01 PowerProtect+DD+Concepts+and+Features+-+Participant+Guide
01 PowerProtect+DD+Concepts+and+Features+-+Participant+Guide
CONCEPTS AND
FEATURES
PARTICIPANT GUIDE
PARTICIPANT GUIDE
Internal Use - Confidential
Table of Contents
Appendix ................................................................................................. 49
© Copyright
Internal Use - Confidential 2020 Dell Inc. Page 1
Introduction to PowerProtect DD
Introduction to PowerProtect DD
© Copyright
Internal Use - Confidential 2020 Dell Inc. Page 3
Introduction to PowerProtect DD
7 Tapes are physically transported and stored offsite for archival and disaster
recovery purposes. If there is a negative event in the data center, moving tapes
offsite prevents the loss of backup data.
8Data recovery requires a manual process of transporting the tapes back to the
primary storage device in the data center.
Primary
Storage
Speed
Restore
Process
Capacity Backup
Servers Management
Server
Tape
Cost
Transport
© Copyright
Internal Use - Confidential 2020 Dell Inc. Page 5
Introduction to PowerProtect DD
10 Sends only deduplicated data across the network to reduce bandwidth required
15If clients do not back up directly to the PowerProtect DD appliance using Avamar
or Networker, the backup servers preserve the data on the PowerProtect DD
appliance. Deduplication greatly reduces the data footprint before the data is
backed up. Global compression technology combines an exceptionally efficient
high-performance inline deduplication technology with a local compression
technique. The reduced data footprint allows data to be retained on-site for longer
periods and allows transfer across the network for archival. If regulatory or
corporate policies require tape backups, tape backups can be incorporated into a
PowerProtect DD environment.
© Copyright
Internal Use - Confidential 2020 Dell Inc. Page 7
Introduction to PowerProtect DD
Archive Applications
Servers
Enterprise Applications WA
N
Backup
Management
Server
Current Models
3 5
2 4
DDVE is agile, it is designed for use with VMware, it is exceptionally quick to set up
and run. You can start with a small capacity configuration and scale as large as 96
TB.
2: The DD3300 is a small and robust protection storage platform, ideal for both
SMBs, and branch or departmental data protection for larger enterprises. The
DD3300 with Cloud Tier can back up a logical capacity up to 4.8 PB in the cloud
with extensive API support.
3: The DD6900 offers 1.3 times greater system scale than its predecessors and
can backup up to 288 TB usable capacity. That usable capacity is expanded to up
to 576 TB with Cloud Tier.
© Copyright
Internal Use - Confidential 2020 Dell Inc. Page 9
Introduction to PowerProtect DD
4: The DD9400 has a throughput up to 57 TB per hour and delivers scalability 2.5
times greater than previous generations. It can backup up to 768 TB of usable
capacity, with up to 1.54 PB usable with Cloud Tier.
Expansion Shelves
Listed are the capacities and compatibilities of the options for the expansion
shelves.
1. ES40
2. DS60
The DS60 (Dense Storage) shelf supports 3 TB, 4 TB, or 8 TB SAS drives in
15 drive increments, up to 60 drives per shelf. DS60 supports DD6900,
DD9400, and DD9900 systems. 8 TB SAS drives are only supported on the
DD9400 and DD9900.
3. FS25
The FS25 (Flash Storage) SSD shelf is a solid-state expansion shelf that is
used exclusively for the metadata cache in a PowerProtect DD system. The
FS25 is supported on the DD6900, DD9400, and DD9900. The FS25 is only
supported on the DD6900 and DD9400 in a DD high availability (DD HA)
configuration.
© Copyright
Internal Use - Confidential 2020 Dell Inc. Page 11
Introduction to PowerProtect DD
Hardware Features
Documents for specific hardware models are published on the Dell EMC support
site.
DDVE Evaluation18
18 Dell EMC offers a DDVE evaluation license for a limited 500 GB capacity. The
evaluation license includes DD Boost, Replication, and Encryption with no set
expiration. This license can be replaced with larger capacity licenses if needed – up
to a maximum of 96 TB. Other limited time evaluation licenses are also available.
© Copyright
Internal Use - Confidential 2020 Dell Inc. Page 13
Introduction to PowerProtect DD
DDOS has a wide range of features to protect sensitive data. Most of the features
that are listed are covered in more detail later in the course.
