Best Practices Guide for Data Protection with NetApp Filers Running iscsi

Similar documents
BEST PRACTICES GUIDE FOR DATA PROTECTION WITH FILERS RUNNING FCP

Database Layout with Data ONTAP 7G Radhakrishnan Manga September 2005 TR 3411

Server Fault Protection with NetApp Data ONTAP Edge-T

Simple Disaster Recovery of FileNet on Windows : Image Services Using SnapMirror Technology

SnapManager 5.0 for Microsoft SQL Server Installation and Administration Guide

NS NetworkAppliance. Network Appliance Solution Architect-Backup and Restore (New)

IT Certification Exams Provider! Weofferfreeupdateserviceforoneyear! h ps://

StoreVault and NetApp Snapshot Technology

Midsize Enterprise Solutions Selling Guide. Sell NetApp s midsize enterprise solutions and take your business and your customers further, faster

V-Series Systems Installation Requirements and Reference Guide

V-Series Systems Implementation Guide for RamSan Storage

Building Backup-to-Disk and Disaster Recovery Solutions with the ReadyDATA 5200

Data ONTAP 7.3 System Administration Guide

A Thorough Introduction to 64-Bit Aggregates

Data ONTAP 7.3 Documentation Roadmap

V-Series Systems Implementation Guide for HP EVA Storage

SnapManager for SAP

A Thorough Introduction to 64-Bit Aggregates

Data ONTAP 7-Mode Administration Course D7ADM; 5 Days, Instructor-led

IBM System Storage N3000 Express series Modular Disk Storage Systems

Monitoring and Reporting for an ONTAP Account

Data ONTAP Mode. Storage Efficiency Management Guide

Replacing a DIMM in a FAS20xx system

Replacing a Failed Drive in the EF550 Flash Array

Chapter 11. SnapProtect Technology

Data ONTAP 7-Mode Administration (D7ADM)

Installation and Administration Guide

V-Series Systems Implementation Guide for Hitachi Storage

Volume Disaster Recovery Express Guide

WHITE PAPER: ENTERPRISE SOLUTIONS. Disk-Based Data Protection Achieving Faster Backups and Restores and Reducing Backup Windows

Data ONTAP 7.3 Data Protection Online Backup and Recovery Guide

IBM N Series. Store the maximum amount of data for the lowest possible cost. Matthias Rettl Systems Engineer NetApp Austria GmbH IBM Corporation

Meeting Today s Enterprise Storage Challenges: A Better Backup and Recovery Solution

Data ONTAP 7.3 Upgrade Guide

NetApp Solutions for Oracle

The NetBackup catalog resides on the disk of the NetBackup master server. The catalog consists of the following parts:

Data ONTAP 7.3 Data Protection Online Backup and Recovery Guide

Replacing a Failed Controller Battery in the E2712 Controller- Drive Tray or the E2724 Controller-Drive Tray

Oracle Backup and Recovery with NetApp Storage. Klaus Wagner Solution Architect

Replacing a Failed Host Interface Card in the E5560 Controller- Drive Tray

Technology Insight Series

OnCommand Unified Manager

Replacing a Failed Controller Battery in the E5560 Controller- Drive Tray

Virtualization with Protection for SMBs Using the ReadyDATA 5200

Benefits of Multi-Node Scale-out Clusters running NetApp Clustered Data ONTAP. Silverton Consulting, Inc. StorInt Briefing

Replacing a Failed Controller Canister in the EF550 Flash Array

SQL Server Consolidation with Server Virtualization on NetApp Storage

SnapManager 6.0 for Microsoft SQL Server Installation and Administration Guide

Outline: ONTAP 9 Cluster Administration and Data Protection Bundle (CDOTDP9)

NetApp SnapManager 2.1 for Hyper-V on Clustered Data ONTAP 8.3

NetworkAppliance NS Network Application FAS900 Pre-Sales Engineer. Download Full Version :

iscsi Security Overview

Data ONTAP 8.2. MultiStore Management Guide For 7-Mode. Updated for NetApp, Inc. 495 East Java Drive Sunnyvale, CA U.S.

