec's CA business unit; another worrying failure at Comodo; a few quick bits; an update on my one commercial product SpinRite; answering a closing-the-loop question from a listener; and a look at the Equifax fiasco. High quality (64 kbps) mp3 audio file URL: http://media.GRC.com/sn/SN-628.mp3 Quarter size (16 kbps) mp3 audio file URL: http://media.GRC.com/sn/sn-628-lq.mp3 SHOW TEASE: It's time for Security Now!. Steve Gibson is here. And he, you know, it's funny when something like the Equifax breach happens, I don't know about you, but I just wait all week just to hear what Steve has to say about it. Well, your wait is over. Equifax and a lot more coming up next on Security Now!. Leo Laporte: This is Security Now! with Steve Gibson, Episode 628, recorded Tuesday, September 12th, 2017: Equifax Fiasco. It's time for Security Now!, the show where we cover security, now, with this guy right here, Steven Gibson of the GRC, Gibson Research Corporation, GRC.com.
    [Show full text]
  • Automatic Program Repair Using Genetic Programming
    Automatic Program Repair Using Genetic Programming A Dissertation Presented to the Faculty of the School of Engineering and Applied Science University of Virginia In Partial Fulfillment of the requirements for the Degree Doctor of Philosophy (Computer Science) by Claire Le Goues May 2013 c 2013 Claire Le Goues Abstract Software quality is an urgent problem. There are so many bugs in industrial program source code that mature software projects are known to ship with both known and unknown bugs [1], and the number of outstanding defects typically exceeds the resources available to address them [2]. This has become a pressing economic problem whose costs in the United States can be measured in the billions of dollars annually [3]. A dominant reason that software defects are so expensive is that fixing them remains a manual process. The process of identifying, triaging, reproducing, and localizing a particular bug, coupled with the task of understanding the underlying error, identifying a set of code changes that address it correctly, and then verifying those changes, costs both time [4] and money. Moreover, the cost of repairing a defect can increase by orders of magnitude as development progresses [5]. As a result, many defects, including critical security defects [6], remain unaddressed for long periods of time [7]. Moreover, humans are error-prone, and many human fixes are imperfect, in that they are either incorrect or lead to crashes, hangs, corruption, or security problems [8]. As a result, defect repair has become a major component of software maintenance, which in turn consumes up to 90% of the total lifecycle cost of a given piece of software [9].
    [Show full text]
  • Register with Tarsnap Installation
    For the past year I've been working on Tarsnap GUI, an open source cross-platform frontend for the Tarsnap backup service. Tarsnap is an online, fully encrypted, deduplicated, online backup solution, that's been around for close to 10 years now (unlike other online backup offerings with a lifespan smaller than 5 years). Starting with day one, full source code for the client tools was available for review and to establish trust. A bug bounty program is available and any kind of reporting is taken seriously, promptly responded and adequately rewarded by the creator and principal developer of Tarsnap, Colin Percival. Tarsnap uses a prepaid model, you add credit to your account and you'll only pay for what you use and nothing more, no annual or monthly subscriptions. For the moment, the price per MB (SI notation) of storage (used monthly) and MB transferred is 250 picodollars each. The backend infrastructure is powered by AWS. Tarsnap was originally offered as a command-line suite of tools, in true allegiance to the Unix philosophy, very similar to the tar utility, for maximum flexibility and control over your backup routines and of great relevance for the server world. Die-hard Unix users and admins see no distinction between server administration and personal workstation and thus nothing is stopping you from backing up your personal machines and workstations the same way you would a networked server. Tarsnap GUI comes to the rescue here in filling whatever gap might be between the server and desktop workflows and for the people that like to keep real work inside the Terminal and all else contained in easy to use, slim, yet robust GUIs.
    [Show full text]
  • Freenas® 11.2-U3 User Guide
    FreeNAS® 11.2-U3 User Guide March 2019 Edition FreeNAS® is © 2011-2019 iXsystems FreeNAS® and the FreeNAS® logo are registered trademarks of iXsystems FreeBSD® is a registered trademark of the FreeBSD Foundation Written by users of the FreeNAS® network-attached storage operating system. Version 11.2 Copyright © 2011-2019 iXsystems (https://www.ixsystems.com/) CONTENTS Welcome .............................................................. 8 Typographic Conventions ..................................................... 10 1 Introduction 11 1.1 New Features in 11.2 .................................................... 11 1.1.1 RELEASE-U1 ..................................................... 14 1.1.2 U2 .......................................................... 14 1.1.3 U3 .......................................................... 15 1.2 Path and Name Lengths .................................................. 16 1.3 Hardware Recommendations ............................................... 17 1.3.1 RAM ......................................................... 17 1.3.2 The Operating System Device ........................................... 18 1.3.3 Storage Disks and Controllers ........................................... 18 1.3.4 Network Interfaces ................................................. 19 1.4 Getting Started with ZFS .................................................. 20 2 Installing and Upgrading 21 2.1 Getting FreeNAS® ...................................................... 21 2.2 Preparing the Media ...................................................
