EMC VNX Series: Introduction to SMB 3.0 Support
|
|
- Griffin Miller
- 8 years ago
- Views:
Transcription
1 White Paper EMC VNX Series: Introduction to SMB 3.0 Support Abstract This white paper introduces the Server Message Block (SMB) 3.0 support available on the EMC VNX and the advantages gained over the previous SMB versions. A VNX system can be implemented in a Microsoft Windows environment (with Microsoft Windows 8 and Windows Server 2012) to leverage the enhancements in the SMB 3.0 protocol. March 2015
2 Copyright 2015 EMC Corporation. All Rights Reserved. EMC believes the information in this publication is accurate as of its publication date. The information is subject to change without notice. The information in this publication is provided as is. EMC Corporation makes no representations or warranties of any kind with respect to the information in this publication, and specifically disclaims implied warranties of merchantability or fitness for a particular purpose. Use, copying, and distribution of any EMC software described in this publication requires an applicable software license. For the most up-to-date listing of EMC product names, see EMC Corporation Trademarks on EMC.com. VMware is a registered trademark of VMware, Inc. in the United States and/or other jurisdictions. All other trademarks used herein are the property of their respective owners. Part Number H
3 Table of Contents Executive summary... 4 Audience... 5 Terminology... 5 Concepts... 6 SMB version and negotiation... 6 SMB 3.0 on VNX... 6 Continuous Availability (CA)... 7 Server failover... 7 Client failover... 9 Enabling Continuous Availability Multichannel Directory Lease Offload Copy BranchCache V SMB Encryption Encryption settings Encryption keys Enabling encryption Remote Volume Shadow Copy Service Large IO Conclusion References
4 Executive summary EMC VNX has incorporated the Server Message Block (SMB) protocol as an open standard for network file service. SMB is a file access protocol designed for the internet and is based on the Common Internet File System (CIFS) protocol that the Microsoft Windows operating system uses for distributing file sharing, printing, and communication services from a server over a network. SMB 3.0 is supported with Microsoft Windows 8 and Microsoft Windows Server 2012 systems and has significant improvements over the previous SMB versions. For VNX File Operating Environment (OE) version and later, the SMB 3.0 protocol is supported on VNX. VNX supports SMB 1.0, SMB 2.x, and SMB 3.0 protocol communications between client and server. VNX supports SMB 3.0 enhancements that include: Continuous Availability (CA) Continuous Availability enables applications to be less impacted during a Data Mover or cluster failover. With CA enabled on a share, if the failover period does not exceed the application timeout, application access to all open files that were present prior to the failover is re-established and the failover is transparent to end users. Multichannel - Multiple TCP connections can now be associated with a single SMB 3.0 session and a client application can use several connections to transfer I/O on a CIFS share. This optimizes bandwidth and enables failover and load balancing with multiple NICs. Directory Lease SMB 2 introduced a directory cache that allowed clients to cache a directory listing to save network bandwidth but would not see new updates. SMB 3 introduces a directory lease and the client is now automatically aware of changes made in a cached directory. Offload Copy - Copying data within the same Data Mover can now be offloaded to the storage, which reduces the workload on the client and network. SMB Encryption - Provides secure access to the on CIFS shares, protects data on untrusted networks, and provides end-to-end encryption of data in- flight. Remote Volume Shadow Copy Service (RVSS) With RVSS, point-in-time snapshots can be taken across multiple CIFS shares, providing improved performance in backup and restore. Organizations with geographically dispersed sites must uphold data availability without sacrificing security. Furthermore, performance implications need to be considered, especially when operations are distributed among remote sites. Administrators responsible for managing a Windows environment in their company can leverage VNX support for SMB 3.0 in their IT infrastructure implementations to alleviate these concerns. 4
5 Audience This white paper is intended for EMC customers, partners, and employees who want to understand the SMB 3.0 protocol support of VNX. Readers of this document should be familiar with VNX CIFS shares and Windows Operating System. For additional information about VNX CIFS shares, refer to Configuring and Managing CIFS on VNX on EMC Online Support. Terminology BranchCache A WAN optimization protocol which enables content from file servers on a wide area network (WAN) to be cached on computers at a local branch office. CIFS Server A logical server that uses the CIFS protocol to transfer files. A Data Mover can host many instances of a CIFS server. Each instance is referred to as a CIFS server. Common Internet File System (CIFS) A file-sharing protocol based on Microsoft Server Message Block (SMB). It enables users to share file systems over the Internet and intranets. Data Mover (DM) In VNX for File, a cabinet component that is running its own operating system that retrieves data from a storage device and makes it available to a network client. This is also referred to as a blade. Shadow Copy Point-in-time copy created through Microsoft Volume Shadow Copy Service (VSS). VSS identifies each shadow copy by a 16-byte GUID (Globally Unique Identifier). Share Directory on a file system or that is made available to CIFS users on the network. Also, the process of making a file system, directory, or service available to CIFS users on the network. Storage Processor (SP) Storage processor on VNX for Block. On VNX for Block, a circuit board with memory modules and control logic that manages the system I/O between the hosts Fibre Channel adapter and the disk modules. Unisphere A web-based management environment for creating storage resources, configuring and scheduling protection for stored data, and managing and monitoring other storage operations. Volume Shadow Copy Service (VSS) A Windows service and architecture that coordinates various components to create consistent point-in-time copies of data called shadow copies. 5
6 Concepts SMB version and negotiation The SMB protocol follows the client-server model; the protocol level is negotiated by the client request and server response when establishing a new SMB connection. CIFS Windows NT 4.0 SMB 1.0 Windows 2000, Windows XP, Windows Server 2003, and Windows Server 2003 R2 SMB 2.0 Windows Vista (SP1 or later) and Windows Server 2008 SMB 2.1 Windows 7and Windows Server 2008 R2 SMB 3.0 Windows 8 and Windows Server 2012 SMB 3.02 Windows 8.1 and Windows Server 2012 R2 Before establishing a session between the client and server, a common SMB dialect must be negotiated. As shown in Table 1, the common dialect depends on the SMB version supported by both the client and DM. Table 1 SMB dialect used between Client and DM Client / DM SMB 3.0 SMB 2.1 SMB 2.0 SMB 3.02 SMB 3.0 SMB 2.1 SMB 2.0 SMB 3.0 SMB 3.0 SMB 2.1 SMB 2.0 SMB 2.1 SMB 2.1 SMB 2.1 SMB 2.0 SMB 2.0 SMB 2.0 SMB 2.0 SMB 2.0 SMB 1.0 SMB 1.0 SMB 1.0 SMB 1.0 Note: SMB 3.0 leverages the SMB 2 protocol and the same SMB 2 packet formats are utilized by SMB 3.0. SMB 3.0 was originally known as SMB 2.2. For more information on SMB 2.x versions and negotiations, refer to the Microsoft TechNet Website at SMB 3.0 on VNX Beginning with VNX File Operating Environment (OE) version , the SMB 3.0 protocol is now enabled by default on VNX. Note that VNX uses SMB 3.0 when negotiating with SMB 3.02 clients. To check if SMB 3.0 is enabled on your DM, use the server_cifs command to check the Max Protocol as shown in Figure 1. 6
