Managing Hitachi Network Attached Storage (NAS) (TCI2910)

This course introduces the operation and administration of Hitachi NAS Platform (HNAS) models 4xx0 and Hitachi Virtual Storage Platform (VSP) series with NAS modules. 

The course also covers clustering, network environments, Hitachi Enterprise Virtual Server (EVS) for NAS, file systems, authentication, file sharing, and data protection. 

Lab activities are included to provide hands-on practice on operation and administration tasks. In addition, you will get an opportunity to follow the process for creating an EVS with associated file system, join Microsoft Active Directory services, and create CIFS shares and NFS exports. 

Course Objectives 

When you complete this course, you should be able to: 

  • Describe the main concepts of the current models of Hitachi NAS Platform (HNAS) and Hitachi Virtual Storage Platform (VSP) series with NAS module 
  • Recognize the hardware and software elements of Hitachi NAS Platform models 4xx0 and VSP series with NAS module 
  • Explain the functions of the HNAS file system 
  • Identify administrative processes of the Hitachi NAS Platform family 
  • Discuss various HNAS and VSP series with NAS module data protection features

Delivery Type 

  • Instructor-led Training (ILT) 
  • Virtual Instructor-led Training (vILT) 


  • 5 days 

Course Availability 

  • Employees 
  • Customers 
  • Partners 

Target Audience 

  • Administration 
  • User 

Required Knowledge and Skills 

  • UNIX and Microsoft Windows network management, maintenance, and administration 
  • Network attached storage, network switch and router configuration, management and maintenance

Pokaz szczególy

Course Outline 

  1. Hitachi NAS Overview 
  2. Architecture 
  3. Configuration and Management 
  4. N-Way Clustering
  5. Networking
  6. System Drives and Storage Pools (SPANS)
  7. Enterprise Virtual Server (EVS)
  8. File System
  9. File System Features
  10. Access Protocols
  11. Access Security Concepts
  12. Disaster Recovery
  13. Snapshots and Cloning
  14. Data Migration Features
  15. Data Protection Features
  16. Object Replication
  17. File Replication