Implementation Guide for EMC for VSPEX Private Cloud Environments. CloudLink Solution Architect Team

Size: px
Start display at page:

Download "Implementation Guide for EMC for VSPEX Private Cloud Environments. CloudLink Solution Architect Team"

Transcription

1 VSPEX IMPLEMENTATION GUIDE CloudLink SecureVSA Implementation Guide for EMC for VSPEX Private Cloud Environments CloudLink Solution Architect Team Abstract This Implementation Guide describes best practices for the design and architecture of CloudLink SecureVSA into VSPEX for private cloud environments enabling multi-tenant, agentless, storage layer encryption. April 2014

2 Contents Copyright 2014 All Rights Reserved. CloudLink is a registered trademark of CloudLink Technologies (formerly AFORE Solutions, Inc.). All other trademarks, trade names, service marks and logos referenced herein belong to their respective companies. EMC 2, EMC, the EMC logo, VSPEX are registered trademarks or trademarks of EMC Corporation in the United States and other countries. 2

3 Contents Contents Chapter 1 Introduction 4 Purpose of this guide...4 Business value...4 Scope...5 Audience...5 Terminology...5 Product description...5 Solution tested...7 Chapter 2 SecureVSA Design Planning 8 Chapter 3 Implementation Process Overview 15 Pre-deployment Deployment Chapter 4 Key Store Configuration 17 Selecting a key store for the SecureVSA deployment Configuring Active Directory as a key store RSA Data Protection Manager configuration Chapter 5 Installation and Configuration 20 Process overview Deploying CloudLink Center Deploying vnodes for Datastore mode Deploying a vnode for NAS mode Chapter 6 Testing and Verification 51 Appendix A Pre-Deployment Checklist 52 Appendix B Troubleshooting 61 Appendix C CLOUDLINK Support Contact Information 62 3

4 Chapter 1: Introduction Chapter 1 Introduction Purpose of this guide This Implementation Guide assists with the implementation of CloudLink SecureVSA (Secure Virtual Storage Appliance) into VSPEX private cloud environments. Business value SecureVSA s data-at-rest encryption and data-in-motion encryption solution enables customers to cost-effectively address compliance requirements and security best practices while maximizing use of storage resources. Implementing SecureVSA as part of a VSPEX private cloud environment offers many benefits. VSPEX optimization. SecureVSA data-at-rest encryption is specifically designed for virtualized environments providing the optimal solution for the VSPEX private cloud deployments. This Implementation Guide walks partners step-by-step through the deployment, configuration, sizing, and tuning processes to ensure optimal performance. Simple deployment. As an agentless solution, SecureVSA alleviates the challenge of installing and managing software on individual virtual machines. IT personnel can quickly and easily deploy data encryption when and where needed, all while managing and reporting from a central security management console. The net impact is lower TCO and improved business agility. Granular encryption. Unlike other approaches that force encryption of the entire storage infrastructure, SecureVSA enables granular encryption on a per-application, per-tenant basis. SecureVSA s approach makes efficient resource use of the storage array by encrypting only the application data that needs to be encrypted. Granular key management policy. For multi-tenant clouds that include individual business lines within an organization that requires data isolation and encryption such as departments, agencies, or groups SecureVSA supports unique encryption keys for each individual entity, placing key control in the hands of data owners. Data-at-rest encryption for both new and existing storage arrays. SecureVSA can be used as a data-at-rest encryption platform for new VSPEX-based storage environments. SecureVSA can also be used to encrypt existing storage arrays that do not support encryption natively, such as EMC Clarion, VNX, VMAX, vblock, and so on. Hybrid cloud support. SecureVSA is designed to protect customer data regardless of its location, whether that is an on-premise VSPEX private cloud implementation or one or more public cloud environments. SecureVSA provides customers with a single, extensible data encryption policy management capable of addressing all of their data-at-rest encryption requirements. 4

5 Chapter 1: Introduction Compliance and regulatory standards support. SecureVSA meets critical requirements for internal and external compliance programs, and standards such as HIPAA, PCI, CSA, and NIST, through implementation of a data-at-rest encryption solution. Data remanence support. SecureVSA ensures that data remanence requirements are met. Should servers or applications be decommissioned (terminated) in the future, any related data will be inaccessible. Scope This Implementation Guide provides a brief overview of SecureVSA, design and architecture considerations for various deployment scenarios, and installation instructions. This Implementation Guide provides partners with the knowledge necessary to customize the SecureVSA configuration for a particular customer s environment and application requirements, as necessary. Audience Users of this document must be knowledgeable about VMware, EMC Next-Generation VNX series storage systems, and networking concepts. At a minimum, a high-level understanding of how SecureVSA functions is also required. Terminology This Implementation Guide uses the following terminology. Table 1. Term CHAP Terminology Description Challenge-Handshake Authentication Protocol. CloudLink Center CloudLink Gateway CloudLink vnode SecureVSA RSA DPM Management console for SecureVSA that integrates with encryption key stores. See CloudLink Center. Software virtual appliance that provides encrypted storage. Software-defined storage layer encryption solution for virtualized and cloud environments. Components of this solution described in this guide include CloudLink Center and CloudLink vnodes. RSA Data Protection Manager. Product description SecureVSA is a virtual storage appliance for virtualized and cloud environments that provides a software encryption layer between virtualized applications and physical storage. SecureVSA provides an agentless encryption solution for virtual machines, 5

6 Chapter 1: Introduction regardless of the underlying storage array environment (such as Clarion, VNX, or legacy storage arrays) that is completely transparent and requires no modification to the virtual machines and applications using SecureVSA encrypted storage. SecureVSA supports two deployment modes: encrypted datastore mode encrypted NAS mode CloudLink Center includes advanced key management including per-tenant unique keys and key rotation. CloudLink Center also provides a variety of key storage options, including Microsoft Active Directory or, for advanced protection, RSA Data Protection Manager. SecureVSA encrypted datastore mode SecureVSA s encrypted datastore mode provides encrypted storage for hypervisor use (VMware vsphere and Microsoft Hyper-V). In this mode, virtual machines (VM) associated with the encrypted datastore can be thought of as running in an encrypted container from the perspective of the VMDK files associated with the VM that resides in the encrypted datastore. The entire VM can reside within the encrypted datastore. Alternatively, administrators can associate just the data volumes with the encrypted datastore, and the operating system and application volume can be run out of a standard datastore. Administrators can combine or aggregate volumes into a single large datastore. Alternatively, each attached volume can be encrypted with unique encryption keys and shared as individual datastores. The benefit of encrypted datastore mode is that it is completely transparent to the VMs running with the encrypted datastore, requiring no changes or modifications to virtualized servers and applications (agentless). This mode also offers the benefits of supporting standard VMware features such as DRS, HA, FT, and Storage vmotion. SecureVSA encrypted NAS mode SecureVSA s encrypted NAS mode provides encrypted storage at the network level for servers and end users. Like encrypted datastore mode, encrypted NAS mode is an agentless data-at-rest encryption solution, with the encryption being completely transparent to the server and application attaching or mapping to the network 6

7 Chapter 1: Introduction attached storage. Administrators can combine or aggregate volumes into a single large network share. Alternatively, each attached volume can be encrypted with unique encryption keys and shared individually. CloudLink Center integration for key stores CloudLink Center supports the ability to use either Microsoft Active Directory or RSA Data Protection Manager (DPM) as a key store for production deployments. Optionally, a local key store can be used for trials and evaluations. RSA DPM is an integrated security solution that delivers extremely efficient and comprehensive data protection. RSA DPM is designed to ensure that large numbers of keys are preserved, across geographic and organizational boundaries, without risks of key loss or compromise. It distributes encryption keys when and where they are needed, protecting them in transit and ensuring they are provided only to authenticated and authorized entities. SecureVSA features and benefits summary Agentless encryption model Transparent to virtualized servers and applications Central management Support for on-premise, hybrid, and multi-cloud deployments Support for partial encryption Spans heterogeneous storage environments Support for RSA Data Protection Manager and Active Directory key stores Highly scalable Simplified deployment and management FIPS validation Solution tested SecureVSA was tested and validated in the EMC VSPEX lab using the same storage and VM configuration defaults that were detailed in the reference architecture described in the Proven Infrastructure Guide: EMC VSPEX Private Cloud, VMware vsphere 5.5 for up to 1,000 Virtual Machines document. For completeness, the SecureVSA design described in this guide is configured to support and showcase both the encrypted datastore and NAS implementation models. Partners and customers can choose the appropriate deployment model that best meets their specific requirements. 7

8 Chapter 3: Implementation Process Overview Chapter 2 SecureVSA Design Planning SecureVSA is designed and implemented as an overlay for the EMC VSPEX private cloud reference architecture described in the Proven Infrastructure Guide: EMC VSPEX Private Cloud, VMware vsphere 5.5 for up to 1,000 Virtual Machines document. For solution consistency, the SecureVSA design uses the same sizing and profiling data and tools as the reference architecture. The EMC VSPEX private cloud reference architecture is available at VSPEX for Private Cloud Reference Architecture. This Implementation Guide refers to the reference architecture as the VSPEX for private cloud reference architecture or reference architecture. The reference architecture has the following characteristics that are important for SecureVSA designs. VNX configuration for block versus file (NFS) access The VNX storage array supports both block and file access to the VMware vsphere virtual environment. For SecureVSA deployments, block access to the VNX storage array provides significantly higher performance than file access. Once the VNX storage array has been configured to support block access, the next decision is to determine whether raw data mapping (RDM) or VMFS access should be configured for SecureVSA. Note: SecureVSA supports both physical and virtual RDM, with virtual RDM recommended in order to preserve VMware snapshot functionality. Advantages of vrdm versus VMFS Higher performance when the SecureVSA is configured as an iscsi datastore (approximately 12,000 IOPS) VMFS requires SecureVSA to be configured as an NFS datastore, which introduces additional overhead and limits performance (approximately 3,000 IOPS) Disadvantages of vrdm versus VMFS vrdm requires the entire LUN to be assigned to SecureVSA VMFS can easily be used to create the desired SecureVSA datastore size by adding one or more virtual disks to SecureVSA New SecureVSA datastores can be created independently of storage administrators streamlining management When performance is the primary consideration, we recommend implementing RDM and SecureVSA iscsi datastores. When ease of administration and flexibility in terms of the size of datastores to be provisioned are priorities, we recommend VMFS and SecureVSA NFS datastores. This Implementation Guide describes a VMFS and SecureVSA NFS datastore configuration. 8