7 Figure 1 Check SMB 3.0 If SMB 3.0 is not enabled on your DM, you can enable it using the server_cifs command as shown in Figure 2. Figure 2 Enable SMB 3.0 Continuous Availability (CA) In a client or CIFS server failure, the Continuous Availability (CA) feature allows Windows-based clients to persistently access CIFS shares without the loss of the session state. You can leverage this feature when planning with storage availability in mind for business-critical applications such as Microsoft SQL Server, IIS, and Hyper-V. Server failover For a CIFS server to recover client content in a Data Mover failover, persistent handles are introduced in SMB 3.0. When CA is enabled on a share, persistent handles enable a CIFS server to save specific metadata associated to an open file handle on disk. When a Data Mover failover occurs, the new primary Data Mover reads the metadata from disk before starting the CIFS service. The client will re-establish its session to the Data Mover and attempt to re-open its files and the Data Mover will return the persistent handle to the client. The end result is no impact to the application accessing the open files, if the failover time does not exceed the application timeout. It is important to note that whether CA works in a Data Mover failover or failback situation is dependent on the timeout of the application. As long as the Data Mover failover or failback period does not exceed the timeout of the application, the application can remain online. 7
8 Figure 3 Server Continuous Availability Figure 3 shows the sequence of events for a Data Mover failover with CA enabled: 1. The client requests a persistent handle by opening a file with associated leases and locks on a CIFS share. 2. The CIFS server saves the open state and persistent handle on disk. 3. The primary Data Mover is failed over to the standby Data Mover. 4. The Data Mover reads and restores the persistent open state from the disk before starting the CIFS service. 5. Using the persistent handle, the client re-establishes the connection to the same CIFS server and recovers the same context associated with the open file as before the failover occurred. CA enables SMB clients to transparently reconnect to the peer Data Mover without affecting clients accessing files on the shares. 8
9 A persistent open requires the metadata of the file be committed to the back-end storage before a request is completed, which includes: All file data All namespaces changes Security descriptor File size File dos attributes File timestamps on explicit setinfo or create If a failover of a Data Mover occurs, the server will preserve the state of the persistent handle. This means that any new open state conflicting with the share mode or new range lock requests will be denied. Furthermore, any new open state involving a lease break will be suspended. Before enabling the CA feature, keep in mind that: With CA enabled, you can achieve a transparent server failover for implementations where the failover time is no longer than the application timeout. In such implementations, hosts can continue to access a CIFS resource without the loss of a CIFS session state following a failover event Enabling CA will make all I/O going to that share be performed in synchronous or write-through mode. Performance may be affected and the impact will be similar to enabling the uncached mount option on a file system CA is designed for applications, such as Microsoft Hyper-V or SQL Server, where the file open/close operations are limited. It is not recommended to use CA in scenarios where the impact of storing the open states is not negligible such as Home Directory implementations Client failover A common approach to mitigate data unavailability at the client level is to configure Windows clients in a cluster. In the previous SMB 2.x implementation, the problem with this scenario was that the server kept the handles of the clients with associated locks. Since the peer cluster node (to which the application had failed over) is not the same as the original node, a conflict occurred when the application tried to re-open the file and set the same locks. The server did not realize that this was the same application trying to re-open its file. To address this issue, SMB 3.0 introduces the concept of an instance ID. The instance ID is a 16-byte unique identifier assigned by the application, such as SQL Server 2012, on a file handle and is maintained for the lifetime of the handle. Using this, the application will not conflict with the session established prior to the failover because it can now be identified by the instance ID. The assumptions are that Windows Server 9
10 2012 cluster logic ensures the same instance ID is not used by multiple applications at the same time, and only a single instance of an application can be running at any time. Figure 4 Client Continuous Availability Figure 4 describes the basic sequence of events when a node in a Windows cluster fails over: 1. The application opens a file on the CIFS share and sets locks. 2. Node 1 fails and the Windows cluster moves the application from node 1 to node The application re-opens its content on the CIFS share from node 2. Applications accessing the data stored on the CIFS share are not interrupted. 10
11 Enabling Continuous Availability The Continuous Availability (CA) feature is disabled by default. To enable CA, the file system must first be mounted with the smbca mount option as shown in Figure 5 Enabling CA on the file system. This is a CLI only procedure. Figure 5 Enabling CA on the file system Then the CIFS share must be exported with the type=ca option as shown in Figure 6. This is a CLI only procedure. Figure 6 Enabling CA on a CIFS share Multichannel SMB 3.0 introduces Multichannel where multiple TCP connections can be associated with a single SMB session. A restriction in the previous versions of SMB was that only one TCP connection could be established per SMB session. Now, if one TCP connection is broken, the user session can continue using the remaining, active TCP connections. The connection to the CIFS server on the Data Mover remains established until the last TCP connection is terminated. Multichannel provides several benefits, including: Increased bandwidth Transparent network interface failover Load balancing When establishing the SMB session, the CIFS server must send the response on the same TCP connection the request arrived on. Once the session has been established, the client sends a request to retrieve the list of interfaces available from the DM and uses the best interface available for I/O. If multiple interfaces are available, the client will open new connections on an as-needed basis. For example, when the pending I/O queue begins growing, the client will open additional connections to improve bandwidth. If the network interface controller (NIC) supports Receive Side Scaling (RSS), multiple TCP connections can be opened on the same NIC and be load balanced across multiple CPU cores. Multiple RSS NICs can be used to support multiple TCP 11
12 connections on each NIC for a single SMB session. You can run the netstat command on a client to check the number of open TCP connections. As shown in Figure 7, there are two TCP connections on two NICs associated with the SMB session. Figure 7 Multiple TCP connections Directory Lease In SMB 2.0, Microsoft developed a directory content cache that resided on the client. This increased performance by reducing the amount of directory list requests transmitted over the network. However, a disadvantage of this feature is that when a client modifies files or folders, clients with a cached listing would not be aware of the changes even when the directory listing is refreshed by the user. SMB 3.0 improves the directory content cache with the concept of a directory lease. By setting a lease on a directory, the Windows client is automatically aware of a content change made in an open directory. If the content is created, modified, or deleted in the directory, the directory lease is broken. The next directory list request will be serviced by the CIFS server, instead of from the directory cache, with the latest changes. 12