4. BoostFS
19 Features that are supported only on DDVE are the deployment assessment tool,
virtual resource monitoring, and RAID-On-LUN.
20Features that are optimized for use with DDVE are stream counts, MTree counts,
the DD System Manager, IPv4, and IPv6.
21Features that are supported on DDVE include DD Boost, CIFS, NFS, Encryption,
and Replication.
The Cloud Tier feature enables the movement of inactive data from the active
tier to a low-cost and a high-capacity object storage like a public, private, or
hybrid cloud. This mechanism is highly efficient for long-term data retention.
During the process of data movement, only the unique and deduplicated data
is sent from the PowerProtect DD system to the cloud. This process ensures
that the data being sent to the cloud occupies as little space as possible. Using
less space in the cloud results in a lower TCO over time for long-term storage.
6. DD Replicator
7. DD Boost
8. Encryption
Encryption software option encrypts all data on the system using an internally
generated encryption key. Optionally, an external key manager may be used.
9. DD Retention Lock
© Copyright
Internal Use - Confidential 2020 Dell Inc. Page 15
Introduction to PowerProtect DD
If there is a system failure, the DD HA feature lets you configure two protection
systems as an Active-Standby pair, providing redundancy. DD HA keeps the
NVRAM of the active and standby systems synchronized. If the active node
were to fail due to hardware or software issues, the standby node can take
over services and continue where the failing node left off.
Electronic Licensing
Management
System
© Copyright
Internal Use - Confidential 2020 Dell Inc. Page 17
Architecture and Technology Overview
Backup
Management
Administration
Server
Clients
Servers LAN
or
WAN
© Copyright
Internal Use - Confidential 2020 Dell Inc. Page 19
Architecture and Technology Overview
The DDOS has a file system for system and administrative files and another for
storing backup data. System files are stored in the /ddvar directory, and backup
data is stored in an MTree in the /data/col1 folder.
/data
/ddvar
/col1
/core
/backup
/log
/HR
/support
/Sales
/releases
/Support
DDOS Deduplication
2: The stream is divided into variable-length segments, and each is given a unique
ID or fingerprint.
© Copyright
Internal Use - Confidential 2020 Dell Inc. Page 21
Architecture and Technology Overview
3: Filter: Summary vector and segment locality techniques in RAM (inline) are
used to identify 99% of the duplicate segments before storing to disk. If a segment
is a duplicate, it is referenced and discarded. If a segment is new, the data is
grouped and compressed.
© Copyright
Internal Use - Confidential 2020 Dell Inc. Page 23
Architecture and Technology Overview
DIA is an important DDOS technology that provides safe and reliable storage. It
protects data from loss due to hardware and software failures.
DDOS is built to ensure that you can reliably recover your data with confidence. Its
elements consist of an architectural design which provides data invulnerability.
© Copyright
Internal Use - Confidential 2020 Dell Inc. Page 25
DD Operating System Features and Capabilities
DD Boost
Avam NetWork NetBack Backup vRang NetVa Veea VDP Data Greenpl RMA SAP SAP DB2 SQL
Exec Advance Protect HAN
App
Server
Supported over
Dell EMC Avamar and NetWorker support DD Boost over LAN, SAN, and WAN. Other leading
backup and enterprise applications support DD Boost over LAN or SAN.
22 DD Boost is a private protocol that is more efficient than CIFS or NFS. DD Boost
distributes parts of the deduplication process out of the PowerProtect DD system
and into the backup or application server enabling client-side deduplication. DD
Boost can speed backups by up to 50% and enables more efficient resource
utilization, including reducing the impact on the server by 20% to 40%. DD Boost
also reduces the impact on the network by 80% to 99%.
23PowerProtect App Direct provides application owners control and visibility of their
own backups to PowerProtect DD systems using their native utilities.
24DD Boost for backup applications allows the application to control the replication
process with full catalog awareness of both the local and remote copies of the
backup.
Replication
Replication
Destination
Source PowerProtect
PowerProtect DD
DD
© Copyright
Internal Use - Confidential 2020 Dell Inc. Page 27
DD Operating System Features and Capabilities
Cloud Tier
What is Cloud
Tier?
