GuardianOS Data Migration Tool Enables Ease of Snap Server Deployment and Data Consolidation WHITE PAPER

Size: px
Start display at page:

Download "GuardianOS Data Migration Tool Enables Ease of Snap Server Deployment and Data Consolidation WHITE PAPER"

Transcription

1 GuardianOS Data Migration Tool Enables Ease of Snap Server Deployment and Data Consolidation WHITE PAPER

2 Introduction Powered by the GuardianOS operating system, the Overland Storage Snap Server family of NAS storage servers support numerous file access protocols that provide client access to files in Windows, UNIX, and AFP networks, as well as remote access via FTP and HTTP. Since Snap Servers are a cost-effective file server replacement for so many platforms, a utility that simplifies data migration to Snap Servers was designed as part of GuardianOS. This white paper will describe how to utilize and best leverage the data migration utility built into GuardianOS. Overview of the Data Migration Utility The data migration utility allows administrators to easily copy or move data from any file server that has an accessible Windows (CIFS/SMB) share or UNIX (NFS) mount. It can also preserve permissions in order to make the transition to a new Snap Server seamless to end users and data owners. Previously, only native tools were readily available to move data from older file servers. Now, for consolidating data from multiple sources or performing a technology refresh, the data migration utility simplifies the migration process and reduces the implementation time for the new Snap Server. The Old Way In the past, if an administrator was moving data from a Windows system he could simply drag-and-drop the data if he was unconcerned with preserving permissions. However, if he wanted to maintain any user and group permissions while migrating, he was forced to use other utilities, such as XCOPY, Robocopy, SCOPY, XXCOPY, etc. Each of these tools has its own set of subtle nuances that can make it difficult to work with and can produce inconsistent and unpredictable results. Not to mention that these tools lack the ability to verify the data transfers or restart without overwriting all data that was previously copied after a failed data movement. If the administrator was moving data from a UNIX-based operating system, the task was not as unpredictable, but consolidating multiple systems could, nevertheless, become incredibly cumbersome. In many cases, administrators are replacing or offloading data from existing network attached storage (NAS) systems that do not have local utilities or commands for migrating data from them, requiring the use of a third-party Windows or UNIX system to move that data. Permissions on both the source and target must be painstakingly set to allow the operation. The third-party system will become bogged down moving data instead of doing other productive work. This can especially be a problem if the administrator s own workstation is used. A Better Way Now, with an integrated data migration utility on GuardianOS-powered Snap Servers, administrators can easily move data, streamlining the integration of a new Snap Server. This makes it less daunting to offload shared data from servers that were not originally intended for file serving, perform a technology refresh on older file servers that cannot keep up with the current performance and capacity requirements, or even to centralize the storage of multiple file servers to one high-capacity and high-performance solution. 1

3 The benefits of using the embedded data migration utility over other copy or move tools are simplicity and centralization. The simplicity comes from having a centralized single interface for copying or moving data from any server or storage platform that can be mounted using either CIFS/SMB (Windows) or NFS (UNIX/Linux/Solaris/Mac OS X). Administrators will no longer have to learn any command-line switches to make sure that the permissions are included. No manual verification that the data was successfully migrated is required. Everything an administrator needs to successfully perform data migration from other servers is on one easy-to-use screen within the web browser administration tool of Snap Server systems. Since the data migration utility runs natively on the Snap Server, all migration processing is done locally on the Snap Server and does not require any other system to facilitate the migration of data from the source. Just getting the data where it needs to be on a new file server can be the most difficult part of integrating a new data storage device. With the data migration utility, administrators can now easily accomplish this task. Use Case Scenarios for the Data Migration Utility There are several scenarios where the data migration utility can simplify the task of getting data moved over to the new Snap Server. The following use case scenarios outline some of the ways that in which the data migration utility can be used. Figure 3.1 shows just two examples of these use cases. Snap Server 520, 620 or Snap Server with Expansion Figure 3.1 The data migration utility is designed to be a single-direction, single-instance tool for moving data from a source system to a target system. In the first usage case above (Performing a Technology Refresh with the Data Migration Utility) the usage of the data migration utility is illustrated as a single operation for each server that is being replaced with a more current Snap Server system. In the second usage case above (Consolidating Multiple File Servers with the Data Migration Utility) the data migration utility is run repeatedly for each source system that is being consolidated and/or replaced by the more current Snap Server system. 2

4 Use Case #1 Migrating Data from a Server Running Windows (CIFS/SMB) Migrating data from a Windows source server requires the existence of a Windows share to provide access to the data by the Snap Server. The source server can be in a Windows Workgroup, an NT Domain, or an Active Directory Domain. The data migration utility can retain permissions for servers in a Windows NT or Active Directory Domain as long as the Snap Server is joined to the domain prior to executing the migration. If the Windows source is part of a Windows Workgroup, permissions can not be retained as all local user and group accounts are only relevant on the source server. Local Windows user and group security identifiers (SIDs) are not transferable, and therefore, the permissions cannot be recreated. In all cases, a proper administrative user account will be required to access the data on the source machine in order to properly transfer the data and permissions. If the source data contains filenames with extended characters other than common Western European characters (CP 1252), it may be advisable to enable Unicode on the Snap Server. Then, convert the file system to the proper mode before migration in order to properly retain the extended characters. Note: SMB must be enabled on the Snap Server to perform migration using the Windows network protocol option. This is enabled by default in the Network Windows screen of the web browser administration tool. A valid Windows share must also exist that allows write access to the target path in order to properly preserve permissions and DOS attributes. Use Case #2 Migrating Data from a Server Running UNIX or Linux (NFS) When moving data from a UNIX-based file server via NFS, the source server must have a valid NFS mount point for access to the data by the Snap Server. The file server can be part of a NIS Domain, but does not have to be. If permission preservation is enabled, the data migration utility preserves permissions and ownership for all user identifiers (UIDs) and group identifiers (GIDs) verbatim, regardless of whether an equivalent UID/GID is known to the Snap Server. This means that if all UIDs/GIDs are created on the target and match the source, permissions will be properly retained. A proper administrative user account will be required to access the data on the source machine in order to properly transfer the data and permissions. The migration will take place with the UID of the local Snap Server user logged into the UNIX machine as the migration user (note that the name may not have an equivalent on the target machine only the UID is relevant). Filenames are transferred over NFS verbatim as a bag of bytes. Therefore, extended characters in filenames may not be properly retained if encoded on the source with a character set that does not match the character set used on the Snap Server's file system (ISO /CP 1252 if Unicode is disabled, or UTF-8 if Unicode is enabled). Note: When connecting to the NFS source, the Snap Server tries to connect using NFSv3 by default, but will fall back to NFSv2 if necessary. It will, likewise, try to use TCP as the default transport protocol, but fall back to UDP. Use Case #3 Migrating Data from a GuardianOS-Powered Snap Server Migrating data from another GuardianOS-powered Snap Server to a new Snap Server with the data migration utility works just as if you were moving data from any other file server source. Be sure to choose the appropriate protocol for the migration job with respect to the security model of the data being migrated. For example, if the data is in 3

