DXi4800 User's Guide
The DXi4800 is Quantum’s entry-level and midrange disk backup solution that integrates data deduplication and replication technology to connect backup and DR (disaster recovery) protection across distributed corporate environments. The DXi4800 disk-based backup appliance uses Quantum’s patented data deduplication technology to increase disk capacities by 10 to 50 times, and make WAN replication a practical, cost-effective part of disaster recovery planning. With Capacity-on-Demand scalability from 8 TB up to 315 TB, the DXi4800 is designed for departmental and medium business customers.
The DXi4800 leverages Quantum’s data deduplication technology to dramatically increase the role that disk can play in the protection of critical data. With the DXi4800 solution, users can retain 10 to 50 times more backup data on fast recovery disk than with conventional arrays.
With the DXi4800, users can transmit backup data from a remote site to a central, secure location to reduce or eliminate media handling. DXi™‑Series replication is asynchronous, automated, and operates as a background process.
With up to 315 TB usable capacity, the DXi4800 supports large-scale Enterprise environments. Presentations include VTL (Fibre Channel), NAS (CIFS/SMB), Veritas OpenStorage (OST) and Oracle® Recovery Manager (RMAN). Integrated tape creation writes physical media directly over dedicated Fibre Channel connections, and supports ISV direct tape creation in NetBackup, Backup Exec, Oracle Secure Backup, and Atempo Time Navigator.
DXi Accent distributes deduplication between the DXi4800 and the backup server to accelerate backups over bandwidth-constrained networks.
In addition, DXi4800 systems optionally support Data-at-Rest Encryption to secure all data stored on the DXi4800. Data-at-Rest Encryption ensures that a hard drive that is physically removed from the DXi4800 cannot be read using another system or device.
DXi storage presentations are optimized for backup usage rather than file sharing. Backup application usage is typically characterized by:
-
Aggregated name spaces and file contents.
-
Limited direct, active file access.
-
Limited browsing, scanning, or stating.
-
Limited metadata manipulation (including rename).
Note: Usage diverging from these characteristics must be qualified to ensure acceptable behavior with respect to functionality, performance, replication, and recovery.