Oceanspace Series Storage Product Technical White Paper for the WORM

Similar documents
Technical White Paper for the Oceanspace VTL6000

Doc. Code. OceanStor VTL6900 Technical White Paper. Issue 1.1. Date Huawei Technologies Co., Ltd.

OceanStor 9000 InfoProtector Technical White Paper. Issue 01. Date HUAWEI TECHNOLOGIES CO., LTD.

HUAWEI OceanStor Load Balancing Technical White Paper. Issue 01. Date HUAWEI TECHNOLOGIES CO., LTD.

OceanStor UDS Massive Storage System Technical White Paper Reliability

Microsoft SQL Server 2008 R2 Enterprise Edition and Microsoft SharePoint Server 2010

Technical Note. Dell PowerVault Solutions for Microsoft SQL Server 2005 Always On Technologies. Abstract

HUAWEI OceanStor Series Enterprise Storage System Disaster Recovery White Paper HUAWEI TECHNOLOGIES CO., LTD. Issue 01.

White Paper on Video Wall Display Technology in Videoconferencing HUAWEI TECHNOLOGIES CO., LTD. Issue 01. Date

Huawei OceanStor Backup Software Technical White Paper for NetBackup

SECURE DATA PROTECTION WITH DOT HILL S BATCH REMOTE REPLICATION. Replication

EMC NETWORKER SNAPSHOT MANAGEMENT

MPLS L2VPN (VLL) Technology White Paper

IP Storage On-The-Road Seminar Series

NSI Solutions with Microsoft VSS

Symantec NetBackup OpenStorage Solutions Guide for Disk

Deploying Global Clusters for Site Disaster Recovery via Symantec Storage Foundation on Infortrend Systems

Part Number: HG253s V2 Home Gateway Product Description V100R001_01. Issue HUAWEI TECHNOLOGIES CO., LTD.

Hyperoo 2.0 A (Very) Quick Start

EMC MID-RANGE STORAGE AND THE MICROSOFT SQL SERVER I/O RELIABILITY PROGRAM

Huawei Business Continuity and Disaster Recovery Solution

Total Disaster Recovery in Clustered Storage Servers

OceanStor VTL Solution V100R001 Interoperability Matrix

Hitachi s Midrange Disk Array as Platform for DLCM Solution

Microsoft SQL Server Always On Technologies

Navisphere Quality of Service Manager (NQM) Applied Technology

Disaster Recovery for Oracle Database

Online Transaction Processing in SQL Server 2008

Using HP StoreOnce D2D systems for Microsoft SQL Server backups

VRRP Technology White Paper

DocAve 6 Service Pack 1 Job Monitor

Technology Insight Series

Preface Introduction... 1 High Availability... 2 Users... 4 Other Resources... 5 Conventions... 5

Configuring Celerra for Security Information Management with Network Intelligence s envision

HP EVA to 3PAR Online Import for EVA-to-3PAR StoreServ Migration

Huawei Smart Education Solution

Pipeliner CRM Phaenomena Guide Opportunity Management Pipelinersales Inc.

NetStream (Integrated) Technology White Paper HUAWEI TECHNOLOGIES CO., LTD. Issue 01. Date

Symantec NetBackup Snapshots, Continuous Data Protection, and Replication

Veritas CommandCentral Disaster Recovery Advisor Release Notes 5.1

End-to-end Data integrity Protection in Storage Systems

Veritas NetBackup for Microsoft Exchange Server Administrator s Guide

Understanding Storage Virtualization of Infortrend ESVA

Virtual Machine Environments: Data Protection and Recovery Solutions

EonStor DS High-Density Storage: Key Design Features and Hybrid Connectivity Benefits

Qsan Document - White Paper. How to use QReplica 2.0

Enterprise Vault 10 Feature Briefing

NetBackup Backup, Archive, and Restore Getting Started Guide

BUSINESS CONTINUITY BEST PRACTICES FOR SAP HANA TAILORED DATACENTER INTEGRATION WITH EMC SYMMETRIX VMAX

Using HP StoreOnce Backup systems for Oracle database backups

AUTOMATED DATA RETENTION WITH EMC ISILON SMARTLOCK

Spambrella Archiving Service Guide Service Guide

NetApp Storage System Plug-In for Oracle Enterprise Manager 12c Installation and Administration Guide

Pipeliner CRM Phaenomena Guide Lead Management Pipelinersales Inc.