5 a Windows SnapTree, use Windows, and if the data is in a UNIX SnapTree, use NFS to migrate the correct permissions. The rest works the same as any other Windows or UNIX data migration as described in Use Cases #1 and #2. To properly retain any extended characters in filenames, make sure the target Snap Server is configured for the same Unicode state (enabled/disabled) as the source Snap Server. Note: If the source location contains both Windows and UNIX SnapTrees and you want to preserve permissions, split the migration operation into multiple jobs, one for each SnapTree for the given security model, using the appropriate protocol per job. Use Case #4 Migrating Data from a SnapOS-Powered Snap Server Like GuardianOS-to-GuardianOS migrations, moving data off of a SnapOS-powered Snap Server is as simple as defining the data type (Windows or UNIX) that you will be migrating. Permission preservation, however, is generally not recommended when migrating from a SnapOS-powered Snap Server. SnapOS native file system permissions are only properly visible and configurable in the SnapOS web UI. Though modeled after Windows-style permissions, SnapOS permissions cannot be communicated over SMB or any of the file access network protocols. In addition, UNIX permissions reported over NFS by SnapOS servers are loosely interpreted from the SnapOS file system permissions, and do not necessarily properly represent them. Therefore, preserving them when migrating over NFS may not result in equivalent effective permissions on the target, even if preserved verbatim with the same UIDs/GIDs. SnapOS does not enforce a standardized character set for filenames and relies on DOS code pages for communicating filenames over SMB. Therefore, extended characters may not be properly retained using either SMB or NFS migration, depending on the method and protocol by which the filenames were originally written at the source. Because NFS migration transfers filenames verbatim as a bag of bytes, extended characters are likely to be copied improperly, especially if the target GuardianOS Snap Server is configured for UTF-8. Use Case #5 - Migrating Data from Mac OS X Mac OS X migrations can be done using either the Windows or NFS network protocol, but they cannot retain the extended ACLs or resource forks of OS X 10.4 s extended ACLs or resource forks. If neither of these is a concern, then the appropriate migration protocol should be selected based on the need to retain UNIX-style permissions, whether there are extended characters in filenames on the source, and whether the GuardianOS-powered Snap Server is in Unicode mode. A NFS migration can retain UNIX-style permissions from OS X, but characters in filenames are migrated verbatim as a bag of bytes. Extended characters on source filenames will, therefore, only be retained properly if Unicode is enabled on the Snap Server. A Windows migration cannot retain permissions from OS X, but it can retain common Western-European extended characters in filenames if Unicode is not enabled on the Snap Server target. It can retain all extended characters if Unicode is enabled on the Snap Server. Use Case #6 Migrating Data from Other Sources Migrating data from any other source is possible, as long as the source file server or NAS system has an NFS mount or CIFS/SMB share available. Moving data off of other sources only requires that you have an administrative login with appropriate access privileges. For customers whose NAS offerings are not performing adequately or meeting all of their 4

6 needs, the data can be easily migrated from these systems using the data migration utility. If NFS migration is chosen, note that filenames are transferred over NFS verbatim as a bag of bytes. Therefore, extended characters in filenames may not be properly retained if encoded on the source with a character set that does not match the character set used on the Snap Server s file system (ISO /CP 1252 if Unicode is disabled, or UTF-8 if Unicode is enabled). Note: Similar to a migration from GuardianOS to GuardianOS, migrating data from a location that has mixed Windows-style and UNIX-style file permissions e.g. a mixedmode qtree on a NetApp filer can only properly preserve permissions that correspond to the protocol used for the migration job. For example, if Windows is used, only Windows permissions will properly be preserved; and if NFS is used, only UNIX permissions will be properly preserved. Procedures for Using the Data Migration Utility The data migration utility can be found on the bottom of the main Administration web page of the web browser administration tool (see Screenshot 4-1) for any GuardianOSpowered Snap Server. The latest version of GuardianOS can be found at the support portal at Screenshot 4-1 It is important that, before any data migration, the administrator carefully plan out the process and allow enough time to move the data and test access prior to turning the new Snap Server live to the end users. Roughly estimating a data migration can be done by creating a dry run to copy (not move) the data; let the migration job run for some time; and then check the estimated time remaining on the Data Migration Status Page. The job can then be stopped and restarted when there is enough time to complete an uninterrupted migration. This will give a very rough estimate of the migration time and can in no way be used as an accurate gauge for the actual migration. See Screenshot 4-2 for a look at the Data Migration page. 5

7 Screenshot 4-2 Requirements: - GuardianOS or later - Valid Windows/CIFS share or NFS mount point with administrative access - Dedicated access to the source data (no clients accessing the source during migration) - Minimum 100Base-T network for both source and target on the same local LAN (Does not support WAN-based migrations) - Sufficient available capacity on the target volume on the Snap Server The following is an overview of the steps that should be followed to set up and execute a successful data migration: Step 1: Synchronize User Accounts If it is critical to preserve permissions, join the appropriate Windows Domain (with trusted domain support enabled, if applicable) or NIS Domain, and add any local users and groups that are necessary. Also make sure if there are any ID mappings that need to be created between Local or NIS users/groups and Windows users/groups, that this is done prior to beginning any migration jobs. ID Mapping instructions can be found in the GuardianOS Administrators Guide or in the online help. Note: All of the users and groups that own or have permissions assigned at the source need to be properly added and configured on the Snap Server. Step 2: Choose Network Protocol Decide which network protocol will be used for the data transfer. If you are transferring from a Windows file share, then you would choose the Windows option that uses the CIFS/SMB network protocol. If you are transferring data from a UNIX mount point, choose the NFS option. If either protocol is an option, choose whichever is more convenient, or, if preserving permissions, choose the protocol that matches the file permission type of the source data. Step 3: Identify Source User Account Identify an administrative user account that has the appropriate access on the source system to move the data. If performing a move operation, note that this user needs to be able to delete source data, and if preserving permissions, needs to be able to read permissions on source files. For Windows migration jobs, the user Administrator or an 6

8 equivalent account e.g. a domain administrator such as mydomain\administrator is recommended, as is the root account for NFS migration. If using root for NFS, make sure to use the no_root_squash option on the source export. In general, it is a good idea to test access to the source s share or mount point with the identified user account before proceeding. Step 4: Create the Security Model on the Snap Server Using the SnapTree feature, ensure that the appropriate security model for the migration type (Windows or NFS) is configured on the target path for the Snap Server. The following are some examples to help illustrate the importance of setting the proper security model: If moving Windows data, set up a Windows SnapTree at the target, and if moving UNIX data, set up a UNIX SnapTree. If the SnapTree type does not match the migration job s Network Protocol (e.g. a Windows job configured to migrate to a Unix SnapTree), a warning will be returned by the data migration utility. If preserving permissions when migrating Windows data, each file or folder written to a folder with the UNIX security model will result in a permission denied error output to the migration log. If the target location is a volume root directory that contains various SnapTrees of different security models, permissions will be properly maintained for files and folders placed in directories with the security model that matches the protocol of the migration job, whereas files and folders placed in directories with a mismatched security model will not be properly retained (and may return an error per the above). Step 5: Create a Share on the Snap Server Create the target share(s) or mount point(s) on the Snap Server exactly as you want them to be. Make sure that at least one share is available that can access the target path that gives write access to the Snap Server s local root user. Step 6: Move or Copy? Decide whether you want to copy the data (leave the data on the source) or move the data (delete the data from the source). This is a very important decision. For example: In your environment it may make the most sense to copy all of the data first and then to disable access to the old file server and activate the new Snap Server share. This would allow you to test and make sure everything is working as desired before removing the data from the old server. If you decide to move the data instead, it is highly recommended that you ensure there is no other user access to the source or target server during the migration. It is also highly recommended that you use the Verify option to ensure the data has been properly migrated. The Verify option will take twice as long, but will ensure that the data was moved or copied correctly. Note: If verification is enabled, files will only be removed from the source after successful verification; otherwise they ll be removed from the source immediately after copying. Step 7: Restrict Access to the Source Data Make sure that the source location is quiescent. In other words, at the very least no users or services can change or add data at the source. It is always best to restrict all other access except for the Snap Server system doing the migration. Step 8: Run the Migration Job Once all of the necessary information is gathered, configure and run the migration job. At a minimum, always restrict access to the source from which the data is being moved. It is always best to restrict all other access except for the Snap Server doing the migration. 7

