ࡱ> y{z` Fbjbj *>&&&&&31j&&&&&&&&0000000$2h5n0&&&&&0&&0'''& &&0'&0''-v.&& w^K&&2.".1031T."s5's5Dv.s5v. &&'&&&&&00' &&&31&&&&d && Auspex Software NDMP Server Benefits NDMP server services backup or restore requests from an NDMP client. An NDMP (Network Data Management Protocol) client is a backup software provided by third party backup software vendors. Examples of third party software include NetBackup from Veritas Software and Networker from Legato. NDMP server allows backup software to provide reliable backup and restore support for file servers via direct-attached or remote-attached tape libraries. Product Description The NDMP protocol allows NDMP-compliant applications to send messages over the network to NDMP hosts to initiate and control backups and restores. The standard provides compatibility between any combination of NDMP-compliant network-attached servers, backup devices and management applications. It also significantly simplifies the data management process by centralizing backup control, reducing network traffic and enhancing backup performance. Network congestion is minimized because the data and control path are separated. The NDMP server runs as a daemon on a file server. It runs in the background and creates an instance for every backup or restore operation. The instance terminates once the backup or restore request is processed. TurboReplicator Benefits TurboReplicator provides for interoperability with third party backup products while maintaining File metadata and providing high-speed backup. Product Description TurboReplicator is designed to provide a fast and efficient tape backup/restore solution for such large amounts of data without sacrificing the benefits of the data management and user interface functionality provided by third-party backup software. TurboReplicator improves tape backup/restore performance through its unique architectural design and by complying with NDMP (Network Data Management Protocol), an open-standard protocol for communication between a NAS (Network Attached Storage) server and backup software. In addition to tape backup and restore, TurboReplicator also supports disk-to-disk replication when used in conjunction with the Auspex TurboCopy Premier Software Option. TurboReplicator and TurboCopy together make possible the disk-to-disk replication of individual files, individual directories, or entire file systems from one NAS filer to another. TurboCopy Benefits TurboCopy provides a means of replicating file systems for data protection as well as for use as test data. Replicated file systems can be done as full replication or just incremental to reduce network traffic. Since TurboCopy operates over a LAN or WAN its benefits can be applied to disaster recovery as well as data protection. Product Description TurboCopy enables both local and remote replication of single files, single directories, or entire file systems to disk, without the use of third-party backup software. TurboCopy supports remote data transfer between two NAS filer systems, one acting as data source (data server), the other acting as destination (disk server). The roles of the two filer systems are interchangeable. Because the NAS filer systems involved in the replication need not be in the same location, TurboCopy meets a growing demand for online but off-site data copies. TurboCopy provides quicker recovery of recent data than tape and affords the added security of a remote location. The lag times in typical Local Area Network (LAN) and Wide Area Network (WAN) connections may make it impractical to synchronously create and update a remote replica of data from disk. However, by allowing the replication process to operate asynchronously, first by creating a full copy of the file system on the remote NAS filer and then by refreshing it periodically with incremental updates, a remote hard-disk copy of current data can be easily maintained. TurboCopy