9 Solution hardware Chapter 3: Implementation Process Overview EMC VNX5400 array provides storage to vsphere hosts for up to 300 virtual machines EMC VNX5600 array provides storage to vsphere hosts for up to 600 virtual machines EMC VNX5800 array provides storage to vsphere hosts for up to 1,000 virtual machines Version of VMware supported VMware vsphere 5.1 and 5.5 with VMFS for disk configuration. Client virtual machine characteristics Characteristic Virtual machine operating system Value Microsoft Windows Server 2012 Data Center Edition Virtual processors per virtual machine 1 RAM per virtual machine Available storage capacity per virtual machine 2 GB 100 GB IOPS per virtual machine 25 I/O pattern Random I/O read/write ratio 2:1 Storage allocation table for block data Configuration Number of pools Number of 15K SAS drives per pool Number of flash drives per pool Number of LUNs per pool LUN size (TB) 300 virtual machines Total x 7 TB LUNs 2 x 3 TB LUNs 600 virtual machines Total x 7 TB LUNs 2 x 6 TB LUNs 1000 virtual machines Total x 7 TB LUNs Note: Each virtual machine occupies 102 GB in this solution, with 100 GB for the operating system and user 9

10 Chapter 3: Implementation Process Overview space, and a 2 GB swap file. Validation test profile Profile characteristic Value Number of virtual machines 300/600/1,000 Virtual machine OS Windows Server 2012 Data Center Edition Processors per virtual machine 1 Number of virtual processors per physical CPU core RAM per virtual machine Average storage available for each virtual machine Average IOPS per virtual machine Number of LUNs or NFS shares to store virtual machine disks Disk and RAID type for LUNs or NFS shares 4 2 GB 100 GB 25 IOPS 62 or 63 per LUN or NFS share RAID 5, 600 GB, 15k rpm, 3.5 inch SAS disks SecureVSA design considerations From the perspective of the SecureVSA design described in this Implementation Guide, the following summarizes the most important VSPEX for private cloud reference architecture data points: total number of VMs to be supported dictates VNX model used number of pools number of LUNs per pool size of LUNs number of VMs supported on a per LUN basis VM IOPS performance profile baseline The SecureVSA design is based on a VSPEX for private cloud 600 VM configuration, which includes 4 ESXi hosts and a VNX 5600 storage array. This Implementation Guide provides detailed guidance that administrators can use to scale the SecureVSA design as required to meet a specific deployment requirement. In addition, the SecureVSA design is based on a model where 50 percent of the application data requires data-at-rest encryption. If a higher or lower percentage of data encryption is required, administrators can refer to information later in this chapter that explains how to adapt the SecureVSA design appropriately. 10

11 Chapter 3: Implementation Process Overview The VSPEX for private cloud reference architecture for up to 600 VMs has the following characteristics that apply to the SecureVSA design: 5 pools 2 LUNs per pool (10 total) 8 x 7 TB per LUN (56 TB) 2 x 6 TB per LUN (12 TB) 62 VMs per LUN The VSPEX architecture used for the purpose of this Implementation Guide includes 4 ESXi hosts with 1 ESXi host dedicated to hosting infrastructure components such as AD, DNS, and so on. The three remaining hosts were dedicated to hosting VM workloads (50 VMs per host). Each ESXi host is assigned a LUN from which a datastore is created from (7 TB in size) to support 50 VMs on each host. This SecureVSA design assumes that 50 percent of the workload VMs requires data-at-rest encryption, which translates to 2.5 TB of encrypted storage (25 VMs x 100 GB of allocated disk space). An additional 1 TB of storage is allocated to accommodate Storage vmotion and DRS capacity balancing operations. These assumptions result in a total of 3.5 TB of encrypted storage per host. This SecureVSA design assumes no data-at-rest encryption requirements for the infrastructure components, and allocates 7 TB of standard datastore storage to the host for the management infrastructure VMs. Based on this configuration, the following SecureVSA design is implemented: 1 CloudLink Center for management of the CloudLink vnodes. CloudLink Center is installed on the same ESXi host used to host other infrastructure components such as AD, DNS, and so on. 3 vnodes configured in encrypted datastore mode, each provisioned to provide 3.5 TB of encrypted storage. Each CloudLink vnode is installed on the ESXi hosts used to support VM workloads. 1 vnode configured in encrypted NAS mode to provide 1 TB of encrypted storage. This CloudLink vnode also resides on one of the ESXi hosts used to support VM workloads. The following diagram shows a high-level representation of the SecureVSA design. Note that the SecureVSA node representing CloudLink Center is referred to as the CloudLink Gateway. 11

12 Chapter 3: Implementation Process Overview SecureVSA performance sizing SecureVSA is licensed to support up to 10 TB of encrypted storage per CloudLink vnode. However, the allocated size of encrypted storage per CloudLink vnode depends on the number of VMs allocated per CloudLink vnode and the individual VMs performance requirements from an IOPS and latency perspective. Measuring performance is always subjective as many factors can influence the performance seen in labs versus production environments, and even between two nearly identical environments. As a baseline reference point, a single CloudLink vnode can support up to 3000 IOPS, assuming the network, compute and storage resources are available to support the CloudLink vnode s resource requirements and that a typical VNX storage configuration has been implemented (that is, a combination of SSD and SAS drives). Performance will vary, so this baseline information is as guidance only, with the implemented solution validated using the intended environment. Notes: For environments that require a higher number of IOPS, we recommend configuring the VNX storage array to provide vrdm access to the SecureVSA and iscsi datastores. VSPEX testing has demonstrated throughput speeds of up to 12,000 IOPS for this configuration. SecureVSA iscsi datastore mode is supported only when the VNX storage array is configured for RDM access. VNX with VMFS access is only supported with SecureVSA NFS datastores. Reference virtual machine resources Resource Value for reference virtual machine Relationship between requirements and equivalent reference virtual machines CPU 1 Equivalent reference virtual machines = resource requirements Memory 2 Equivalent reference virtual machines = 12

13 Chapter 3: Implementation Process Overview (resource requirements)/2 IOPS 25 Equivalent reference virtual machines = (resource requirements)/25 Capacity 100 Equivalent reference virtual machines = (resource requirements)/100 Calculating resource consumption of a SecureVSA software appliances Server resources Storage resources Application vcpus Memory (GB) IOPS Capacity (GB) Equivalent reference VMs CloudLink Center SecureVSA vnode Resource Requirements Equivalent reference VM Resource Requirements Equivalent reference VM N/A * N/A * Note: This value is the storage capacity of the CloudLink vnode itself and does not include allocated encrypted storage. 13

14 Chapter 3: Implementation Process Overview Calculating reference VM IOPS requirements for SecureVSA A CloudLink vnode supports 3000 IOPS, on average, when implemented using VMFS disk and configured as an NFS datastore IOPS translates to 120 equivalent reference VMs in total per CloudLink vnode (3000/25 = 120). Based on this average, use the following worksheet to calculate the number of reference VMs that can be supported by a particular CloudLink vnode from an IOPS perspective. Based on the number of VMs requiring encrypted storage and the IOPS required, the number of implemented CloudLink vnodes to be implemented can be adjusted. Storage resources Allocated storage SecureVSA supports up to 120 reference VMs per vnode Application IOPS GB Equivalent reference VMs Application #1: custom built app Application #2: point of sale system Application #3: decision support database Application #4: Application #5: Application #6: Resource requirements Equivalent reference VM Resource requirements Equivalent reference VM Resource requirements Equivalent reference VM Resource requirements Equivalent reference VM Resource requirements Equivalent reference VM Resource requirements Equivalent reference VM N/A N/A N/A N/A N/A N/A Total number of reference VMs must be below

15 Chapter 3: Implementation Process Overview Chapter 3 Implementation Process Overview This section provides an overview of the implementation process from pre-deployment preparation to deployment verification. Pre-deployment 1. Prepare design. Complete the checklist provided in Appendix A: Pre-Deployment Checklist, which includes information such as the volume of data under management, the applications accessing the data, and the location of the data in the network. 2. Design solution. Using the VSPEX for private cloud reference architecture, engineer the system resources based on actual workloads in place of VSPEX reference workloads. For information about breaks requirements for CPU, memory, storage size and storage IO components, see the following sections in Chapter 4 Solution Architecture Overview of the reference architecture document: Sizing guidelines, Reference workload, and Applying the reference workload. For convenience, this information has been included this Implementation Guide in Chapter 1 SecureVSA Design Planning. Follow these same guidelines when designing the SecureVSA configuration. 3. Plan deployment. Procure solution components. Determine order of installation of the solutions components. Verify correct operation of each component using appropriate methods. Work with members of IT team to plan updates (for example, reachability between network nodes). 4. Confirm pre-requisites prior to deployment. 10G connections between the storage array and all ESXi hosts as per the VSPEX for private cloud reference architecture. 10G ESXi interconnect as per the VSPEX for private cloud reference architecture. Validate the VSPEX configuration is operating properly before starting the SecureVSA deployment. For example, all components are accessible and communicating without interference from firewalls, and so on. 15