9 Step 9: Check the Logs After the job runs, always check the log for errors by clicking on the View Log button at the bottom of the data migration screen. Step 10: Verify the Data Migration If you used the Verify option, the Data Migration Log will help you determine success for the migration. If you chose not to use the Verify option, make sure to use some other method to validate the success of the data migration. If you are executing another migration after a previous failed migration, it is crucial that verification is enabled, to ensure that any files that may be corrupt due to a migration failure are identified. Corrupted data can only be found by utilizing the Verify option. If a file comparison fails in the verification phase, the target file will be moved to a quarantine directory on the same volume. The log message for the comparison failure will indicate the path. Step 11: Take the Old Server Offline Once migration of the data has been successfully verified, bring the old file server shares or mount points offline. This will prevent new data from inadvertently being added to the old server. What Permissions are Preserved? The types of permissions retained will differ, depending on which of the following migration scenarios is applied: Migrating from a System Using a Windows Security Model: When migrating from a Windows server or any other server using a Windows Security Model to a Snap Server, permissions will be retained as follows: Known domain user owners are retained as owners if the Snap Server belongs to the same or trusting domain of users assigned permissions on the source data. To retain permissions for users of a trusted domain, Trusted Domain support must be enabled on the Snap Server. To enable, navigate to Network > Windows. Permissions for unknown users and groups and for local users and groups on the Windows server are NOT retained. Access Control Entries (ACEs) for users and groups will be applied on the target files approximately as they were on the source files. Due to differences between Windows Access Control Lists (ACLs) and POSIX ACLs, the effective permissions may not be those you expect. For more information, see How the GuardianOS and Windows Differ in Processing File-Level Access Permissions in the Snap Server Administrator Guide. For example: If there is no ACE for everyone on the source, it will be assigned No Access for all users who are not covered by higher POSIX ACL checks. If there is a Deny All ACE for everyone on the source, it will be applied to all ACEs on the ACL (that is, everyone is denied access, although the owner always has implicit change permissions). If there is a Deny All ACE for non-owning users or groups, it will be removed (i.e., enforced as a lack of permission rather than as an explicit Deny). If there are Deny ACEs on users, the denied bits are set as No Access rather than enforced as explicit Denies. If there are Deny ACEs on groups, the denied bits are set as No Access on the group ACE, and are also propagated as No Access bits to ACEs for individual group members (if any exist). 8

10 Migrating from a System Using a UNIX Security Model When migrating from a UNIX server using a UNIX Security Model to a UNIX SnapTree, UNIX permissions for UIDs/GIDs are copied exactly from the source to the target; thus, identities of the users and groups will be best retained if the Snap Server belongs to the same NIS domain as the UNIX server. If an NIS Domain does not exist all of the same UIDs/GIDs must exist and be configured properly as local users on the Snap Server to retain the permissions properly. Migrating between conflicting Security Models It is not recommended that permissions be preserved when migrating from a Windows Security Model to a UNIX SnapTree, or vice versa. Permissions will not be applied or enforced as expected. Migrating from a GuardianOS-Powered Snap Server When migrating from one GuardianOS-powered Snap Server to another, it is recommended that the same Security Model is used on the target server that was used on the source. If the source server uses a Windows SnapTree and has permissions assigned to Windows domain users, use a Windows connection for migration. Note: Permissions for local users on the source Snap Server will not be retained. If permissions or ownership is largely assigned to local users, it is not recommended to use the Preserve Permissions option because the permissions will all be dropped. If the source server uses a UNIX SnapTree and has permissions assigned to local or NIS users, use an NFS connection for migration. Generic POSIX ACLs or Solaris POSIX ACLs will not be retained. Only standard UNIX permissions (User/Group/Other) are maintained as part of data migration process. Note: Local users that have UNIX permissions on the source will not be created on the target with the same UIDs. These local user accounts and UIDs must be created manually. During a NFS migration, permissions, and ownership are preserved verbatim if local user name and/or group name equivalents for these UIDs/GIDs are needed, those users and groups with corresponding UIDs/GIDs need to be created manually. When Not to use the Data Migration Utility In some cases there are better options for moving or copying data to a Snap Server. The following describes some common scenarios that have better alternative methods for moving data: Data migration is not a replication replacement The data migration utility is not schedulable and therefore is not a good tool for repetitive data movement. The data migration utility also is not optimized by way of bandwidth throttling or copying bytelevel changes only, which are highly beneficial for WAN-based data movement. Purpose-built tools, such as Snap Enterprise Data Replicator (Snap EDR), are better suited for this type of task. Data migration is not a backup replacement For the same reasons that the data migration utility is not suited as an ongoing replication tool, it is not designed with data backup in mind. Features such as scheduling, incremental capabilities, versioning, and backup cataloging among many other things make the data migration tool a poor choice as a backup tool. 9

11 Mixed Windows and UNIX security models For any data that is accessed by end users from both Windows and UNIX machines, the data migration tool can only effectively retain the permissions of one or the other security model, based on the protocol used for the migration job. Therefore, it is recommended to choose the security model that is predominantly used by the end users. Once the data migration has completed, the other security model permissions will have to be manually adjusted. Note: When migrating from an older GuardianOS-powered Snap Server, Snap EDR can be used to make sure all Windows and UNIX permissions are properly retained during the data movement. Migration of AFP files from SnapOS-powered Snap Servers Macintosh files stored on a SnapOS-powered Snap Server may have resource forks associated with them that may not be properly accessible on the GuardianOS target after migration. Therefore, a manual copy or move of the data from a native Macintosh is the best option for migrating Macintosh files. Notable Caveats NFS data migration is very memory-intensive, scaling with the number of files and folders processed. Jobs should therefore be configured to divide up the source data into data sets not exceeding one million total files and folders per job. There are no limits for CIFS/SMB migration jobs. It is important to note the following behavior for migrating symbolic and hard links from UNIX-based source servers using NFS: Symbolic or soft links (also known as symlinks) are preserved verbatim, symbolically They are not followed (to prevent getting stuck in a recursive symlink loop). As a consequence, symlinks at the source migrated to locations outside of the data set may be broken at the target. Hard links are retained as hard links Multiple files pointing to the same inode at the source will result in those same files pointing to the same inode at the target. NetApp systems using a version of Data ONTAP older then version may not allow the Windows (CIFS/SMB) data migration engine to authenticate to the NetApp box via a Windows Domain. This was verified as fixed in version A NetApp bug has been noted during testing that can result in failure to migrate if NFSv3 is enabled and TCP is disabled on the NetApp server. If necessary, configure the NetApp server to either allow NFS over TCP or force NFSv2. 10

12 About Overland Storage Overland Storage provides affordable end-to-end data protection solutions that are engineered to store smarter, protect faster and extend anywhere across networked storage, media types, and multi-site environments. Overland Storage products include award- winning NEO SERIES and ARCvault tape libraries, REO SERIES disk-based backup and recovery appliances with VTL capabilities, Snap Server NAS appliances, and ULTAMUS RAID high-performance, high-density storage. For more information, visit WORLDWIDE HEADQUARTERS 4820 Overland Avenue San Diego, CA USA TEL FAX UNITED KINGDOM (EMEA OFFICE) Overland House, Ashville Way Wokingham, Berkshire RG41 2PL England TEL +44 (0) FAX +44 (0) Overland Storage, Inc. All trademarks and registered trademarks are the property of their respective owners. EDRDM-WP