DD Retention
Lock Support
Encryption
with Cloud
Tier
Replication
Support
Supported
Cloud
Providers
BoostFS
What is BoostFS?25
Application Support26
Boost FS Profiler27
26Third-party backup applications can avoid the cost and effort of integration with
the DD Boost APIs by directly accessing the mount points. This method allows the
customers to use the DD Boost feature without integrating their applications with
DD Boost APIs. The third-party applications that are supported in this release are:
CommVault, MySQL, and MongoDB.
© Copyright
Internal Use - Confidential 2020 Dell Inc. Page 29
DD Operating System Features and Capabilities
PowerProtect DD High Availability (DD HA) uses dual Dell EMC PowerProtect DD
nodes that are loosely coupled into a single highly available system. When there
are software or hardware failures on individual nodes, the overall system and its
services remain available to external applications. DD HA reduces (and sometimes
eliminates) down time in the event of a failure.
DD HA uses:
• Dual head units.
• A single set of shared storage.
• Both head units and nodes that are configured in an active/passive setup.
One of the nodes is active and running an instance of DD File System (DDFS)
handling all ingests, restores, replication, and cleaning. The second node is a
standby and in normal operation remains almost idle. If the active node
experiences a fault, such as a DDFS panic, failover occurs automatically, to the
standby node.
© Copyright
Internal Use - Confidential 2020 Dell Inc. Page 31
DD Operating System Features and Capabilities
DD Retention Lock
© Copyright
Internal Use - Confidential 2020 Dell Inc. Page 33
DD Operating System Features and Capabilities
The SMT feature for the DD Operating System allows enterprises and service
providers to deliver data protection-as-a-service.
DD VTL software eliminates the challenges of physical tape storage. DD VTL can
emulate up to 60 or more virtual tape libraries with up to 1080 virtual tape drives,
and unlimited tape cartridges.
Dell EMC has qualified DD VTL with leading open systems and IBM enterprise
backup applications. It integrates without disrupting existing Fibre Channel storage
area network (SAN) backup environments.
Any Dell EMC PowerProtect DD system running VTL protocol can also run other
backup operations simultaneously using NAS, NDMP, and DD Boost protocols.
Using PowerProtect Data Domain Replication software that you can vault virtual
tape cartridges over a wide area network (WAN). Replicate your data to a remote
site for disaster recovery, remote office backup and recovery, or multisite tape
consolidation.
Disk-based network storage provides a shorter RTO by eliminating the need for
handling, loading, and accessing tapes from a remote location.
DD VTL Tape Out to Cloud feature offers the ability to store offsite and retrieve
tapes for long-term retention (LTR) use cases.
© Copyright
Internal Use - Confidential 2020 Dell Inc. Page 35
DD Operating System Features and Capabilities
Data Security
PowerProtect DD systems can keep data secure using data encryption, data
sanitization, and Cyber Recovery solution.
DDOS can be configured for user access to the system for administrative tasks.
Access can be configured to use the FTP, FTPS, HTTP, HTTPS, SSH, SCP, and
Telnet protocols. Only SSH and HTTPS are active by default.
There are six different user access roles in DDOS. To learn more, click each user.
1 2 3 6
4 5
1: The Admin role is used to administer the entire PowerProtect DD system. The
Admin role is designed so you can create and destroy data that is stored on Dell
EMC PowerProtect DD systems. This design does not include any function to
recover data that was removed through the Admin role.
2: Users with the Security role can monitor the system, set up security officer
configurations, and manage other security officer operators.
4: All administrative privileges except the ability to perform data delete operations
are included with the Limited-Admin role. This exception prevents a potentially
malicious administrator from deleting any data from Dell EMC PowerProtect DD
systems.
5: Users assigned the Backup Operator role can monitor Dell EMC PowerProtect
DD systems and create snapshots. Backup Operator role can import and export
tapes to a VTL library, and move tapes within a VTL library.