16 Chapter 3: Implementation Process Overview Deployment 5. Install and configure. Start from the physical, computing storage, and networking as per the VSPEX for private cloud reference architecture. Overlay encrypted storage on the design. Add SecureVSA. Add guest VMs (servers and/or clients). For SecureVSA, test a single vnode first before deploying all vnodes. Refer to the CloudLink SecureVSA VMware VSphere Deployment Guide for specific instructions. 6. Test and verify. Verify system components (such as hardware) as they are installed. The SecureVSA design assumes that physical hardware is fully verified prior to SecureVSA installation. We recommend using two validation profiles: a small profile for validation of the first encrypted storage function and a full-scale profile for validation of the entire encrypted storage solution. The full-scale profile can initially be validated with test applications and revalidated as the actual applications and guests are installed and integrated onto the system. Perform performance tuning as required (including alignment, caching, SSD, and boot volume). 16

17 Chapter 3: Implementation Process Overview Chapter 4 Key Store Configuration Selecting a key store for the SecureVSA deployment Before starting the SecureVSA deployment, determine the encryption key store that will be used: Microsoft Active Directory or RSA Data Protection Manager (DPM). For deployments with higher security assurance requirements, we recommend using RSA DPM as the encryption key store. Configuring Active Directory as a key store To use Active Directory to store SecureVSA encryption keys, deploy a Windows Server so that it will be accessible by CloudLink Center from its private network. During this procedure, you must provide the host name of the Windows Server. To use the host name, you must have already set up the DNS server. To configure the Active Directory for the SecureVSA encryption key store on Windows 2003 or 2008 Server that is configured as a domain controller: 1. Setup Organization unit on Windows Server: a. On the Windows taskbar, click the Start button, select All Programs -> Administrative Tools, and select Active Directory Users and Computers. b. Create an Organization Unit by expanding your domain name. Right-click and select New, Organizational Unit. c. Specify a Name (for example, SecureVSA_OU). d. Right-click the Organization Unit (for example, SecureVSA_OU) and select New, Group. e. Specify the group name (for example, SecureVSA_Group). 2. Create a bind user. a. Select Global and Security. b. Right-click the Organization Unit (for example, SecureVSA_OU) and select New, User. c. Specify the First Name (for example, Cloud), Last Name (for example, Link), login name and click Next. d. Specify the Password and click Finish. e. Right-click the Organization Unit (for example, SecureVSA_OU) and select Delegate Control. f. Click Next to follow setup wizard. g. Click Add and specify the SecureVSA group name (for example, SecureVSA_Group). Click OK and then click Next. 17

18 Chapter 3: Implementation Process Overview h. Select Create a custom task to delegate and click Next. i. Select the first bullet--this folder, existing objects in this folder, and creation of new objects in this folder--and select Next. j. Select Full Control and click Next. k. Select Finish. 3. Add the bind user to the security group. a. Double-click Security Group. b. Click the Members tab. c. Click Add. d. Type the bind user name. e. Click OK. 4. Record the DN of SecureVSA. a. Click the Start button and select Run. b. Enter cmd and select OK. c. Enter dsquery OU (Support tool is required) and record the DN (for example, OU=SecureVSA_OU,DC=company,DC=com). 5. Apply domain controller in SecureVSA. a. Log in to CloudLink Center as the secadmin user. b. Select CloudLink Center in the topology tree. c. Click the Security tab. d. Click the Key Store tab. e. Click the Active Directory link in Options. f. Enter the host name of the Windows Server for Host. To use the host name, you must first set up the DNS server. g. Enter the DN recorded in step 4 (for example, OU=SecureVSA_OU,DC=company,DC=com) for Base DN. h. Enter login name for the bind user from step 2c for User and select Apply. Right-click the Organization Unit (for example, SecureVSA_OU) and select Delegate Control. Tip: If the password for the bind user changes, repeat Step 5 and provide the new password. 18

19 RSA Data Protection Manager configuration Chapter 3: Implementation Process Overview To use RSA DPM to store SecureVSA encryption keys, ensure that an RSA DPM host is accessible by CloudLink Center via its private network. To configure RSA DPM for storage of SecureVSA encryption keys: 1. Log onto the RSA Data Protection Manager console. 2. Create an identity that belongs to a particular RSA DPM identity group. 3. Create a security class object with Infinite duration that belongs to the same RSA DPM identity group. To configure RSA DPM as the SecureVSA key store location: 1. Open the CloudLink Center on the CloudLink Gateway using the secadmin user account. 2. On the left side of the window, at the top of the VMs list in the Topology Tree, select the Gateway. 3. Click Security tab and then the Key Store tab. 4. To configure the SecureVSA to use RSA Data Protection Manager for encryption key storage, click the RSA DPM link in the Location panel. 5. In the RSA DPM Configuration panel, specify the RSA DPM parameters Host: The RSA DPM host IP address. Port: The TCP port number configured on the RSA DPM host (default 443). Security Class Name: The name of the security class configured on the RSA DPM host for the RSA DPM client. Trust Certificate: The RSA DPM server certificate. Client Certificate: The RSA DPM client certificate. Password: The password used during the RSA DPM client certificate creation. Important: Ensure that RSA DPM server and client certificates are created and saved on the RSA DPM host. 19

20 Chapter 5: Testing and Verification Chapter 5 Installation and Configuration Process overview The following workflow identifies the primary tasks for installing and configuring SecureVSA into VSPEX for private cloud environments. Start Deploy CloudLink Center Deploy three CloudLink vnodes for Datastore mode Deploy one CloudLink vnode for NAS mode End In this SecureVSA design, CloudLink Center manages multiple vnodes. A CloudLink vnode is the software appliance that performs the data encryption operation. Four SecureVSA vnodes are deployed: three CloudLink vnodes configured for Datastore mode and one vnode configured for NAS mode. The three vnodes configured for Datastore mode are each assigned 3.5 TB of disk. The fourth vnode deployed in NAS mode is assigned 1 TB of disk. This configuration means that two of the ESXi nodes have one vnode each and a third ESXi host has two vnodes deployed. Deploying CloudLink Center This section describes how to deploy CloudLink Center, which is the first task in the workflow for installing and configuring SecureVSA into VSPEX for private cloud environments. This SecureVSA design consists of a single CloudLink Center that manages multiple vnodes. Start Deploy CloudLink Center Deploy three CloudLink vnodes for Datastore mode Deploy one CloudLink vnode for NAS mode End Deploying CloudLink Center consists of the following procedures: 1. Deploy the CloudLink Center OVF template. 2. Add a network adapter to CloudLink Center. 3. Configure CloudLink Center. 4. Log into CloudLink Center. 20

21 Chapter 5: Testing and Verification Deploy the CloudLink Center OVF template CloudLink Center is packaged as an OVF template to simplify installation. To deploy a CloudLink Center OVF template: 1. From the VMware vsphere client, select the VMware vsphere File > Deploy OVF Template menu item to access the Deploy OVF Template window. 2. Navigate to the template folder and select a CloudLink Center template, and click Next. 3. Verify the OVF template details and click Next. 4. Type a name and select an inventory location for the deployed template, and click Next. 21

22 Chapter 5: Testing and Verification 5. Select a host or cluster to run the deployed template and click Next. 6. If a series of warnings is displayed, click Yes to continue with the deployment. These warnings are displayed for versions of ESX prior to 5.1, and don t require any action from you to resolve. 7. Select a resource pool and click Next. 8. Select a location for the virtual machine files and click Next. 22

23 9. Select the disk format for the virtual disk and click Next. Chapter 5: Testing and Verification 10. If CloudLink Center requires a public interface, select an adapter for the public network and click Next. For this deployment, the public network is optional as CloudLink Center will not be connecting to vnodes. 11. After template has deployed, from the Deployment Settings panel, review the selected options and click Finish. Click Back to make changes. 12. Wait until CloudLink Center deployment is complete and you see the Deployment Completed Successfully window. Click Close. 23

24 Chapter 5: Testing and Verification Adding a network adapter to CloudLink Center After deploying an OVF template for CloudLink Center, one network adapter is assigned to it, which is used for the public interface. The reference to a public interface does not mean that it will be used for Internet connectivity, but instead, refers to a network adapter that will be use for communication with CloudLink vnodes and by browser-based administration. You need to add a second network adapter configured as a private interface. This interface is not used in the planned configuration, but it does need to be defined. In summary, you define two network interfaces in the following order: a public interface defined in the OVF template a private interface that you add after deploying the OVF template To add a network adapter: 1. From the VMware vsphere client, right-click CloudLink Center and select Edit Settings. 2. From the Virtual Machine Properties window, click Add, select Ethernet Adapter, and click Next. This Ethernet Adapter will be used for the private interface. 24

