Do you have a question about the EMC Unity Family and is the answer not in the manual?
Management | Unisphere, REST API, CLI |
---|---|
Drive Types Supported | SSD, SAS, NL-SAS |
Protocols | iSCSI, NFS, SMB |
Data Services | Snapshots, Replication |
Data Reduction | Compression, Deduplication |
Unified Storage | Block and File |
Cloud Integration | Cloud Tiering |
Model | Unity 300, Unity 400, Unity 500, Unity 600 |
Target Market | Enterprise, Midmarket |
High Availability | Dual-controller architecture, automatic failover |
Explains default user accounts for initial access and configuration, including admin and service accounts.
Describes methods for managing storage system accounts, including roles like Management and Service.
Covers authentication for Unisphere access using local or LDAP accounts, session rules, and password requirements.
Explains the CLI for Unisphere functionality, session rules, and password usage.
Covers how storage systems use security policies for multiprotocol environments, including UNIX and Windows security models.
Covers applying access-control permissions and restrictions based on rules related to resource sensitivity, user roles, and device configuration.
Outlines network services and their corresponding ports used by the storage system.
Lists ports the storage system must access as a network client for services like LDAP, DNS, and Kerberos.
Details SMB 3.0 and Windows 2012 support for SMB encryption and signing for secure data transfer.
Details FIPS 140-2 standard requirements for IT products and how the storage system supports FIPS 140-2 mode for SSL traffic.
Explains Data at Rest Encryption (D@RE) using controller-based encryption for physical drive security.
Recommends backing up the generated keystore file to an external location for system recovery in case of corruption.
Details the auditing function for D@RE, logging keystore operations like key creation, backup, and disk encryption.
Summarizes security features available for different storage types like iSCSI, SMB, and NFS, including authentication and access control.