SnapManager 7.2 for Microsoft Exchange Server Administration Guide

Replacing a Failed Power-Fan Canister in the E5612 or the E5624 Controller-Drive Tray

IBM Storage Sales for N series Version 1.

Replacing a Cisco Nexus 5010 cluster switch

Dynamic Storage Using IBM System Storage N series

Netapp Exam NS0-510 NCIE-Backup & Recovery Implementation Engineer Exam Version: 7.0 [ Total Questions: 216 ]

Data ONTAP 7.3 Active/Active Configuration Guide

Replacing a Failed Host Interface Card in the E2712 Controller- Drive Tray or the E2724 Controller-Drive Tray

GA NA _A0. IBM System Storage N series Gateway Implementation Guide for IBM XIV Storage

WHITE PAPER: ENTERPRISE SOLUTIONS

SnapMirror Configuration and Best Practices Guide for Clustered Data ONTAP

NETAPP - Accelerated NCDA Boot Camp Data ONTAP 7-Mode

Data ONTAP 8.1 SAN Administration Guide For 7-Mode

Replacing Failed Memory in the E5512 Controller-Drive Tray or the E5524 Controller-Drive Tray

INTEGRATING FILENET IMAGE SERVICES WITH NETAPP UNIFIED STORAGE FOR WINDOWS PLATFORM: SQL SERVER

Data ONTAP 8.1 Storage Efficiency Management Guide for 7-Mode

Building a Dynamic Cloud Environment

SAFEGUARD INFORMATION AND ENSURE AVAILABILITY WITH THE NETAPP BACKUP AND RECOVERY SOLUTION

GC NA _A0

Accelerated NCDA Boot Camp Data ONTAP 7-Mode (ANCDABC87)

Veritas NetBackup 6.5 Clients and Agents

White Paper. A System for Archiving, Recovery, and Storage Optimization. Mimosa NearPoint for Microsoft

Installing a Cisco Nexus 5596 cluster switch and passthrough panel in a NetApp cabinet

Exam Name: Midrange Storage Technical Support V2

Data Sheet: Storage Management Veritas Storage Foundation for Oracle RAC from Symantec Manageability and availability for Oracle RAC databases

NetApp SnapManager for Microsoft SharePoint Server

NetApp System Manager 1.1 Quick Start Guide

Network- Appliance EXAM - NS NetApp Certified Implementation Engineer - SAN, Cluster-Mode. Buy Full Product

Data ONTAP 7-Mode Administration

A Close-up Look at Potential Future Enhancements in Tivoli Storage Manager

IBM. SnapManager 7.2 for Microsoft Exchange Server Release Notes. IBM System Storage N series GC

itexamdump 최고이자최신인 IT 인증시험덤프 일년무료업데이트서비스제공

Virtualizing Microsoft Exchange Server 2010 with NetApp and VMware

Infinite Volumes Management Guide

Clustered Data ONTAP 8.3

NCIE-Backup & Recovery Implementation Engineer

Veritas Storage Foundation for Oracle RAC from Symantec

OnCommand Unified Manager 6.0

Data ONTAP 7.3 Upgrade Guide

Database over NFS. beepy s personal perspective. Brian Pawlowski Vice President and Chief Architect Network Appliance

Hosted Microsoft Exchange Server 2003 Deployment Utilizing Network Appliance Storage Solutions

STORAGE CONSOLIDATION WITH IP STORAGE. David Dale, NetApp

Microsoft E xchange 2010 on VMware

GC NA _A0. IBM System Storage N series Logical Replication (LREP) Tool 2.0

Accelerated NCDA Boot Camp Data ONTAP 7-Mode Course ANCDABC87; 5 Days, Instructor-led

ONTAP 9.3 Cluster Administration and Data Protection Bundle (CDOTDP9)

Introduction to iscsi

Transcription:

Best Practices Guide for Data Protection with NetApp Filers Running iscsi Brett P. Cooper and Nicholas Wilhelm-Olsen, Network Appliance, Inc. April 29, 2003 TR 3250 TECHNICAL REPORT Network Appliance, a pioneer and industry leader in data storage technology, helps organizations understand and meet complex technical challenges with advanced storage solutions and global data management strategies. 1

Table of Contents 1. Abstract 2. Introduction 3. Data Protection Overview 3.1. Backup and Data Consistency 3.2. Snapshot Technology 3.3. SnapRestore 3.4. SnapMirror 3.5. SnapVault 3.6. SnapDrive 3.7. Native Tape Backup and Recovery 3.8. Network Data Management Protocol (NDMP) 3.9. File Systems That Are Not Capable of Snapshots 3.10. Raw Partitions 3.11. Snapshots 3.12. SnapRestore 3.13. SnapMirror 3.14. SnapVault 3.15. NDMP and Native Tape Backup and Recovery 4. Configuration Models 5. Summary 6. References 2

1. Abstract Network Appliance is committed to providing fast, simple, highly available, and flexible solutions. In keeping with this tradition, Network Appliance has now added support for the iscsi protocol to its core line of filers. Now iscsi, SAN, and NAS technologies are available together on the same physical device with the same level of performance, availability, and simplicity that Network Appliance is known for providing. 2. Introduction Enterprise corporations around the globe are facing a wide variety of challenges. Challenges from competitors, economic conditions, resource limitations, and other factors make it difficult for a corporation to thrive and grow. In order for these companies to succeed, they rely on their enterprise storage vendors to provide constant data availability and absolute protection from data loss and corruption. Network Appliance has always been a leader in providing the highest level of availability and protection to corporations, as well as educating customers on the best methods for protecting data in their unique environments. The purpose of this document is to educate the reader on the best methods for protecting filers utilizing the iscsi protocol. This document is intended for storage administrators and systems administrators that have some familiarity with iscsi, Network Appliance filers, the Network Appliance Data ONTAP operating system, and host-based backup solutions. This document opens with a brief discussion of available data protection technology from Network Appliance. Next, it outlines potential configurations for data protection of iscsi-only filers as well as filers configured for iscsi, FCP, and NAS data storage. This document is not intended to be a detailed integration guide for iscsi backup or third-party backup applications, nor is it an exhaustive list of backup options that may be considered for deployment of iscsi. 3. Data Protection Overview In order to discuss models for data protection, it is necessary to first describe the technologies used in these models. This section briefly describes all of these elements. Further explanation as well as command syntax and examples can be found in the Data ONTAP Data Protection Guide, available online at the Network Appliance NOW Web site registration is required. 3.1. Backup and Data Consistency Backing up data to secondary or tertiary storage resources requires the data to be consistent on the primary storage media before it can be copied. Without a consistent image, backups or Snapshot images would be unrecoverable. This is also true for open files on file systems such as NTFS in which major third-party backup tools integrate an open file option as well as a Bare Metal restore option, which will copy operating system files such as the Microsoft Windows registry. Without utilities that can coordinate file system and application consistency on disk, there is a complex process involved in leveraging Network Appliance Snapshot technology. This process is outside the scope of this document and may be referenced in other documentation. 3

