{"id":93732,"date":"2015-08-17T17:31:35","date_gmt":"2015-08-17T21:31:35","guid":{"rendered":"http:\/\/www.bu.edu\/tech\/?page_id=93732"},"modified":"2022-03-04T13:27:10","modified_gmt":"2022-03-04T18:27:10","slug":"network-file-storage","status":"publish","type":"page","link":"https:\/\/www.bu.edu\/tech\/services\/infrastructure\/storage-backup\/network-file-storage\/","title":{"rendered":"Network File Storage"},"content":{"rendered":"<div class=\" bu-callout alignright\"><\/p>\n<h3><span class=\"tw icon-mapmarker\"><\/span> Quick Start<\/h3>\n<p><strong>Available to:<\/strong> Faculty, Researchers, Staff, Departments<\/p>\n<p><strong>Cost: <\/strong>See <a href=\"#Cost\">cost<\/a> details, below.<\/p>\n<ul>\n<li>See <a href=\"#GettingStarted\">Getting Started<\/a>, below.<\/li>\n<\/ul>\n<p><\/div>\n<p>Network File Storage provides a secure, centrally-managed, storage environment for University data. The base allocation of Network File Storage can be expanded for a nominal fee. The service is protected via periodic snapshot and replication policies and monitored on a 24\/7 basis.<\/p>\n<h2>Benefits<\/h2>\n<p>Leveraging a central network file storage service, rather than operating independent file servers, decreases risk; improves security and efficiency, and lowers University operating expenses. High capacity and low operating costs ensure that affordable space is available to meet changing needs. High availability, achieved by replicating stored information across multiple data centers, ensures ready to access data. Choosing this service relieves departmental administrators of the responsibility, labor and expense to physically administer and maintain shared file server(s).<\/p>\n<h2>Key Features<\/h2>\n<p>Network File Storage offers a number of features that help ensure a high degree of availability, security, and reliability:<\/p>\n<ul>\n<li>The service is hosted in secure, professionally managed data centers.<\/li>\n<li>It\u2019s monitored on a 24\/7 basis via automated tools, and support staff are notified of any equipment or service issues.<\/li>\n<li>In the event of an outage at the primary site, clients can access a read-only replica of their data.<\/li>\n<li>The service supports access from Windows, Macintosh, and Linux\/UNIX platforms. The storage can be presented as either a Windows Share (CIFS\/SMB) using Microsoft Active Directory (AD), as an NFS export, or an S3 bucket.<\/li>\n<li>Access control can be self-managed<\/li>\n<li>This service is approved to store <a href=\"http:\/\/www.bu.edu\/policies\/data-classification-policy\/\">Restricted Use data<\/a> for CIFS\/SMB only, but additional licensing fees may be required in order to ensure compliance. See <a href=\"https:\/\/www.bu.edu\/tech\/services\/security\/server\/permissions\/\">Permissions Management &amp; Data Loss Prevention<\/a> for licensing information to protect Restricted Use data.<\/li>\n<li>Data presented as Windows Shares or NFS Exports is protected by a periodic snapshot and replication policy, enabling recovery from inadvertent file deletion. Data is asynchronously replicated to a secondary, remote data center.<\/li>\n<\/ul>\n<p>&nbsp;<\/p>\n<table style=\"border-top: 2px solid #f1f1f0; border-left: 2px solid #f1f1f0;\" class=\"styled_table\">\n<tbody>\n<tr>\n<td colspan=\"2\" style=\"border-bottom: 2px solid #f1f1f0 ! important; border-right: 2px solid #f1f1f0 ! important; padding: 0.4em ! important; background-color: #e8e8e8 ! important; text-align: center;\"><strong>Snapshot<\/strong><\/td>\n<td style=\"border-bottom: 2px solid #f1f1f0 ! important; border-right: 2px solid #f1f1f0 ! important; padding: 0.4em ! important; background-color: #e8e8e8 ! important; text-align: center;\"><strong>Replication<\/strong><\/td>\n<\/tr>\n<tr>\n<td style=\"border-bottom: 2px solid #f1f1f0 ! important; border-right: 2px solid #f1f1f0 ! important; padding: 0.4em ! important; background-color: #e8e8e8 ! important; text-align: center;\"><strong>Interval<\/strong><\/td>\n<td style=\"border-bottom: 2px solid #f1f1f0 ! important; border-right: 2px solid #f1f1f0 ! important; padding: 0.4em ! important; background-color: #e8e8e8 ! important; text-align: center;\"><strong>Retention<\/strong><\/td>\n<td style=\"border-bottom: 2px solid #f1f1f0 ! important; border-right: 2px solid #f1f1f0 ! important; padding: 0.4em ! important; background-color: #e8e8e8 ! important; text-align: center;\"><strong>Interval<\/strong><\/td>\n<\/tr>\n<tr>\n<td style=\"border-bottom: 2px solid #f1f1f0 ! important; border-right: 2px solid #f1f1f0 ! important; padding: 0.4em ! important; background-color: #e8e8e8 ! important; text-align: center;\">6 Hours<\/td>\n<td style=\"border-bottom: 2px solid #f1f1f0 ! important; border-right: 2px solid #f1f1f0 ! important; padding: 0.4em ! important; background-color: #e8e8e8 ! important; text-align: center;\">36 Hours<\/td>\n<td rowspan=\"4\" style=\"border-bottom: 2px solid #f1f1f0 ! important; border-right: 2px solid #f1f1f0 ! important; padding: 0.4em ! important; background-color: #e8e8e8 ! important; text-align: center;\">15 Minutes<\/td>\n<\/tr>\n<tr>\n<td style=\"border-bottom: 2px solid #f1f1f0 ! important; border-right: 2px solid #f1f1f0 ! important; padding: 0.4em ! important; background-color: #e8e8e8 ! important; text-align: center;\">Daily<\/td>\n<td style=\"border-bottom: 2px solid #f1f1f0 ! important; border-right: 2px solid #f1f1f0 ! important; padding: 0.4em ! important; background-color: #e8e8e8 ! important; text-align: center;\">7 Days<\/td>\n<\/tr>\n<tr>\n<td style=\"border-bottom: 2px solid #f1f1f0 ! important; border-right: 2px solid #f1f1f0 ! important; padding: 0.4em ! important; background-color: #e8e8e8 ! important; text-align: center;\">Weekly<\/td>\n<td style=\"border-bottom: 2px solid #f1f1f0 ! important; border-right: 2px solid #f1f1f0 ! important; padding: 0.4em ! important; background-color: #e8e8e8 ! important; text-align: center;\">12 Weeks<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<ul>\n<li>Data stored in an S3 bucket is protected by Erasure Coding (EC) and stored across two separate data centers.<\/li>\n<\/ul>\n<h2>What to Expect<\/h2>\n<ul>\n<li>Network File Storage services normally will be available 24 by 7 except for standard change windows, as described in <a href=\"\/tech\/about\/service\/change\/\">IS&amp;T\u2019s standard policies, procedures, and schedules for making changes<\/a>. Notice of these infrequent outages will be posted on <a href=\"https:\/\/www.bu.edu\/tech\">TechWeb.<\/a><\/li>\n<\/ul>\n<h2>Requirements<\/h2>\n<p>Client responsibilities:<\/p>\n<ul>\n<li>Network File Storage<em> must <\/em>use endpoints that comply with the <u><a href=\"http:\/\/www.bu.edu\/policies\/minimum-security-standards\/\">Minimum<\/a><\/u> <u><a href=\"http:\/\/www.bu.edu\/policies\/minimum-security-standards\/\">Security Standards <\/a><\/u>for University data. This includes installing and maintaining endpoint protection (e.g. <a href=\"https:\/\/www.bu.edu\/tech\/services\/cccs\/desktop\/device-security\/endpoint-protection\/crowdstrike-installation\/\">CrowdStrike<\/a> \u2013 available for IS&amp;T and IT Partner managed systems, and non-managed personal computers of BU personnel.)<\/li>\n<li>Confirm with IS&amp;T or your local IT professional that both space available and performance will meet your needs.