13 There are three types of leases: Read-caching lease (R) enables a client to cache reads, and can be granted to multiple clients Write-caching lease (W) enables a client to cache writes A handle-caching lease (H) enables a client to cache open handles, and can be granted to multiple clients Client B Client A Figure 8 Directory Lease Figure 8 describes the sequence of events when a directory lease is broken: 1. Client A opens a directory and caches the listing. 2. Client B changes a file or folder in the same directory. By making this change, the directory lease is broken. 3. Client A is notified that its cached directory content is no longer up-to-date, and sends a query to update that directory. 13
14 Offload Copy SPB SPA 2 7 Command Data Data Mover 3 Data Mover Client Figure 9 Pre-SMB 3.0 data copy Figure 9 shows the sequence of events required for a pre-smb 3.0 copy: 1. The client requests data to be copied. 2. The Data Mover requests data from the Storage Processor. 3. The Storage Processor sends data to the Data Mover. 4. The Data Mover sends data to the client over the network. 5. The client sends back the same data to the Data Mover over the network. 6. The Data Mover sends back the same data to the Storage Processor to be written. 7. The Storage Processor acknowledges the Data Mover. 8. The Data Mover acknowledges the client. 14
15 Transferring data to the client and back results in wasted resources and adds additional overhead. Offload copy is designed to improve efficiency by allowing the Data Mover to do the copy instead of sending data to the host and back again. It is a token-based copy method where a 512-byte token is used to represent up to 256MB of actual data. SPB SPA 4 Command Data Token Data Mover 3 Data Mover Figure 10 Offload Copy Figure 10 describes the sequence of events for an Offload Copy: 1. The client submits a copy request for a file. 2. The Data Mover builds a token and sends it to the client. 3. The client uses the token to generate the write request. 4. The Data Mover performs the copy. 5. The Data Mover acknowledges the client. 15
16 The main benefit of Offload Copy is the elimination of reading and writing data across the network. The host CPU usage and network bandwidth required is reduced. Offload copy is only used for files that are greater than 512 KB as the token overhead would make it impractical for smaller files. Note that if the data that is represented by the token is modified, the token is invalidated and an error is returned. The client then reverts back to the old copy method using a standard read and write. BranchCache V2 BranchCache is a Microsoft feature that was originally introduced in the Windows 7 and Windows Server 2008 R2 operating systems. It is designed to optimize wide area network (WAN) bandwidth when one or more remote branch offices need to connect to the main office to retrieve data. This had several disadvantages including poor application responsiveness, high WAN link utilization, and WAN bandwidth is expensive. When BranchCache is enabled, it creates a cache of the content from the DM, locally within a branch office. A client from the same network can request the file and download it from the local cache, instead of downloading it from the wide area network. BranchCache optimizes the local link utilization and the responsiveness of applications, and reduces the WAN bandwidth consumption. When a file is requested from the DM in the main office, a hash of the file is sent to the client instead of the file itself. The hash, known as the signature, is much smaller than the file itself and the client uses it to search the branch office for the file. If a match is found at the branch office, the client will retrieve the file using the LAN. If no match is found, the client retrieves the file through the WAN and caches it for other clients at the branch. An update to BranchCache was released in Windows 8 and Windows Server 2012 called BranchCache V2. In the original BranchCache, files were divided into 32 MB segments and each segment was divided into 65KB blocks. Each block was hashed using SHA256 to generate the signature. In BranchCache V2, a simpler format was introduced to increase the likelihood of finding signature matches. The concept of blocks has been dropped. Files are divided into segments and each segment is hashed using SHA256 to generate the signature. VNX uses a fixed segment size of 128KB. SMB Encryption SMB encryption provides secure access to data over untrusted networks by providing end-to-end encryption between the client and VNX. It does not require specialized hardware, IPSec, or WAN accelerators. Scenarios where SMB encryption can be utilized include Remote Office Branch Office (ROBO) over WAN networks and application workloads over unsecured networks. 16
17 Encryption at the share-level is enabled on the particular share, and encryption is enforced when that share is accessed. Optionally, encryption can be enforced at the system-level (where encryption is set in the registry of the CIFS server), and all share access would require encryption. There is no configuration needed at the client-level. SMB encryption is not the same as Data at Rest Encryption (DARE) and will not encrypt data on disk. SMB encryption only encrypts data during transmission over the network. Once the data arrives at the destination, it is decrypted before it is saved to disk. Encryption settings To support the SMB 3.0 protocol, VNX has two new values added to the registry of the CIFS server: EncryptData and RejectUnencryptedAccess. Setting the EncryptData value enables encryption on all shares on the CIFS server. By default, the EncryptData value is disabled. Setting the RejectUnencryptedAccess value prevents clients that do not support encryption from establishing a session to the share. Instead, the client receives an ACCESS_DENIED message after the failed attempt. Disabling the RejectUnencryptedAccess value gives pre-smb 3.0 clients the ability to access encrypted shares. By default, the RejectUnencryptedAccess value is enabled. To configure these parameters on the registry of the CIFS server, do the following steps: 1. Open the Registry Editor (regedit.exe) on a computer. 2. Select File > Connect Network Registry. 3. Type the hostname or IP Address of the CIFS server and click Check Names. When the server is recognized, click OK to close the window. 4. You can edit the parameters under HKEY_LOCAL_MACHINE\System\CurrentControlSet\Services\LanmanServer\Pa rameters as shown in Figure
18 Figure 11 Location of SMB Encryption values in the Registry On VNX, encryption can also be enabled at the share-level by using the type=encrypted export option. Once encryption is enabled, the SMB payload is encrypted only when an encrypted share is accessed. You can also use the RejectUnencryptedAccess value with the type=encrypted export option to control the behavior when a pre-smb 3.0 client attempts to access it. Encryption keys Incoming and outgoing traffic are encrypted using two different secret keys. Both are computed once the user is authenticated successfully. The encryption and decryption 16-byte keys are generated using the KDF algorithm in Counter Mode. SMB messages on the network are encrypted between the client and server using the AES128-CCM cryptographic algorithm, as described in RFC4309 and RFC3610. The format of the encrypted messages consists of an SMB 2 TRANSFORM_HEADER header followed by the payload. Any SMB 2 message can be encrypted, except SMB 2_NEGOTIATE and SMB 2_SESSION_SETUP. Enabling encryption To enable encryption on a share, export it with the type=encrypted export option as shown in Figure 12. This is a CLI only procedure. 18