    [Show full text]
  • Bsync: Sistema Extensible Para La Sincronizaci´Ony Copia De Seguridad De ficheros Para Su Uso En Organizaciones
    Escuela Polit´ecnicaSuperior Departamento de Inform´atica Proyecto de Fin de Carrera bsync: Sistema extensible para la sincronizaci´ony copia de seguridad de ficheros para su uso en organizaciones Javier Torres Ni~no Tutores Juan Miguel G´omezBerb´ıs Alejandro Rodr´ıguezGonz´alez 28 de Julio de 2011 2 Resumen En la actualidad existen muchos sistemas de sincronizaci´ony copia de segu- ridad de ficheros, pero la mayor´ıade ellos no comercializan el producto, optando por comercializar los servicios ofrecidos por medio de estos. Esto impide el uso de estas herramientas a entidades que necesiten que sus datos no salgan de su entorno, por lo que el objetivo de este Proyecto de Fin de Carrera es el dise~no y desarrollo de un sistema similar a estos otros productos. Se analizan las caracter´ısticasde los competidores, y se dise~naun programa que incluye en el n´ucleolas caracter´ısticasb´asicasy sea capaz de incluir to- das las caracter´ısticasadicionales mediante el uso de extensiones o plugins. Es precisamente esta extensibilidad la que caracteriza el sistema, permitiendo que un mismo producto pueda adaptarse a las necesidades de multitud de clientes, que pueden precisar, por ejemplo, de distintos sistemas de autenticaci´on(para integrar el sistema en la arquitectura existente) o utilizar la infraestructura para sincronizar m´asque ficheros. Palabras clave: sincronizaci´on,copia de seguridad, extensibilidad, plugins, sistemas distribuidos 3 4 Agradecimientos Es impensable dejar este proyecto sin unas breves l´ıneas en las que agradecer a todas las personas que me han soportado durante estos ´ultimoscinco a~nos,y especialmente los ´ultimosmeses.
    [Show full text]
  • Muuglines the Manitoba UNIX User Group Newsletter
    MUUGLines The Manitoba UNIX User Group Newsletter June 2011 Volume 23 No. 10 Next Meeting: June 14th, 2011 Upcoming Meetings Topic: Practical Security (Sean Cody) September 13th, 2011 For our last meeting of the season, Sean Cody will be We’ll start the 2011/2012 year with our first meeting speaking on Practical Security. The term “security” is on Tuesday, September 13th. Stay tuned (and make thrown around quite readily and its meaning has been sure you’re subscribed to one of the mailing lists) for diluted to being a product adjective as opposed to a details on that month’s presentation. process or mind set. This presentation will go over the basic theory of computer security and will attempt to Linux Kernel 3.0-RC1 Announced. equip you with the knowledge to properly evaluate computer security, products and mitigation strategies. As originally noted in a posting by Linus (http://lwn.net/Articles/445222/) the Linux kernel Where to find the Meeting branding is jumping a few points to 3.0. Meetings are held at the No, marketing firms aren’t searching for a new IBM offices at 400 internet buzzword. The kernel major revision number Ellice Ave. (between is getting renumbered to 3. Linus explains the Edmonton and Kennedy reasoning for the jump as “I can no longer [sic] Streets). When you comfortably count as high as 40.” arrive, you will have to sign in at the reception No big changes are actually expected. As usual, there desk. Please try to will be some driver updates and random fixes.