offers an efficient disk-to-disk copy method by eliminating the need for a third station, and by avoiding the associated extra network traffic. It enables high-speed transfer of data between two NAS filers through direct Network Processor (NP) to NP communication. TurboCopy embeds file metadata and data in the same data stream (using GTAR format) so that the replication of metadata and data is streamlined. The delta replication option can limit replication to the files that have changed since the last delta. The deleted file tracking option can synchronize the delta destination with the original, removing files or file systems that no longer exist on the source. Taking a snapshot of a file system and replicating the resulting frozen view supports replication of live file systems. TurboCopy supports two operational modes, file-level and block-level. In file mode, complete files are copied from source to destination, while in block mode, only changed portions of a Filesystem are replicated. The optimal choice of which mode to use depends upon the dynamic nature of the content of the Filesystem and other factors discussed later in this manual. TurboCopy also works on the local level. Use local TurboCopy to quickly and efficiently back up data within a single NAS filer system. Features of the Fibre Series TurboCopy software include: File-based and block-based remote data replication for I/O Node-attached disks between two NS3000-series systems. Local and remote replication of individual files, individual directories, and entire file systems. Replication of file attributes, including UNIX ownership, permissions, and Windows NT ACLs. Full and incremental replications. Support for large numbers of incremental replication levels. Replication of live file systems with the file system snapshot option. Destination snapshot support for maintaining historical views of the destination Filesystem. Concurrent bi-directional replication in which two NS3000 systems can serve as both replication source and destination. Support for optional Deleted File Tracking (DFT) during incremental restore and replication by means of the dft command line option. A command-line option to log replication file history. A command-line option to specify a preferred connection for replication data transfer. Secure root authorization for NS3000 systems involved in a disk replication. The root password is DES-encrypted in a file, so it cannot be read. A command-line option to set the maximum process data rate (throttling). NetOS for CIFS Benefits NetOS for CIFS provides Enterprise Class network attached storage for native Windows Environments. Product Description NetOS for CIFS (formerly known as NeTservices) enables a system to share files in both NFS and Windows environments simultaneously. NetOS for CIFS supports Microsofts Common Internet File System protocol (CIFS/0.9) supporting all dialects up to and including Windows 2000 in the Auspex NetOS DataXpress kernel. In addition, NeTservices bundles AT&T s Advanced Server for UNIX 4.0 and Micro Computer Systems NetBIOS 4.0 to provide comprehensive NT administration and management tools. NeTservices supports Windows 3.1.1, Windows 95, Windows 98, Windows NT 4.0, and Windows 2000. One World View Product Description When to use One-World-Change Model Use the One-World-Change Model when most of the users in an organization have both UNIX accounts and NT accounts and they access data from both UNIX workstations and NT workstations. One-World-Change Model ensures that permissions for files and directories appear the same in both UNIX and NT environments, whether the permissions are changed by UNIX or NT users. In the One-World-Change Model, every security attribute (except SACL) is dependent on other security attributes. Usually, only one security attribute must be changed to control access to an object effectively. For example, to make a file non-writable, the