SQL Azure vs. SQL Server

GRIDScaler-WOS Bridge

Business Continuity: Choosing the Right Technology Solution

Data Model s Role in DaaS...3. The SQL Azure Use Case...4. Best Practices and Guidelines...5

EMC DATA DOMAIN ENCRYPTION A Detailed Review

Whitepaper - Disaster Recovery with StepWise

Using HP StoreOnce Backup Systems for NDMP backups with Symantec NetBackup

HUAWEI OceanStor Enterprise Storage System Success Cases

OVERCOME REGULATORY DATA RETENTION CHALLENGES WITH COMPLIANCE ARCHIVING

IBM Infrastructure for Long Term Digital Archiving

Using Data Domain Storage with Symantec Enterprise Vault 8. White Paper. Michael McLaughlin Data Domain Technical Marketing

An Oracle White Paper November Leveraging Massively Parallel Processing in an Oracle Environment for Big Data Analytics

Database Backup and Recovery Guide

Replicating VNXe3100/VNXe3150/VNXe3300 CIFS/NFS Shared Folders to VNX Technical Notes P/N h REV A01 Date June, 2011

Sarbanes-Oxley Assessment

Remote Copy Technology of ETERNUS6000 and ETERNUS3000 Disk Arrays

BEYOND LIMITATIONS CONNECTING POSSIBILITIES

Protect Microsoft Exchange databases, achieve long-term data retention

Leveraging the Cloud for Data Protection and Disaster Recovery

Infortrend EonNAS 3000 and 5000: Key System Features

BrightStor ARCserve Backup for Windows

How To Use The Hitachi Content Archive Platform

Symantec Storage Foundation for Windows

2.6.1 Creating an Acronis account Subscription to Acronis Cloud Creating bootable rescue media... 12

Reduce your data storage footprint and tame the information explosion

The Secret to Affordably Protecting Critical Data

Use QNAP NAS for Backup

TestFlight FAQ Apple Inc.

Huawei NE5000E 400Gbps Flexible Line Processing Unit

Bigdata High Availability (HA) Architecture

Symantec Enterprise Vault

Symantec Enterprise Vault

DATA BACKUP AND STORAGE SERVICE LEVEL AGREEMENT

NexentaConnect for VMware Virtual SAN

Volume Replication INSTALATION GUIDE. Open-E Data Storage Server (DSS )

Installation & Configuration Guide

Acronis Backup & Recovery 11. Backing Up Microsoft Exchange Server Data

EMC DATA DOMAIN RETENTION LOCK SOFTWARE

EonStor DS remote replication feature guide

Achieving High Availability & Rapid Disaster Recovery in a Microsoft Exchange IP SAN April 2006

ZENworks Mobile Management 3.0.x Deployment Quick Start

END- USER LICENSE AGREEMENT FOR Helpdesk Pilot

Oracle Plug-in for Windows Agent 7.1 User Guide

Data Replication INSTALATION GUIDE. Open-E Data Storage Server (DSS ) Integrated Data Replication reduces business downtime.

Symantec NetBackup Backup, Archive, and Restore Getting Started Guide. Release 7.5

Huawei N2000 NAS Storage System Technical White Paper

Transcription:

Technical White Paper for the WORM Issue 01 Release Date 2009-12-01 Huawei Symantec Technologies Co., Ltd.

Copyright Chengdu Huawei Symantec Technologies CO., Ltd. 2010. All rights reserved. No part of this document may be reproduced or transmitted in any form or by any means without prior written consent of Huawei Symantec Technologies Co., Ltd. Trademarks and Permissions and other Huawei Symantec icons are trademarks of Chengdu Huawei Symantec Technologies CO., Ltd. All other trademarks and trade names mentioned in this document are the property of their respective holders. Note The purchased products, services and features are stipulated by the commercial contract between Chengdu Huawei Symantec Technologies CO., Ltd. and the customer. All or partial products, services and features described in this document may not be within the purchased scope or the usage scope. Unless otherwise agreed by the contract, all statements, information, and recommendations in this document are provided "AS IS" without warranties, guarantees or representations of any kind, either express or implied. The information in this document is subject to change without notice. Every effort has been made in the preparation of this document to ensure accuracy of the contents, but all statements, information, and recommendations in this document do not constitute the warranty of any kind, express or implied. Huawei Symantec Technologies Co., Ltd. Address: Building 1 The West Zone Science Park of UESTC, No.88, Tianchen Road Chengdu, 611731 P.R.China Website: Email: http://www.huaweisymantec.com support@huaweisymantec.com Telephone: 86-400-888-2333 Fax: 86-28-87897555 Page 2 of 18

