Professional Documents
Culture Documents
Contents
Contents
Contents
Chapter 1
Contents
Chapter 7
Appendix A
Contents
Appendix C
Figures
Figure 1.
Figure 2.
Figure 3.
Figure 4.
Figure 5.
Figure 6.
Figure 7.
Figure 8.
Figure 9.
Figure 10.
Figure 11.
Figure 12.
Figure 13.
Figure 14.
Figure 15.
Figure 16.
Figure 17.
Figure 18.
Figure 19.
Figure 20.
Figure 21.
Figure 22.
Figure 23.
Figure 24.
Figure 25.
Figure 26.
Figure 27.
Figure 28.
Figure 29.
Figure 30.
Figure 31.
Figure 32.
Figure 33.
Figure 34.
Figure 35.
Figure 36.
Figure 37.
Figure 38.
Figure 39.
Figures
Figure 40.
Figure 41.
Figure 42.
Figure 43.
Figure 44.
Figure 45.
Figure 46.
Figure 47.
Figure 48.
Figure 49.
Figure 50.
Figure 51.
Figure 52.
Figure 53.
Figure 54.
Figure 55.
Figure 56.
Figure 57.
Figure 58.
Figure 59.
Figure 60.
Figure 61.
Figure 62.
Figure 63.
Figure 64.
Figure 65.
Figure 66.
Figure 67.
Figure 68.
Figure 69.
Figure 70.
Figure 71.
Figure 72.
Figure 73.
Figure 74.
Figure 75.
Figure 76.
Figure 77.
Figure 78.
Figure 79.
Figure 80.
Figure 81.
Figure 82.
Figure 83.
Figure 84.
Figure 85.
Figure 86.
Figure 87.
Figure 88.
Figure 89.
Figure 90.
Figures
Figure 91.
Figure 92.
Figure 93.
Figure 94.
Figure 95.
Figure 96.
Figure 97.
Figure 98.
Figure 99.
Figure 100.
Figure 101.
Figure 102.
Figure 103.
Figure 104.
Figure 105.
Figures
10
Tables
Table 1.
Table 2.
Table 3.
Table 4.
Table 5.
Table 6.
Table 7.
Table 8.
Table 9.
Table 10.
Table 11.
Table 12.
11
Tables
12
13
Third-party documents
The following articles are available on the Microsoft TechNet website
(http://technet.microsoft.com):
14
Chapter 1
Introduction to the
EMC VNXe Series
15
VNXe Security and Compliance Suite Keeps data safe from changes,
deletions, and malicious activity.
Total Efficiency PackIncludes all five software suites (not available for the
VNX5100 and VNXe series).
Total Value PackIncludes all three protection software suites and the
Security and Compliance Suite (the VNX5100, VNXe3150, and VNXe3100
exclusively support this package).
16
Microsoft Exchange
VMware vStorage Virtual Machine File System (VMFS) and Raw Device
Mapping (RDM) using iSCSI
Shared folders:
Accessibility
The VNXe platform provides consolidated access to stored data from multiple hosts,
users, and applications by using existing IP network connectivity and industrystandard protocols, including CIFS, NFS, and iSCSI.
Ease of management
A simple-to-use, web-based user interface controls the VNXe platform operations,
including tools to manage, monitor, and configure storage and system settings.
17
Security
Secure system management is provided through HTTPS communication, manageable
system accounts and authentication, and user roles. Secure access to VNXe storage
resources is provided through Challenge-Handshake Authentication Protocol (CHAP)
for iSCSI storage and compliance with NFS and CIFS access controls for storage
resource security.
Antivirus support
VNXe supports VEE Common Anti-Virus Agent (CAVA). CAVA is a component of the
VNX Event Enabler (VEE) 4.5.1, which is part of the Security and Compliance Suite.
CAVA provides an antivirus solution to clients using the VNXe platform. CAVA uses
third-party antivirus software to identify and eliminate known viruses before they
infect files on the VNXe platform.
