Network attached storage (NAS, iSCSI) is not supported with VSMS.
If the customer would like to generate a backup copy of their archives, the best method is using VSOM’s “Backup” feature. They will need at least one extra media server to do this. You can register the backup server under “Admin >> Servers” Every 24 hours the archives from a given media server can be automatically backed up to that Backup server. Basically, archive backup copies archives from the VSMS server where they are recorded to a VSMS server configured to receive the backups. The VSMS backup server could be connected to the SAN. There is not a method to directly backup archives to SAN storage and Cisco does not certify 3rd party SAN vendors.
Cisco does sell Nexsan arrays which TAC will support, though you are free to use any 3rd party FC SAN array (though Cisco would not be responsible for supporting configuration and communication between the FC card and the array.)
As far as configuration, Cisco recommends ordering the FC card as an option when ordering a media server using the Configuration Tool. Getting one to work as an addition after a server has been factory configured can be a challenge, and is not a Cisco TAC supported procedure.
Link speed detection supports 1, 2 or 4Gbps automatically.
The data rates for this card are 1.0625 Gbps, 2.125 Gbps, and 4.25 Gbps, auto-detected
If you use a 3rd party storage array, the card is industry standard ANSI compliant, with support for fiber channel class 2 and 3.
DocumentationCode download linksGoalRequirementLimitationsSupported ISR
and UCS-E ModelSupported ISRG2 and UCS-E Blades:Supported ISR4K and
UCS-E Blades:Step by Step ConfigurationConfigure one of the connectivity
options to access the Cisco IMC from the n...
Firepower Threat Defense (NGFWv) on UCS E-series - Transparent Mode in
HA DocumentationCode download linksGoalRequirementLimitationsSupported
ISR and UCS-E ModelSupported ISRG2 and UCS-E Blades:Supported ISR4K and
UCS-E Blades:Step by Step ConfigurationCo...
Question I am currently unable to specify "crypto keyring" command when
configuring VPN connection on my cisco 2901 router. The following
licenses have been activated on my router :