MODE can be changed or the DOS-Attributes can be changed. When a security attribute is changed, the change is applied to all the security attributes, which are dependent on the changing attribute. Changes to Security Attributes in the One-World-Change Model Making a Change to Causes a change inUID DACLGID DACLMODE DACL, DOS-AttributesOwner-SID UIDGroup-SID GIDDACL MODEDOS-Attributes MODESACL None Implicit Security Descriptor in One-World-Change Model The implicit Security Descriptor in the One-World-Change Model is NOT dependent on the user requesting the Security Descriptor. It is derived from the object's UNIX Security listed below: The Owner-SID is obtained by mapping the UID of the object to user SID. The Group-SID is obtained by mapping the GID of the object to group SID. The SACL is empty (no ACEs). For files, the DACL consists of up to three ACEs File Permissions Owner-SID Special Access (NT-Owner permission)Group-SID Special Access (NT-Group permission)Everyone Special Access (NT-Everyone permission) If NT-Owner permission or NT-Group permission or NT-Everyone permission is none (zero), the corresponding entry is omitted. Access Control in One-World-Change Model In the One-World-Change Model , the Registry parameter "IgnoreUnixPermissions" does not play a role. Access Control in One-World-Change Model Protocol used When the object has Explicit Security Descriptor When the object has no Explicit Security DescriptorNFS UNIX Security only UNIX Security onlyCIFS (file access) NT Security only Both UNIX Security and DOS-AttributesCIFS (Take Ownership) Granted to administrators and anyone as permitted by DACLGranted to the UNIX Owner and administratorsCIFS (Set DACL)Granted to the NT Owner and anyone as permitted by DACLGranted to the UNIX Owner onlyCIFS (View/Set SACL) Granted to administrators only Granted to administrators only Agnostic SAN Failover - Storage Agnostic SAN Multi-pathing (SAMP) Benefits: A seamless software module capable of managing and monitoring the various paths to a given LUN independent of storage vendor intricacies with regard to storage volume failover or migration in a SAN. Product Description: When a Fibre Channel path fails because of any component from the Host Bus Adapter (HBA) to the storage volumes, then the multipathing and redundancy of the Fibre Channel path allows access to the storage through an alternate path without virtual server failover. When multipathing is configured in a Fibre Channel SAN network, the SAN itself provides redundancy in accessing storage. In a Public SAN, Agnostic Failover from the Auspex HBA connection to the SAN provides automatic failover for storage access using multipathing support to the storage volumes. From the system, two HBA cards are attached to a Fibre Channel SAN which may have multipathing for redundancy and load balancing. In the event of a Fibre Channel path failure, the other Fibre Channel path can continue to serve data on behalf of the failed path. No server failover is initiated. On each server two HBAs connect each node to the switches connected to the public SAN. The third-party storage is agnostic to the Management interface and volume management is done by third party software. LUNs are mapped to NAS filer I/O Nodes for storage access, but not controlled by NAS filer software. Also, any storage failures (in the RAID arrays, controllers, disks, or channels) are likewise third-party dependent. NetGuard Benefits NetGuard increases availability by allowing a NIC or network segment to fail and, by using Virtual IP technology, will re-assign the Virtual IP (VIP) address to a surviving Physical IP (PIP) address. Product Description NetGuard is a high availability software product that resides on the I/O Node Enclosures Host. This software provides automatic fail-over and fail-back between network server connections, both for network interface failure and for lack of network