3.2. Snapshot Technology The Network Appliance Write Anywhere File Layout, or WAFL, supports Snapshots, a unique feature that allows administrators to maintain multiple read-only versions online per filer volume. Snapshots, an included component of Data ONTAP software, allow users to recover accidentally damaged or deleted data by utilizing a version of the data from within a Snapshot directory. 3.3. SnapRestore SnapRestore software leverages the Snapshot feature of Data ONTAP software by restoring a file system to an earlier preserved state. It can be used to recover from a corrupted database, application, or damaged file system. The system administrator can restore a single logical unit number (LUN) or the entire volume containing the LUN to any existing Snapshot. Restored LUNs are available for full production use without rebooting the filer, having returned to the precise state that existed when the selected Snapshot was created. Restoration will take less than a minute regardless of the size of the LUN or volume being restored. 3.4. SnapMirror SnapMirror software provides a fast, flexible enterprise solution for asynchronous mirroring or replicating data from one filer to another over local or wide area networks. SnapMirror transfers Snapshots from specific points in time to other filers or NearStore appliances. These replication targets can be in the same data center connected via a LAN (local area network) or distributed across the globe connected via MANs (metropolitan area network) or WANs (wide area network) networks. Since it operates at the changed block level instead of transferring entire files or file systems, it greatly reduces bandwidth and time requirements for replication. 3.5. SnapVault SnapVault software builds on the asynchronous, block-level incremental transfer technology of SnapMirror by providing archival technology. This allows data to be backed up via Snapshots on a filer and transferred on a scheduled basis to a destination filer or NearStore appliance. These Snapshots can be retained on the destination for many weeks or even months, allowing recovery operations to occur nearly instantaneously from this destination system to the original filer. 3.6. SnapDrive SnapDrive software offers a rich set of capabilities to virtualize and enhance storage management for Microsoft Windows environments. It is tightly integrated with Microsoft NTFS, providing a layer of abstraction between application data and physical storage associated with that data. It facilitates creation and management of virtual devices on the filer, and allows the creation and management of Snapshots either from the Microsoft MMC or via a command line interface. Storage managed by SnapDrive logically appears to the Windows host as locally attached storage. In reality, the capacity comes from a centrally managed pool of networked storage equipped with enhanced attributes. SnapDrive runs on a Windows 2000 host and complements native NTFS volume management with virtualization capabilities. It allows administrators to easily create virtual disks from pools of storage that can be distributed among several storage appliances. 4

Since the iscsi protocol is a relatively new integration with Network Appliance, utilities including SnapDrive will be forthcoming. 3.7. Native Tape Backup and Recovery Network Appliance filers support backup and recovery from local, Fibre Channel, and Gigabit Ethernet SAN-attached tape devices. Support for most existing tape drives is included as well as a method for tape vendors to dynamically add support for new devices. In addition, the Remote Magnetic Tape (RMT) protocol is fully supported, allowing backup and recovery to any capable system. Backup images are written using a derivative of the BSD dump stream format, allowing full file-system backups as well as nine levels of differential backups. 3.8. Network Data Management Protocol (NDMP) The Network Data Management Protocol, or NDMP, is an open standard for centralized control of enterprise-wide data management. The NDMP architecture allows backup application vendors to control native backup and recovery facilities in Network Appliance filers and other file servers by providing a common interface between backup applications and file servers. NDMP separates the control and data flow of a backup or recovery operation into separate conversations. This allows for greater flexibility in configuring the environment used to protect the data on Network Appliance filers. Since the conversations are separate, they can originate from different locations, as well as be directed to different locations, allowing greater flexibility in designing NDMPbased topologies. Available NDMP topologies are discussed in detail in the Data Protection Solutions Overview at http://www.netapp.com/tech_library/3131.html. 3.9. File Systems That Are Not Capable of Snapshots Applications that are implemented on top of file systems that are not capable of Snapshots, such as NTFS, represent the simplest scenario from a backup and recovery perspective. When backing up these applications, applications must be first quiesced, or taken offline, in order to avoid open files or files changing during the backup operation. Then, file system caches must be first committed before the backup operation commences. The application remains quiesced, or offline, until the backup is completed, at which point normal application operation can resume. This can result in a significant period of unavailability for the application. Some applications have a built-in hot backup mode, allowing a backup to occur while the application operates at a reduced efficiency and often, limited capabilities. This type of mode is typical in messaging and database applications such as Microsoft Exchange and Oracle. It will result in higher overall application availability than not using hot backup mode. However, it can potentially still result in a long interval of reduced efficiency and limited performance. One final alternative is to use an open file manager from a backup software vendor. These applications are designed to handle backup operations on files that are still locked by an application. They work well for simple applications, such as home directories and shared documents. However, they should be avoided with complex applications, such as messaging applications or databases. 5