<\/li>\n<li>File storage above the base allocation will require an additional charge. Submit an Internal Service Request (ISR) to IS&amp;T Systems Operations for the desired amount of storage and associated charge.<\/li>\n<li>If you have acquired additional storage above the base allocation, you must renew your agreement each year.<\/li>\n<li>Manage permissions in conjunction with your local IT professional for subscribers using Active Directory (AD).<\/li>\n<li><a href=\"http:\/\/www.bu.edu\/policies\/information-security-home\/data-protection-standards\/data-classification-policy\/#restricteduse\">Restricted Use data<\/a> storage requires additional licensing fees to ensure compliance. For licensing information to protect restricted use data, \u00a0visit our <a href=\"https:\/\/www.bu.edu\/tech\/services\/security\/server\/permissions\/\">Permissions Management &amp; Data Loss Prevention<\/a> page.\u00a0 Off-campus access of Restricted Use data requires use of the <span><a href=\"https:\/\/www.bu.edu\/tech\/services\/cccs\/remote\/vpn\/two-factor-vpn\/\">BU two-factor VPN with Duo Security<\/a><\/span>.<\/li>\n<li>Inadvertently deleted files can be recovered through a self-service option. The procedure is described in the <a href=\"https:\/\/www.bu.edu\/tech\/services\/infrastructure\/storage-backup\/network-file-storage\/faq\/\"><u>Frequently Asked Questions<\/u><\/a>. Or, you can <a href=\"https:\/\/www.bu.edu\/tech\/contact\/\"><u>submit a ticket<\/u><\/a> for assistance.<\/li>\n<li>Exporting data to removable media must comply with the <span><a href=\"http:\/\/www.bu.edu\/policies\/minimum-security-standards\/\">Minimum Security Standards<\/a><\/span> for all University data.<\/li>\n<li>Contact the <span><a href=\"https:\/\/www.bu.edu\/tech\/about\/help-center\/hours\/\">IT Help Center<\/a><\/span> if you have any questions on these requirements, to report issues or need help submitting a new request.<\/li>\n<\/ul>\n<h2><a id=\"Cost\"><\/a>Cost<\/h2>\n<p>&nbsp;<\/p>\n<table style=\"border-top: 2px solid #f1f1f0; border-left: 2px solid #f1f1f0;\" class=\"styled_table\">\n<tbody>\n<tr>\n<td style=\"border-bottom: 2px solid #f1f1f0!important; border-right: 2px solid #f1f1f0!important; padding: .4em!important; background-color: #e8e8e8!important;\"><strong>Category<\/strong><\/td>\n<td style=\"border-bottom: 2px solid #f1f1f0 ! important; border-right: 2px solid #f1f1f0 ! important; padding: 0.4em ! important; background-color: #e8e8e8 ! important; text-align: center;\"><strong>Fully subsidized base allocation<\/strong><\/td>\n<td style=\"border-bottom: 2px solid #f1f1f0 ! important; border-right: 2px solid #f1f1f0 ! important; padding: 0.4em ! important; background-color: #e8e8e8 ! important; text-align: center;\"><strong>Additional fee for storage beyond base allocation<\/strong><strong><\/strong><\/td>\n<\/tr>\n<tr>\n<td style=\"border-bottom: 2px solid #f1f1f0!important; border-right: 2px solid #f1f1f0!important; padding: .4em!important; background-color: #e8e8e8!important;\"><strong>School\/Colleges\u00a0<\/strong>(to be sub-allocated by School administrators to that School&#8217;s departments)<\/td>\n<td style=\"border-bottom: 2px solid #f1f1f0 ! important; border-right: 2px solid #f1f1f0 ! important; padding: 0.4em ! important; background-color: #e8e8e8 ! important; text-align: center;\">10 Terabytes<\/td>\n<td style=\"border-bottom: 2px solid #f1f1f0 ! important; border-right: 2px solid #f1f1f0 ! important; padding: 0.4em ! important; background-color: #e8e8e8 ! important; text-align: center;\" rowspan=\"4\">$50 per Terabyte\/Year<\/td>\n<\/tr>\n<tr>\n<td style=\"border-bottom: 2px solid #f1f1f0!important; border-right: 2px solid #f1f1f0!important; padding: .4em!important; background-color: #e8e8e8!important;\"><strong>Other Academic Units<\/strong> (Division, Center, Program, Section, Lab, Association, Group)<\/td>\n<td style=\"border-bottom: 2px solid #f1f1f0 ! important; border-right: 2px solid #f1f1f0 ! important; padding: 0.4em ! important; background-color: #e8e8e8 ! important; text-align: center;\">1 Terabyte<\/td>\n<\/tr>\n<tr>\n<td style=\"border-bottom: 2px solid #f1f1f0!important; border-right: 2px solid #f1f1f0!important; padding: .4em!important; background-color: #e8e8e8!important;\"><strong>Administrative Units<\/strong> (Departments, Offices, Buildings)<\/td>\n<td style=\"border-bottom: 2px solid #f1f1f0 ! important; border-right: 2px solid #f1f1f0 ! important; padding: 0.4em ! important; background-color: #e8e8e8 ! important; text-align: center;\">1 Terabyte<\/td>\n<\/tr>\n<tr>\n<td style=\"border-bottom: 2px solid #f1f1f0!important; border-right: 2px solid #f1f1f0!important; padding: .4em!important; background-color: #e8e8e8!important;\"><strong>Projects<\/strong> (registered with IS&amp;T Research Computing)<\/td>\n<td style=\"border-bottom: 2px solid #f1f1f0 ! important; border-right: 2px solid #f1f1f0 ! important; padding: 0.4em ! important; background-color: #e8e8e8 ! important; text-align: center;\">1 Terabyte<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<h2><a id=\"GettingStarted\"><\/a>Getting Started<\/h2>\n<ul>\n<li>After consulting your local IT professional regarding the storage options that are available, <a href=\"https:\/\/bu.service-now.com\/sp?id=sc_category&amp;sys_id=b69b25d91b226490b068ed70604bcb3f\" title=\"Submit a request for Network File Storage\" target=\"_blank\" rel=\"noopener noreferrer\">submit a request<\/a> for Network File Storage. If you need additional information or consultation concerning your request, please click on the HELP button on this page.<\/li>\n<li>Upon submission of a service request, you will be notified via the service ticket when your file share is ready for use.<\/li>\n<\/ul>\n","protected":false},"excerpt":{"rendered":"<p>Network File Storage provides a secure, centrally-managed, storage environment for individual or departmental file storage.  This service provides a common location to store and share files based on Microsoft Active Directory (AD) permissions that can be managed with the assistance of your local IT professional.  The base allocation of Network File Storage can be expanded for a nominal fee.  The service is protected via periodic snapshot and replication policies and monitored on a 24\/7 basis.  Tape backup is an optional component available for an additional fee. &#8230;<\/p>\n","protected":false},"author":1356,"featured_media":0,"parent":84272,"menu_order":4,"comment_status":"closed","ping_status":"closed","template":"service.php","meta":[],"_links":{"self":[{"href":"https:\/\/www.bu.edu\/tech\/wp-json\/wp\/v2\/pages\/93732"}],"collection":[{"href":"https:\/\/www.bu.edu\/tech\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/www.bu.edu\/tech\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/www.bu.edu\/tech\/wp-json\/wp\/v2\/users\/1356"}],"replies":[{"embeddable":true,"href":"https:\/\/www.bu.edu\/tech\/wp-json\/wp\/v2\/comments?post=93732"}],"version-history":[{"count":43,"href":"https:\/\/www.bu.edu\/tech\/wp-json\/wp\/v2\/pages\/93732\/revisions"}],"predecessor-version":[{"id":139140,"href":"https:\/\/www.bu.edu\/tech\/wp-json\/wp\/v2\/pages\/93732\/revisions\/139140"}],"up":[{"embeddable":true,"href":"https:\/\/www.bu.edu\/tech\/wp-json\/wp\/v2\/pages\/84272"}],"wp:attachment":[{"href":"https:\/\/www.bu.edu\/tech\/wp-json\/wp\/v2\/media?parent=93732"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}