    [Show full text]
  • Wire Security Whitepaper
    Wire Security Whitepaper Wire Swiss GmbH∗ July 19, 2021 Contents 1 Introduction 2 2 Registration 2 2.1 User Registration . .2 2.1.1 Registration by e-mail . .3 2.1.2 Registration by phone . .3 2.1.3 Passwords . .4 2.1.4 Password policy . .4 2.1.5 Further data . .4 2.2 Client registration . .5 2.2.1 Further data . .5 2.2.2 Metadata . .6 2.2.3 Notifications . .6 2.3 End-of-life of a client . .6 2.4 Push token registration . .7 3 Authentication 7 3.1 Tokens . .7 3.2 Login . .8 3.2.1 Password login . .8 3.2.2 SMS login . .9 3.3 Password Reset . .9 4 Messaging 9 4.1 End-to-end encryption . .9 4.1.1 Prekeys . .9 4.2 Message exchange and client discovery . 10 4.3 Assets . 10 4.4 Link previews . 12 4.5 Notifications . 12 ∗[email protected] 1 5 Calling 12 5.1 Call signaling . 12 5.2 Media transport . 13 5.3 Encryption . 13 5.3.1 1:1 calls . 13 5.3.2 Conference calls . 13 5.4 Encoding . 15 5.5 WebRTC . 15 6 Legal hold 15 6.1 Legal hold service . 15 6.2 Legal hold device . 16 6.3 Interaction . 16 7 Verification 16 8 Further encryption and protection 17 8.1 Transport encryption . 17 8.2 Local data protection . 17 8.3 App lock . 18 8.4 Backups . 18 A Cookie and access token format 18 1 Introduction Wire runs on Android and iOS devices, on Windows, macOS and Linux as well as on web in browsers.
    [Show full text]
  • Opinion Sysadmin File Systems Hardware Columns Book
    OCTOBER 2009 VOLUME 34 NUMBER 5 OPINION Musings 2 Rik Farrow SYSADMin Hey! I Have to Install and Maintain This Crap Too, Ya Know! 6 Thomas a. Limoncelli THE USENIX MAGAZINE XFS: The Big Storage File System­ for Linux 10 chRisToph hellwig Fixing on a Standard Language for UNIX Manuals 19 KrisTaps Dz˘ onsons FILE SYSTEMS Perspective: Semantic Data Management for the Home 24 BR anDon saL mon, Steven w. schLosseR, Lorrie FaiTh CranoR, anD GregoRy R. gangeR PROGRAMMinG Migration to Multicore: Tools That Can Help 32 Tasneem g. BRuTch HARDWARE Chips and Static Electricity 42 RuDi van DRunen COLUMNS Practical Perl Tools: Scratch the ­Webapp Itch with CGI::Application, Part 2 49 DaviD n. BLank-EdeLman Pete’s All Things Sun: VMware vSphere 4 vs. Microsoft Hyper-V R2 58 peTeR BaeR gaLvin iVoyeur: Packet-Level, Per-User Network Access Control and Monitoring 68 Dave Josephsen /dev/random 73 RoBert g. FerreLL BooK REVIEWS Book Reviews 76 ElizaBeTh zwicky eT aL. USEniX NOTES Nominating Committee for 2010 USENIX Board of Directors 79 Summary of USENIX Board of Directors Actions 79 Ellie young ConFEREncES 2009 USENIX Annual Technical Conference Reports 81 Report on the Workshop on Hot Topics in Cloud Computing (HotCloud ’09) 100 Report on BSDCan 2009: The Technical BSD Conference 107 The Advanced Computing Systems Association oct09covers.indd 1 9.4.09 10:19:48 AM Upcoming Events 23r d La r g e In s t a ll a t I o n sy s t e m ad m I n I s t r a t I o n 2010 In t e r n e t ne t w o r k ma n a g e m e n t Co n f e r e n C e (LISA ’09) wo r k s H o p (INM
    [Show full text]
  • January/February 2021
    January/February 2021 Case Studies: n Tarsnap n Netflix n BALLY WULFF Also: FreeBSD for the Writing Scholar New Faces of FreeBSD Practical Ports ® LETTER J O U R N A L from the Foundation E d i t o r i a l B o a r d John Baldwin FreeBSD Developer and Chair of • FreeBSD Journal Editorial Board. Justin Gibbs Founder of the FreeBSD Foundation, • President of the FreeBSD Foundation, elcome 2021! and a Software Engineer at Facebook. Like many of you, the Foundation team Daichi Goto Director at BSD Consulting Inc. • (Tokyo). was pretty happy to see that clock strike Tom Jones FreeBSD Developer, Internet Engineer W Midnight on January 1, 2021. Last year will definitely • and Researcher at the University of Aberdeen. go down as one of the most memorable in the Dru Lavigne Author of BSD Hacks and • The Best of FreeBSD Basics. Foundation’s 20-year history. However, we’re happy Michael W Lucas Author of Absolute FreeBSD. to report it ended on a positive note. Thanks to your • Ed Maste Director of Project Development, generous support, the Foundation was able to raise • FreeBSD Foundation and Member of the FreeBSD Core Team. enough funds to not only continue our efforts to Kirk McKusick Treasurer of the FreeBSD Foundation support the FreeBSD Project, but also expand our • Board, and lead author of The Design and Implementation book series. software development and advocacy efforts in 2021. George V. Neville-Neil Director of the FreeBSD Foundation Board, • Member of the FreeBSD Core Team, and From new hires in the software development group co-author of The Design and Implementation to increased online content and greater focus on of the FreeBSD Operating System.