19 Figure 12 Enabling Encryption on a Share It is important to note that there is a performance impact associated with enabling encryption. Data is encrypted at either the client or VNX before it is sent across the network and decrypted at the destination as it is received. CPU resources are required on both client and VNX for these operations. Remote Volume Shadow Copy Service Volume Shadow Copy Service (VSS) infrastructure enables file systems to be backed up while applications continue to write to these volumes and enables creation of snapshots (called shadow copies for Microsoft VSS). Prior to SMB 3.0, VSS could only create and manage snapshots of data stored on local volumes. With Windows Server 2012, Microsoft has extended this feature with Remote Volume Shadow Copy Service (RVSS). RVSS supports application backup across multiple file servers and shares. Backup applications that are VSS-aware can now perform snapshots of server applications that store data on the VNX CIFS shares. Hyper-V has the ability to store virtual machine files on CIFS shares. RVSS can be leveraged to take point-in time copies of the contents of the share. The application can create a writeable snap to leverage RVSS and then perform a resynchronize operation before the backup is started. Figure 13 shows a simple deployment of a single Hyper-V server utilizing VNX to store virtual machines and user data. 19
20 Data Mover 3 Data Mover 2 Marketing Share Sales Share Marketing VM Sales VM Figure 13 Backup Hyper-V VMs on CIFS shares Two Hyper-V CIFS shares are provisioned on VNX: one for the Marketing team and the other for the Sales team. Each member of these teams has an assigned virtual machine and accesses files via their group s respective shares. The Marketing VM stores the virtual machine files on the Marketing share whereas Sales VM stores the virtual machine files on both the Marketing and Sales shares. When the backup application performs a snapshot of Marketing VM, VNX takes a snapshot of the Marketing file system. A snapshot of the Sales file system is not taken since only the Marketing share is used by the Marketing VM. The snapshot data can then be made available to the backup application to perform a backup of the data. When a snapshot of Sales VM is taken, both the Marketing and Sales file systems are included in the snapshot taken by VNX. 20
21 Large IO The SMB 3.0 protocol, by default, enables large IO sizes for reads and writes. The maximum I/O size is now 1 MB, which improves performance for large data copies by limiting the number of SMB commands on the network. Conclusion Data availability, performance, and security are factors that you must consider in your organization s IT infrastructure. This is especially important when organizations have remote offices across different regions of the world. You can utilize the VNX support of the SMB 3.0 protocol, along with Microsoft Windows 8 and Windows Server 2012, to address some common concerns. Continuous Availability and Multichannel are features that maintain data availability in a failure at the client, server, or network level. Offload Copy enables efficient data consolidation or migration of content stored on CIFS shares. BranchCache V2 optimizes the local link utilization and the responsiveness of applications, and reduces the WAN bandwidth consumption. In terms of security, SMB Encryption enforces protection when data is exchanged between Windows clients and VNX over untrusted networks, and enables administrators to decide which Windows clients are granted access to this data. Leveraging RVSS, point-in-time snapshots of the CIFS shares can be taken across multiple shares and provide improved performance for backup and restore. References Configuring and Managing CIFS on VNX Configuring BranchCache on VNX Microsoft TechNet at 21
EMC PERSPECTIVE: THE POWER OF WINDOWS SERVER 2012 AND EMC INFRASTRUCTURE FOR MICROSOFT PRIVATE CLOUD ENVIRONMENTS
EMC PERSPECTIVE: THE POWER OF WINDOWS SERVER 2012 AND EMC INFRASTRUCTURE FOR MICROSOFT PRIVATE CLOUD ENVIRONMENTS EXECUTIVE SUMMARY It s no secret that organizations continue to produce overwhelming amounts
More informationVeeam Cloud Connect. Version 8.0. Administrator Guide
Veeam Cloud Connect Version 8.0 Administrator Guide April, 2015 2015 Veeam Software. All rights reserved. All trademarks are the property of their respective owners. No part of this publication may be
More informationEMC VNXe Series. Configuring Hosts to Access CIFS File Systems. Version 3.1 P/N 302-000-191 REV. 03
EMC VNXe Series Version 3.1 Configuring Hosts to Access CIFS File Systems P/N 302-000-191 REV. 03 Copyright 2014-2015 EMC Corporation. All rights reserved. Published in USA. Published June, 2015 EMC believes
More informationEMC VNXe File Deduplication and Compression
White Paper EMC VNXe File Deduplication and Compression Overview Abstract This white paper describes EMC VNXe File Deduplication and Compression, a VNXe system feature that increases the efficiency with
More informationEMC Backup and Recovery for Microsoft SQL Server 2008 Enabled by EMC Celerra Unified Storage
EMC Backup and Recovery for Microsoft SQL Server 2008 Enabled by EMC Celerra Unified Storage Applied Technology Abstract This white paper describes various backup and recovery solutions available for SQL
More informationReplicating VNXe3100/VNXe3150/VNXe3300 CIFS/NFS Shared Folders to VNX Technical Notes P/N h8270.1 REV A01 Date June, 2011
Replicating VNXe3100/VNXe3150/VNXe3300 CIFS/NFS Shared Folders to VNX Technical Notes P/N h8270.1 REV A01 Date June, 2011 Contents Introduction... 2 Roadmap... 3 What is in this document... 3 Test Environment...
More informationSetting Up a Unisphere Management Station for the VNX Series P/N 300-011-796 Revision A01 January 5, 2010
Setting Up a Unisphere Management Station for the VNX Series P/N 300-011-796 Revision A01 January 5, 2010 This document describes the different types of Unisphere management stations and tells how to install
More informationWindows Server 2008 Hyper-V Backup and Replication on EMC CLARiiON Storage. Applied Technology
Windows Server 2008 Hyper-V Backup and Replication on EMC CLARiiON Storage Applied Technology Abstract This white paper provides an overview of the technologies that are used to perform backup and replication
More informationUsing Windows Administrative Tools on VNX
EMC VNX Series Release 7.0 Using Windows Administrative Tools on VNX P/N 300-011-833 REV A01 EMC Corporation Corporate Headquarters: Hopkinton, MA 01748-9103 1-508-435-1000 www.emc.com Copyright 2011 -
More informationEMC VNXe Series Using a VNXe System with CIFS Shared Folders
EMC VNXe Series Using a VNXe System with CIFS Shared Folders VNXe Operating Environment Version 2.4 P/N 300-010-548 REV 04 Connect to Storage Copyright 2013 EMC Corporation. All rights reserved. Published
More informationIBM TSM DISASTER RECOVERY BEST PRACTICES WITH EMC DATA DOMAIN DEDUPLICATION STORAGE
White Paper IBM TSM DISASTER RECOVERY BEST PRACTICES WITH EMC DATA DOMAIN DEDUPLICATION STORAGE Abstract This white paper focuses on recovery of an IBM Tivoli Storage Manager (TSM) server and explores
More informationEMC NetWorker Module for Microsoft for Windows Bare Metal Recovery Solution
EMC NetWorker Module for Microsoft for Windows Bare Metal Recovery Solution Release 3.0 User Guide P/N 300-999-671 REV 02 Copyright 2007-2013 EMC Corporation. All rights reserved. Published in the USA.
