Rugged Fortified Storage.
Streamlined Performance.
Key Features of RhinOS 24.1
Built on Enterprise Linux V6.8 RhinOS 24.1 leverages the latest technologies for superior performance with advanced security comparable to Red Hat Enterprise (RHEL)
Administration Made Easy:
- Web-Based IP Interface: Manage your SecureNAS® remotely through an intuitive web-based graphical interface.
- Efficient Data Management: The lightweight web GUI frees up memory for other important data serving tasks.
- Simplified Collaboration: Share files easily on your network.
- Comprehensive Status & Notifications: Track alerts, anomalies, and system events through the web UI.
- Cost-Effective: RhinOS 24.1 comes pre-installed on every SecureNAS® appliance at no additional cost.
- Scalability: Designed to scale with your business, offering petabyte scalability through ZFS integration.
Data Security & Integrity
- Ciphertex Protect® Key: FIPS 140-2 Level 3 certified hardware encryption keys provide unparalleled security.
- Encryption at Every Level: Whether your data is at rest or in transit, it is protected by multi-layered encryption at the system, hardware, and software levels.
- USB Port Firewall: SecureNAS® ignores all communication from unauthorized external USB devices.
- Antivirus Protection: RhinOS 24.1 employs industry-approved ClamAV service for robust antivirus protection. It features automated updates or manual updates if off-network, keeping your data clean and free of viruses and malware.
- Firewall Protection: If your SecureNAS® Enterprise is installed in an open environment, SNE24.1 provides a firewall to help block malicious attacks and unauthorized access to your secured data.
- ADS Integration: authenticate users against the Active Directory, allowing administrators to apply consistent security policies across the network.
Robust Storage Capabilities
-
ZFS Architecture: Ensure data integrity with RAID-Z redundancy levels and proactive corruption detection.
- STRIPED => similar to RAID-0
- MIRROR => similar to RAID-1
- RAID-Z => similar to RAID-5
- RAID-Z2 => similar to RAID-6
- RAID-Z3 => similar to RAID-7
- Striped RAID-Z => ZFS-Striped of RAID-Z/2/3
- Deduplication & Compression: Optimize storage space and performance with block-based data deduplication and inline compression (LZ4, LZJB, ZLE, GZIP 1.9).
Scale up or scale out with ZFS.
ZFS architecture works similarly to traditional hardware RAID, except it uses smaller RAIDs in partitions called “Vdevs”, or virtual devices. ZFS detects silent data corruption better than traditional RAID and it writes data to a log before writing to storage blocks — if a drive fails or the system shuts down unexpectedly, the cached log will store the writes-in- process until ZFS determines it’s safe to resume.
Difference between RAIDZ and traditional RAID
ZFS RAIDZ is a file system and logical volume manager that introduces advanced features and functionalities that set it apart from traditional systems. One of the standout features of ZFS RAIDZ is its end-to-end data integrity through its checksumming feature. Every time data is written or read from a disk; a checksum is computed and compared against the original checksum to ensure data integrity.
Unlike traditional RAID, which relies on hardware controllers for data redundancy and performance, ZFS RAIDZ handles these functions at the software level. It eliminates the need for expensive hardware controllers and allows for more flexibility and customization. Additionally, ZFS RAIDZ offers features such as data compression, deduplication, and snapshots, making it a robust and versatile storage solution.
Striping is the process of distributing blocks of data across hard drives. Input data is split up into pieces known as striped units. If you refer to this diagram, striped units Block 0 through Block 8 would be considered a stripe.
With a single hard drive, read and write operations can be executed one at a time. The major advantage of a RAID 0 system is the capacity for parallel processing, which allows read and write operations to be executed on each drive at the same time. For example, the owner of this Striped system could access striped units Block 0, Block 1, and Block 2 at the same time.
Mirroring takes all data written to one drive and writes it in parallel to a second drive. This provides the highest redundancy since there is a 1-for-1 copy of all data written. It also provides very high read performance, as both disks can be read in parallel. Write performance is unaffected as although there are two disks writing in parallel, they’re writing the same data twice. The downside to RAID-1 is the high cost, as one must build out twice the capacity that’s actually required. Traditional RAID-1 is also designed for exactly two drives, and as such is limited in how far it can expand storage.
RAIDZ provides redundancy by using parity, allowing data recovery without the need for full duplication on a second drive. It mathematically creates a new block of data across multiple disks, so if one drive fails, the RAID controller can reconstruct the missing data from the remaining drives. RAIDZ supports single parity, enabling the system to continue functioning even if a drive fails, with parity distributed across the disks to balance access and improve performance. While RAIDZ offers high storage capacity and reliability, performance is slightly reduced due to the calculations required for reading and writing data.
While RAIDZ protects against a single drive failing and can rebuild it, RAIDZ2 uses two different sets of parity calculations and can rebuild an array even with two simultaneous failures (what’s known as N+2 redundancy). RAIDZ2 requires at least 4 drives – at least two for data, and two for the parity information. RAIDZ2 makes the most sense when used with more disks — up to a point. While the efficiency rises with the number of disks, so does the chance of multiple failures and the complexity of rebuilding the disk set. RAIDZ2 has a good balance of capacity, redundancy, and performance, which makes it the workhorse of high-capacity storage.
RAID-Z3 is the most advanced level of RAID-Z, offering triple-disk redundancy. It can withstand the failure of up to three disks without losing any data. RAID-Z3 is ideal for environments where data integrity is critical and cannot afford any data loss.