WHITE PAPER. Home Directories on Snap Server GuardianOS

WHITE PAPER. Home Directories on Snap Server GuardianOS WHITE PAPER Home Directories on Snap Server GuardianOS Introduction Home directories have become commonplace in today s corporate computing environments. Home directories present a central location for

More information

File Services. File Services at a Glance

File Services. File Services at a Glance File Services High-performance workgroup and Internet file sharing for Mac, Windows, and Linux clients. Features Native file services for Mac, Windows, and Linux clients Comprehensive file services using

More information

WHITE PAPER Overview of Data Replication

WHITE PAPER Overview of Data Replication Overview of Data Replication 1 Abstract Replication is the process of making a copy of something, or of creating a replica. In different contexts, such as art (copies of a painting), bioscience (cloning),

More information

Creating Home Directories for Windows and Macintosh Computers

Creating Home Directories for Windows and Macintosh Computers ExtremeZ-IP Active Directory Integrated Home Directories Configuration! 1 Active Directory Integrated Home Directories Overview This document explains how to configure home directories in Active Directory

More information

Centralized Mac Home Directories On Windows Servers: Using Windows To Serve The Mac

Centralized Mac Home Directories On Windows Servers: Using Windows To Serve The Mac Making it easy to deploy, integrate and manage Macs, iphones and ipads in a Windows environment. Centralized Mac Home Directories On Windows Servers: Using Windows To Serve The Mac 2011 ENTERPRISE DEVICE

More information

USING USER ACCESS CONTROL LISTS (ACLS) TO MANAGE FILE PERMISSIONS WITH A LENOVO NETWORK STORAGE DEVICE

USING USER ACCESS CONTROL LISTS (ACLS) TO MANAGE FILE PERMISSIONS WITH A LENOVO NETWORK STORAGE DEVICE White Paper USING USER ACCESS CONTROL LISTS (ACLS) TO MANAGE FILE PERMISSIONS WITH A LENOVO NETWORK STORAGE DEVICE CONTENTS Executive Summary 1 Introduction 1 Audience 2 Terminology 2 Windows Concepts

More information

How To Manage File Access On Data Ontap On A Pc Or Mac Or Mac (For A Mac) On A Network (For Mac) With A Network Or Ipad (For An Ipad) On An Ipa (For Pc Or

How To Manage File Access On Data Ontap On A Pc Or Mac Or Mac (For A Mac) On A Network (For Mac) With A Network Or Ipad (For An Ipad) On An Ipa (For Pc Or Clustered Data ONTAP 8.3 File Access Management Guide for NFS NetApp, Inc. 495 East Java Drive Sunnyvale, CA 94089 U.S. Telephone: +1 (408) 822-6000 Fax: +1 (408) 822-4501 Support telephone: +1 (888) 463-8277

More information

Quick Start - NetApp File Archiver

Quick Start - NetApp File Archiver Quick Start - NetApp File Archiver TABLE OF CONTENTS OVERVIEW SYSTEM REQUIREMENTS GETTING STARTED Upgrade Configuration Archive Recover Page 1 of 14 Overview - NetApp File Archiver Agent TABLE OF CONTENTS

More information

VERITAS Backup Exec 9.0 for Windows Servers

VERITAS Backup Exec 9.0 for Windows Servers WHITE PAPER Data Protection Solutions for Network Attached Storage VERITAS Backup Exec 9.0 for Windows Servers VERSION INCLUDES TABLE OF CONTENTS STYLES 1 TABLE OF CONTENTS Background...3 Why Use a NAS

More information

How To Set Up Egnyte For Netapp Sync For Netapp

How To Set Up Egnyte For Netapp Sync For Netapp Egnyte Storage Sync For NetApp Installation Guide Introduction... 2 Architecture... 2 Key Features... 3 Access Files From Anywhere With Any Device... 3 Easily Share Files Between Offices and Business Partners...

More information

storage elements and computer systems so that data transfer is secure and robust."

storage elements and computer systems so that data transfer is secure and robust. Storage Architecture Choice, SAN or NAS LaNet Merrill SGI SAN & HA Product Marketing Manager storage elements and computer systems so that data transfer is secure and robust." Unlike the traditional direct-attach

More information

Isilon OneFS. Version 7.2.1. OneFS Migration Tools Guide

Isilon OneFS. Version 7.2.1. OneFS Migration Tools Guide Isilon OneFS Version 7.2.1 OneFS Migration Tools Guide Copyright 2015 EMC Corporation. All rights reserved. Published in USA. Published July, 2015 EMC believes the information in this publication is accurate

More information

Distributing File Data with Snap Enterprise Data Replicator (Snap EDR)

Distributing File Data with Snap Enterprise Data Replicator (Snap EDR) TECHNICAL OVERVIEW Distributing File Data with Snap Enterprise Data Replicator (Snap ) Contents 1. Abstract...1 2. Introduction to Snap...1 3. Product Architecture...2 4. Distribute Data Management Tool...2

More information

Clustered Data ONTAP 8.2

Clustered Data ONTAP 8.2 Updated for 8.2.1 Clustered Data ONTAP 8.2 File Access Management Guide for NFS NetApp, Inc. 495 East Java Drive Sunnyvale, CA 94089 U.S. Telephone: +1 (408) 822-6000 Fax: +1 (408) 822-4501 Support telephone:

More information

CA Unified Infrastructure Management Server

CA Unified Infrastructure Management Server CA Unified Infrastructure Management Server CA UIM Server Configuration Guide 8.0 Document Revision History Version Date Changes 8.0 September 2014 Rebranded for UIM 8.0. 7.6 June 2014 No revisions for

More information

Migrating Your Windows File Server to a CTERA Cloud Gateway. Cloud Attached Storage. February 2015 Version 4.1

Migrating Your Windows File Server to a CTERA Cloud Gateway. Cloud Attached Storage. February 2015 Version 4.1 Migrating Your Windows File Server to a CTERA Cloud Gateway Cloud Attached Storage February 2015 Version 4.1 Copyright 2009-2015 CTERA Networks Ltd. All rights reserved. No part of this document may be

More information

How To Take Advantage Of Active Directory Support In Groupwise 2014

How To Take Advantage Of Active Directory Support In Groupwise 2014 White Paper Collaboration Taking Advantage of Active Directory Support in GroupWise 2014 Flexibility and interoperability have always been hallmarks for Novell. That s why it should be no surprise that

More information

WHITE PAPER. Understanding Windows & UNIX File Permissions on GuardianOS

WHITE PAPER. Understanding Windows & UNIX File Permissions on GuardianOS WHITE PAPER Understanding Windows & UNIX File Permissions on GuardianOS Introduction Overland Storage Snap Server storage systems powered by the GuardianOS operating system support many file access protocols

More information

Windows Services. Support Windows and mixed-platform workgroups with high-performance, affordable network services. Features

Windows Services. Support Windows and mixed-platform workgroups with high-performance, affordable network services. Features Windows Services Support Windows and mixed-platform workgroups with high-performance, affordable network services. Features File and print services Integrated Samba 3 for native SMB/CIFS protocol support

More information

Direct Storage Access Using NetApp SnapDrive. Installation & Administration Guide

Direct Storage Access Using NetApp SnapDrive. Installation & Administration Guide Direct Storage Access Using NetApp SnapDrive Installation & Administration Guide SnapDrive overview... 3 What SnapDrive does... 3 What SnapDrive does not do... 3 Recommendations for using SnapDrive...