    [Show full text]
  • A Model to Manage Shared Mutable Data in a Distributed Environment
    THE SEA OF STUFF: A MODEL TO MANAGE SHARED MUTABLE DATA IN A DISTRIBUTED ENVIRONMENT Simone Ivan Conte A Thesis Submitted for the Degree of PhD at the University of St Andrews 2018 Full metadata for this thesis is available in St Andrews Research Repository at: http://research-repository.st-andrews.ac.uk/ Please use this identifier to cite or link to this thesis: http://hdl.handle.net/10023/16827 This item is protected by original copyright This item is licensed under a Creative Commons Licence https://creativecommons.org/licenses/by-nc-nd/4.0/ The Sea of Stuff: a Model to Manage Shared Mutable Data in a Distributed Environment Simone Ivan Conte This thesis is submitted in partial fulfilment for the degree of Doctor of Philosophy (PhD) at the University of St Andrews August 2018 ii Abstract Managing data is one of the main challenges in distributed systems and computer science in general. Data is created, shared, and managed across heterogeneous distributed systems of users, services, applications, and devices without a clear and comprehensive data model. This technological fragmentation and lack of a common data model result in a poor understanding of what data is, how it evolves over time, how it should be managed in a distributed system, and how it should be protected and shared. From a user perspective, for example, backing up data over multiple devices is a hard and error-prone process, or synchronising data with a cloud storage service can result in conflicts and unpredictable behaviours. This thesis identifies three challenges in data management: (1) how to extend the current data abstractions so that content, for example, is accessible irrespective of its location, versionable, and easy to distribute; (2) how to enable transparent data storage relative to locations, users, applications, and services; and (3) how to allow data owners to protect data against malicious users and automatically control content over a distributed system.
    [Show full text]
  • The PGP Problem Latacora
    13/06/2020 Latacora - The PGP Problem Latacora About Archive The PGP Problem Jul 16, 2019 Cryptography engineers have been tearing their hair out over PGP’s deÙciencies for (literally) decades. When other kinds of engineers get wind of this, they’re shocked. PGP is bad? Why do people keep telling me to use PGP? The answer is that they shouldn’t be telling you that, because PGP is bad and needs to go away. There are, as you’re about to see, lots of problems with PGP. Fortunately, if you’re not morbidly curious, there’s a simple meta-problem with it: it was designed in the 1990s, before serious modern cryptography. No competent crypto engineer would design a system that looked like PGP today, nor tolerate most of its defects in any other design. Serious cryptographers have largely given up on PGP and don’t spend much time publishing on it anymore (with a notable exception). Well-understood problems in PGP have gone unaddressed for over a decade because of this. Two quick notes: Ùrst, we wrote this for engineers, not lawyers and activists. Second: “PGP” can mean a bunch of things, from the OpenPGP standard to its reference implementation in GnuPG. We use the term “PGP” to cover all of these things. The Problems Absurd Complexity For reasons none of us here in the future understand, PGP has a packet-based structure. A PGP message (in a “.asc” Ùle) is an archive of typed packets. There are at least 8 different ways of encoding the length of a packet, depending on whether you’re using “new” or “old” format packets.
    [Show full text]
  • A Worldwide Survey of Encryption Products
    A Worldwide Survey of Encryption Products Bruce Schneier Kathleen Seidel Saranya Vijayakumar Berkman Center for Internet Independent Researcher Harvard College and Society [email protected] [email protected] Harvard University [email protected] February 11, 2016 Version 1.0 Introduction Data security is a worldwide problem, and there is a wide world of encryption solutions available to help solve this problem. Most of these products are developed and sold by for-profit entities, although some are created as free open-source projects. They are available, either for sale or free download, all over the world. In 1999, a group of researchers from George Washington University attempted to survey the worldwide market for encryption products [HB+99]. The impetus for their survey was the ongoing debate about US encryption export controls. By collecting information about 805 hardware and software encryption products from 35 countries outside the US, the researchers showed that restricting the export of encryption products did nothing to reduce their availability around the world, while at the same time putting US companies at a competitive disadvantage in the information security market. Seventeen years later, we have tried to replicate this survey. Findings We collected information on as many encryption products as we could find anywhere in the world. This is a summary of our findings: We have identified 865 hardware or software products incorporating encryption from 55 different countries. This includes 546 encryption products from outside the US, representing two-thirds of the total. Table 1 summarizes the number of products from each country. The most common non-US country for encryption products is Germany, with 112 products.
    [Show full text]