3.10. Raw Partitions Some applications have the ability to work directly with raw device partitions, allowing significant performance benefits. In order to back up this application data, however, it is necessary to use specialized modules from a backup software vendor tailored for each application. Without these modules, there is no means of knowing if the data is in a consistent state for backup. When backing up raw partitions, it is usually necessary to place the application in hot backup mode to ensure that the data is consistent. As there is no file system exposed outside of the application, there is no method of performing Snapshots from the host system. Thus, the application must remain in hot backup mode for the duration of the backup operation. Further instructions for backup and recovery of databases utilizing Network Appliance SAN configurations can be found in the Network Appliance Technical Library. 3.11. Snapshots Snapshots are the most basic element of all filer-based data protection scenarios discussed in this paper. All of the methods discussed below operate with either explicitly named Snapshots or will create, use, and destroy Snapshots as required. Since the internal scheduling mechanism for Snapshot creation within Data ONTAP has no means of ensuring that the data within a LUN is in a consistent state, scheduled Snapshots should be disabled for all volumes that contain LUNs. Either SnapDrive or batch files and scripts should be used on a host that has administrative access to the filer. These scripts must first make the data within the LUN consistent. This could be accomplished by quiescing a database, placing an application in hot backup mode, or even taking the application offline in extreme cases. Next, use the rsh or ssh command to create the Snapshot on the filer. Snapshot creation will take only a few seconds, regardless of volume size or utilization. Finally, the application is returned to normal operation. The Windows Task Scheduler service can then be used to execute this script at specified intervals. To recover a LUN from a Snapshot, the LUN can be cloned as described in the Data ONTAP SAN System Administrator Guide available online at the Network Appliance NOW Web site registration is required. Cloning a LUN from a version contained in a Snapshot will cause that Snapshot to be locked. Thus, the Snapshot can only be deleted if the LUN is destroyed and recreated. LUN cloning is typically only done when the cloned LUN is needed for a short amount of time. If the LUN needs to be restored to a previous version permanently, the SnapRestore feature discussed in the next section should be used. 3.12. SnapRestore SnapRestore will revert a LUN or an entire volume containing LUNs to a previous state in only a few seconds, regardless of size or utilization. Furthermore, the SnapRestore operation takes effect immediately, without requiring a reboot of the filer. When restoring a single LUN, it must be taken offline or unmapped prior to recovery if the LUN has not been destroyed. This makes SnapRestore ideal for environments where very large LUNs are in use, or environments where transaction logs are maintained, such as database applications. Host-based methods would require that all the data within the LUN be recovered block-by-block or file-by-file. This will be extremely time-consuming for large LUNs. On the other hand, SnapRestore can revert the LUN to a previous version nearly instantaneously. 6