More informationInstalling Management Applications on VNX for File
EMC VNX Series Release 8.1 Installing Management Applications on VNX for File P/N 300-015-111 Rev 01 EMC Corporation Corporate Headquarters: Hopkinton, MA 01748-9103 1-508-435-1000 www.emc.com Copyright
More informationHyper-V over SMB Remote File Storage support in Windows Server 8 Hyper-V. Jose Barreto Principal Program Manager Microsoft Corporation
Hyper-V over SMB Remote File Storage support in Windows Server 8 Hyper-V Jose Barreto Principal Program Manager Microsoft Corporation Agenda Hyper-V over SMB - Overview How to set it up Configuration Options
More informationEMC VNXe HIGH AVAILABILITY
White Paper EMC VNXe HIGH AVAILABILITY Overview Abstract This white paper discusses the high availability (HA) features in the EMC VNXe system and how you can configure a VNXe system to achieve your goals
More informationEMC Celerra Version 5.6 Technical Primer: Control Station Password Complexity Policy Technology Concepts and Business Considerations
EMC Celerra Version 5.6 Technical Primer: Control Station Password Complexity Policy Technology Concepts and Business Considerations Abstract This white paper presents a high-level overview of the EMC
More informationHyper-V over SMB: Remote File Storage Support in Windows Server 2012 Hyper-V. Jose Barreto Principal Program Manager Microsoft Corporation
Hyper-V over SMB: Remote Storage Support in Windows Server 2012 Hyper-V Jose Barreto Principal Program Manager Microsoft Corporation Abstract In this session, we cover the Windows Server 2012 Hyper-V support
More informationCisco and EMC Solutions for Application Acceleration and Branch Office Infrastructure Consolidation
Solution Overview Cisco and EMC Solutions for Application Acceleration and Branch Office Infrastructure Consolidation IT organizations face challenges in consolidating costly and difficult-to-manage branch-office
More informationMicrosoft SMB 2.2 - Running Over RDMA in Windows Server 8
Microsoft SMB 2.2 - Running Over RDMA in Windows Server 8 Tom Talpey, Architect Microsoft March 27, 2012 1 SMB2 Background The primary Windows filesharing protocol Initially shipped in Vista and Server
More informationWindows Server 2008 R2 Hyper V. Public FAQ
Windows Server 2008 R2 Hyper V Public FAQ Contents New Functionality in Windows Server 2008 R2 Hyper V...3 Windows Server 2008 R2 Hyper V Questions...4 Clustering and Live Migration...5 Supported Guests...6
More informationIsilon OneFS. Version 7.2.1. OneFS Migration Tools Guide
Isilon OneFS Version 7.2.1 OneFS Migration Tools Guide Copyright 2015 EMC Corporation. All rights reserved. Published in USA. Published July, 2015 EMC believes the information in this publication is accurate
More informationEMC AVAMAR INTEGRATION WITH EMC DATA DOMAIN SYSTEMS
EMC AVAMAR INTEGRATION WITH EMC DATA DOMAIN SYSTEMS A Detailed Review ABSTRACT This white paper highlights integration features implemented in EMC Avamar with EMC Data Domain deduplication storage systems
More informationDeployment Options for Microsoft Hyper-V Server
CA ARCserve Replication and CA ARCserve High Availability r16 CA ARCserve Replication and CA ARCserve High Availability Deployment Options for Microsoft Hyper-V Server TYPICALLY, IT COST REDUCTION INITIATIVES
More informationVIDEO SURVEILLANCE WITH SURVEILLUS VMS AND EMC ISILON STORAGE ARRAYS
VIDEO SURVEILLANCE WITH SURVEILLUS VMS AND EMC ISILON STORAGE ARRAYS Successfully configure all solution components Use VMS at the required bandwidth for NAS storage Meet the bandwidth demands of a 2,200
More informationEMC VNX2 Deduplication and Compression
White Paper VNX5200, VNX5400, VNX5600, VNX5800, VNX7600, & VNX8000 Maximizing effective capacity utilization Abstract This white paper discusses the capacity optimization technologies delivered in the
More informationHIGHLY AVAILABLE MULTI-DATA CENTER WINDOWS SERVER SOLUTIONS USING EMC VPLEX METRO AND SANBOLIC MELIO 2010
White Paper HIGHLY AVAILABLE MULTI-DATA CENTER WINDOWS SERVER SOLUTIONS USING EMC VPLEX METRO AND SANBOLIC MELIO 2010 Abstract This white paper demonstrates key functionality demonstrated in a lab environment
More informationIntroducing. Markus Erlacher Technical Solution Professional Microsoft Switzerland
Introducing Markus Erlacher Technical Solution Professional Microsoft Switzerland Overarching Release Principles Strong emphasis on hardware, driver and application compatibility Goal to support Windows
More informationEMC NetWorker Module for Microsoft for Windows Bare Metal Recovery Solution
EMC NetWorker Module for Microsoft for Windows Bare Metal Recovery Solution Version 9.0 User Guide 302-001-755 REV 01 Copyright 2007-2015 EMC Corporation. All rights reserved. Published in USA. Published
More informationIsilon OneFS. Version 7.2. OneFS Migration Tools Guide
Isilon OneFS Version 7.2 OneFS Migration Tools Guide Copyright 2014 EMC Corporation. All rights reserved. Published in USA. Published November, 2014 EMC believes the information in this publication is
More informationSyncplicity On-Premise Storage Connector
Syncplicity On-Premise Storage Connector Implementation Guide Abstract This document explains how to install and configure the Syncplicity On-Premise Storage Connector. In addition, it also describes how
More informationMicrosoft SMB File Sharing Best Practices Guide
Technical White Paper Microsoft SMB File Sharing Best Practices Guide Tintri VMstore, Microsoft SMB 3.0 Protocol, and VMware 6.x Author: Neil Glick Version 1.0 06/15/2016 @tintri www.tintri.com Contents
More informationIntegration Guide. EMC Data Domain and Silver Peak VXOA 4.4.10 Integration Guide
Integration Guide EMC Data Domain and Silver Peak VXOA 4.4.10 Integration Guide August 2013 Copyright 2013 EMC Corporation. All Rights Reserved. EMC believes the information in this publication is accurate
More informationEMC UNISPHERE FOR VNXe: NEXT-GENERATION STORAGE MANAGEMENT A Detailed Review
White Paper EMC UNISPHERE FOR VNXe: NEXT-GENERATION STORAGE MANAGEMENT A Detailed Review Abstract This white paper introduces EMC Unisphere for VNXe, a web-based management environment for creating storage
More informationWindows Server on WAAS: Reduce Branch-Office Cost and Complexity with WAN Optimization and Secure, Reliable Local IT Services