Data Access & Storage Protocols
RhinOS 24.1 provides extensive support for accessing and sharing data via:
- CIFS/SMB: Provides Windows Share access
- Full Active Directory integration for easy access to protected data
- Use local accounts when Active Directory is not available
- Easy discovery of your SecureNAS® in your Network
- All versions of the CIFS protocol are supported from old WinNT to the latest secured version
- Supports advanced Windows ACLs
- NFS: Traditional UNIX remote access, latest NVS Version 4 supported
- FTP: Supports both standard unsecured FTP and secured FTP over SSL
- WebDAV: Browser-based data access
- Access your data via a standard browser or other tools that support WebDAV such as WinSCP
- Users can only access data that is allowed
- iSCSI: Supports latest protocol version and security
- Create raw storage volumes within ZFS which can be shared
- Easily create a SAN using your SecureNAS® Enterprise
- Rsync: Easily sync data with SecureNAS® Enterprise
- Both client and server
- Client jobs can be scheduled or on-demand
Attached USB storage drives can be shared out to the network using the above methods.
Virtualization & Networking
RhinOS 24.1 is optimized for virtualization, and VirtualBox V7 has been modified and tuned to run any virtualized Intel-based machine with flexibility and performance.
- Supported OS: Windows, Linux, FreeBSD, and more
- Wizards for Easy Setup: Beginner and advanced options available
- Remote Access: RDP for virtual machine consoles
- VM Management: Virtual Media Manager makes it easy to create and manage storage resources for your virtual machines
- Easily import and export VM’s from and to other virtualization technologies including Microsoft Hyper-V, VMware, Linux KVM, Red Hat Virtualization, and more
Flexible Networking Options
- Connection Flexibility: Configurations from a single 1G connection to multiple bonded 100G connections
- Configuration: Simple static or automatic via DHCP
- Customizable Routing: Optimize routing with configurable local routing tables and DNS settings
- Hosts: Add custom host entries in order to resolve host names without using a DNS
Backup, Restore & Remote Management
RhinOS 24.1 offers secure and flexible backup options:
- Custom Duplicati Integration: A customized Duplicati version has been tailored and tuned specifically for the SecureNAS® Enterprise
- Compresses data inline to reduce network utilization, especially important over slow network connections
- Automated Redundancy: Integrated redundancy and backup tools across the SecureNAS® Enterprise Portfolio
- Managing with Wizards make it easy to:
- Create new configurations
- Import backup configuration from other SecureNAS® machines
- Search backed-up data
- Import backup sets from other SecureNAS® machines
- Restore data whether a single file or terabytes of files
- Backed-up data can be encrypted for secure remote storage
- Scheduled or manual backup jobs
- USB Data Management: Easily back up or copy USB flash drives and storage with a simple “COPY” button on the front panel. SNE24.1 will copy all new or changed data to a preconfigured storage location.
- Advanced Options: Tune the backup jobs to meet your requirements
Backup Destinations Include . . .
...and many more!
Snapshot & Recovery:
- Volume and LUN snapshots: Safeguard your SecureNAS® data, including folders, files, and iSCSI LUNs
- Block-based snapshots: These incremental backups capture only that changes that are made
- Versioning: Schedule snapshots to minimize the risk of data loss
- Restore with one click: Easily revert an entire volume/LUN or selectively restore specific files and folders
Notifications & Remote Control:
- Manage and monitor your SecureNAS® Enterprise from anywhere:
- Web UI tracks all alerts, anomalies, and other events
- See and resolve problems proactively
- Integrate notifications into your SNMP configuration for centralized notifications
- Send notifications via mail and SMS
- Front panel LED will be green when all is OK and red when attention is needed
- Front panel LCD shows current version information and IP address
- Power on or shut down your SecureNAS® remotely
- Remotely save and restore system configurations on any SecureNAS® and perform system updates via the server’s web interface, without physical interaction
- Access Network Recovery Console to reconfigure network settings when your SecureNAS® is unreachable
Advanced System Features
Intelligent Storage Solutions
- UPS Integration: Automatic orderly, safe shutdown during power issues with support for all leading UPS manufacturers
- Date & Time Configuration: User-configured NTP servers, time zone settings, and manual time configuration
- User & Group Security:
- Local Database of Users and Groups
- Maintained through Web UI
- Access to SecureNAS® Configurations definable by Local Users and Groups
- Access to your data definable by Local Users and Groups
- Install your own SSL certificate or use a RhinOS 24.1 - generated SSL certificate for secure communications and data sharing
- System Monitoring & Diagnostics: Proactive alerts and detailed system health monitoring
- Drive Failures: Notifications for failing hardware
- System Health: Easily monitor the health of your SecureNAS® by viewing the condition of temperature and voltage sensors, drives, and fans
- System Logs: Generate System Log Dumps for Ciphertex Support diagnostic activities
Ultimate expansion option
SMB / CIFS
- iSCSI
- WebDav
Optional Network/Graphic Interface Cards
10G Copper / Fibre
Upgradable to 50G Fibre and *200G on
select systems
Your Security Is Key
Encryption Key Management:
- Ciphertex Protect® Encryption Key is a FIPS 140-2 Level 3 validated hardware encryption module that encrypts network shares at the filesystem (or volume) level.
- To activate the key, it must be paired via the web GUI (administrators have the option to set a passphrase).
- After pairing, encrypted data residing on the Ciphertex SecureNAS® Enterprise volume cannot be accessed unless the Ciphertex-Protect® key is inserted into the USB Type-C port on the front of the server.
- If the administrator designated a password, it must also be entered to unlock the volume.
- Key Server – RhinOS® supports centralized storage and management of the encryption key(s) on any key server supporting KMIP.