© Copyright
Internal Use - Confidential 2020 Dell Inc. Page 37
DD Operating System Features and Capabilities
© Copyright
Internal Use - Confidential 2020 Dell Inc. Page 39
DD Operating System Features and Capabilities
Storage Migration
© Copyright
Internal Use - Confidential 2020 Dell Inc. Page 41
DD Operating System Features and Capabilities
29The minimally disruptive upgrade (MDU) feature lets you upgrade specific
software components or apply issue fixes without a system reboot. Only those
services that depend on the component being upgraded are disrupted, so the MDU
feature can prevent significant downtime during certain software upgrades. Not all
software components qualify for a minimally disruptive upgrade; such components
must be upgraded as part of a regular DDOS software upgrade. A DDOS software
upgrade uses a large Red-hat Package Manager (RPM) upgrade bundle, which
performs upgrade actions for all DDOS components. MDU uses smaller component
bundles, which upgrade specific software components individually.
© Copyright
Internal Use - Confidential 2020 Dell Inc. Page 43
PowerProtect DD Management Overview
Direct Access
The initial installation and configuration of the DDOS is done using direct access to
the hardware. Access the system through a serial connection or directly attaching a
keyboard and monitor to the system.
More Support
Remote Access
After the initial configuration is done, you can use the SSH or Telnet (if enabled),
IPMI, or SOL utilities to access the system using remote CLI commands.
© Copyright
Internal Use - Confidential 2020 Dell Inc. Page 45
PowerProtect DD Management Overview
Movie:
System administrators use sophisticated tools like DDSM to configure and manage
Data Domain systems.
What is DDSM?32
You can access the System Manager from many popular web browsers 34.
34 You can use web browsers such as Google Chrome™, and Mozilla Firefox™.
Movie:
Avamar Server
© Copyright
Internal Use - Confidential 2020 Dell Inc. Page 47
Appendix
© Copyright
Internal Use - Confidential 2020 Dell Inc. Page 49
Appendix
Connectivity
Connectivity features include USB ports for connecting a keyboard and mouse, a
VGA port for connecting a monitor, and serial and Ethernet connectivity. Many
systems include mini-SAS ports to connect expansion shelves to increase capacity
and Fibre Channel for SAN connections.
For repairs in the field, access to the command line interface to shut down, restart,
and run diagnostics is usually through the serial port.
6
1 3 4 5 2
5: USB ports - This ports are 9 pins and 3.0 complaint and enable you to connect
USB devices to the system.
© Copyright
Internal Use - Confidential 2020 Dell Inc. Page 51
Appendix
Redundancy
Components under high mechanical or electrical stress such as spinning drives,
fans, and power supplies are provided with N+1 redundant configuration. N+1
redundancy is a system configuration where certain components have at least one
backup component so that the system functionality continues if a part fails. This
configuration allows for uninterrupted operation at full capacity and operational
status if one component fails. For data, RAID 6 technology provides additional
protection of data integrity when up to two disks fail.
© Copyright
Internal Use - Confidential 2020 Dell Inc. Page 53
Appendix
ELMS
Electronic Licensing Management System (ELMS) electronically represents feature
and capacity licenses.
ELMS on PowerProtect DD appliances, both physical and virtual, use one license
file per system. The license file contains entries for all purchased features and
capacities.
There are two categories of licenses: served and unserved. Served licenses are on
a license server, and the PowerProtect DD appliance has to check in with the
server to verify which features are licensed. Served licenses are supported only
with DDVE. Unserved licenses are the licenses that are applied directly to a
PowerProtect DD appliance.
The following are some of the features that require additional licensing:
• DD Boost
• PowerProtect DD VTL
• Encryption
• DD Retention lock
• Dell EMC Cloud Tier
The new PPDD "HIGH_DENSITY CAPACITY ACTIVE" requires a license for 8TB
drives DS60 / ES40.
© Copyright
Internal Use - Confidential 2020 Dell Inc. Page 55
Appendix
Administrative Access
PowerProtect DD appliances can be administered remotely over Ethernet using
various protocols.
• SSH and Telnet can be used to run CLI commands for management and setup.
Telnet is disabled by default.
• HTTPS and HTTP can be used to access the Data Domain System Manager to
perform management and setup tasks. HTTP access is disabled by default.
© Copyright
Internal Use - Confidential 2020 Dell Inc. Page 57
Appendix
Client Direct
Some backup appliances and applications, such as Dell EMC NetWorker and
Avamar, have a client direct feature allowing direct access to the PowerProtect DD
appliance over Ethernet. Both NetWorker and Avamar use the DD Boost protocol
with their client direct feature.