File-level retention
The VNXe File-Level Retention (FLR) feature provides a way to set file-based
permissions to limit write access to the files for a specific period of time. FLR can
ensure the integrity of data during that period by creating an unalterable set of files
and directories. On VNXe, the FLR feature can be enabled for shared folders and
VMware NFS data stores. FLR for VNXe is available as part of the Security and
Compliance Suite.
Active-active clustering
The VNXe platform has two identical storage processors in the hardware chassis.
During normal operation, both storage processors are active and serve data. This is
an example of an active-active configuration. If one storage processor fails during
normal operation, the other storage processor will take over the work assigned to
both the storage processors until the failed storage processor is active. Although the
data is available to users at all times, this may impact the overall performance of the
system.
Note
There is a single storage processor variant of the EMC VNXe3100 and VNXe
3150, which is unable to perform active-active clustering.
18
19
Table 1 lists the three storage pools that are available by default on VNXe platforms
and it also describes their characteristics.
Table 1.
Pool name
Disk type
RAID type
Available
capacities
High performance
SAS
RAID 10 (3+3)
300 GB
600 GB
Balanced performance
/Capacity
SAS
300 GB
300 GB
600 GB
Capacity pool
NL-SAS
RAID 6 (4+2)
1 TB
2 TB
Figure 1.
The dashboard not only displays the usable capacity of the array in terms of the
applications using it; it also provides wizard-driven mechanisms to create additional
application storage using best practices. This guide focuses on provisioning for
Microsoft Exchange.
20
2.
3.
4.
Connect the host to the provisioned storage (Chapter 6 Exchange Host Server
Connectivity Configuration)
The first two steps are independent and can be performed in any order. The third step
requires the first two steps to be completed.
21
22
Chapter 2
Microsoft Exchange
Planning on VNXe
23
24
Array-based snapshots
The EMC VNXe series can provide point-in-time snapshots of Exchange data. The
snapshots enable you to immediately recover to the point in time when the snapshot
was created. Snapshots are commonly used to provide an application-consistent
image for backup tools or serve as a primary recovery mechanism.
When planning for snapshots, it is important to understand how to ensure that
sufficient capacity is available to protect the data. Appendix C iSCSI Snapshot Sizing
provides more information about snapshots.
EMC Replication Manager provides the user interface for array-based iSCSI snapshot
and replication technology on EMC VNXe. The operation of this feature is outside of
the scope of this document.
Exchange replication
Exchange also provides native replication mechanisms such as a Database
Availability Groups (DAG) in Microsoft Exchange 2010. An Exchange DAG
configuration provides multiple copies of data across one or more sites that can be
brought online quickly when needed. The VNXe provisioning wizard provides an
option to select DAG replication, and apply the best practices that are specific to a
DAG configuration.
If you plan to implement a DAG configuration, read the appropriate Microsoft
planning guides, and use the DAG option in the provisioning wizard.
Note
25
26
Chapter 3
Physical Storage
Allocation on VNXe:
Storage Pools
27
2.
Figure 2.
Figure 3.
28
b.
Note
Figure 4.
29
5.
Click Next. The Specify Pool Name window appears (Figure 5).
6.
b.
In the Description field, optionally type a description for the storage pool.
Figure 5.
30
7.
Click Next. The Select Storage Type window appears (Figure 6).
8.
Figure 6.
9.
Click Next. The Select Amount of Storage window appears (Figure 7).
For the following step, it is crucial to understand the balance between number
of users, maximum mailbox size, and snapshots.
10. Select the amount of storage to use for the storage pool:
31
Figure 7.
Separate dropdown lists appear for 300 and 600 or 900 gigabyte
drives.
Note
32
Figure 8.
Summary
33
12. Verify the information is correct, and then click Finish. The Results window
appears (Figure 9).
Figure 9.
Results
13. Verify the Disk Configuration Wizard completed successfully, and then click
Close.
34
Chapter 4
VNXe Connectivity
Configuration
35
Create iSCSI target: Configure the VNXe storage processor network interfaces
to accept connections from the Exchange host.
Create host entry: Identify the intended Exchange hosts to the VNXe.
2.
Figure 10.
36
Figure 11.
b.