availability. NetGuard allows for the definition of fail-over behavior through an editable configuration file, and provides high availability of network connections transparently to both Network File System (NFS) and Common Internet File System (CIFS) protocol clients. The CIFS environment includes both Windows and NT clients. NetGuard is mutually exclusive with EtherBand since EtherBand provides the same functionality as NetGuard. EtherBand also includes port aggregation in addition to the NIC failover that NetGuard provides. Command Station Benefits Command Station is a java client server application. The server side is a robust application that implements and monitors processes and commands on a server. The client side is an appealing and easy to use graphical user interface that can configure a server in many useful ways. Both the client and server side can be extended to include many different kinds of functions. Examples of implementations are Login, Network, Storage, File Systems and Server Redundancy. Product Description Command Station provides a graphical user interface to a command line server. Features are created in separate user agents and can be integrated or removed as required. The server side runs as two separate java processes started at boot up or via an init script. The processes wait for connections from the clients and after connections are established, respond to requests from the client software. Some of the features currently implemented are described below. Login Provides a means for the user to log into the server, using a username and password. Multiple servers can be logged into and encryption will be implemented in a future release. Network Allows configuration of the network cards on the server, providing all the functionality of ifconfig on Sun, i.e., ip number, netmask, interface name (.hosts file), and card features like speed, duplex, and others depending on the capability of the network card. Storage Provides an easy to use way to configure the backend storage on a server. File Systems Implements file system commands such as unix mkfs, fsck, and dfstab manipulations. Server Redundancy Used to configure two servers in a failover configuration. License Manager Benefits The License Manager manages and enforces various licensing policies available for a system. Where as other License Manager schemes are static, this approach is more dynamic with run-time validation and policy enforcement. Product Description The License Manager provides with an efficient mechanism to enforce licensing policies. It triggers notifications to the administrator upon any violations or if the license key becomes invalid. The License Manager checks for the validity of the license key and checks for the expiration of license periodically. It also manages the thresholds for the allowed storage capacity and for the number of user logins. It also enables or disables products/features based on the installed license key. Pseudo SCSI HBA Driver Benefits: A Pseudo SCSI (or FCP) HBA driver for the Solaris 2.6 and 2.8 Operating Systems that can provide kernel level access to a remote SCSI Bus. Product Description: The Pseudo SCSI HBA driver can reside on any system and has the capability to access SCSI buses on remote servers. The driver will present the SCSI bus found on the remote server to the system as if it's connected directly to the SCSI bus. SCSI target drivers installed on the system can send data to SCSI targets on a remote SCSI bus utilizing the Pseudo SCSI HBA driver. Applicability: An application requiring kernel level (target driver) access to a SCSI bus installed on a system that does not have SCSI Hardware can use the Pseudo HBA driver to view a remote systems SCSI bus. Normal view of a SCSI Subsystem: SCSI Target Driver ( SCSI HBA Driver ( SCSI Hardware/Bus ( SCSI Targets Pseudo SCSI HBA drivers view of the SCSI Subsystem: SCSI Target Driver ( Pseudo SCSI HBA Driver ( Remote Bus (SCI or Infiniband interconnect, IP, etc..) ( Remote System Target Driver ( Remote System HBA Driver ( SCSI Hardware/Bus ( SCSI Targets (  ##### $ $$$A''$('(^(_()) ***+ +I+땊wniiwnwniwnin hG}hhG}OJQJhhG}5OJQJhhG}OJQJhG}5CJOJQJhG}56OJQJ hG}CJhG}CJOJQJhG}0JCJOJQJhG}"hG}0J5B*CJOJQJphhG}0J5CJOJQJhG}0JCJOJQJhG}5OJQJhG}5CJOJQJ'( "no$a$$a$$a$F yz<=qyy & F  & F  & F  & F & F & F & F & F & F8^8 & F8^8$a$ b!v!