Академический Документы
Профессиональный Документы
Культура Документы
MK-92HNAS004-0
ii
Notice
Hitachi Data Systems products and services can be ordered only under the terms and conditions of
Hitachi Data Systems applicable agreements. The use of Hitachi Data Systems products is governed
by the terms of your agreements with Hitachi Data Systems.
This product includes software developed by the OpenSSL Project for use in the OpenSSL Toolkit
(http://www.openssl.org/). Some parts of ADC use open source code from Network Appliance, Inc.
and Traakan, Inc.
Part of the software embedded in this product is gSOAP software. Portions created by gSOAP are
copyright 2001-2009 Robert A. Van Engelen, Genivia Inc. All rights reserved. The software in this
product was in part provided by Genivia Inc. and any express or implied warranties, including, but
not limited to, the implied warranties of merchantability and fitness for a particular purpose are
disclaimed. In no event shall the author be liable for any direct, indirect, incidental, special,
exemplary, or consequential damages (including, but not limited to, procurement of substitute
goods or services; loss of use, data, or profits; or business interruption) however caused and on any
theory of liability, whether in contract, strict liability, or tort (including negligence or otherwise)
arising in any way out of the use of this software, even if advised of the possibility of such damage.
The product described in this guide may be protected by one or more U.S. patents, foreign patents,
or pending applications.
iii
Date
Description
MK-92HNAS004-00
August 2012
First publication
MK-92HNAS004-01
June 2013
Contact
Hitachi Data Systems
2845 Lafayette Street
Santa Clara, California 95050-2627
https://portal.hds.com
iv
| TOC | 5
Contents
About this document........................................................................................................................7
Related documentation..........................................................................................................................................7
6 | TOC |
Related documentation
System Access Guide (MK-92HNAS014)In PDF format, this guide explains how to log in to the system,
provides information about accessing the NAS server/cluster CLI and the SMU CLI, and provides information
about the documentation, help, and search capabilities available in the system.
Server and Cluster Administration Guide (MK-92HNAS010)In PDF format, this guide provides information
about administering servers, clusters, and server farms. Includes information about licensing, name spaces,
upgrading firmware, monitoring servers and clusters, the backing up and restoring configurations.
Storage System User Administration Guide (MK-92HNAS013)In PDF format, this guide explains user
management, including the different types of system administrator, their roles, and how to create and manage
these users.
Network Administration Guide (MK-92HNAS008)In PDF format, this guide provides information about the
server's network usage, and explains how to configure network interfaces, IP addressing, name and directory
services.
File Services Administration Guide (MK-92HNAS006)In PDF format, this guide explains about file system
formats, and provides information about creating and managing file systems, and enabling and configuring file
services (file service protocols).
Data Migrator Administration Guide (MK-92HNAS005)In PDF format, this guide provides information about
the Data Migrator feature, including how to set up migration policies and schedules.
Storage Subsystem Administration Guide (MK-92HNAS012)In PDF format, this guide provides information
about managing the supported storage subsystems (RAID arrays) attached to the server/cluster. Includes
information about tiered storage, storage pools, system drives (SDs), SD groups, and other storage device related
configuration and management features and functions.
Snapshot Administration Guide (MK-92HNAS011)In PDF format, this guide provides information about
configuring the server to take and manage snapshots.
Replication and Disaster Recovery Administration Guide (MK-92HNAS009)In PDF format, this guide provides
information about replicating data using file-based replication and object-based replication, provides information
on setting up replication policies and schedules, and using replication features for disaster recovery purposes.
Antivirus Administration Guide (MK-92HNAS004)In PDF format, this guide describes the supported antivirus
engines, provides information about how to enable them, and how to configure the system to use them.
Backup Administration Guide (MK-92HNAS007)In PDF format, this guide provides information about
configuring the server to work with NDMP, and making and managing NDMP backups. Also includes information
about Hitachi NAS Synchronous Image Backup.
Command Line ReferenceDescribes how to administer the system by entering commands at a command prompt.
Hitachi NAS Platform 3080 and 3090 G1 Hardware Reference (MK-92HNAS016)Provides an overview of the
second-generation server hardware, describes how to resolve any problems, and replace potentially faulty
components.
Hitachi NAS Platform 3080 and 3090 G2 Hardware Reference (MK-92HNAS017)Provides an overview of the
first-generation server hardware, describes how to resolve any problems, and replace potentially faulty
components.
Hitachi NAS Platform Series 4000 Hardware Reference (MK-92HNAS030)Provides an overview of the Hitachi
NAS Platform Series 4000 server hardware, describes how to resolve any problems, and replace potentially faulty
components.
Release notesProvides the most up-to-date information about the system, including new feature summaries,
upgrade instructions, and fixed and known defects.
Note: For a complete list of Hitachi NAS open source software copyrights and licenses, see the System Access
Guide.
Chapter
1
About virus scanning
Topics:
The storage server architecture reduces the effect of a virus because the file
system is hardware-based. This prevents viruses from attaching themselves to
(or deleting) system files required for server operation. However, viruses can
still propagate and infect user data files that are stored on the server.