In the Server Name field, type a name specific to this iSCSI server.
Note
c.
Note
d.
e.
f.
In the Storage Processor list box, select the storage processor for the
iSCSI server.
Ensure consideration is given to current and expected processor loads.
g.
37
h.
ii.
Note
Figure 12.
38
6.
7.
Figure 13.
Verify the iSCSI server was created successfully, and then click Close.
Figure 14.
Results
39
Select the new server, and then click Details to begin steps for adding a
redundant network interface.
The iSCSI Server Details window appears (Figure 15).
10. Click Add Network Interface (red arrow) to expose the fields to enter
secondary network information:
a.
b.
c.
d.
In the Ethernet Port list box, select an Ethernet port that is different from
the one selected in step 5.g on page 37.
e.
f.
i.
ii.
Figure 15.
40
Figure 16.
The process for configuring the Exchange server to access the VNXe storage is
covered in Chapter 6 Exchange Host Server Connectivity Configuration.
2.
Figure 17.
41
Click Create Host. The Specify Name window appears (Figure 19).
Figure 18.
4.
Hosts window
On the Specify Name window, type a name and description for the host
configuration:
a.
b.
Figure 19.
5.
6.
42
Figure 20.
7.
8.
b.
Note
Figure 21.
9.
If you are using VLANs to isolate traffic, specify the interface that is
visible from the VNXe platform.
In this example, the public (login) IP is used. The IP identifies the host
to the VNXe; dedicated addresses will be configured on the host for
actual iSCSI connectivity.
43
In the IQN field, type the host IQN. To obtain the IQN:
i.
ii.
Type iSCSI Initiator in the Start > Search programs and files field.
In the CHAP Secret field, type the password (12 to 16) characters if CHAP
is configured.
In the Confirm CHAP Secret field, re-type the CHAP password.
Note
Figure 22.
iSCSI Access
44
Figure 23.
Summary
45
13. Verify the host configuration was successful, and then click Close.
Figure 24.
46
Results
Chapter 5
Exchange Storage
Provisioning
47
2.
Figure 25.
Unisphere Dashboard
Figure 26.
3.
48
4.
In the Name field, type a name for the Exchange storage resource.
b.
Figure 27.
5.
Click Next. The Select Exchange Version window appears (Figure 28).
6.
b.
Figure 28.
Note
Note
49
7.
Click Next. The Specify Storage Configuration window appears (Figure 29).
8.
b.
In the At Average Mailbox Size field, type the average size of the
mailboxes, and select a unit of measure from the list box to the right
Note It is important that the number of users / mailbox size combination
used to create that allocation is used here as Exchange is
provisioned on that storage pool. Review the recommendations
for the number and size of the mailboxes in Appendix B Storage
Pool Overview and Recommendations.
c.
50
Note
Note
Note
Note
Figure 29.
Figure 30.
51
Figure 31.
9.
Click Next. The Configure Storage Pool window appears (Figure 32). This
window displays the recommended storage pool configuration.
ii.
Note
Note
52
If required, select the Thin: Enabled option to provision storage ondemand for the Exchange resource. In this mode, the array creates all
the proper objects to support the required users and their full
allocated space. However, only a small amount of that space is
actually consumed. This option is not recommended for Exchange.
Figure 32.
11. Click Next. The Configure Host Access window appears (Figure 33). This
window displays a list of the currently configured hosts.
12. Specify the host access for this deployment:
In the Access list box for the Exchange host, select Virtual Disks.
Note
Figure 33.
The Virtual Disks and Snapshots option in the Access list box is
covered later in this document.
53
13. Click Next. The Configure Protection window appears (Figure 34).
Optionally, configure snapshots for the Exchange storage. Snapshots allow
the array to maintain a point-in-time view of the storage. This is very useful for
various recovery options. The mailbox sizing guidance explained earlier does
not account for snapshots. If snapshots are desired in the environment, the
pool creation step accounts for the space required.
Note
b.
Figure 34.
54
Figure 35.
55
56
Chapter 6
57
2.
3.
Two network connections on the Exchange host (in addition to the public user
login connection) are dedicated to iSCSI connectivity.