25 Chapter 5: Testing and Verification 3. From the Add Hardware window, select VMXNET 3 as the Adapter Type and click Next. 4. Select Finish. 5. Select OK. Configuring CloudLink Center After deploying a CloudLink Center OVF template and adding the necessary components, you are ready to configure CloudLink Center. To configure CloudLink Center: 1. From the VMware vsphere client, right-click CloudLink Center and select Power On. 2. From the VMware vsphere client, right-click CloudLink Center and select Open Console. Log in to the VM console on CloudLink Center using the login name gateway and the default password gateway. You can navigate the interface with the keyboard arrow keys, the Tab key, and the Enter key. 3. If you agree to the terms outlined in the End User License Agreement, select Accept. Otherwise, select Cancel. 25

26 Chapter 5: Testing and Verification 4. When prompted, type a new password for the CloudLink Center console and click OK. You are required to change the default password. Subsequent logins to the console prompt for the new password. You can change the password after configuring CloudLink Center for the first time. Every time you login to the CloudLink Center console, the Update menu is displayed. Use the Password command on the Update menu to change the password. 5. Click Confirm after reviewing the configuration information. The configuration information to be verified depends on the choices you made when you deployed the CloudLink Center OVF template. 6. Enter the hostname for CloudLink Center and click OK. For example: 7. Select L3 Routing mode for the CloudLink Center VPN and click OK. 8. Do one of the following: If you selected L3 Routing, specify a tunnel network address and click OK. This address must be an address that is not used anywhere else on the network. For example: Specify whether the CloudLink Center public network uses DHCP or a static IP address. To use DHCP, first make sure that a DHCP server is available on CloudLink Center public network. Select DHCP, click OK, and go to Step 10. If a DHCP server is not available, select Static, click OK, and go to Step If you selected Static, you are prompted to enter the IP address, network mask, and gateway address for the CloudLink Center public network interface. Type the addresses and click OK. 26

27 Chapter 5: Testing and Verification 10. Specify whether the CloudLink Center private network uses DHCP or a static IP address. To use DHCP, first make sure that a DHCP server is available on the CloudLink Center public network. Select DHCP and click OK. Go to Step 12. If a DHCP server is not available, select Static, click OK, and go to Step If you selected Static, you are prompted enter the IP address, network mask, and gateway address for the CloudLink Center private network interface. Type the addresses and click OK. Entering the gateway IP address for the private network is optional if you selected L Wait for the configuration to complete. A summary of the CloudLink Center settings is then displayed. For example: Use the Up and Down arrow keys to scroll the Summary window. Note: The CloudLink Center coordinates are displayed at the top of the Summary window. You can use these coordinates to access CloudLink Center from a web browser. After configuring CloudLink Center, every time you log in using the VM Console, the Update menu is displayed. To view the summary of the CloudLink Center settings, select Summary. To change the password, select Password. To change the network settings, select Network. Warning: If you select to reconfigure your network settings, all current network settings will be lost. To configure static routing, select Routes. Click Add to define a static route for CloudLink s private network interface. If you re prompted for the IP address of the gateway on the CloudLink private network interface, type it and select OK. Next, type the specific IP address to which you want to route. Select OK. After CloudLink validates this IP address, select OK. Tip: From the Static Routes menu, you can click List to display any existing static routes. You can also click Delete to remove an existing static route. 27

28 Chapter 5: Testing and Verification The Diagnostics option is intended for use under the direction of CLOUDLINK Support. Log in to CloudLink Center With CloudLink Center deployed and its network interfaces configured, you can now use a web browser to connect to it and log in. To connect to and log in to CloudLink Center: In the web browser address bar, type the following: IpAddress:8443 where IpAddress represents the coordinates displayed at the top of the Summary. 28

29 Chapter 5: Testing and Verification Deploying CloudLink vnodes for Datastore mode This section describes how to deploy SecureVSA vnodes configured for Datastore mode, which is the second task in the workflow for installing and configuring SecureVSA into VSPEX for private cloud environments. You will deploy three CloudLink vnodes for this mode. Start Deploy CloudLink Center Deploy three CloudLink vnodes for Datastore mode Deploy one CloudLink vnode for NAS mode End Deploying a vnode for Datastore mode involves the following procedures: 1. Deploy the OVF template for a vnode. The base template deployment includes one network adapter for the public network. 2. Add network adapters and storage devices to the vnode. 3. Configure the vnode. 4. Configure the SecureVSA storage. 5. Configure secure ESX datastores. Note: Optionally, you can merge volumes later, after deploying the vnode. For more information, see the CloudLink SecureVSA VMware VSphere Administration Guide. Deploy the OVF template for the CloudLink vnode To deploy the OVF template for the CloudLink vnode: 1. From the VMware vsphere client, select the VMware vsphere File, Deploy OVF Template menu item to access the Deploy OVF Template window. 2. Navigate to the template folder and select a vnode template, and then click Next. 3. Verify the OVF Template Details and click Next. 4. Enter a name and select an inventory location for the deployed template, and click Next. 5. Select a host or cluster to run the deployed template and click Next. 6. Select a resource pool and click Next. 7. If a series of warnings is displayed, click Yes to continue with the deployment. These warnings are displayed for versions of ESX prior to 5.1, and don t require any action from you to resolve. 29

30 8. Select a location for the virtual machine files and click Next. Chapter 5: Testing and Verification 9. Select the disk format for the virtual disk and click Next. 10. Select a public network for the vnode and click Next. 11. From the Deployment Settings panel, review the selected options and click Finish to initiate the deployment. Click Back to make changes. 12. Wait until the vnode deployment is complete and you see the Deployment Completed Successfully window. Click Close. You now see a new vnode VM in the VMware vsphere Client VM list. You can rename the VM. 30

31 Chapter 5: Testing and Verification Adding network adapters and storage devices to the CloudLink vnode A network adapter forms part of the CloudLink vnode OVF template. The included network adapter is for the vnode public network interface. For this deployment configuration, you need to add two additional network adapters, in this specific order: The first network adapter that you add is for the SAN interface. The second network adapter that you add is for the private network interface. After adding the network adapters to the CloudLink vnode, you add one or more storage devices. To add a network adapter for the SAN: 1. From the VMware vsphere client, right-click a vnode and select Edit Settings. 2. From the Virtual Machine Properties window, click Add, select Ethernet Adapter, and click Next. 31

32 Chapter 5: Testing and Verification 3. From the Add Hardware window, do the following and click Next: Select VMXNET 3 as the Adapter Type. Select a SAN connection from the Network label drop-down list. Ensure that the Connect at power on checkbox is checked. 4. From the Options panel, verify the configuration and click Finish. Click Back to make changes. 5. From the Virtual Machines Properties, verify that the network adapter was added and click OK. To add a network adapter for the private network: 1. From the VMware vsphere client, right-click a vnode and select Edit Settings. 2. From the Virtual Machine Properties window, click Add, select Ethernet Adapter, and click Next. 3. From the Add Hardware window, do the following and click Next: Select VMXNET 3 as the Adapter Type. Select a private network connection from the Network Label drop-down list. Ensure that the Connect at power on checkbox is checked. 4. From the Options panel, verify the configuration and click Finish. Click Back to make changes. 5. From the Virtual Machines Properties, verify that the network adapter was added and click OK. 6. Select Finish. 32

33 Add one or more disks to be encrypted Chapter 5: Testing and Verification When the CloudLink vnode is configured in secure datastore mode, all encrypted volumes it provides are unavailable during format operations. We recommended that you format all volumes before using any of them for secure ESX datastores. When multiple virtual disks are assigned to a CloudLink vnode, there are two options for storage configuration: Each disk can be presented as a separate encrypted volume. The disks can be merged and presented as a single encrypted volume. You cannot use the storage until you apply the storage license, as described later in this section. If you want a volume that is larger than the maximum disk size, you must create multiple volumes and merge them later. For more information about merging volumes, see the CloudLink SecureVSA VMware VSphere Administration Guide. In this SecureVSA design, two disks are added to each vnode--a 2TB disk and a 1.5 TB disk--enabling 3.5 TB of encrypted storage for the three CloudLink vnodes configured in datastore mode. To create a hard disk for each volume you want to encrypt: 1. Right-click the vnode and select Edit Settings. 2. Click Add and select Hard Disk. 3. Create a new virtual disk specifying its capacity, type of provisioning, and location. Click Next. 33

34 Chapter 5: Testing and Verification 4. On the Advanced Options screen, select a SCSI address for the Virtual Device Node. Make note of the address selected as this will correspond to the name of the resulting secure store. 5. From the Options panel, review the selected options and click Finish to complete the template deployment. Click Back to make changes. 6. From the Virtual Machines Properties, verify that the disk was added and click OK. Select the datastore and size of disk/volume to be attached to the vnode, add additional disks if multiple encrypted datastores are to be provisioned or if an encrypted datastore larger than 2 TBs is to be provisioned. CludLink vnode SAN configuration The next step in the vnode configuration after network adapters and storage devices have been attached and configured is to configure the CloudLink vnode SAN interface. To configure the properties for the SAN interface: 1. From the vsphere Client window, right-click a vnode and select Edit Settings. 2. In the Virtual Machine Properties window, select the Options tab. 3. In the list of vapp Options settings, select Advanced. 34

35 Chapter 5: Testing and Verification 4. Click Properties on the right to display the Advanced Property Configuration window. 5. In the VMware Advanced Property Configuration window, click New. 6. From the Edit Property Settings window, manually add the string sanip to the Label field and enter the IP address for the SAN network interface in the Default Value field. 7. Click OK. 8. In the VMware Advanced Property Configuration window, click New. 35