^##### $ $$$z%{%@'A'~'''$If$a$ & F & F  & F ''''$Iflkd$$Ifl0H$04 la''''$Iflkd$$Ifl0H$04 la''''$Iflkd$$Ifl0H$04 la''''$Iflkd$$Ifl0H$04 la''''$Iflkd$$Ifl0H$04 la'''($Iflkd$$Ifl0H$04 la(((($Iflkd$$Ifl0H$04 la(( (%($Iflkd$$Ifl0H$04 la%(&('(^(_())d)))) * **=*$If & Flkd $$Ifl0H$04 la=*>*I*n*$Iflkd$$Ifl0H$04 lan*o*y**$Iflkd($$Ifl0H$04 la*** +I++++++,N,$If$a$lkd$$Ifl0H$04 la I++O,....L.\.&/A/22E4F4O4F8V8>>AAAA BBB7E8EJEKE_E`EEEEE FF,F-FIFJF_F`FF¹͚͚͔ͮͮͮͅͅͅͅͅͅͅͅͅ jhG}hG}CJKH hG}KH hG}CJhG}OJQJh hG}hhG}56OJQJhG}5OJQJhG}5CJOJQJhG}hG}OJQJhG}B*OJQJhphhG}5B*OJQJhphhG}B*hph-N,O,T,h,{,yyy$Ifkd0$$IflF $x x x 0    4 la{,|,,,,yyy$Ifkd$$IflF $x x x 0    4 la,,,-G-yyy$IfkdH$$IflF $x x x 0    4 laG-H-X---yyy$Ifkd$$IflF $x x x 0    4 la----.yyy$Ifkd`$$IflF $x x x 0    4 la....K.L.\.%/&/A/B/J0K0s1}}}}}{}}vvvv$a$kd$$IflF $x x x 0    4 la s1t122E4F4O4X4 545;6<6x7y7E8F8V8_82:3:4:H:I:;;< <<<$a$<==4>A>>>>>>>???@@AAAAA B BBBBB*D$a$*D+D:D;DEE#E$E:EMEbEoEpEEEEEF/FKFaFqFrFsFtFuF ^` ^``$a$uFvFwFxFyFzF{F|F}F~FFFFFFFFFFF(/ =!"#$% $$If!vh55#v:V l054$$If!vh55#v:V l054$$If!vh55#v:V l054$$If!vh55#v:V l054$$If!vh55#v:V l054$$If!vh55#v:V l054$$If!vh55#v:V l054$$If!vh55#v:V l054$$If!vh55#v:V l054$$If!vh55#v:V l054$$If!vh55#v:V l054$$If!vh55#v:V l054$$If!vh5x 5x 5x #vx :V l05x 4$$If!vh5x 5x 5x #vx :V l05x 4$$If!vh5x 5x 5x #vx :V l05x 4$$If!vh5x 5x 5x #vx :V l05x 4$$If!vh5x 5x 5x #vx :V l05x 4$$If!vh5x 5x 5x #vx :V l05x 48@8 Normal_HmH sH tH L@L Heading 1$<@&5KHOJQJR@R Heading 2$h<@&^h56OJQJD@D Heading 3$@&5CJOJQJDA@D Default Paragraph FontVi@V  Table Normal :V 44 la (k@(No List Ng@N HTML TypewriterCJOJPJQJ^JaJBOB bodydddB*CJOJQJBOB body1dCJOJQJaJo(ph4B@"4 Body Text$a$>(    " n o    yz<=qyy bv^  z{@A~     % & ' ^ _ !!d!!!! " ""=">"I"n"o"y"""" #I######$N$O$T$h${$|$$$$$$%G%H%X%%%%%%&&&&K&L&\&%'&'A'B'J(K(s)t)**E,F,O,X, -4-;.<.x/y/E0F0V0_0223242H2I2334 4445546A66666667778899999 : :::::*<+<:<;<==#=$=:=M=b=o=p=====>/>K>a>q>r>s>t>u>v>w>x>y>z>{>|>}>~>>>>>>>>>>>y0y0y0y0y0y0y0y0y0y0y0y0y0y0y0y0y0y000000000000000000000 0 0 0 0 0 0 0 0 0 0 0 0 000000000(000000000000 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 00000 0 0 0 0000 0 0 0 0 0 0 0 0 00000000 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000I+F$5''''''((%(=*n**N,{,,G--.s1<*DuFF%'()*+,-./012346789:;<=>?F&>Ug $ ,2a#h#&(&// 4t4516i6m666y7788 > >>33333333333333333>Z  I kHM$ Px*  - 'er3 ~F jFG< USL X rd Yv R)x "@[z  hh^h`OJQJo( hh^h`OJQJo( hh^h`OJQJo( hh^h`OJQJo( hh^h`OJQJo( hh^h`OJQJo( hh^h`OJQJo(hh^h`CJOJQJo("  hh^h`OJQJo( hh^h`OJQJo( hh^h`OJQJo( hh^h`OJQJo( hh^h`OJQJo( hh^h`OJQJo(jFGPx*rdIR)xYvUSLX -"@[zkHM$Z ~F'er3'G}A~     % & " ""=">"I"n"o"y"""###$N$O$T$h${$|$$$$$$%G%H%X%%%%%%&&>} "Y#@ ]>`@UnknownG: Times New Roman5Symbol3& : Arial;Wingdings?5 z Courier New7&  Verdana"hSƅS+xFU 35qU 35q$24di>i>2HP(?'2NetOS for CIFS Jim Garvey Jim GarveyD         Oh+'0   @ L X dpxNetOS for CIFS Jim GarveyNormal Jim Garvey2Microsoft Office Word@^в@̦[@f(NK@f(NKU 35՜.+,0 hp  Auspex Systems Inc.qi> NetOS for CIFS Title  !"#$%&'()*+,-./0123456789:;<=>?@BCDEFGHJKLMNOPQRSTUVWXYZ[\]^_`abcefghijkmnopqrsvRoot Entry F7^KxData A1TableI5WordDocument*SummaryInformation(dDocumentSummaryInformation8lCompObjq  FMicrosoft Office Word Document MSWordDocWord.Document.89qRoot Entry FP9Q}Data A1TableI5WordDocument*  !"#$%&'()*+,-./0123456789:;<=>?@BCDEFGHJKLMNOPQRSTUVWXYZ[\]^_`abcefghijk|SummaryInformation(dDocumentSummaryInformation8CompObjq  FMicrosoft Office Word Document MSWordDocWord.Document.89q՜.+,D՜.+,L hp  Auspex Systems Inc.qi> NetOS for CIFS Title4 $,