More information

Replicating File Data with Snap Enterprise Data Replicator (Snap EDR)

Replicating File Data with Snap Enterprise Data Replicator (Snap EDR) TECHNICAL OVERVIEW Replicating File Data with Snap Enterprise Data Replicator (Snap ) 1. Abstract...1 2. Introduction to Snap...1 3. Product Architecture...1 4. Replicate Data Management Tool...2 4.1.

More information

IDENTITIES, ACCESS TOKENS, AND THE ISILON ONEFS USER MAPPING SERVICE

IDENTITIES, ACCESS TOKENS, AND THE ISILON ONEFS USER MAPPING SERVICE White Paper IDENTITIES, ACCESS TOKENS, AND THE ISILON ONEFS USER MAPPING SERVICE Abstract The OneFS user mapping service combines a user s identities from different directory services into a single access

More information

Winchester Systems. White Paper

Winchester Systems. White Paper Winchester Systems White Paper FlashNAS Unified Storage Affordable Feature Rich NAS Supports CIFS & NFS for Windows, Linux, Unix & MAC OS September 2012 101 Billerica Ave, Bldg. 5, Billerica, MA 01862

More information

READYNAS INSTANT STORAGE. Quick Installation Guide

READYNAS INSTANT STORAGE. Quick Installation Guide READYNAS INSTANT STORAGE Quick Installation Guide Table of Contents Step 1 Connect to FrontView Setup Wizard 3 Installing RAIDar on Windows 3 Installing RAIDar on Mac OS X 3 Installing RAIDar on Linux

More information

SiliconServer Data Sharing and Security White Paper

SiliconServer Data Sharing and Security White Paper SiliconServer Data Sharing and Security White Paper Executive Summary The ability of enterprises to access UNIX and Windows NT stored data both separately and from a shared common pool is growing in importance.

More information

Centralized Mac Home Directories with ExtremeZ-IP

Centralized Mac Home Directories with ExtremeZ-IP APPLICATION NOTE Centralized Mac Home Directories with ExtremeZ-IP Published: July 2009 Abstract Organizations wanting to integrate Mac OS X systems into their Windows-based enterprise network will most

More information

User Migration Tool. Note. Staging Guide for Cisco Unified ICM/Contact Center Enterprise & Hosted Release 9.0(1) 1

User Migration Tool. Note. Staging Guide for Cisco Unified ICM/Contact Center Enterprise & Hosted Release 9.0(1) 1 The (UMT): Is a stand-alone Windows command-line application that performs migration in the granularity of a Unified ICM instance. It migrates only Unified ICM AD user accounts (config/setup and supervisors)

More information

ReadyNAS Setup Manual

ReadyNAS Setup Manual ReadyNAS Setup Manual NETGEAR, Inc. 4500 Great America Parkway Santa Clara, CA 95054 USA October 2007 208-10163-01 v1.0 2007 by NETGEAR, Inc. All rights reserved. Trademarks NETGEAR, the NETGEAR logo,

More information

Mac OS X Server Migration Guide

Mac OS X Server Migration Guide Mac OS X Server Migration Guide Includes detailed instructions for upgrading to Mac OS X Server from AppleShare IP, Macintosh Manager, and Mac OS X Server 1.2 K Apple Computer, Inc. 2001 Apple Computer,

More information

Active Directory Compatibility with ExtremeZ-IP. A Technical Best Practices Whitepaper

Active Directory Compatibility with ExtremeZ-IP. A Technical Best Practices Whitepaper Active Directory Compatibility with ExtremeZ-IP A Technical Best Practices Whitepaper About this Document The purpose of this technical paper is to discuss how ExtremeZ-IP supports Microsoft Active Directory.

More information

Sun ZFS Storage Appliance Rule-Based Identity Mapping Between Active Directory and Network Information Services Implementation Guide

Sun ZFS Storage Appliance Rule-Based Identity Mapping Between Active Directory and Network Information Services Implementation Guide An Oracle White Paper February 2011 Sun ZFS Storage Appliance Rule-Based Identity Mapping Between Active Directory and Network Information Services Implementation Guide Introduction... 4 Overview and Prerequisites...

More information

Every organization has critical data that it can t live without. When a disaster strikes, how long can your business survive without access to its

Every organization has critical data that it can t live without. When a disaster strikes, how long can your business survive without access to its DISASTER RECOVERY STRATEGIES: BUSINESS CONTINUITY THROUGH REMOTE BACKUP REPLICATION Every organization has critical data that it can t live without. When a disaster strikes, how long can your business

More information

CommVault Simpana Archive 8.0 Integration Guide

CommVault Simpana Archive 8.0 Integration Guide CommVault Simpana Archive 8.0 Integration Guide Data Domain, Inc. 2421 Mission College Boulevard, Santa Clara, CA 95054 866-WE-DDUPE; 408-980-4800 Version 1.0, Revision B September 2, 2009 Copyright 2009

More information

IBM TSM DISASTER RECOVERY BEST PRACTICES WITH EMC DATA DOMAIN DEDUPLICATION STORAGE

IBM TSM DISASTER RECOVERY BEST PRACTICES WITH EMC DATA DOMAIN DEDUPLICATION STORAGE White Paper IBM TSM DISASTER RECOVERY BEST PRACTICES WITH EMC DATA DOMAIN DEDUPLICATION STORAGE Abstract This white paper focuses on recovery of an IBM Tivoli Storage Manager (TSM) server and explores

More information

Installation and Setup: Setup Wizard Account Information

Installation and Setup: Setup Wizard Account Information Installation and Setup: Setup Wizard Account Information Once the My Secure Backup software has been installed on the end-user machine, the first step in the installation wizard is to configure their account

More information

Open Directory. Apple s standards-based directory and network authentication services architecture. Features

Open Directory. Apple s standards-based directory and network authentication services architecture. Features Open Directory Apple s standards-based directory and network authentication services architecture. Features Scalable LDAP directory server OpenLDAP for providing standards-based access to centralized data

More information

Storage Sync for Hyper-V. Installation Guide for Microsoft Hyper-V

Storage Sync for Hyper-V. Installation Guide for Microsoft Hyper-V Installation Guide for Microsoft Hyper-V Egnyte Inc. 1890 N. Shoreline Blvd. Mountain View, CA 94043, USA Phone: 877-7EGNYTE (877-734-6983) www.egnyte.com 2013 by Egnyte Inc. All rights reserved. Revised

More information

Getting Started Guide

Getting Started Guide Getting Started Guide Microsoft Corporation Published: December 2005 Table of Contents Getting Started Guide...1 Table of Contents...2 Get Started with Windows Server 2003 R2...4 Windows Storage Server

More information

WHITE PAPER: ENTERPRISE SOLUTIONS. Symantec Backup Exec Continuous Protection Server Continuous Protection for Microsoft SQL Server Databases

WHITE PAPER: ENTERPRISE SOLUTIONS. Symantec Backup Exec Continuous Protection Server Continuous Protection for Microsoft SQL Server Databases WHITE PAPER: ENTERPRISE SOLUTIONS Symantec Backup Exec Continuous Protection Server Continuous Protection for Microsoft SQL Server Databases White Paper: Enterprise Solutions Symantec Backup Exec Continuous