36 Chapter 5: Testing and Verification 9. From the Edit Property Settings window, manually add the string sanmask to the Label field and enter the network mask for the SAN network interface in the Default Value field. 10. Click OK. 11. Click OK in the Advanced Property Configuration window and then click OK in the Virtual Machine Properties window to return to the vsphere Client window. Configuring the CloudLink vnode After deploying a vnode OVF template and after adding the necessary components, you are ready to configure the vnode for encrypted Datastore mode. Note: Verify that VM Tools are installed and running before proceeding with the configuration. To configure a vnode with encrypted storage: 1. From the VMware vsphere client, right-click the vnode and select Power On. 36

37 Chapter 5: Testing and Verification 2. From the VMware vsphere client, right-click the vnode and select Open Console. Log in to the VM console on the vnode using login name vnode and default password vnode. You can navigate the interface with the keyboard arrow keys, the Tab key, and the Enter key. 3. If you agree to the terms outlined in the license, click Accept and proceed with the following steps to continue configuration. Otherwise, click Cancel. 4. When prompted, enter a new password for the vnode console. Click OK. You are required to change the default password. Subsequent logins to the console prompt for the new password. Every time you login to the console, the Update menu is displayed. Use the Password command on the Update menu to change the password. 5. The configuration information to be verified depends on the choices you made when you deployed the vnode. Click Confirm to proceed with configuring the vnode. Note: Although the console display indicates a NAS mode of NFS/SMB, you can change the NFS/SMB mode to iscsi after you deploy the vnode. For more information, see the CloudLink SecureVSA VMware VSphere Administration Guide. To change these settings before you proceed, click Cancel to shutdown the system and then return to the deployment procedure to revise them. 6. Enter the hostname for the vnode and click OK. A valid hostname is a letter followed by letters, numbers, dashes ( ), or dots (.). Letters can be lower or upper case. Underscores (_) are not supported. Make note of the configured vnode hostname. You will need the hostname for security token generation for secure VPN connection. 7. Select L2 Bridged or L3 Routing mode for the vnode VPN and click OK. CloudLink Center and all the vnodes must use the same VPN layer. 37

38 Chapter 5: Testing and Verification 8. Specify whether the vnode public network uses DHCP or a static IP address. To use DHCP, first make sure that a DHCP server is available on the vnode public network. Select DHCP, click OK, and proceed to step 10. If a DHCP server is not available, select Static, click OK, and proceed to step If you selected Static, you are prompted to enter the IP address and network mask for the vnode public network interface. Type the addresses and click OK. 10. You are prompted to configure the vnode private network. Specify the IP address, network mask, and gateway address for the vnode private network interface. To use DHCP, first make sure that a DHCP server is available on the vnode public network. Select DHCP, click OK, and proceed to step 12. If a DHCP server is not available, select Static, click OK, and proceed to step If you selected Static, you are prompted to enter the IP address, network mask, and gateway address for the vnode private network interface. Type the addresses and click OK. In L3 VPN mode with multiple vnodes and one CloudLink Gateway, each vnode s private network interface must be configured in a different network. 12. The vnode configuration process might take some time. A summary of the vnode settings is then displayed. 13. To make the VPN operational, perform the following actions: On the vnode console Update menu, select VPN and click OK. 38

39 Chapter 5: Testing and Verification Enter the IP address of the remote CloudLink Gateway public network interface and click OK. You are prompted for a 12-character one-time passcode to be used to authenticate the vnode to CloudLink Center. 14. To generate the 12-character one-time passcode, do the following: Open CloudLink Center using one of the URLs displayed at the top of the Summary, in the following format: Click the CloudLink Gateway. Click the Security tab and then select One-Time Passcode. Create a 15-minute, one-time password for the vnode host name. Click Add. 15. In the vnode console window, type the passcode that was generated in CloudLink Center. 39

40 Chapter 5: Testing and Verification 16. Click OK. The vnode appears in SecureVSA Map along with any other vnodes that have already been added. Configuring SecureVSA Storage As the last procedure in configuring a CloudLink vnode, you: upload a storage license to CloudLink Center apply the storage license to the CloudLink vnode format storage on the CloudLink vnode For information about configuring SecureVSA storage (including uploading and assigning a storage license, and formatting storage), see Configuring SecureVSA Storage in the earlier section named Deploying CloudLink vnodes for Datastore mode. 40

EMC ENCRYPTION AS A SERVICE

EMC ENCRYPTION AS A SERVICE White Paper EMC ENCRYPTION AS A SERVICE With CloudLink SecureVSA Data security for multitenant clouds Transparent to applications Tenant control of encryption keys EMC Solutions Abstract This White Paper

More information

RSA Authentication Manager 8.1 Virtual Appliance Getting Started

RSA Authentication Manager 8.1 Virtual Appliance Getting Started RSA Authentication Manager 8.1 Virtual Appliance Getting Started Thank you for purchasing RSA Authentication Manager 8.1, the world s leading two-factor authentication solution. This document provides

More information

EMC Data Domain Management Center

EMC Data Domain Management Center EMC Data Domain Management Center Version 1.1 Initial Configuration Guide 302-000-071 REV 04 Copyright 2012-2015 EMC Corporation. All rights reserved. Published in USA. Published June, 2015 EMC believes

More information

Virtual Appliance Setup Guide

Virtual Appliance Setup Guide Virtual Appliance Setup Guide 2015 Bomgar Corporation. All rights reserved worldwide. BOMGAR and the BOMGAR logo are trademarks of Bomgar Corporation; other trademarks shown are the property of their respective

More information

Installing and Configuring vcenter Support Assistant

Installing and Configuring vcenter Support Assistant Installing and Configuring vcenter Support Assistant vcenter Support Assistant 5.5 This document supports the version of each product listed and supports all subsequent versions until the document is replaced

More information

VMware/Hyper-V Backup Plug-in User Guide

VMware/Hyper-V Backup Plug-in User Guide VMware/Hyper-V Backup Plug-in User Guide COPYRIGHT No part of this publication may be reproduced, stored in a retrieval system, or transmitted in any form or by any means, electronic, mechanical, photocopying,

More information

Getting Started with ESXi Embedded

Getting Started with ESXi Embedded ESXi 4.1 Embedded vcenter Server 4.1 This document supports the version of each product listed and supports all subsequent versions until the document is replaced by a new edition. To check for more recent

More information

Installing and Configuring vcloud Connector

Installing and Configuring vcloud Connector Installing and Configuring vcloud Connector vcloud Connector 2.7.0 This document supports the version of each product listed and supports all subsequent versions until the document is replaced by a new

More information

VMware vsphere 5.1 Advanced Administration

VMware vsphere 5.1 Advanced Administration Course ID VMW200 VMware vsphere 5.1 Advanced Administration Course Description This powerful 5-day 10hr/day class is an intensive introduction to VMware vsphere 5.0 including VMware ESX 5.0 and vcenter.

More information

Barracuda Backup Vx. Virtual Appliance Deployment. White Paper

Barracuda Backup Vx. Virtual Appliance Deployment. White Paper Barracuda Backup Vx Virtual Appliance Deployment White Paper DOCUMENT SCOPE This document provides guidance and best practices on designing and deploying Barracuda Backup Vx Virtual Appliance on VMware

More information

POD INSTALLATION AND CONFIGURATION GUIDE. EMC CIS Series 1

POD INSTALLATION AND CONFIGURATION GUIDE. EMC CIS Series 1 POD INSTALLATION AND CONFIGURATION GUIDE EMC CIS Series 1 Document Version: 2015-01-26 Installation of EMC CIS Series 1 virtual pods as described this guide, requires that your NETLAB+ system is equipped

More information

Deployment and Configuration Guide

Deployment and Configuration Guide vcenter Operations Manager 5 This document supports the version of each product listed and supports all subsequent versions until the document is replaced by a new edition. To check for more recent editions

More information

F-Secure Messaging Security Gateway. Deployment Guide

F-Secure Messaging Security Gateway. Deployment Guide F-Secure Messaging Security Gateway Deployment Guide TOC F-Secure Messaging Security Gateway Contents Chapter 1: Deploying F-Secure Messaging Security Gateway...3 1.1 The typical product deployment model...4

More information

Installing and Using the vnios Trial

Installing and Using the vnios Trial Installing and Using the vnios Trial The vnios Trial is a software package designed for efficient evaluation of the Infoblox vnios appliance platform. Providing the complete suite of DNS, DHCP and IPAM

More information

VMware for Bosch VMS. en Software Manual

VMware for Bosch VMS. en Software Manual VMware for Bosch VMS en Software Manual VMware for Bosch VMS Table of Contents en 3 Table of contents 1 Introduction 4 1.1 Restrictions 4 2 Overview 5 3 Installing and configuring ESXi server 6 3.1 Installing

More information

SILVER PEAK ACCELERATION WITH EMC VSPEX PRIVATE CLOUD WITH RECOVERPOINT FOR VMWARE VSPHERE

SILVER PEAK ACCELERATION WITH EMC VSPEX PRIVATE CLOUD WITH RECOVERPOINT FOR VMWARE VSPHERE VSPEX IMPLEMENTATION GUIDE SILVER PEAK ACCELERATION WITH EMC VSPEX PRIVATE CLOUD WITH RECOVERPOINT FOR VMWARE VSPHERE Silver Peak Abstract This Implementation Guide describes the deployment of Silver Peak

More information

Bosch Video Management System High availability with VMware

Bosch Video Management System High availability with VMware Bosch Video Management System High availability with VMware en Technical Note Bosch Video Management System Table of contents en 3 Table of contents 1 Introduction 4 1.1 Restrictions 4 2 Overview 5 3