Note
Note
58
1.
2.
Start Server Manager and then click View Network Connections (Figure 36).
Figure 36.
Figure 37.
The Local Area Connection Properties dialog box opens (Figure 38).
4.
b.
c.
Click Properties.
59
Figure 38.
60
b.
c.
d.
e.
f.
Click OK.
Figure 39.
If a private subnet (differing from the public user login subnet) is used for iSCSI
connectivity, a warning dialog box will appear concerning multiple default
gateways. Click Yes to accept and return to the Local Area Connection
properties dialog box.
6.
7.
61
When accessing the iSCSI initiator for the first time, a popup will
appear noting that the service must be started. Click Yes to start the
service.
Figure 40.
In the IP address or DNS name field, type one of the IP addresses of the
VNXe iSCSI server configured in Chapter 4.
b.
Click OK.
A popup will appear if the iSCSI initiator is unable to reach its intended target.
Although the wizard will add the intended target to the Target portals list, it is
recommended that the issue be resolved before continuing. Troubleshooting
failed network connections is beyond the scope of this guide.
62
Figure 41.
4.
On the Discovery tab of the iSCSI Initiator Properties dialog box, verify the
following information (Figure 42):
a.
The Address column displays the address entered for the iSCSI Target in
step 3.a.
b.
c.
Figure 42.
5.
Click the Targets tab, select the VNXe target in the Discovered targets pane
and then click Connect (Figure 43).
63
Figure 43.
Connect to a target
Click Advanced.
Figure 44.
64
b.
In the Initiator IP list box, select the IP address configured for Local Area
Connection 2.
c.
In the Target portal IP list box, select one of the two IP addresses
configured for the iSCSI server in Chapter 4 VNXe Connectivity
Configuration.
Figure 45.
8.
9.
Open the iSCSI Initiator Properties dialog box from the Start menu, or
continue from Step 9.
65
2.
On the Targets tab, select the VNXE target in the Discover targets pane
(Figure 43) and verify the status is Connected.
3.
Click Properties.
The Properties dialog box appears (Figure 46).
4.
b.
Click MCS.
Figure 46.
iSCSI target
The Multiple Connected Session (MCS) dialog box appears (Figure 47).
5.
66
Click Add.
Figure 47.
Click Advanced.
Figure 48.
In the Initiator IP list box, select the second ISCSI initiator IP, typically
bound to Local Area Connection 3.
b.
In the Target portal IP list box, select the second IP configured on the
iSCSI server in Chapter 4 VNXe Connectivity Configuration.
67
8.
c.
Verify Data digest, Header digest, and Enable CHAP logon are not
selected.
d.
Click Connect on the Add Connection dialog box to establish the connection
and return to the Multiple Connected Session (MCS) dialog box.
Figure 49.
68
Figure 50.
9.
Volume configuration
After the iSCSI connection with the VNXe target is established, the VNXe storage
appears to the Windows host as two or more new, uninitialized disks. This section
explains the procedures to create and configure volumes on the new disks,
completing the Exchange deployment setup.
69
From the Start menu, select Administrative Tools > Open iSCSI Initiator.
Click Devices.
Verify the number of disks and the disk names are correct, and then click OK.
Figure 51.
3.
4.
5.
70
Figure 52.
6.
Disk management
Right-click the first uninitialized disk, then click Online (Figure 53).
Repeat this for all offline disks.
Figure 53.
7.
Once the disks are online, right-click one and select Initialize Disk.
71
b.
c.
Click OK.
Figure 54.
9.
Right-click the online raw disk, and select New Simple Volume (Figure 55).
Figure 55.
72
Figure 56.
10. Click Next. The Specify Volume Size window appears (Figure 57).
11. Verify the simple volume size matches the maximum disk space, and then
click Next.
Figure 57.
NTFS mount can also be used. In this case, mount a local drive to an
empty folder on an NTFS volume by using a drive path instead of a
drive letter.
73
Figure 58.
b.
c.
d.
e.
Figure 59.
74
14. Click Next. The Completing the New Simple Volume Wizard window appears
(Figure 60).