More information

Disaster Recovery Strategies: Business Continuity through Remote Backup Replication

Disaster Recovery Strategies: Business Continuity through Remote Backup Replication W H I T E P A P E R S O L U T I O N : D I S A S T E R R E C O V E R Y T E C H N O L O G Y : R E M O T E R E P L I C A T I O N Disaster Recovery Strategies: Business Continuity through Remote Backup Replication

More information

Veeam Cloud Connect. Version 8.0. Administrator Guide

Veeam Cloud Connect. Version 8.0. Administrator Guide Veeam Cloud Connect Version 8.0 Administrator Guide April, 2015 2015 Veeam Software. All rights reserved. All trademarks are the property of their respective owners. No part of this publication may be

More information

Isilon OneFS. Version 7.2. OneFS Migration Tools Guide

Isilon OneFS. Version 7.2. OneFS Migration Tools Guide Isilon OneFS Version 7.2 OneFS Migration Tools Guide Copyright 2014 EMC Corporation. All rights reserved. Published in USA. Published November, 2014 EMC believes the information in this publication is

More information

CONFIGURING ACTIVE DIRECTORY IN LIFELINE

CONFIGURING ACTIVE DIRECTORY IN LIFELINE White Paper CONFIGURING ACTIVE DIRECTORY IN LIFELINE CONTENTS Introduction 1 Audience 1 Terminology 1 Test Environment 2 Joining a Lenovo network storage device to an AD domain 3 Importing Domain Users

More information

EMC Celerra Network Server

EMC Celerra Network Server EMC Celerra Network Server Release 5.6.47 Using Windows Administrative Tools with Celerra P/N 300-004-139 REV A02 EMC Corporation Corporate Headquarters: Hopkintons, MA 01748-9103 1-508-435-1000 www.emc.com

More information

ReadyNAS Replicate. Software Reference Manual. 350 East Plumeria Drive San Jose, CA 95134 USA. November 2010 202-10727-01 v1.0

ReadyNAS Replicate. Software Reference Manual. 350 East Plumeria Drive San Jose, CA 95134 USA. November 2010 202-10727-01 v1.0 ReadyNAS Replicate Software Reference Manual 350 East Plumeria Drive San Jose, CA 95134 USA November 2010 202-10727-01 v1.0 2010 NETGEAR, Inc. All rights reserved. No part of this publication may be reproduced,

More information

Seagate NAS OS 4 Reviewers Guide: NAS / NAS Pro / Business Storage Rackmounts

Seagate NAS OS 4 Reviewers Guide: NAS / NAS Pro / Business Storage Rackmounts Seagate NAS OS 4 Reviewers Guide: NAS / NAS Pro / Business Storage Rackmounts Seagate NAS OS 4 Reviewers Guide 2 Purpose of this guide Experience the most common use cases for the product, learn about

More information

Managing Software and Configurations

Managing Software and Configurations 55 CHAPTER This chapter describes how to manage the ASASM software and configurations and includes the following sections: Saving the Running Configuration to a TFTP Server, page 55-1 Managing Files, page

More information

NetVault Backup, NDMP and Network Attached Storage

NetVault Backup, NDMP and Network Attached Storage NetVault, NDMP and Network Attached Storage Simplicity and power for NAS Written by Adrian Moir, Dell Scott Hetrick, Dell Abstract This technical brief explains how Network Data Management Protocol (NDMP)

More information

Microsoft DFS Replication vs. Peer Software s PeerSync & PeerLock

Microsoft DFS Replication vs. Peer Software s PeerSync & PeerLock Microsoft DFS Replication vs. Peer Software s PeerSync & PeerLock Contents.. Why Replication is Important. 2 The Original Purpose for MS DFSR. 2 Best Scenarios for DFSR. 3 When DFSR is Problematic. 4 The

More information

White Paper. Anywhere, Any Device File Access with IT in Control. Enterprise File Serving 2.0

White Paper. Anywhere, Any Device File Access with IT in Control. Enterprise File Serving 2.0 White Paper Enterprise File Serving 2.0 Anywhere, Any Device File Access with IT in Control Like it or not, cloud- based file sharing services have opened up a new world of mobile file access and collaborative

More information

CatDV Pro Workgroup Serve r

CatDV Pro Workgroup Serve r Architectural Overview CatDV Pro Workgroup Server Square Box Systems Ltd May 2003 The CatDV Pro client application is a standalone desktop application, providing video logging and media cataloging capability

More information

Buffalo Technology: Migrating your data to Windows Storage Server 2012 R2

Buffalo Technology: Migrating your data to Windows Storage Server 2012 R2 Buffalo Technology: Migrating your data to Windows Storage Server 2012 R2 1 Buffalo Technology: Migrating your data to Windows Storage Server 2012 R2 Contents Chapter 1 Data migration method:... 3 Chapter

More information

Using HP StoreOnce Backup Systems for NDMP backups with Symantec NetBackup

Using HP StoreOnce Backup Systems for NDMP backups with Symantec NetBackup Technical white paper Using HP StoreOnce Backup Systems for NDMP backups with Symantec NetBackup Table of contents Executive summary... 2 Introduction... 2 What is NDMP?... 2 Technology overview... 3 HP

More information

Acronis Backup & Recovery for Mac. Acronis Backup & Recovery & Acronis ExtremeZ-IP REFERENCE ARCHITECTURE

Acronis Backup & Recovery for Mac. Acronis Backup & Recovery & Acronis ExtremeZ-IP REFERENCE ARCHITECTURE Acronis Backup & Recovery for Mac Acronis Backup & Recovery & Acronis ExtremeZ-IP This document describes the technical requirements and best practices for implementation of a disaster recovery solution

More information

VERITAS NetBackup BusinesServer

VERITAS NetBackup BusinesServer VERITAS NetBackup BusinesServer A Scalable Backup Solution for UNIX or Heterogeneous Workgroups V E R I T A S W H I T E P A P E R Table of Contents Overview...................................................................................1

More information

IBM WebSphere Application Server Version 7.0

IBM WebSphere Application Server Version 7.0 IBM WebSphere Application Server Version 7.0 Centralized Installation Manager for IBM WebSphere Application Server Network Deployment Version 7.0 Note: Before using this information, be sure to read the

More information

Data ONTAP 8.2. MultiStore Management Guide For 7-Mode. NetApp, Inc. 495 East Java Drive Sunnyvale, CA 94089 U.S.

Data ONTAP 8.2. MultiStore Management Guide For 7-Mode. NetApp, Inc. 495 East Java Drive Sunnyvale, CA 94089 U.S. Data ONTAP 8.2 MultiStore Management Guide For 7-Mode NetApp, Inc. 495 East Java Drive Sunnyvale, CA 94089 U.S. Telephone: +1(408) 822-6000 Fax: +1(408) 822-4501 Support telephone: +1(888) 4-NETAPP Web:

More information

Transition Networks White Paper. Network Security. Why Authentication Matters YOUR NETWORK. OUR CONNECTION.