More information

VMware Certified Professional 5 Data Center Virtualization (VCP5-DCV) Exam

VMware Certified Professional 5 Data Center Virtualization (VCP5-DCV) Exam Exam : VCP5-DCV Title : VMware Certified Professional 5 Data Center Virtualization (VCP5-DCV) Exam Version : DEMO 1 / 9 1.Click the Exhibit button. An administrator has deployed a new virtual machine on

More information

Installing and Configuring vcenter Multi-Hypervisor Manager

Installing and Configuring vcenter Multi-Hypervisor Manager Installing and Configuring vcenter Multi-Hypervisor Manager vcenter Server 5.1 vcenter Multi-Hypervisor Manager 1.1 This document supports the version of each product listed and supports all subsequent

More information

Technical Note. vsphere Deployment Worksheet on page 2. Express Configuration on page 3. Single VLAN Configuration on page 5

Technical Note. vsphere Deployment Worksheet on page 2. Express Configuration on page 3. Single VLAN Configuration on page 5 Technical Note The vfabric Data Director worksheets contained in this technical note are intended to help you plan your Data Director deployment. The worksheets include the following: vsphere Deployment

More information

NexentaConnect for VMware Virtual SAN

NexentaConnect for VMware Virtual SAN NexentaConnect for VMware Virtual SAN QuickStart Installation Guide 1.0.2 FP2 Date: October, 2015 Subject: NexentaConnect for VMware Virtual SAN QuickStart Installation Guide Software: NexentaConnect for

More information

FortiAnalyzer VM (VMware) Install Guide

FortiAnalyzer VM (VMware) Install Guide FortiAnalyzer VM (VMware) Install Guide FortiAnalyzer VM (VMware) Install Guide December 05, 2014 05-520-203396-20141205 Copyright 2014 Fortinet, Inc. All rights reserved. Fortinet, FortiGate, FortiCare

More information

Table of Contents. Online backup Manager User s Guide

Table of Contents. Online backup Manager User s Guide Table of Contents Backup / Restore VMware Virtual Machines... Error! Bookmark not defined. Backup virtual machines running on VMware ESXi / ESX Server with VDDK / non VDDK... 2 Requirements and recommendations...

More information

PROTECTING DATA IN MULTI-TENANT CLOUDS

PROTECTING DATA IN MULTI-TENANT CLOUDS 1 Introduction Today's business environment requires organizations of all types to reduce costs and create flexible business processes to compete effectively in an ever-changing marketplace. The pace of

More information

VMware vsphere 5.0 Boot Camp

VMware vsphere 5.0 Boot Camp VMware vsphere 5.0 Boot Camp This powerful 5-day 10hr/day class is an intensive introduction to VMware vsphere 5.0 including VMware ESX 5.0 and vcenter. Assuming no prior virtualization experience, this

More information

Rally Installation Guide

Rally Installation Guide Rally Installation Guide Rally On-Premises release 2015.1 rallysupport@rallydev.com www.rallydev.com Version 2015.1 Table of Contents Overview... 3 Server requirements... 3 Browser requirements... 3 Access

More information

Nasuni Filer Virtualization Getting Started Guide. Version 7.5 June 2016 Last modified: June 9, 2016 2016 Nasuni Corporation All Rights Reserved

Nasuni Filer Virtualization Getting Started Guide. Version 7.5 June 2016 Last modified: June 9, 2016 2016 Nasuni Corporation All Rights Reserved Nasuni Filer Virtualization Getting Started Guide Version 7.5 June 2016 Last modified: June 9, 2016 2016 Nasuni Corporation All Rights Reserved Document Information Nasuni Filer Virtualization Getting

More information

Virtual Web Appliance Setup Guide

Virtual Web Appliance Setup Guide Virtual Web Appliance Setup Guide 2 Sophos Installing a Virtual Appliance Installing a Virtual Appliance This guide describes the procedures for installing a Virtual Web Appliance. If you are installing

More information

vrealize Air Compliance OVA Installation and Deployment Guide

vrealize Air Compliance OVA Installation and Deployment Guide vrealize Air Compliance OVA Installation and Deployment Guide 14 July 2015 vrealize Air Compliance This document supports the version of each product listed and supports all subsequent versions until the

More information

VMware vsphere Data Protection Evaluation Guide REVISED APRIL 2015

VMware vsphere Data Protection Evaluation Guide REVISED APRIL 2015 VMware vsphere Data Protection REVISED APRIL 2015 Table of Contents Introduction.... 3 Features and Benefits of vsphere Data Protection... 3 Requirements.... 4 Evaluation Workflow... 5 Overview.... 5 Evaluation

More information

Using EonStor FC-host Storage Systems in VMware Infrastructure 3 and vsphere 4

Using EonStor FC-host Storage Systems in VMware Infrastructure 3 and vsphere 4 Using EonStor FC-host Storage Systems in VMware Infrastructure 3 and vsphere 4 Application Note Abstract This application note explains the configure details of using Infortrend FC-host storage systems

More information

Drobo How-To Guide. Cloud Storage Using Amazon Storage Gateway with Drobo iscsi SAN

Drobo How-To Guide. Cloud Storage Using Amazon Storage Gateway with Drobo iscsi SAN The Amazon Web Services (AWS) Storage Gateway uses an on-premises virtual appliance to replicate a portion of your local Drobo iscsi SAN (Drobo B1200i, left below, and Drobo B800i, right below) to cloudbased

More information

VMware vcenter Log Insight Getting Started Guide

VMware vcenter Log Insight Getting Started Guide VMware vcenter Log Insight Getting Started Guide vcenter Log Insight 1.5 This document supports the version of each product listed and supports all subsequent versions until the document is replaced by

More information

VMware vsphere: Install, Configure, Manage [V5.0]

VMware vsphere: Install, Configure, Manage [V5.0] VMware vsphere: Install, Configure, Manage [V5.0] Gain hands-on experience using VMware ESXi 5.0 and vcenter Server 5.0. In this hands-on, VMware -authorized course based on ESXi 5.0 and vcenter Server

More information

StarWind Virtual SAN Installation and Configuration of Hyper-Converged 2 Nodes with Hyper-V Cluster

StarWind Virtual SAN Installation and Configuration of Hyper-Converged 2 Nodes with Hyper-V Cluster #1 HyperConverged Appliance for SMB and ROBO StarWind Virtual SAN Installation and Configuration of Hyper-Converged 2 Nodes with MARCH 2015 TECHNICAL PAPER Trademarks StarWind, StarWind Software and the

More information

Virtual Managment Appliance Setup Guide

Virtual Managment Appliance Setup Guide Virtual Managment Appliance Setup Guide 2 Sophos Installing a Virtual Appliance Installing a Virtual Appliance As an alternative to the hardware-based version of the Sophos Web Appliance, you can deploy

More information

Advanced VMware Training

Advanced VMware Training Goals: Demonstrate VMware Fault Tolerance in action Demonstrate Host Profile Usage How to quickly deploy and configure several vsphere servers Discuss Storage vmotion use cases Demonstrate vcenter Server

More information

HP CloudSystem Enterprise

HP CloudSystem Enterprise HP CloudSystem Enterprise F5 BIG-IP and Apache Load Balancing Reference Implementation Technical white paper Table of contents Introduction... 2 Background assumptions... 2 Overview... 2 Process steps...

More information

Virtual Appliance Setup Guide

Virtual Appliance Setup Guide The Virtual Appliance includes the same powerful technology and simple Web based user interface found on the Barracuda Web Application Firewall hardware appliance. It is designed for easy deployment on

More information

Virtual Data Centre. User Guide

Virtual Data Centre. User Guide Virtual Data Centre User Guide 2 P age Table of Contents Getting Started with vcloud Director... 8 1. Understanding vcloud Director... 8 2. Log In to the Web Console... 9 3. Using vcloud Director... 10

More information

Managing Multi-Hypervisor Environments with vcenter Server

Managing Multi-Hypervisor Environments with vcenter Server Managing Multi-Hypervisor Environments with vcenter Server vcenter Server 5.1 vcenter Multi-Hypervisor Manager 1.0 This document supports the version of each product listed and supports all subsequent

More information

Barracuda Message Archiver Vx Deployment. Whitepaper

Barracuda Message Archiver Vx Deployment. Whitepaper Barracuda Message Archiver Vx Deployment Whitepaper Document Scope This document provides guidance on designing and deploying Barracuda Message Archiver Vx on VMware vsphere Document Scope, and Microsoft

More information

VMware vcloud Air Networking Guide

VMware vcloud Air Networking Guide vcloud Air This document supports the version of each product listed and supports all subsequent versions until the document is replaced by a new edition. To check for more recent editions of this document,

More information

Installing and Configuring vcloud Connector

Installing and Configuring vcloud Connector Installing and Configuring vcloud Connector vcloud Connector 2.0.0 This document supports the version of each product listed and supports all subsequent versions until the document is replaced by a new

More information

VMware Data Recovery. Administrator's Guide EN-000193-00

VMware Data Recovery. Administrator's Guide EN-000193-00 Administrator's Guide EN-000193-00 You can find the most up-to-date technical documentation on the VMware Web site at: http://www.vmware.com/support/ The VMware Web site also provides the latest product

More information

CommandCenter Secure Gateway

CommandCenter Secure Gateway CommandCenter Secure Gateway Quick Setup Guide for CC-SG Virtual Appliance - VMware, XEN, HyperV This Quick Setup Guide explains how to install and configure the CommandCenter Secure Gateway. For additional