Windows Server on WAAS: Reduce Branch-Office Cost and Complexity with WAN Optimization and Secure, Reliable Local IT Services What You Will Learn Windows Server on WAAS reduces the cost and complexity
More informationEnterprise Backup and Restore technology and solutions
Enterprise Backup and Restore technology and solutions LESSON VII Veselin Petrunov Backup and Restore team / Deep Technical Support HP Bulgaria Global Delivery Hub Global Operations Center November, 2013
More informationTECHNICAL PAPER. Veeam Backup & Replication with Nimble Storage
TECHNICAL PAPER Veeam Backup & Replication with Nimble Storage Document Revision Date Revision Description (author) 11/26/2014 1. 0 Draft release (Bill Roth) 12/23/2014 1.1 Draft update (Bill Roth) 2/20/2015
More informationEMC BACKUP-AS-A-SERVICE
Reference Architecture EMC BACKUP-AS-A-SERVICE EMC AVAMAR, EMC DATA PROTECTION ADVISOR, AND EMC HOMEBASE Deliver backup services for cloud and traditional hosted environments Reduce storage space and increase
More informationEMC NetWorker Module for Microsoft for Windows Bare Metal Recovery Solution
EMC NetWorker Module for Microsoft for Windows Bare Metal Recovery Solution Version 8.2 Service Pack 1 User Guide 302-001-235 REV 01 Copyright 2007-2015 EMC Corporation. All rights reserved. Published
More informationPhysical Security EMC Storage with ISS SecurOS
Physical Security EMC Storage with ISS SecurOS Version 1.0 Sizing Guide H14192 Copyright 2015 EMC Corporation. All rights reserved. Published in USA. Published June, 2015 EMC believes the information in
More informationCaching SMB Data for Offline Access and an Improved Online Experience
Caching SMB Data for Offline Access and an Improved Online Experience Agenda What is Offline Files How does Offline Files interact with SMB Offline Files enhancements for Windows 7 Questions 2 What is
More informationBest Practices for Installing and Configuring the Hyper-V Role on the LSI CTS2600 Storage System for Windows 2008
Best Practices Best Practices for Installing and Configuring the Hyper-V Role on the LSI CTS2600 Storage System for Windows 2008 Installation and Configuration Guide 2010 LSI Corporation August 13, 2010
More informationEMC PERFORMANCE OPTIMIZATION FOR MICROSOFT FAST SEARCH SERVER 2010 FOR SHAREPOINT
Reference Architecture EMC PERFORMANCE OPTIMIZATION FOR MICROSOFT FAST SEARCH SERVER 2010 FOR SHAREPOINT Optimize scalability and performance of FAST Search Server 2010 for SharePoint Validate virtualization
More informationEMC Celerra Version 5.6 Technical Primer: Public Key Infrastructure Support
EMC Celerra Version 5.6 Technical Primer: Public Key Infrastructure Support Technology Concepts and Business Considerations Abstract Encryption plays an increasingly important role in IT infrastructure
More informationW H I T E P A P E R : T E C H N I C A L. Understanding and Configuring Symantec Endpoint Protection Group Update Providers
W H I T E P A P E R : T E C H N I C A L Understanding and Configuring Symantec Endpoint Protection Group Update Providers Martial Richard, Technical Field Enablement Manager Table of Contents Content Introduction...
More informationWindows Server 2012 授 權 說 明
Windows Server 2012 授 權 說 明 PROCESSOR + CAL HA 功 能 相 同 的 記 憶 體 及 處 理 器 容 量 虛 擬 化 Windows Server 2008 R2 Datacenter Price: NTD173,720 (2 CPU) Packaging All features Unlimited virtual instances Per processor
More informationSymantec Endpoint Protection 11.0 Architecture, Sizing, and Performance Recommendations
Symantec Endpoint Protection 11.0 Architecture, Sizing, and Performance Recommendations Technical Product Management Team Endpoint Security Copyright 2007 All Rights Reserved Revision 6 Introduction This
More informationWindows Server 2008 R2 Hyper-V Live Migration
Windows Server 2008 R2 Hyper-V Live Migration White Paper Published: August 09 This is a preliminary document and may be changed substantially prior to final commercial release of the software described
More informationVMware Site Recovery Manager with EMC RecoverPoint
VMware Site Recovery Manager with EMC RecoverPoint Implementation Guide EMC Global Solutions Centers EMC Corporation Corporate Headquarters Hopkinton MA 01748-9103 1.508.435.1000 www.emc.com Copyright
More informationEMC CENTERA VIRTUAL ARCHIVE
White Paper EMC CENTERA VIRTUAL ARCHIVE Planning and Configuration Guide Abstract This white paper provides best practices for using EMC Centera Virtual Archive in a customer environment. The guide starts
More informationUnderstanding EMC Avamar with EMC Data Protection Advisor
Understanding EMC Avamar with EMC Data Protection Advisor Applied Technology Abstract EMC Data Protection Advisor provides a comprehensive set of features that reduce the complexity of managing data protection
More informationHigh Availability with Windows Server 2012 Release Candidate
High Availability with Windows Server 2012 Release Candidate Windows Server 2012 Release Candidate (RC) delivers innovative new capabilities that enable you to build dynamic storage and availability solutions
More informationMicrosoft File and Print Service Failover Using Microsoft Cluster Server
Microsoft File and Print Service Failover Using Microsoft Cluster Server TechNote First Edition (March 1998) Part Number 309826-001 Compaq Computer Corporation Notice The information in this publication
More informationCA ARCserve and CA XOsoft r12.5 Best Practices for protecting Microsoft Exchange
CA RECOVERY MANAGEMENT R12.5 BEST PRACTICES CA ARCserve and CA XOsoft r12.5 Best Practices for protecting Microsoft Exchange Overview Benefits The CA Advantage The CA ARCserve Backup Support and Engineering
More informationWAN Optimization, Web Cache, Explicit Proxy, and WCCP. FortiOS Handbook v3 for FortiOS 4.0 MR3
WAN Optimization, Web Cache, Explicit Proxy, and WCCP FortiOS Handbook v3 for FortiOS 4.0 MR3 FortiOS Handbook WAN Optimization, Web Cache, Explicit Proxy, and WCCP v3 13 January 2012 01-433-96996-20120113
More informationProtecting Desktop and Laptop Workstations with CA ARCserve D2D r16
WHITE PAPER: PROTECTING DESKTOP AND LAPTOP WORKSTATIONS WITH CA ARCSERVE D2D R16 Protecting Desktop and Laptop Workstations with CA ARCserve D2D r16 October 2011 CA Technologies DATA MANAGEMENT CUSTOMER
More informationVeeam Backup & Replication for VMware
Veeam Backup & Replication for VMware Version 8.0 Evaluator s Guide May, 2015 2015 Veeam Software. All rights reserved. All trademarks are the property of their respective owners. No part of this publication