Transition Networks White Paper. Network Security. Why Authentication Matters YOUR NETWORK. OUR CONNECTION. Transition Networks White Paper Why Authentication Matters YOUR NETWORK. OUR CONNECTION. : Why Authentication Matters For most organizations physical security is a given. Whether it is video surveillance,

More information

How To Install An Aneka Cloud On A Windows 7 Computer (For Free)

How To Install An Aneka Cloud On A Windows 7 Computer (For Free) MANJRASOFT PTY LTD Aneka 3.0 Manjrasoft 5/13/2013 This document describes in detail the steps involved in installing and configuring an Aneka Cloud. It covers the prerequisites for the installation, the

More information

FTP Service Reference

FTP Service Reference IceWarp Server FTP Service Reference Version 10 Printed on 12 August, 2009 i Contents FTP Service 1 V10 New Features... 2 FTP Access Mode... 2 FTP Synchronization... 2 FTP Service Node... 3 FTP Service

More information

Installation Guide. Novell Storage Manager 3.1.1 for Active Directory. Novell Storage Manager 3.1.1 for Active Directory Installation Guide

Installation Guide. Novell Storage Manager 3.1.1 for Active Directory. Novell Storage Manager 3.1.1 for Active Directory Installation Guide Novell Storage Manager 3.1.1 for Active Directory Installation Guide www.novell.com/documentation Installation Guide Novell Storage Manager 3.1.1 for Active Directory October 17, 2013 Legal Notices Condrey

More information

Understanding and Using NetInfo. Includes information on setting up Mac OS X Server and NetInfo to increase the power of your Mac OS X network

Understanding and Using NetInfo. Includes information on setting up Mac OS X Server and NetInfo to increase the power of your Mac OS X network Understanding and Using NetInfo Includes information on setting up Mac OS X Server and NetInfo to increase the power of your Mac OS X network K Apple Computer, Inc. 2001 Apple Computer, Inc. All rights

More information

EVault for Data Protection Manager. Course 361 Protecting Linux and UNIX with EVault

EVault for Data Protection Manager. Course 361 Protecting Linux and UNIX with EVault EVault for Data Protection Manager Course 361 Protecting Linux and UNIX with EVault Table of Contents Objectives... 3 Scenario... 3 Estimated Time to Complete This Lab... 3 Requirements for This Lab...

More information

DameWare Server. Administrator Guide

DameWare Server. Administrator Guide DameWare Server Administrator Guide About DameWare Contact Information Team Contact Information Sales 1.866.270.1449 General Support Technical Support Customer Service User Forums http://www.dameware.com/customers.aspx

More information

IBM Rational ClearCase 4.x and Active Directory

IBM Rational ClearCase 4.x and Active Directory IBM Rational ClearCase 4.x and Active Directory ABSTRACT: Like any enterprise-scale application in a Windows network, Rational ClearCase will be affected when the network is converted from using Windows

More information

C p o y p r y i r g i h g t D t e a t i a lie l d

C p o y p r y i r g i h g t D t e a t i a lie l d of EISOO AnyBackup Appliance Copyright 2003-2012 EISOO Software Co.,Ltd. No company or individual are allowed to copy, distribute and extract all or parts of this document without the permission of EISOO

More information

Jet Data Manager 2012 User Guide

Jet Data Manager 2012 User Guide Jet Data Manager 2012 User Guide Welcome This documentation provides descriptions of the concepts and features of the Jet Data Manager and how to use with them. With the Jet Data Manager you can transform

More information

Using Windows Administrative Tools on VNX

Using Windows Administrative Tools on VNX EMC VNX Series Release 7.0 Using Windows Administrative Tools on VNX P/N 300-011-833 REV A01 EMC Corporation Corporate Headquarters: Hopkinton, MA 01748-9103 1-508-435-1000 www.emc.com Copyright 2011 -

More information

ONEFS MULTIPROTOCOL SECURITY UNTANGLED

ONEFS MULTIPROTOCOL SECURITY UNTANGLED White Paper ONEFS MULTIPROTOCOL SECURITY UNTANGLED Abstract This paper describes the role that identity management, authentication, and access control play in the security system of the EMC Isilon OneFS

More information

COMPARING STORAGE AREA NETWORKS AND NETWORK ATTACHED STORAGE

COMPARING STORAGE AREA NETWORKS AND NETWORK ATTACHED STORAGE COMPARING STORAGE AREA NETWORKS AND NETWORK ATTACHED STORAGE Complementary technologies provide unique advantages over traditional storage architectures Often seen as competing technologies, Storage Area

More information

This Deployment Guide is intended for administrators in charge of planning, implementing and

This Deployment Guide is intended for administrators in charge of planning, implementing and YOUR AUTOMATED EMPLOYEE Foxtrot Deployment Guide Enterprise Edition Introduction This Deployment Guide is intended for administrators in charge of planning, implementing and maintaining the deployment

More information

OnCommand Unified Manager

OnCommand Unified Manager OnCommand Unified Manager Operations Manager Administration Guide For Use with Core Package 5.2 NetApp, Inc. 495 East Java Drive Sunnyvale, CA 94089 U.S. Telephone: +1(408) 822-6000 Fax: +1(408) 822-4501

More information

Using DC Agent for Transparent User Identification

Using DC Agent for Transparent User Identification Using DC Agent for Transparent User Identification Using DC Agent Web Security Solutions v7.7, 7.8 If your organization uses Microsoft Windows Active Directory, you can use Websense DC Agent to identify

More information

Migrating to vcloud Automation Center 6.1

Migrating to vcloud Automation Center 6.1 Migrating to vcloud Automation Center 6.1 vcloud Automation Center 6.1 This document supports the version of each product listed and supports all subsequent versions until the document is replaced by a

More information

Remote Backup & Replication Solution Guide. When it comes to Storage we are the Solution

Remote Backup & Replication Solution Guide. When it comes to Storage we are the Solution Remote Backup & Replication Solution Guide When it comes to Storage we are the Solution 2 What is Remote Backup? Remote Backup is simply backing up data to a location other than an organisation s central

More information

Solaris For The Modern Data Center. Taking Advantage of Solaris 11 Features

Solaris For The Modern Data Center. Taking Advantage of Solaris 11 Features Solaris For The Modern Data Center Taking Advantage of Solaris 11 Features JANUARY 2013 Contents Introduction... 2 Patching and Maintenance... 2 IPS Packages... 2 Boot Environments... 2 Fast Reboot...

More information

How To Use 1Bay 1Bay From Awn.Net On A Pc Or Mac Or Ipad (For Pc Or Ipa) With A Network Box (For Mac) With An Ipad Or Ipod (For Ipad) With The

How To Use 1Bay 1Bay From Awn.Net On A Pc Or Mac Or Ipad (For Pc Or Ipa) With A Network Box (For Mac) With An Ipad Or Ipod (For Ipad) With The 1-bay NAS User Guide INDEX Index... 1 Log in... 2 Basic - Quick Setup... 3 Wizard... 3 Add User... 6 Add Group... 7 Add Share... 9 Control Panel... 11 Control Panel - User and groups... 12 Group Management...