Figure 60.
75
76
Chapter 7
Management of
Exchange on VNXe
77
2.
Figure 61.
Click Configure Disks to open the Disk Configuration Wizard (Figure 62).
Figure 62.
78
b.
In the Select Pool list box, select the storage pool where the disks will be
added.
Figure 63.
4.
Click Next. The Select Amount of Storage window appears (Figure 64).
Note
Figure 64.
79
5.
Figure 65.
6.
80
Summary window
Figure 66.
7.
Results window
81
Figure 67.
Note
The VNXe storage arrays provide a simple dashboard interface to examine the health
of the system. This section describes some of the features.
Figure 68.
82
Figure 69.
These graphs help administrators identify and understand trends and patterns in
capacity needs in advance so there is sufficient time to plan for the future. Examine
these graphs periodically to observe trends, and conduct resource planning.
If more than one DAE is present, all DAEs appear in the carousel. To display
information about a particular system component, click one of the following:
83
If the component is faulted or has any issue, a pop-up window appears with
descriptive information.
Figure 70.
System health
84
Figure 71.
System performance
Select System > System Performance.
The System Performance window displays array activity over time (Figure 72). Click
Timeframe in any pane and adjust the slider to change the 24 hour default timeframe.
Figure 72.
85
Alerts
Select System > System Alerts.
The System Alerts window (Figure 73) displays the alerts reported by the VNXe.
Select an alert to view the details and severity in the Alert Information pane.
Figure 73.
86
Alert severity
System logs
Select System > Logs.
The Logs window displays the logs saved in the system (Figure 74). Login attempts
promoted to alerts are also listed.
Figure 74.
System logs
Logging standards
87
Support
The VNXe interface has integrated support features. Select the help options directly
from the user interface (Figure 75).
Figure 75.
Support options
VNXe online documentation is accessible from the array interface. Use this interface
to attend online training sessions, participate in the VNXe community, and search for
EMC Support.
88
Appendix A
89
2.
Figure 76.
Click Configure Disks to open the Disk Configuration Wizard (Figure 77).
Figure 77.
90
b.
In the Select pool list box, select Hot Spare Pool box
Figure 78.
5.
Click Next. The Configure Spares window appears. This window shows all
types of drives in the system (Figure 79).
6.
Select the number of hot spares to configure from each list box. The
recommended number of hot spares is indicated with an asterisk.
91
Figure 79.
92
7.
8.
Figure 80.
93
9.
Figure 81.
94
Results window
Appendix B
Storage Pool
Overview and
Recommendations
95
Storage profile
(storage pool type)
Disk type
(available sizes)
Balanced
Perf/Capacity
(Performance Pool)
SAS
4+1 RAID 5 (VNXe3100)
(300, 600, 900 GB) 4+1 RAID 5 (VNXe3150)
6+1 RAID 5 (VNXe3150
and VNXe3300)
5 (VNXe3100)
5 (VNXe3150)
7 (VNXe3150 and
VNXe3300)
High Performance
(Custom Pool)
SAS
3+3 RAID 1/0
(300, 600, 900 GB)
High Capacity
(Capacity)
NL-SAS
(1, 2 TB)
RAID configuration
4+2 RAID 6
Disks assigned in
multiples of
The recommendations do not include space for snapshots. Appendix C iSCSI Snapshot
Sizing provides additional information for snapshot planning.
2
The usable space on a given disk will be less than its raw capacity. Usable space in a
storage pool can be affected by factors beyond the scope of this guide, so planning should be
based on space reported by the VNXe as opposed to manual calculations.
96
The tables do not allow space for snapshots. If snapshots are desired,
Appendix C iSCSI Snapshot Sizing provides more information.