Update History Date Issue Description Prepared By 2010-05-12 1.0 Initial release. Cong Yang Page 3 of 18

Contents 1 Executive Summary... 7 2 Introduction... 9 3 Solution... 11 3.1 Introduction to WORM... 11 3.2 Principle of WORM... 11 3.3 WORM LUN vs. Common LUN... 12 4 Experience... 15 5 Conclusion... 17 6 Acronyms and Abbreviations... 18 Page 4 of 18

Figures Figure 3-1 Process of WORM... 11 Figure 3-2 Data read and write on a common LUN... 12 Figure 3-3 Data read and write on a WORM LUN... 12 Page 5 of 18

Tables Table 3-1 Common LUN vs. WORM LUN... 13 Table 6-1 Acronyms and abbreviations related to the WORM... 18 Page 6 of 18

1 Executive Summary This document describes the principle, process, and scenarios of the Write Once Read Many (WORM) technology for the Oceanspace series storage system. In addition, this document introduces the technological superiority and regulatory compliance of Huawei Symantec WORM technology. Page 7 of 18

2 Introduction In the countries outside China, public sectors, financial institutions, and medical organizations are forbidden by law to delete or overwrite their business documents at will. For example, once electronic medicine charts are archived, they cannot be deleted or modified. In comparison, there is little law in China that regulates data storage. As the law system has been improving and more and more China companies have started their exploration in oversea markets, data archiving will be a focus. Under this background, the storage technologies that incorporate the WORM function have emerged as a solution to data archiving. Page 9 of 18

3 Solution 3.1 Introduction to WORM WORM is realized through the combination of hardware and software. Once data is written onto the storage media with the WORM technology embedded, the data cannot be modified or deleted. WORM secures the backup of special and mission-critical data. 3.2 Principle of WORM The principle of WORM is the judgment of WORM LUNs on the array side. If a common LUN is specified as a WORM LUN, this LUN is read-only. Figure 3-1 shows the process of WORM. Figure 3-1 Process of WORM Page 11 of 18

1. The host sends the read/write I/O to the array. 2. The LUN to be read or written is judged for a WORM LUN on the Target (TGT) layer of the array. 3. If the LUN is a WORM LUN, the read I/O is successfully sent and the read data is returned to the host. But the write I/O cannot be sent and an error code is returned to the host. The user can set a LUN as a WORM LUN for a period (days). In this protection period, data on this LUN cannot be modified or deleted. Before the period expires, the user can prolong rather than shorten the period. When the protection expires, the user can manually set the WORM LUN back to a common LUN. Then, all restrictions originally on the WORM LUN disappear. The protection period ranges from 1 day to 60 years (60 x 365 days). 3.3 WORM LUN vs. Common LUN For the host's data reading and writing: Data on a common LUN can be read and written, whereas data on a WORM LUN is read-only. Figure 3-2 and Figure 3-3 show the details: Figure 3-2 Data read and write on a common LUN Figure 3-3 Data read and write on a WORM LUN Page 12 of 18

For their value-added features: A WORM LUN is used as a source LUN rather than a destination LUN. And there are restrictions for a WORM LUN working as a source LUN, as listed in Table 3-1. Table 3-1 Common LUN vs. WORM LUN LUN Value-added Features Virtual Snapshot Remote Replication LUN Copy LUN Extension Common LUN Snapshot and rollback Synchronous and asynchronous replication; Source LUN and destination LUN No restriction. Failover WORM LUN Snapshot; Rollback not supported Synchronous and asynchronous replication; Failover not supported Source LUN; destination LUN not supported WORM cannot be enabled before the implementation of LUN extension. Page 13 of 18

4 Experience WORM mainly applies to the fields where archived data cannot be modified or destroyed. The demand for data protection is derived from regulatory compliance or organizations' individual concerns. The WORM technology protects data on the storage media against loss or tamper and is suitable for the long-term retention of mission-critical data. In addition, the WORM technology caters for regulatory compliance for data storage. Page 15 of 18

5 Conclusion The WORM technology for the Oceanspace series storage system is easy to master and has broad market opportunities. This technology applies to the applications that require read-only protection for important data. Huawei Symantec WORM technology complies with the industry standards and rules, such as the Sarbanes-Oxley Act, HIPAA, US-SEC Rule 17a-4, and Gramm-Leach-Bliley Act. Page 17 of 18

6 Acronyms and Abbreviations Table 6-1 Acronyms and abbreviations related to the WORM Acronym WORM LUN TGT Full Spelling Write Once Read Many Logical Unit Number Target Page 18 of 18