More information

Moving the TRITON Reporting Databases

Moving the TRITON Reporting Databases Moving the TRITON Reporting Databases Topic 50530 Web, Data, and Email Security Versions 7.7.x, 7.8.x Updated 06-Nov-2013 If you need to move your Microsoft SQL Server database to a new location (directory,

More information

StorageCraft ShadowStream User Guide StorageCraft Copyright Declaration

StorageCraft ShadowStream User Guide StorageCraft Copyright Declaration StorageCraft Copyright Declaration StorageCraft ImageManager, StorageCraft ShadowProtect, StorageCraft Cloud, and StorageCraft Cloud Services, together with any associated logos, are trademarks of StorageCraft

More information

Windows Offline Files

Windows Offline Files Windows Offline Files 1. Description: Windows Offline Files or Client Side Caching (CSC) allows files and folders stored on any Server Message Block (SMB) network share to be available offline. To further

More information

Table of Contents. FleetSoft Installation Guide

Table of Contents. FleetSoft Installation Guide FleetSoft Installation Guide Table of Contents FleetSoft Installation Guide... 1 Minimum System Requirements... 2 Installation Notes... 3 Frequently Asked Questions... 4 Deployment Overview... 6 Automating

More information

Networking Best Practices Guide. Version 6.5

Networking Best Practices Guide. Version 6.5 Networking Best Practices Guide Version 6.5 Summer 2010 Copyright: 2010, CCH, a Wolters Kluwer business. All rights reserved. Material in this publication may not be reproduced or transmitted in any form

More information

NETWORK ATTACHED STORAGE DIFFERENT FROM TRADITIONAL FILE SERVERS & IMPLEMENTATION OF WINDOWS BASED NAS

NETWORK ATTACHED STORAGE DIFFERENT FROM TRADITIONAL FILE SERVERS & IMPLEMENTATION OF WINDOWS BASED NAS INTERNATIONAL International Journal of Computer JOURNAL Engineering OF COMPUTER and Technology (IJCET), ENGINEERING ISSN 0976-6367(Print), ISSN 0976 & 6375(Online) TECHNOLOGY Volume 4, Issue (IJCET) 3,

More information

CA ARCserve Backup for Windows

CA ARCserve Backup for Windows CA ARCserve Backup for Windows Agent for Microsoft SharePoint Server Guide r15 This documentation and any related computer software help programs (hereinafter referred to as the "Documentation") are for

More information

Transparent fileservices for Windows, Unix and Mac

Transparent fileservices for Windows, Unix and Mac Transparent fileservices for Windows, Unix and Mac Leveraging ProLiant Storage Servers and Enterprise Virtual Array together with Windows Storage Server, ExtremeZ-IP and Cluster Extension EVA Monday, 10-Nov-08

More information

Caché Integration with a Network Appliance Filer

Caché Integration with a Network Appliance Filer Caché Integration with a Network Appliance Filer Version 2010.2 25 April 2011 InterSystems Corporation 1 Memorial Drive Cambridge MA 02142 www.intersystems.com Caché Integration with a Network Appliance

More information

Using HP StoreOnce Backup systems for Oracle database backups

Using HP StoreOnce Backup systems for Oracle database backups Technical white paper Using HP StoreOnce Backup systems for Oracle database backups Table of contents Introduction 2 Technology overview 2 HP StoreOnce Backup systems key features and benefits 2 HP StoreOnce

More information

CIFS/NFS Gateway Product Release Notes. Version 1.2.0 May 2015 Revision A0

CIFS/NFS Gateway Product Release Notes. Version 1.2.0 May 2015 Revision A0 CIFS/NFS Gateway Product Release Notes Version 1.2.0 May 2015 Revision A0 Important Information Information in this document is subject to change without notice and does not represent a commitment on the

More information

SnapServer NAS GuardianOS 5.2 Compatibility Guide October 2009

SnapServer NAS GuardianOS 5.2 Compatibility Guide October 2009 SnapServer NAS GuardianOS 5.2 Compatibility Guide October 2009 1 Table of Contents 1 Introduction... 3 2 ed SnapServer NAS Systems... 3 3 Client Compatibility... 3 3.1 Microsoft Windows... 3 3.2 Apple

More information

Network Attached Storage. Jinfeng Yang Oct/19/2015

Network Attached Storage. Jinfeng Yang Oct/19/2015 Network Attached Storage Jinfeng Yang Oct/19/2015 Outline Part A 1. What is the Network Attached Storage (NAS)? 2. What are the applications of NAS? 3. The benefits of NAS. 4. NAS s performance (Reliability

More information

VMware Mirage Web Manager Guide

VMware Mirage Web Manager Guide Mirage 5.1 This document supports the version of each product listed and supports all subsequent versions until the document is replaced by a new edition. To check for more recent editions of this document,

More information

NexentaConnect for VMware Virtual SAN

NexentaConnect for VMware Virtual SAN NexentaConnect for VMware Virtual SAN User Guide 1.0.2 FP3 Date: April, 2016 Subject: NexentaConnect for VMware Virtual SAN User Guide Software: NexentaConnect for VMware Virtual SAN Software Version:

More information

User's Guide. Product Version: 2.5.0 Publication Date: 7/25/2011

User's Guide. Product Version: 2.5.0 Publication Date: 7/25/2011 User's Guide Product Version: 2.5.0 Publication Date: 7/25/2011 Copyright 2009-2011, LINOMA SOFTWARE LINOMA SOFTWARE is a division of LINOMA GROUP, Inc. Contents GoAnywhere Services Welcome 6 Getting Started

More information

How To Configure Vnx 7.1.1 (Vnx) On A Windows-Only Computer (Windows) With A Windows 2.5 (Windows 2.2) (Windows 3.5) (Vnet) (Win

How To Configure Vnx 7.1.1 (Vnx) On A Windows-Only Computer (Windows) With A Windows 2.5 (Windows 2.2) (Windows 3.5) (Vnet) (Win EMC é VNX dm Series Release 7.1 Configuring VNX dm User Mapping P/N 300-013-811 Rev 01 EMC Corporation Corporate Headquarters: Hopkinton, MA 01748-9103 1-508-435-1000 www.emc.com Copyright â 2009-2012

More information

Drobo How-To Guide. Use a Drobo iscsi Array as a Target for Veeam Backups

Drobo How-To Guide. Use a Drobo iscsi Array as a Target for Veeam Backups This document shows you how to use a Drobo iscsi SAN Storage array with Veeam Backup & Replication version 5 in a VMware environment. Veeam provides fast disk-based backup and recovery of virtual machines

More information

Quick Start - Virtual Server idataagent (Microsoft/Hyper-V)

Quick Start - Virtual Server idataagent (Microsoft/Hyper-V) Page 1 of 31 Quick Start - Virtual Server idataagent (Microsoft/Hyper-V) TABLE OF CONTENTS OVERVIEW Introduction Key Features Complete Virtual Machine Protection Granular Recovery of Virtual Machine Data

More information

BackupAssist v6 quickstart guide

BackupAssist v6 quickstart guide Using the new features in BackupAssist v6... 2 VSS application backup (Exchange, SQL, SharePoint)... 2 Backing up VSS applications... 2 Restoring VSS applications... 3 System State backup and restore...

More information

Server & Workstation Installation of Client Profiles for Windows

Server & Workstation Installation of Client Profiles for Windows C ase Manag e m e n t by C l i e n t P rofiles Server & Workstation Installation of Client Profiles for Windows T E C H N O L O G Y F O R T H E B U S I N E S S O F L A W General Notes to Prepare for Installing

More information

VMware vsphere Data Protection 6.0

VMware vsphere Data Protection 6.0 VMware vsphere Data Protection 6.0 TECHNICAL OVERVIEW REVISED FEBRUARY 2015 Table of Contents Introduction.... 3 Architectural Overview... 4 Deployment and Configuration.... 5 Backup.... 6 Application

More information

REQUIREMENTS AND INSTALLATION OF THE NEFSIS DEDICATED SERVER

REQUIREMENTS AND INSTALLATION OF THE NEFSIS DEDICATED SERVER NEFSIS TRAINING SERIES Nefsis Dedicated Server version 5.1.0.XXX Requirements and Implementation Guide (Rev 4-10209) REQUIREMENTS AND INSTALLATION OF THE NEFSIS DEDICATED SERVER Nefsis Training Series

More information