More informationDESIGN AND IMPLEMENTATION GUIDE EMC DATA PROTECTION OPTION NS FOR VSPEXX PRIVATE CLOUD EMC VSPEX December 2014
DESIGN AND IMPLEMENTATION GUIDE EMC DATA PROTECTION OPTIONS FOR VSPEX PRIVATE CLOUD EMC VSPEX December 2014 Copyright 2013-2014 EMC Corporation. All rights reserved. Published in USA. Published December,
More informationCONFIGURATION GUIDELINES: EMC STORAGE FOR PHYSICAL SECURITY
White Paper CONFIGURATION GUIDELINES: EMC STORAGE FOR PHYSICAL SECURITY DVTel Latitude NVMS performance using EMC Isilon storage arrays Correct sizing for storage in a DVTel Latitude physical security
More informationEnterprise Manager. Version 6.2. Administrator s Guide
Enterprise Manager Version 6.2 Administrator s Guide Enterprise Manager 6.2 Administrator s Guide Document Number 680-017-017 Revision Date Description A August 2012 Initial release to support version
More informationABSTRACT. February, 2014 EMC WHITE PAPER
EMC APPSYNC SOLUTION FOR MANAGING PROTECTION OF MICROSOFT SQL SERVER SLA-DRIVEN, SELF-SERVICE CAPABILITIES FOR MAXIMIZING AND SIMPLIFYING DATA PROTECTION AND RECOVERABILITY ABSTRACT With Microsoft SQL
More informationGlobalSCAPE DMZ Gateway, v1. User Guide
GlobalSCAPE DMZ Gateway, v1 User Guide GlobalSCAPE, Inc. (GSB) Address: 4500 Lockhill-Selma Road, Suite 150 San Antonio, TX (USA) 78249 Sales: (210) 308-8267 Sales (Toll Free): (800) 290-5054 Technical
More informationEMC Business Continuity for VMware View Enabled by EMC SRDF/S and VMware vcenter Site Recovery Manager
EMC Business Continuity for VMware View Enabled by EMC SRDF/S and VMware vcenter Site Recovery Manager A Detailed Review Abstract This white paper demonstrates that business continuity can be enhanced
More informationAcronis Backup & Recovery 11.5 Quick Start Guide
Acronis Backup & Recovery 11.5 Quick Start Guide Applies to the following editions: Advanced Server for Windows Virtual Edition Advanced Server SBS Edition Advanced Workstation Server for Linux Server
More informationCloud Optimize Your IT
Cloud Optimize Your IT Windows Server 2012 The information contained in this presentation relates to a pre-release product which may be substantially modified before it is commercially released. This pre-release
More informationEMC SYNCPLICITY FILE SYNC AND SHARE SOLUTION
EMC SYNCPLICITY FILE SYNC AND SHARE SOLUTION Automated file synchronization Flexible, cloud-based administration Secure, on-premises storage EMC Solutions January 2015 Copyright 2014 EMC Corporation. All
More information1 Introduction to Microsoft Enterprise Desktop Virtualization (MED-V)... 3 1.1 Terminology... 4 1.2 Key Capabilities... 4
MED-V v1 Contents 1 Introduction to Microsoft Enterprise Desktop Virtualization (MED-V)... 3 1.1 Terminology... 4 1.2 Key Capabilities... 4 2 High-level Architecture... 6 2.1 System Requirements for MED-V
More informationWindows Server 2012 2,500-user pooled VDI deployment guide
Windows Server 2012 2,500-user pooled VDI deployment guide Microsoft Corporation Published: August 2013 Abstract Microsoft Virtual Desktop Infrastructure (VDI) is a centralized desktop delivery solution
More informationStorage Sync for Hyper-V. Installation Guide for Microsoft Hyper-V
Installation Guide for Microsoft Hyper-V Egnyte Inc. 1890 N. Shoreline Blvd. Mountain View, CA 94043, USA Phone: 877-7EGNYTE (877-734-6983) www.egnyte.com 2013 by Egnyte Inc. All rights reserved. Revised
More informationEMC NetWorker Module for Microsoft for Windows Bare Metal Recovery Solution
EMC NetWorker Module for Microsoft for Windows Bare Metal Recovery Solution Release 8.2 User Guide P/N 302-000-658 REV 01 Copyright 2007-2014 EMC Corporation. All rights reserved. Published in the USA.
More informationRedefining Microsoft SQL Server Data Management
Redefining Microsoft SQL Server Data Management Contact Actifio Support As an Actifio customer, you can get support for all Actifio products through the Support Portal at http://support.actifio.com/. Copyright,
More informationSteelEye DataKeeper Cluster Edition. v7.6. Release Notes
SteelEye DataKeeper Cluster Edition v7.6 Release Notes June 2013 This document and the information herein is the property of SIOS Technology Corp. (previously known as SteelEye Technology, Inc.) and all
More informationWindows Server 2008 R2 Hyper-V Live Migration
Windows Server 2008 R2 Hyper-V Live Migration Table of Contents Overview of Windows Server 2008 R2 Hyper-V Features... 3 Dynamic VM storage... 3 Enhanced Processor Support... 3 Enhanced Networking Support...
More informationSMB remote file protocol (including SMB 3.0) SW Worth, Microsoft
SMB remote file protocol (including SMB 3.0) SW Worth, Microsoft SNIA Legal Notice The material contained in this tutorial is copyrighted by the SNIA unless otherwise noted. Member companies and individual
More informationFrequently Asked Questions: EMC UnityVSA
Frequently Asked Questions: EMC UnityVSA 302-002-570 REV 01 Version 4.0 Overview... 3 What is UnityVSA?... 3 What are the specifications for UnityVSA?... 3 How do UnityVSA specifications compare to the
More informationEMC RepliStor for Microsoft Windows ERROR MESSAGE AND CODE GUIDE P/N 300-002-826 REV A02
EMC RepliStor for Microsoft Windows ERROR MESSAGE AND CODE GUIDE P/N 300-002-826 REV A02 EMC Corporation Corporate Headquarters: Hopkinton, MA 01748-9103 1-508-435-1000 www.emc.com Copyright 2003-2005
More informationCA ARCserve Replication and High Availability Deployment Options for Hyper-V
Solution Brief: CA ARCserve R16.5 Complexity ate my budget CA ARCserve Replication and High Availability Deployment Options for Hyper-V Adding value to your Hyper-V environment Overview Server virtualization
More informationVeeam Backup & Replication
Veeam Backup & Replication Version 7.0 Evaluator s Guide Hyper-V Environments August, 2013 2013 Veeam Software. All rights reserved. All trademarks are the property of their respective owners. No part
More informationUsing Data Domain Storage with Symantec Enterprise Vault 8. White Paper. Michael McLaughlin Data Domain Technical Marketing
Using Data Domain Storage with Symantec Enterprise Vault 8 White Paper Michael McLaughlin Data Domain Technical Marketing Charles Arconi Cornerstone Technologies - Principal Consultant Data Domain, Inc.