Therefore, Hitachi Data Systems works with industry leading antivirus (AV)
software vendors to ensure that the server integrates into an organizations
existing AV solutions and without requiring special installations of AV
software and servers. To reduce the effect that a virus may have on user data,
Hitachi Data Systems Support Center recommends that AV be configured for
the server and that AV software run on all user workstations.
You can configure multiple Virus Scan Engines to enhance both the performance and to maintain high-availability of
the server. If a Virus Scan Engine fails during a virus scan, the storage server automatically redirects the scan to
another Virus Scan Engine.
The server maintains a list of file types, the Inclusion List, that allows the administrator to control which files are
scanned (for example, .exe, .dll, .doc, and so forth). The default Inclusion List includes most file types commonly
affected by viruses.
Caution: When virus scanning is enabled, the server must receive notification from a Virus Scan Engine that
a file is clean before allowing access to the file. As a result, if virus scanning is enabled and there are no Virus
Scan Engines available to service the virus scans, CIFS clients may experience a temporary loss of data
access. To ensure maximum accessibility of data, configure multiple Virus Scan Engines to service each EVS
on which virus scanning has been enabled.
If virus scanning is temporarily disabled, files continue to be marked as needing to be scanned. In this way, if virus
scanning is re-enabled, files that were changed are re-scanned the next time they are accessed by a CIFS client.
Virus Scanning statistics for the storage server (in 10-second time slices) are available for activity since the previous
reboot or since the point when statistics were last reset.
Note: When a virus is detected, a severe event is placed in the Event Log, identifying the path of the infected
file and the IP address of the infected machine. For information on accessing the event log, see the Server and
Cluster Administration Guide.
Field/Item
Description
EVS
Displays the EVS to which this page applies. Click change to select a
different EVS.
Mode
Virus Scanning
Scans all file types, regardless of those defined in the File type to scan list.
Field/Item
Description
Scans specific file types, and ensure that the list of file types contains the
appropriate file extensions. The default list includes most files commonly
affected by viruses. To add a file type to scan, enter the file extension in the
field, and click Add. To delete a file type from the list, select the file type,
and click X. To revert to the original list of files to scan, select restore
defaults.
Note: When you choose to limit the scan to specific file types, only
the file types you include in the list are scanned; file types not listed
are not scanned.
apply
Lists the virus scan engines configured for the current EVS.
Actions
Scans every file whether or not it has been scanned since it was last
accessed.
To scan all file types regardless of those in the list, select Scan All File Types. It is advisable to select this
option while compiling your list of file types to scan.
To add a file type to scan, click the Scan Files With Extensions radio button, enter the file extension in the
field below it, then click Add.
To delete a file type, select it from the list, and click the X.
To revert back to the original default list of files types to scan, click restore defaults.
Caution: The default list of file extensions contains the most commonly used file types. Contact your
antivirus software vendor for an up-to-date list of file types that should be included for scanning, and
to modify the your file extension list accordingly. It is your responsibility to choose the file types you
include for scanning. Based on your needs, the antivirus software used, and the recommendations of
the antivirus software manufacturer, choose the file types you want to include in the antivirus
scanning; types not listed will not be scanned.
ACE, ACM, ACV, ACX, ADT, APP, ASD, ASP, ASX, AVB, AX, BAT, BO, BIN, BTM,
CDR, CFM, CHM, CLA, CLASS, CMD, CNV, COM, CPL, CPT, CPY, CSC, CSH, CSS, DAT,
DEV, DL, DLL, DOC, DOT, DVB, DRV, DWG, EML, EXE, FON, GMS, GVB, HLP, HTA,
HTM, HTML, HTT, HTW, HTX, IM, INF, INI, JS, JSE, JTD, LIB, LGP, LNK, MB,
MDB, MHT, MHTM, MHTML, MOD, MPD, MPP, MPT, MRC, MS, MSG, MSO, MP, NWS, OBD,
OBT, OBJ, OBZ, OCX, OFT, OLB, OLE, OTM, OV, PCI, PDB, PDF, PDR, PHP, PIF,
PL, PLG, PM, PNF, PNP, POT, PP, PPA, PPS, PPT, PRC, PWZ, QLB, QPW, REG, RTF,
SBF, SCR, SCT, SH, SHB, SHS, SHT, SHTML, SHW, SIS, SMM, SWF, SYS, TD0, TLB,
TSK, TSP, TT6, VBA, VBE, VBS, VBX, VOM, VS?, VSD, VSS, VST, VWP, VXD, VXE,
WBT, WBK, WIZ, WK?, WML, WPC, WPD, WS?, WSC, WSF, WSH, XL?, XML, XTP, 386
5. If a virus scanner has been disabled for some reason, you can re-enable its usage by filling the check box next to
the name of the disabled virus scanner and clicking the enable button in the Actions area.
6. Verify your settings, and click apply to save.
MK-92HNAS004-01