SnapRestore dramatically increases application availability, providing extremely fast recovery times for business-critical applications such as databases and groupware. 3.13. SnapMirror SnapMirror asynchronously transfers volumes or qtrees from a source filer to a destination filer or NearStore appliance. This involves an initial baseline transfer, and block-level incremental updates thereafter. As a result, SnapMirror works very well in LAN and WAN environments where bandwidth is limited. Normally, SnapMirror Snapshot creation and updates are controlled by a schedule local to the filer. Due to the issues discussed previously, Snapshot creation with LUNs must be controlled by host systems. Scripts are set up to create Snapshots as previously mentioned, and then initiate the SnapMirror update to the remote filer or NearStore appliance. These operations can be scheduled on the host system using the Windows Task Scheduler service. SnapMirror is often used for disaster recovery (DR) planning. Here, volumes containing LUNs would be mirrored asynchronously to a filer at a DR facility. Preferably, application servers would be mirrored to this facility as well. In the event that the DR facility needs to be made operational, applications can be switched over to the servers at the DR site and all application traffic directed to these servers as long as necessary to recover the primary site. Once the primary site is online, SnapMirror can be used to transfer the data efficiently back to the production filers. After the production site takes over normal application operation again, SnapMirror transfers to the DR facility can resume without requiring a second baseline transfer. SnapMirror can also be used for backup consolidation or offloading tape backup overhead from production servers. This facilitates centralized backup operations, reducing backup administrative requirements at remote locations. It can also dramatically reduce overhead from stressful backup operations caused by small backup windows on production filers. Since backup operations are not occurring on the production systems, small backup windows are not as important. 3.14. SnapVault SnapVault builds on the Network Appliance SnapMirror software by providing greater flexibility in the retention of Snapshots on the destination appliance. This makes SnapVault ideal for backing up or archiving Snapshots to a filer or NearStore system. SnapVault can be used in this manner to perform disk-based backups of LUNs to a second filer or NearStore appliance, greatly reducing the time to back up or recover these LUNs when compared to tape-based backup and recovery. Keep in mind that SnapVault, as well as all host-based methods, can only back up and recover an entire LUN. SnapVault will work well with applications that maintain transaction logs, such as databases. The LUN is restored and then transaction logs are rolled forward to bring the LUN to the desired state. With SnapVault, there can be two separate schedules maintained. One schedule controls creation of the Snapshots on the source filer. The second schedule controls transfer of these Snapshots to the destination filer and the amount of time to retain these Snapshots. It is recommended that Snapshots on the source filer be created manually when FCP data is contained on the file system. Scripts should 7

be used to quiesce the application or place it in hot backup mode before creating a Snapshot. Once the Snapshot is created, the application should be returned to normal operation. The Windows Task Scheduler service can then be used to execute these scripts at specified intervals. 3.15. NDMP and Native Tape Backup and Recovery Tape backup and recovery operations of LUNs should generally only be performed on the filer for disaster recovery scenarios, applications with transaction logging, or when combined with other filerbased data protection elements, such as SnapMirror and SnapVault. All tape operations local to the filer operate on the entire LUN and cannot interpret the data or file system within the LUN. Thus, LUNs can only be recovered to a specific point-in-time unless transaction logs exist to roll forward. Where finer granularity is required, host-based backup and recovery must be used. If the operator does not specify an existing Snapshot when performing a native or NDMP backup operation, the filer will create one before proceeding. This Snapshot will be deleted when the backup completes. When a file system contains FCP data, one should always specify a Snapshot that was created at a point in time when the data was consistent. As mentioned earlier, this is ideally done in a script by quiescing an application or placing it in hot backup mode before creating the Snapshot. After Snapshot creation, normal application operation can resume and tape backup of the Snapshot can occur at any convenient time. When attaching a filer to a Fibre Channel SAN for tape backup, it is necessary to first ensure that Network Appliance certifies the hardware and software in use. A complete list of certified configurations is available in the Network Appliance Data Protection Portal. Redundant links to Fibre Channel switches and tape libraries are not currently supported by Network Appliance in a Fibre Channel tape SAN. Furthermore, a separate host bus adapter must be used in the filer for tape backup. This adapter must be attached to a separate Fibre Channel switch that contains only filers, NearStore appliances, and certified tape libraries and tape drives. The backup server must either communicate with the tape library via NDMP or have library robotic control attached directly to the backup server. Figure 5 in section 3 illustrates a unified storage architecture in which a Fibre Channel tape SAN is utilized with a tape library controlled over NDMP. 4. Configuration Models Presented below are some of the possible models for data protection with iscsi-enabled filers. This is not intended to be a complete list, but rather a collection of some of the best models for most environments. Using the guidelines and recommendations presented in this document as well as other documents from Network Appliance, it should be possible to adapt these configurations to each unique environment. Initially, host-based data protection models are examined, including utilizing an iscsi-connected NearStore as a backup target disk pool, traditional SCSI and an FCP-connected NearStore system, or tape array. Finally, a unified backup architecture will be explored that brings together iscsi, FCP, and NAS architectures into a singular architecture for backup. 8