More informationEMC XtremSF: Delivering Next Generation Storage Performance for SQL Server
White Paper EMC XtremSF: Delivering Next Generation Storage Performance for SQL Server Abstract This white paper addresses the challenges currently facing business executives to store and process the growing
More informationEMC VNXe3200 UFS64 FILE SYSTEM
White Paper EMC VNXe3200 UFS64 FILE SYSTEM A DETAILED REVIEW Abstract This white paper explains the UFS64 File System architecture, functionality, and features available in the EMC VNXe3200 storage system.
More informationNetworking Best Practices Guide. Version 6.5
Networking Best Practices Guide Version 6.5 Summer 2010 Copyright: 2010, CCH, a Wolters Kluwer business. All rights reserved. Material in this publication may not be reproduced or transmitted in any form
More informationW H I T E P A P E R. Optimized Backup and Recovery for VMware Infrastructure with EMC Avamar
W H I T E P A P E R Optimized Backup and Recovery for VMware Infrastructure with EMC Avamar Contents Introduction...1 VMware Infrastructure Overview...1 VMware Consolidated Backup...2 EMC Avamar Overview...3
More informationTechnical Notes. EMC NetWorker Performing Backup and Recovery of SharePoint Server by using NetWorker Module for Microsoft SQL VDI Solution
EMC NetWorker Performing Backup and Recovery of SharePoint Server by using NetWorker Module for Microsoft SQL VDI Solution Release number 9.0 TECHNICAL NOTES 302-001-760 REV 01 September, 2015 These technical
More informationUsing Live Sync to Support Disaster Recovery
Using Live Sync to Support Disaster Recovery SIMPANA VIRTUAL SERVER AGENT FOR VMWARE Live Sync uses backup data to create and maintain a warm disaster recovery site. With backup and replication from a
More informationTesting and Restoring the Nasuni Filer in a Disaster Recovery Scenario
Testing and Restoring the Nasuni Filer in a Disaster Recovery Scenario Version 7.2 November 2015 Last modified: November 3, 2015 2015 Nasuni Corporation All Rights Reserved Document Information Testing
More informationEMC NetWorker Module for Microsoft Applications Release 2.3. Application Guide P/N 300-011-105 REV A02
EMC NetWorker Module for Microsoft Applications Release 2.3 Application Guide P/N 300-011-105 REV A02 EMC Corporation Corporate Headquarters: Hopkinton, MA 01748-9103 1-508-435-1000 www.emc.com Copyright
More informationNovell Distributed File Services Administration Guide
www.novell.com/documentation Novell Distributed File Services Administration Guide Open Enterprise Server 11 SP2 January 2014 Legal Notices Novell, Inc., makes no representations or warranties with respect
More informationHow To Backup A Virtualized Environment
Disk-based Backup for Virtualized Environment via Infortrend EonStor DS, ESVA, EonNAS 3000 / 5000 and Veeam Backup and Replication Application Note Abstract The document describes, as an example the usage
More informationSMB 3.0 New Opportunities for Windows Environments
SMB 3.0 New Opportunities for Windows PRESENTATION TITLE GOES HERE Environments Webcast Presenters Linda Wu Director of Product Management, Windows File Services NetApp Linda Wu is the Director of Product
More informationHow to Backup and Restore a VM using Veeam
How to Backup and Restore a VM using Veeam Table of Contents Introduction... 3 Assumptions... 3 Add ESXi Server... 4 Backup a VM... 6 Restore Full VM... 12 Appendix A: Install Veeam Backup & Replication
More informationWelcome to the IBM Education Assistant module for Tivoli Storage Manager version 6.2 Hyper-V backups. hyper_v_backups.ppt.
Welcome to the IBM Education Assistant module for Tivoli Storage Manager version 6.2 Hyper-V backups. Page 1 of 21 You are familiar with Tivoli Storage Manager version 5.5 or higher. Page 2 of 21 When
More informationEMC Data Domain Boost for Oracle Recovery Manager (RMAN)
White Paper EMC Data Domain Boost for Oracle Recovery Manager (RMAN) Abstract EMC delivers Database Administrators (DBAs) complete control of Oracle backup, recovery, and offsite disaster recovery with
More informationConfiguring Celerra for Security Information Management with Network Intelligence s envision
Configuring Celerra for Security Information Management with Best Practices Planning Abstract appliance is used to monitor log information from any device on the network to determine how that device is
More informationVMware Data Recovery. Administrator's Guide EN-000193-00
Administrator's Guide EN-000193-00 You can find the most up-to-date technical documentation on the VMware Web site at: http://www.vmware.com/support/ The VMware Web site also provides the latest product
More informationBackupAssist v6 quickstart guide
New features in BackupAssist v6... 2 VSS application backup (Exchange, SQL, SharePoint)... 3 System State backup... 3 Restore files, applications, System State and mailboxes... 4 Fully cloud ready Internet
More informationAcronis SharePoint Explorer. User Guide
Acronis SharePoint Explorer User Guide Table of contents 1 Introducing Acronis SharePoint Explorer... 3 1.1 Supported Microsoft SharePoint versions... 3 1.2 Supported backup locations... 3 1.3 Licensing...
More informationEMC ISILON SMARTCONNECT
EMC ISILON SMARTCONNECT Optimize Scale-out Storage Performance and Availability ABSTRACT This white paper covers the built-in client connection balancing functionality found in the EMC Isilon scale-out
More informationCA ARCserve Family r15
CA ARCserve Family r15 Rami Nasser EMEA Principal Consultant, Technical Sales Rami.Nasser@ca.com The ARCserve Family More than Backup The only solution that: Gives customers control over their changing
More informationEMC Replication Manager and Kroll Ontrack PowerControls for Granular Recovery of SharePoint Items
EMC Replication Manager and Kroll Ontrack PowerControls for Granular Recovery of SharePoint Items Applied Technology Abstract This white paper discusses how Kroll Ontrack PowerControls integrates with
More informationDell High Availability Solutions Guide for Microsoft Hyper-V
Dell High Availability Solutions Guide for Microsoft Hyper-V www.dell.com support.dell.com Notes and Cautions NOTE: A NOTE indicates important information that helps you make better use of your computer.
More information