Backup and archive media servers can use the following protocols to send data to
a PowerProtect DD appliance over Ethernet:
• CIFS
• NFS
• DD Boost
• NDMP
© Copyright
Internal Use - Confidential 2020 Dell Inc. Page 59
Appendix
Fibre Channel
If a supported FC HBA is installed on the PowerProtect DD appliance, the system
can be connected to a vDisk (Virtual Disk Device) for Storage Direct solution or a
Fibre Channel system attached network and use the PowerProtect DD VTL and DD
Boost protocols for backup operations.
If the DD VTL option is licensed, the backup or archive server sees the
PowerProtect DD appliance as one or multiple DD VTLs.
Replication
The data is written to the backup file system on the PowerProtect DD appliance.
Physical separation of the replication traffic from backup traffic can be achieved by
using two separate Ethernet interfaces on the PowerProtect DD appliance. This
separation allows backups and replication to run simultaneously without network
conflicts.
© Copyright
Internal Use - Confidential 2020 Dell Inc. Page 61
Appendix
ddvar
The /ddvar file system is a ext3 (Third Extended file system) which stores
administrative files, core and log files, generated support upload bundles,
compressed core files, and .rpm (Red Hat package manager) upgrade package
files.
The /ddvar file system keeps the administrative files that are separated from data
storage files.
• Stores core files, logfiles, support upload bundles, and upgrade packages.
• Cannot be renamed or deleted.
• Does not provide access to all subdirectories.
MTree
The Managed Tree (MTree) file structure is the destination to store user data. It
provides a root directory for user data. You can configure your backup application
to a specific MTree and organize backup files. MTree provides more granular
space management and reporting. MTrees simplify management of several
features including replication, snapshots, quotas, and retention lock. These
operations can be performed on a specific MTree rather than on the entire file
system.
© Copyright
Internal Use - Confidential 2020 Dell Inc. Page 63
Appendix
Replication Features
Replication
Destination
Source PowerProtect
PowerProtect DD
DD
When replicating over untrusted networks, Replication can encrypt sensitive data.
This encryption can be enabled on all or for only a selected portion of the replicated
dataset.
You can also consolidate data from up to 270 remote sites by simultaneously
replicating data to a single, large PowerProtect DD system.
You can set up a PowerProtect DD system for managed file, directory, MTree, or
collection replication. DDVE supports only managed file and MTree replication.
Dell EMC PowerProtect DD systems and DDVE support managed file replication.
© Copyright
Internal Use - Confidential 2020 Dell Inc. Page 65
Appendix
Directory Replication
Directory replication transfers deduplicated data within a Data Domain file system
directory that is configured as a replication source. Data is copied to a directory
configured as a replication destination on a different PowerProtect DD system.
MTree Replication
MTree replication is used to replicate MTrees between PowerProtect DD systems.
Periodic snapshots are created on the source. The differences between the
snapshots are transferred to the destination by using the same cross-site
deduplication mechanism used for directory replication.
© Copyright
Internal Use - Confidential 2020 Dell Inc. Page 67
Appendix
Collection Replication
Collection replication performs whole-system mirroring in a one-to-one topology.
Collection replication continuously transfers changes in the underlying collection,
including all logical directories and files of the file system.
Collection replication does not have the flexibility of the other replication types.
Collection replication can provide higher throughput and support more objects with
less overhead, which may work better for high-scale enterprise cases.
© Copyright
Internal Use - Confidential 2020 Dell Inc. Page 69
Appendix
DD Retention Lock
The Cloud Tier feature supports the DD Retention Lock feature, and meets all the
regulatory and compliance policies.
Encryption at the active tier level is applicable only if encryption is enabled at the
system level. The system level encryption is a licensed feature.
The cloud units have separate controls for enabling encryption. The encryption of
Data at Rest is enabled by default in the cloud. If needed, users can disable
encryption.
Once the data is in the cloud tier, the encryption status cannot be changed. So the
decision to encrypt the data or not to encrypt must be made before sending any
data to the cloud.
The complete process of data transfer between a PowerProtect DD system and the
cloud is done over a secure HTTP connection.