More information

Setup for Failover Clustering and Microsoft Cluster Service

Setup for Failover Clustering and Microsoft Cluster Service Setup for Failover Clustering and Microsoft Cluster Service ESX 4.0 ESXi 4.0 vcenter Server 4.0 This document supports the version of each product listed and supports all subsequent versions until the

More information

VMware vsphere: Fast Track [V5.0]

VMware vsphere: Fast Track [V5.0] VMware vsphere: Fast Track [V5.0] Experience the ultimate in vsphere 5 skills-building and VCP exam-preparation training. In this intensive, extended-hours course, you will focus on installing, configuring,

More information

vsphere Replication for Disaster Recovery to Cloud

vsphere Replication for Disaster Recovery to Cloud vsphere Replication for Disaster Recovery to Cloud vsphere Replication 6.0 This document supports the version of each product listed and supports all subsequent versions until the document is replaced

More information

Uila Management and Analytics System Installation and Administration Guide

Uila Management and Analytics System Installation and Administration Guide USER GUIDE Uila Management and Analytics System Installation and Administration Guide October 2015 Version 1.8 Company Information Uila, Inc. 2905 Stender Way, Suite 76E Santa Clara, CA 95054 USER GUIDE

More information

Storage Sync for Hyper-V. Installation Guide for Microsoft Hyper-V

Storage Sync for Hyper-V. Installation Guide for Microsoft Hyper-V Installation Guide for Microsoft Hyper-V Egnyte Inc. 1890 N. Shoreline Blvd. Mountain View, CA 94043, USA Phone: 877-7EGNYTE (877-734-6983) www.egnyte.com 2013 by Egnyte Inc. All rights reserved. Revised

More information

13.1 Backup virtual machines running on VMware ESXi / ESX Server

13.1 Backup virtual machines running on VMware ESXi / ESX Server 13 Backup / Restore VMware Virtual Machines Tomahawk Pro This chapter describes how to backup and restore virtual machines running on VMware ESX, ESXi Server or VMware Server 2.0. 13.1 Backup virtual machines

More information

RSA Security Analytics Virtual Appliance Setup Guide

RSA Security Analytics Virtual Appliance Setup Guide RSA Security Analytics Virtual Appliance Setup Guide Copyright 2010-2015 RSA, the Security Division of EMC. All rights reserved. Trademarks RSA, the RSA Logo and EMC are either registered trademarks or

More information

vsphere Replication for Disaster Recovery to Cloud

vsphere Replication for Disaster Recovery to Cloud vsphere Replication for Disaster Recovery to Cloud vsphere Replication 5.8 This document supports the version of each product listed and supports all subsequent versions until the document is replaced

More information

Khóa học dành cho các kỹ sư hệ thống, quản trị hệ thống, kỹ sư vận hành cho các hệ thống ảo hóa ESXi, ESX và vcenter Server

Khóa học dành cho các kỹ sư hệ thống, quản trị hệ thống, kỹ sư vận hành cho các hệ thống ảo hóa ESXi, ESX và vcenter Server 1. Mục tiêu khóa học. Khóa học sẽ tập trung vào việc cài đặt, cấu hình và quản trị VMware vsphere 5.1. Khóa học xây dựng trên nền VMware ESXi 5.1 và VMware vcenter Server 5.1. 2. Đối tượng. Khóa học dành

More information

TGL VMware Presentation. Guangzhou Macau Hong Kong Shanghai Beijing

TGL VMware Presentation. Guangzhou Macau Hong Kong Shanghai Beijing TGL VMware Presentation Guangzhou Macau Hong Kong Shanghai Beijing The Path To IT As A Service Existing Apps Future Apps Private Cloud Lots of Hardware and Plumbing Today IT TODAY Internal Cloud Federation

More information

F-Secure Internet Gatekeeper Virtual Appliance

F-Secure Internet Gatekeeper Virtual Appliance F-Secure Internet Gatekeeper Virtual Appliance F-Secure Internet Gatekeeper Virtual Appliance TOC 2 Contents Chapter 1: Welcome to F-Secure Internet Gatekeeper Virtual Appliance.3 Chapter 2: Deployment...4

More information

RSA Authentication Manager 8.1 Setup and Configuration Guide. Revision 2

RSA Authentication Manager 8.1 Setup and Configuration Guide. Revision 2 RSA Authentication Manager 8.1 Setup and Configuration Guide Revision 2 Contact Information Go to the RSA corporate website for regional Customer Support telephone and fax numbers: www.emc.com/domains/rsa/index.htm

More information

vsphere Host Profiles

vsphere Host Profiles ESXi 5.1 vcenter Server 5.1 This document supports the version of each product listed and supports all subsequent versions until the document is replaced by a new edition. To check for more recent editions

More information

Acronis Backup & Recovery 10 Advanced Server Virtual Edition. Quick Start Guide

Acronis Backup & Recovery 10 Advanced Server Virtual Edition. Quick Start Guide Acronis Backup & Recovery 10 Advanced Server Virtual Edition Quick Start Guide Table of contents 1 Main components...3 2 License server...3 3 Supported operating systems...3 3.1 Agents... 3 3.2 License

More information

Thinspace deskcloud. Quick Start Guide

Thinspace deskcloud. Quick Start Guide Thinspace deskcloud Quick Start Guide Version 1.2 Published: SEP-2014 Updated: 16-SEP-2014 2014 Thinspace Technology Ltd. All rights reserved. The information contained in this document represents the

More information

Getting Started with Database Provisioning

Getting Started with Database Provisioning Getting Started with Database Provisioning VMware vfabric Data Director 2.0 This document supports the version of each product listed and supports all subsequent versions until the document is replaced

More information

How To Manage An Iscsi Vsa With An Hp Storevirtual Storage With An Iscsi Vsa

How To Manage An Iscsi Vsa With An Hp Storevirtual Storage With An Iscsi Vsa HP StoreVirtual Storage VSA Installation and Configuration Guide Abstract This guide provides information about installing and configuring the HP StoreVirtual VSA for VMware vsphere and the HP StoreVirtual

More information

Index C, D. Background Intelligent Transfer Service (BITS), 174, 191

Index C, D. Background Intelligent Transfer Service (BITS), 174, 191 Index A Active Directory Restore Mode (DSRM), 12 Application profile, 293 Availability sets configure possible and preferred owners, 282 283 creation, 279 281 guest cluster, 279 physical cluster, 279 virtual

More information

Hillstone StoneOS User Manual Hillstone Unified Intelligence Firewall Installation Manual

Hillstone StoneOS User Manual Hillstone Unified Intelligence Firewall Installation Manual Hillstone StoneOS User Manual Hillstone Unified Intelligence Firewall Installation Manual www.hillstonenet.com Preface Conventions Content This document follows the conventions below: CLI Tip: provides

More information

Drobo How-To Guide. Deploy Drobo iscsi Storage with VMware vsphere Virtualization

Drobo How-To Guide. Deploy Drobo iscsi Storage with VMware vsphere Virtualization The Drobo family of iscsi storage arrays allows organizations to effectively leverage the capabilities of a VMware infrastructure, including vmotion, Storage vmotion, Distributed Resource Scheduling (DRS),

More information

VMware vsphere-6.0 Administration Training

VMware vsphere-6.0 Administration Training VMware vsphere-6.0 Administration Training Course Course Duration : 20 Days Class Duration : 3 hours per day (Including LAB Practical) Classroom Fee = 20,000 INR Online / Fast-Track Fee = 25,000 INR Fast

More information

Virtual Appliances. Virtual Appliances: Setup Guide for Umbrella on VMWare and Hyper-V. Virtual Appliance Setup Guide for Umbrella Page 1

Virtual Appliances. Virtual Appliances: Setup Guide for Umbrella on VMWare and Hyper-V. Virtual Appliance Setup Guide for Umbrella Page 1 Virtual Appliances Virtual Appliances: Setup Guide for Umbrella on VMWare and Hyper-V Virtual Appliance Setup Guide for Umbrella Page 1 Table of Contents Overview... 3 Prerequisites... 4 Virtualized Server

More information

User Manual. Onsight Management Suite Version 5.1. Another Innovation by Librestream

User Manual. Onsight Management Suite Version 5.1. Another Innovation by Librestream User Manual Onsight Management Suite Version 5.1 Another Innovation by Librestream Doc #: 400075-06 May 2012 Information in this document is subject to change without notice. Reproduction in any manner

More information

Virtual Appliance Setup Guide

Virtual Appliance Setup Guide The Barracuda SSL VPN Vx Virtual Appliance includes the same powerful technology and simple Web based user interface found on the Barracuda SSL VPN hardware appliance. It is designed for easy deployment

More information

Core Protection for Virtual Machines 1

Core Protection for Virtual Machines 1 Core Protection for Virtual Machines 1 Comprehensive Threat Protection for Virtual Environments. Installation Guide e Endpoint Security Trend Micro Incorporated reserves the right to make changes to this

More information

Virtual Server Installation Manual April 8, 2014 Version 1.8

Virtual Server Installation Manual April 8, 2014 Version 1.8 Virtual Server Installation Manual April 8, 2014 Version 1.8 Department of Health and Human Services Administration for Children and Families Office of Child Support Enforcement REVISION HISTORY Version

More information

TECHNICAL PAPER. Veeam Backup & Replication with Nimble Storage

TECHNICAL PAPER. Veeam Backup & Replication with Nimble Storage TECHNICAL PAPER Veeam Backup & Replication with Nimble Storage Document Revision Date Revision Description (author) 11/26/2014 1. 0 Draft release (Bill Roth) 12/23/2014 1.1 Draft update (Bill Roth) 2/20/2015

