8.2.5 Data Security Planning
This section introduces the data security planning.
If the user's data is damaged, the user can recover data by selecting a snapshot of a specified
time.
8.2.6 Configuration Data Summary
This section introduces the specific data for anti-virus.
Storage array data
Table 8-5
Storage array data
Parameter Name
Value
Capacity
320 GB
Snapshot Data
Table 8-6
Snapshot data
Parameter Name
Value
Number
1/hour
8.3 Inter-Array Data Protection
This section introduces an application of mirrors: inter-array data protection.
This chapter introduces the application scenario of mirrors.
This section describes the networking for inter-array data protection.
This section introduces the capacity planning.
This section introduces the service planning.
8.3.5 Configuration Data Summary
This section introduces the specific data for inter-array data protection.
8.3.1 Scenario Introduction
This chapter introduces the application scenario of mirrors.
The existing network of the customer has a host cluster running Oracle. ASs access the storage
array directly through FC switches. Once the storage array is faulty, services will stop. The
8 Configuration Instance
OceanStor VIS6000 Series Virtual Intelligent Storage
System
Initial Configuration Guide
8-6
Huawei Proprietary and Confidential
Copyright © Huawei Technologies Co., Ltd.
Issue 08 (2010-05-10)