Users
300 GB
Disks
350
1 GB
2 GB
400
937 MB
1.875 GB
450
800 MB
1.6 GB
500
750 MB
1.5 GB
650
625 MB
1.25 GB
750
500 MB
1 GB
900
400 MB
800 MB
1,000
375 MB
750 MB
600 GB Disks
Users
300 GB
Disks
600 GB Disks
300
1.25 GB
2.5 GB
350
1 GB
2 GB
400
875 MB
1.75 GB
500
750 MB
1.5 GB
600
750 MB
1.5 GB
800
625 MB
1.25 GB
1,000
375 MB
750 MB
97
Users
300 GB
Disks
600 GB Disks
900 GB Disks
300
1.67 GB
3.33 GB
5.00 GB
350
1.43 GB
2.86 GB
4.29 GB
400
1.25 GB
2.50 GB
3.75 GB
500
1.00 GB
2.00 GB
3.00 GB
600
0.83 GB
1.67 GB
2.50 GB
800
0.62 GB
1.25 GB
1.86 GB
1,000
0.50 GB
1.00 GB
1.50 GB
1250
0.40GB
0.80 GB
1.20 GB
1500
0.33 GB
0.67 GB
1.00 GB
Users
300 GB
Disks
600 GB Disks
500
750 MB
1.5 GB
750
500 MB
1 GB
1000
375 MB
750 MB
1500
250 MB
500 MB
2000
375 MB
750 MB
3000
250 MB
500 MB
98
Users*
500
750 MB
1.5 GB
500
1.625 GB
3.25 GB
750
1 GB
2 GB
1,000
750 MB
1.5 GB
1,250
625 MB
1.25 GB
1,500
500 MB
1 GB
2,000
750 MB
1.5 GB
3,000
500 MB
1 GB
* To support the highest two tiers, select 14 disks in step 4 of the Disk Configuration
Wizard.
99
Deployment Guide
Appendix C
iSCSI Snapshot
Sizing
101
Snapshot overview
A snapshot is a point-in-time view of an iSCSI data store. It is a foundation element of
data recovery in the event of data corruption or system failure. For planning purposes,
snapshots require the same amount of space as currently used by the data store plus
additional space for new or changed data. The amount of storage pool space
occupied by the iSCSI data store and snapshot depends on how much data changes
from the time when the oldest snapshot is taken.
It can be difficult to determine the space required for a snapshot. The VNXe snapshot
provisioning wizard recommends a reasonable protection size suitable for a wide
variety of situations.
Note
While the VNXe application-driven wizards help allocate space for snapshots,
the actual capability to take and schedule snapshots is provided by
additional software.
The size of the LUN. For a 100 GB LUN, the minimum pool size starts at 100
GB.
For the first snapshot, provision enough space to ensure that the system
stays stable and the data is protected even in a worst-case scenario. For
example, if every single block of data in the LUN is changed while the
snapshots are active, the pool requirement is doubled, that is, 200 GB.
Deployment Guide
The VNXe platform uses the same underlying technology as the EMC
Celerra product family. For a complete discussion of sizing
considerations in a wide variety of use cases, The Sizing
103
Deployment Guide
Appendix D
105
2.
3.
In step 5b, select the Manually create a new pool radio button and Shared
folders Backup for the application.
2.
In step 7, select the highest-rated disk type with sufficient maximum capacity.
2.
Click the Settings tab, and then click Shared Folder Server Settings
(Figure 82).
Deployment Guide
Figure 82.
The Shared Folder Server Settings dialog box appears (Figure 83).
Figure 83.
3.
4.
Specify naming and connectivity information for the shared folder server:
a.
In the Server Name field, type a name for the shared folder server.
b.
In the IP Address field, type the IP address for the new share.
c.
In the Subnet Mask field, type the subnet mask for the new share.
d.
In the Gateway field, type the gateway for the new share.
107
e.
Note
ii.
iii. If VLAN tagging is in use, click the click to edit, and in the VLAN ID
list box, specify a VLAN ID for the new share.
Figure 84.
Deployment Guide
5.
Click Next. The Shared Folder Types window appears (Figure 85).
6.
To select the services for the shared folder server, complete the following
steps:
a.
You can use both the NFS and CIFS protocols to access shared
folders on the VNXe platform. For Exchange, only CIFS is required.
b.
c.
d.
Click Add.
The IP address appears in the DNS Servers field.
e.
In the User Name field, type a user ID with domain administrator rights in
the target domain.
f.