© Copyright
Internal Use - Confidential 2020 Dell Inc. Page 71
Appendix
Replication Support
Cloud tier can be enabled on both source and target PowerProtect DD systems. If
the source system is cloud tier-enabled and the data is migrated to the cloud, then
data must be read from the cloud for replication. A replicated file is always written
on the active tier on the destination system even if cloud tier is enabled.
Managed file replication and MTree replication can be implemented on cloud tier-
enabled systems with latest DDOS. Directory replication works only on the
/backup MTree, thus the cloud tier feature does not effect directory replication.
Collection replication is not supported on cloud tier-enabled PowerProtect DD
systems.
The Replication to Cloud feature supports DDVE instances set up in the cloud
replicate from one DDVE system to another.
© Copyright
Internal Use - Confidential 2020 Dell Inc. Page 73
Appendix
1 2
3 4
2: Delete an archive file using an archiving application after the retention period
expires.
Locked files cannot be modified on the PowerProtect DD system even after the
retention period for the file expires. Archive data that is retained on the
PowerProtect DD system is not deleted automatically when the retention period
expires. An archiving application must delete the file.
3: Update the default values of minimum and maximum retention periods per
MTree. The default values of minimum and maximum retention periods are 12
hours and 5 years respectively.
With Retention Lock Governance edition, IT administrators can meet secure data
retention requirements. If corporate governance policies change, administrators
keep the ability to update the retention period. For example, an administrator could
revert the locked state of a file on a specified path name inside an MTree. They
could also delete an MTree enabled with Retention Lock Governance.
© Copyright
Internal Use - Confidential 2020 Dell Inc. Page 75
Appendix
2 3 4
1
Use dual sign-on to extend the retention periods for an MTree, rename the MTree.
You can also use dual sign-on to delete the Retention Lock Compliance license
from the PowerProtect DD system. Use dual sign-on to secure the system clock
from illegal updates.
© Copyright
Internal Use - Confidential 2020 Dell Inc. Page 77
Appendix
Overview
SMT for the DDOS is a software feature that enables secure isolation of many
users and workloads on a shared system. As a result, the activities of one tenant
are not visible or apparent to other tenants. This capability improves cost
efficiencies through a shared infrastructure. SMT provides each tenant with the
same visibility, isolation, and control that they would have with their own stand-
alone Dell EMC PowerProtect DD system.
A tenant may be one or more business units, or departments hosted onsite for an
enterprise or large enterprise. For example, Finance and Human Resources
sharing PowerProtect DD system. Each department would be unaware of the
presence of the other.
SMT features:
© Copyright
Internal Use - Confidential 2020 Dell Inc. Page 79
Appendix
Terminology
In SMT terms, the landlord is the storage admin or the DD Administrator. The
landlord is responsible for managing the PowerProtect DD system. The landlord
sets up the file systems, storage, networking, replication, and protocols. They are
also responsible for monitoring overall system health and replace any failed
hardware as necessary.
A tenant is responsible for scheduling and running the backup application for the
tenant customer. A tenant also manages their own tenant-units including
configuring backup protocols and monitoring resources and stats within their
tenant-unit.
Tenant-units are logical containers for MTrees. They also contain important
information, such as users, notification groups, and other configuration elements.
Other tenants cannon view or detect tenant-units not belonging to them. This type
of privacy ensures security and isolation of the control path, when running multiple
tenants simultaneously on the shared infrastructure.
Architecture
This example shows two companies Red and Blue share the same PowerProtect
DD system. Tenant units and individual data paths are logically and securely
isolated from each other and are managed independently. Tenant users can
backup using their application servers to Data Domain storage in secure isolation
from other tenants on the PowerProtect DD system.
Tenant administrators can perform self-service fast copy operations within their
tenant units for data restores as needed. Tenant administrators can monitor data
capacity and associated alerts for capacity and stream use.
The landlord responsible for the system monitors and manages all tenants in the
system, and has visibility across the entire system. They set capacity and stream
quotas on the system for the different tenant units, and report on tenant unit data.