Figure 1. Host-Based iscsi Backup to iscsi Connected Network Appliance NearStore. iscsi data is backed up using a third-party backup utility with an open file option and, optionally, an application integration option may be purchased to back up live application data. The data is backed up to iscsi disk targets on the NearStore through the backup server. Figure 2. Host-Based iscsi Backup to SCSI Tape Array. iscsi data is backed up using a third-party backup utility with an open file option and, optionally, an application integration option may be purchased to back up live application data. The data is backed up via SCSI to a direct-connected SCSI tape array. 9

Figure 3. Host-Based iscsi Backup to FCP Using an FCP SAN-connected NearStore system. iscsi data is backed up using a third-party backup utility with an open file option and optionally an application integration option may be purchased to backup live application data. The data is backed up via FCP to an FCP-connected NearStore appliance. 10

Figure 4. Host-Based iscsi Backup to FCP Using FCP Tape Array. iscsi data is backed up using a third-party backup utility with an open file option and, optionally, an application integration option may be purchased to back up live application data. The data is backed up via FCP to an FCP-connected SCSI tape array. Figure 5. Unified Backup (iscsi, FCP, and NAS). The above graphic illustrates how multiple best practices for data availability across multiple protocols can be combined to create a single unified backup solution. For more information on the best practices for a given protocol, please review the following technical reports: 11

Best Practices Guide for Data Protection with Filers Running FCP Data Protection Strategies for Network Appliance Filers Data Protection and Recovery for Network-Attached Storage over IP/Ethernet Networks Additional information is available on application integration with data availability solutions including Oracle, Exchange, and other applications at the Network Appliance Technical Library 5. Summary There are many methods to back up data stored on a filer via iscsi. Host-based methods provide the finest granularity of data protection, allowing selective backup and recovery of data within a LUN. Filerbased methods provide very fast and efficient disaster recovery solutions, but may compromise file system consistency. There is no single best method for meeting all data protection requirements. One must prioritize requirements and combine methods to meet and exceed these requirements. Data protection is a constantly changing entity for any enterprise. As needs and usage patterns change, so must data protection policies and technologies. Network Appliance is committed to providing industry-leading data protection solutions now and in the future. As needs and technology change, Network Appliance will continue to exceed customer expectations, providing the constant data availability and absolute data integrity they rely upon for success. 6. References Network Appliance Data Protection Portal http://www.netapp.com/solutions/data_protection.html Data Protection Solutions Overview http://www.netapp.com/tech_library/3131.html Network Data Management Protocol home page http://www.ndmp.org/ Best Practices Guide for Data Protection with Filers Running FCP http://www.netapp.com/tech_library/3202.html Data Protection and Recovery for Network-Attached Storage over IP/Ethernet Networks http://www.netapp.com/tech_library/3163.html Network Appliance Technical Library http://www.netapp.com/tech_library/ Network Appliance, Inc. 12 2003 Network Appliance, Inc and SAS Institute. All rights reserved. Specifications subject to change without notice. NetApp, the Network Appliance logo, FAServer, FilerView, NetCache, SecureShare, SnapManager, SnapMirror, SnapRestore, and WAFL are registered trademarks and Network Appliance, ApplianceWatch, BareMetal, Camera-to-Viewer, Center-to-Edge, ContentDirector, ContentFabric, ContentReporter, DataFabric, Data ONTAP, EdgeFiler, HyperSAN, InfoFabric, MultiStore, NearStore, NetApp Availability Assurance, NetApp ProTech Expert, NOW, NOW (NetApp on the Web), RoboCache, RoboFiler, SecureAdmin, Serving Data by Design, Smart SAN, SnapCache, SnapCopy, SnapDirector, SnapDrive, SnapFilter, SnapMigrator, Snapshot, SnapSuite, SnapVault, SohoCache, SohoFiler, The evolution of storage, Vfiler, and Web Filer are trademarks of Network Appliance, Inc. in the U.S. and other countries. All other brands or products are trademarks or registered trademarks of their respective holders and should be treated as such.