Figure 85.
7.
8.
109
Figure 86.
9.
Server Summary
Figure 87.
Results window
Deployment Guide
The shared folder server appears in the Shared Folder Server Settings page.
2.
Click the Storage tab, and then click Shared Folders (Figure 88).
Figure 88.
Figure 89.
3.
Click Create. The Specify Shared Folder Name window appears (Figure 90).
111
4.
Note
b.
Figure 90.
5.
Click Next. The Configure Shared Folder Storage window appears (Figure 91).
6.
Select the storage pool created in the first section of this chapter.
b.
In the Size field, type a size for the shared folder, and select the unit of
capacity from the list box to the right.
c.
Deployment Guide
Figure 91.
7.
8.
b.
Note
Note
113
Note
Figure 92.
9.
Opportunistic file locks (OpLocks) allow CIFS clients to buffer file data
locally before sending it to a server. CIFS clients can work with files
locally and periodically communicate changes to the VNXe platform
rather than communicate every operation over the network to the
VNXe platform. OpLocks is selected in the wizard by default for
Windows (CIFS) shared folders. Unless the application handles critical
data or has specific requirements that make this mode or operation
unfeasible, EMC recommends selecting OpLocks.
Click Next. The Configure Windows Share window appears (Figure 93).
Deployment Guide
Figure 93.
11. Click Next. The Configure Protection window appears (Figure 94).
12. Specify the protection storage size:
Note
115
Figure 94.
Figure 95.
Summary
Deployment Guide
Figure 96.
Results
15. Verify success of folder and share creation and then click Close.
The share is now ready for use.
117
Deployment Guide
Appendix E
119
2.
3.
Under Customize This Server, click the Add Features link to open the Add
Features Wizard.
4.
In the Select Features dialog box of the wizard, locate and expand the
Windows Server Backup Features feature:
a.
b.
Click Next.
5.
On the Confirm Installation Selections dialog box, confirm choices and then
click Install.
6.
7.
Click Start > Administrative Tools > Windows Server Backup. The Windows
Server Backup window appears (Figure 97).
Deployment Guide
Figure 97.
2.
Click Action > Backup Once. The Backup Once Wizard appears (Figure 98).
Note
Figure 98.
3.
Click Next. The Select Backup Configuration screen appears (Figure 99).
121
4.
Figure 99.
5.
Click Next. The Select Items for Backup window appears (Figure 100).
6.
Deployment Guide
7.
For Exchange backup, select only the data and log drives that are part
of the Exchange installation. Do not select any non-Exchange drives.
Follow Exchange best practices by unmounting the Exchange
databases before backing them up
9.
123
In the Type the path to the remote shared folder field, enter the path to
the remote shared folder created in Appendix D CIFS Shared Folder
Configuration (Export Path in the Summary screen as shown in Figure
95).
b.
In the Access Control area, select Inherit or Do not Inherit based on the
security needs of the environment.
Deployment Guide
125
Deployment Guide
Appendix F
System Comparison
and Limits
127
Component
VNXe3100
VNXe3150
VNXe3300
System memory
(per storage
processor)
4 GB
4 (single SP)
12 GB
Connectivity
options
12 x 1 GbE
8 (dual SP)
6 x 1 GbE(single SP)
16 x 1 GbE
2x 10 GBaseT(single
SP)
8 x 1 GbE and 4 x 10
GbE
12 x 1 GbE(dual SP)
4x 10 GBaseT(single
SP)
48 (single SP)
50 (single SP)
96 (dual SP)
Allowed drive
types
100 GB Flash
100 GB Flash
200 GB Falsh
200 GB Falsh
1 TB NL-SAS
2TB NL-SAS
1 TB NL-SAS
1 TB NL-SAS
2 TB NL-SAS
2 TB NL-SAS
3TB SAS
3TB SAS
Deployment Guide
150
Maximum
number of disks
Parameter
Limit
Hosts connected
500
2,000
Virtual disks
256
96
Shared folders
500
1.999 TB
15.533 TB
Open files
200,000
Concurrent connections
20,000
129