© Copyright
Internal Use - Confidential 2020 Dell Inc. Page 81
Appendix
Benefits
Logical data isolation allows providers to spread the capital expenditure and
operational expenditure of a protection storage infrastructure across multiple
tenants. Data isolation is achieved by using separate DD Boost users for different
MTrees or by using the access mechanisms of NFS, CIFS, and DD VTL.
Metering and Reporting enable a provider to ensure that they are running a
sustainable business model. Reporting is important in a multitenant environment so
the provider can track usage on the shared PowerProtect DD system.
Similarly, for other protocols such as CIFS, NFS, and DD VTL, the native protocol
level access control mechanisms can be used to provide isolation.
© Copyright
Internal Use - Confidential 2020 Dell Inc. Page 83
Appendix
Encryption
The Encryption software option encrypts all data on the system using an internally
generated encryption key. This encryption key is static, and the user cannot change
it.
© Copyright
Internal Use - Confidential 2020 Dell Inc. Page 85
Appendix
Data Sanitization
The Cyber Recovery software runs in a secure, air-gapped 'vault' environment. The
Cyber Recovery Vault (CR Vault) is physically isolated from an unsecure system or
network. It provides management tools and technology to automate the creation of
restore points that are used for recovery or security analytics. The software is built
on a secure microservices architecture.
A primary storage system replicates its data over an air-gapped link to the Cyber
Recovery environment. The data that is in the CR Vault can be analyzed and
checked for signs of tampering. If the copied data is deemed to be good, it is saved
as an independent full backup copy that can be restored if needed. If this data must
be restored, data can be sent out of the Cyber Recovery environment and back to
the production environment.
With the Cyber Recovery software, you can create, run, and monitor policies that
protect your data.
© Copyright
Internal Use - Confidential 2020 Dell Inc. Page 87
Appendix
Overview
Customer Environment Dell EMC Backend Environment
Support Analyst
Public
Internet
(https)
Dell EMC Secure Remote Services, is a two-way remote connection between Dell
Customer Service and Dell products. This connection enables remote monitoring,
diagnosis, and repair. Secure Remote Services assures availability and
optimization of the Dell EMC infrastructure, and is a key component of Dell EMC
industry-leading Customer Service. The connection is secure, high speed, and
operates 24x7.
Secure Remote Services is the remote service solution application that is installed
on one or more customer-supplied dedicated servers. For devices associated with
a particular service, Secure Remote Services is the single point of entry and exit for
all IP-based remote service activities.
© Copyright
Internal Use - Confidential 2020 Dell Inc. Page 89
Appendix
ConnectEMC
In general, the system sends Autosupport alerts and alert-summaries to Dell EMC
Support. An e-License is required if the system is a physical Dell EMC
PowerProtect DD system or DDVE.
Configure network security only for Secure Remote Services gateway instead of
multiple systems.
The Secure Remote Services GUI supports DD HA. The configuration is similar to
the non-HA systems with the addition of the HA Peer IP which is a required field.
© Copyright
Internal Use - Confidential 2020 Dell Inc. Page 91
Appendix
When migrating storage to new storage, system processes such as data access,
expansion, cleaning, and replication are unaffected.
© Copyright
Internal Use - Confidential 2020 Dell Inc. Page 93
Appendix
More Support
The DDOS Command Reference Guide provides information for using the
commands to accomplish specific administration tasks. Each command also has an
online help page that gives the complete command syntax. Help pages are
available at the CLI using the help command.
© Copyright
Internal Use - Confidential 2020 Dell Inc. Page 95
Appendix
Some of the capabilities of remote power management that are supported through
iDRAC are:
• Running diagnostics
• Installing, upgrading, or reconfiguring the DDOS
• Accessing the BIOS
• Viewing valuable POST and boot messages
© Copyright
Internal Use - Confidential 2020 Dell Inc. Page 97
Appendix
In contrast, the DDSM is primarily a single system management tool. DDSM does
not aggregate storage or performance data from multiple systems, as provided by
DDMC.
© Copyright
Internal Use - Confidential 2020 Dell Inc. Page 99
Glossary
iDRAC
Dell Remote Access Controller
RAID
Redundant Array of Independent Disks
© Copyright
Internal Use - Confidential 2020 Dell Inc. Page 101
PowerProtect DD Concepts and Features
© Copyright
Internal Use - Confidential 2020 Dell Inc. Page 102