More information

QNAP in vsphere Environment

QNAP in vsphere Environment QNAP in vsphere Environment HOW TO USE QNAP NAS AS A VMWARE DATASTORE VIA NFS Copyright 2009. QNAP Systems, Inc. All Rights Reserved. V1.8 How to use QNAP NAS as a VMware Datastore via NFS QNAP provides

More information

EMC VSPEX END-USER COMPUTING

EMC VSPEX END-USER COMPUTING IMPLEMENTATION GUIDE EMC VSPEX END-USER COMPUTING VMware Horizon 6.0 with View and VMware vsphere for up to 2,000 Virtual Desktops Enabled by EMC VNX and EMC Data Protection EMC VSPEX Abstract This describes

More information

VMware vsphere 5.5: Install, Configure, Manage Lab Addendum. Lab 4: Working with Virtual Machines

VMware vsphere 5.5: Install, Configure, Manage Lab Addendum. Lab 4: Working with Virtual Machines VMware vsphere 5.5: Install, Configure, Manage Lab Addendum Lab 4: Working with Virtual Machines Document Version: 2014-06-02 Copyright Network Development Group, Inc. www.netdevgroup.com NETLAB Academy

More information

PHD Virtual Backup for Hyper-V

PHD Virtual Backup for Hyper-V PHD Virtual Backup for Hyper-V version 7.0 Installation & Getting Started Guide Document Release Date: December 18, 2013 www.phdvirtual.com PHDVB v7 for Hyper-V Legal Notices PHD Virtual Backup for Hyper-V

More information

Barracuda Message Archiver Vx Deployment. Whitepaper

Barracuda Message Archiver Vx Deployment. Whitepaper Barracuda Message Archiver Vx Deployment Whitepaper Document Scope This document provides guidance on designing and deploying Barracuda Message Archiver Vx on VMware vsphere Document Scope, and Microsoft

More information

Interworks. Interworks Cloud Platform Installation Guide

Interworks. Interworks Cloud Platform Installation Guide Interworks Interworks Cloud Platform Installation Guide Published: March, 2014 This document contains information proprietary to Interworks and its receipt or possession does not convey any rights to reproduce,

More information

VMWARE VSPHERE 5.0 WITH ESXI AND VCENTER

VMWARE VSPHERE 5.0 WITH ESXI AND VCENTER VMWARE VSPHERE 5.0 WITH ESXI AND VCENTER CORPORATE COLLEGE SEMINAR SERIES Date: April 15-19 Presented by: Lone Star Corporate College Format: Location: Classroom instruction 8 a.m.-5 p.m. (five-day session)

More information

Quick Start Guide for VMware and Windows 7

Quick Start Guide for VMware and Windows 7 PROPALMS VDI Version 2.1 Quick Start Guide for VMware and Windows 7 Rev. 1.1 Published: JULY-2011 1999-2011 Propalms Ltd. All rights reserved. The information contained in this document represents the

More information

vcloud Director User's Guide

vcloud Director User's Guide vcloud Director 5.5 This document supports the version of each product listed and supports all subsequent versions until the document is replaced by a new edition. To check for more recent editions of

More information

VMware vcenter Log Insight Getting Started Guide

VMware vcenter Log Insight Getting Started Guide VMware vcenter Log Insight Getting Started Guide vcenter Log Insight 2.0 This document supports the version of each product listed and supports all subsequent versions until the document is replaced by

More information

Setup for Failover Clustering and Microsoft Cluster Service

Setup for Failover Clustering and Microsoft Cluster Service Setup for Failover Clustering and Microsoft Cluster Service Update 1 ESXi 5.1 vcenter Server 5.1 This document supports the version of each product listed and supports all subsequent versions until the

More information

Basic System Administration ESX Server 3.0 and VirtualCenter 2.0

Basic System Administration ESX Server 3.0 and VirtualCenter 2.0 Basic System Administration ESX Server 3.0 and VirtualCenter 2.0 Basic System Administration Revision: 20090213 Item: VI-ENG-Q206-219 You can find the most up-to-date technical documentation at: http://www.vmware.com/support/pubs

More information

How to install/upgrade the LANDesk virtual Cloud service appliance (CSA)

How to install/upgrade the LANDesk virtual Cloud service appliance (CSA) How to install/upgrade the LANDesk virtual Cloud service appliance (CSA) The upgrade process for the virtual Cloud Services Appliance is a side- by- side install. This document will walk you through backing

More information

Setup for Microsoft Cluster Service ESX Server 3.0.1 and VirtualCenter 2.0.1

Setup for Microsoft Cluster Service ESX Server 3.0.1 and VirtualCenter 2.0.1 ESX Server 3.0.1 and VirtualCenter 2.0.1 Setup for Microsoft Cluster Service Revision: 20060818 Item: XXX-ENG-QNNN-NNN You can find the most up-to-date technical documentation on our Web site at http://www.vmware.com/support/

More information

VMware vsphere 4.1 with ESXi and vcenter

VMware vsphere 4.1 with ESXi and vcenter VMware vsphere 4.1 with ESXi and vcenter This powerful 5-day class is an intense introduction to virtualization using VMware s vsphere 4.1 including VMware ESX 4.1 and vcenter. Assuming no prior virtualization

More information

Unitrends Virtual Backup Installation Guide Version 8.0

Unitrends Virtual Backup Installation Guide Version 8.0 Unitrends Virtual Backup Installation Guide Version 8.0 Release June 2014 7 Technology Circle, Suite 100 Columbia, SC 29203 Phone: 803.454.0300 Contents Chapter 1 Getting Started... 1 Version 8 Architecture...

More information

OnCommand Performance Manager 1.1

OnCommand Performance Manager 1.1 OnCommand Performance Manager 1.1 Installation and Administration Guide For VMware Virtual Appliances NetApp, Inc. 495 East Java Drive Sunnyvale, CA 94089 U.S. Telephone: +1 (408) 822-6000 Fax: +1 (408)

More information

OnCommand Performance Manager 2.0

OnCommand Performance Manager 2.0 OnCommand Performance Manager 2.0 Installation and Administration Guide For VMware Virtual Appliances NetApp, Inc. 495 East Java Drive Sunnyvale, CA 94089 U.S. Telephone: +1 (408) 822-6000 Fax: +1 (408)

More information

Veeam Cloud Connect. Version 8.0. Administrator Guide

Veeam Cloud Connect. Version 8.0. Administrator Guide Veeam Cloud Connect Version 8.0 Administrator Guide April, 2015 2015 Veeam Software. All rights reserved. All trademarks are the property of their respective owners. No part of this publication may be

More information

Direct Storage Access Using NetApp SnapDrive. Installation & Administration Guide

Direct Storage Access Using NetApp SnapDrive. Installation & Administration Guide Direct Storage Access Using NetApp SnapDrive Installation & Administration Guide SnapDrive overview... 3 What SnapDrive does... 3 What SnapDrive does not do... 3 Recommendations for using SnapDrive...

More information

Quick Start Guide. for Installing vnios Software on. VMware Platforms

Quick Start Guide. for Installing vnios Software on. VMware Platforms Quick Start Guide for Installing vnios Software on VMware Platforms Copyright Statements 2010, Infoblox Inc. All rights reserved. The contents of this document may not be copied or duplicated in any form,

More information

Monitoring Hybrid Cloud Applications in VMware vcloud Air

Monitoring Hybrid Cloud Applications in VMware vcloud Air Monitoring Hybrid Cloud Applications in ware vcloud Air ware vcenter Hyperic and ware vcenter Operations Manager Installation and Administration Guide for Hybrid Cloud Monitoring TECHNICAL WHITE PAPER

More information

SonicWALL SRA Virtual Appliance Getting Started Guide

SonicWALL SRA Virtual Appliance Getting Started Guide COMPREHENSIVE INTERNET SECURITY SonicWALL Secure Remote Access Appliances SonicWALL SRA Virtual Appliance Getting Started Guide SonicWALL SRA Virtual Appliance5.0 Getting Started Guide This Getting Started

More information

Basic System Administration ESX Server 3.0.1 and Virtual Center 2.0.1

Basic System Administration ESX Server 3.0.1 and Virtual Center 2.0.1 Basic System Administration ESX Server 3.0.1 and Virtual Center 2.0.1 This document supports the version of each product listed and supports all subsequent versions until the document is replaced by a

More information

How To Set Up A Firewall Enterprise, Multi Firewall Edition And Virtual Firewall

How To Set Up A Firewall Enterprise, Multi Firewall Edition And Virtual Firewall Quick Start Guide McAfee Firewall Enterprise, Multi-Firewall Edition model S7032 This quick start guide provides high-level instructions for setting up McAfee Firewall Enterprise, Multi-Firewall Edition

More information

INCORPORATING CLOUDLINK SECUREVSA OFFERINGS IN EMC VSPEX DESIGNS

INCORPORATING CLOUDLINK SECUREVSA OFFERINGS IN EMC VSPEX DESIGNS INCORPORATING CLOUDLINK SECUREVSA OFFERINGS IN EMC VSPEX DESIGNS 2014 CloudLink Technologies Inc. All rights reserved. The Copyright in this document belongs to CloudLink Technologies Inc. and no part

More information

Testing and Restoring the Nasuni Filer in a Disaster Recovery Scenario

Testing and Restoring the Nasuni Filer in a Disaster Recovery Scenario Testing and Restoring the Nasuni Filer in a Disaster Recovery Scenario Version 7.2 November 2015 Last modified: November 3, 2015 2015 Nasuni Corporation All Rights Reserved Document Information Testing

More information