Explanation of virtual image management system

24

Virtual Image Manage System (VIMS) is a high-performance cluster file system that converts datastores into VIMS format and attaches the datastores to CNAs. This system enables multiple VMs to access an integrated storage pool to improve the efficiency of resource utilization. VIMS is the basis for virtualizing multiple storage servers and it provides multiple services such as live storage migration, dynamic storage resource scheduling, and high availability.
In a VIMS application scenario:
Three CNA servers are deployed, each of which runs two VMs. The VMs regard their virtual disks as local SCSI targets, but they are actually VIMS volume files.
Each CNA server's VM files are stored in specified VIMS sub-directories. When a VM is running, the VIMS locks its virtual disks to ensure shared reading and exclusive writing.
Each CNA server can connect to the entire VIMS space. A VIMS volume is a cluster volume that provides distributed lock management to balance access and enable CNA servers to share the clustered storage pool.
VIMS has the following characteristics:
1. Hierarchical directories
2. Applying to VMs in a cluster
3. Distributed lock management and logical volume management
4. Scaling among multiple storage disks and dynamic datastore expansion
5. Quick restoration on clustered file systems with logs
6. Independent encapsulation for VM files
VIMS uses abstract processing to simplify storage infrastructure architecture. It allows multiple virtualization servers to access storage devices concurrently to provide efficient storage pooling.

Other related questions:
Is the firewall virtual system controlled by the license?
Yes.

Configuring virtual systems on the USG6000 series
The virtual system has the following application scenarios: 1. An enterprise may have multiple departments, and each department has specific functions and responsibilities and requires specific network management policies, which complicate the configuration. As the egress gateway of the enterprise network, the NGFW uses virtual systems to manage departments separately, simplifying the configuration. For configuration details, search for "Web Example for Configuring Virtual Systems to Isolate Enterprise Departments (Layer-3 Access, Virtual Systems Sharing the WAN Interface of the Root System)" in the product documentation. 2. The NGFW functions as the access gateway of the office area of a large campus network to protect the intranet. The intranet has multiple service departments, and the administrator configures virtual systems for each department to implement independent management over department networks. For configuration details, search for "Web Example for Configuring Virtual Systems to Isolate Enterprise Departments (Layer-3 Access, Virtual Systems Having Independent WAN Interfaces)" in the product documentation. 3. When the NGFW connects to an intranet through Layer-2 access, configure virtual systems to isolate enterprise departments and facilitate configuration management by different administrators. For configuration details, search for "Web Example for Configuring Virtual Systems to Isolate Enterprise Departments (Layer-2 Access)" in the product documentation.

Whether IPSec supports virtual systems on the USG5000
The USG500 does not support IPSec in virtual systems. However, IPSec services can be isolated using VPN instances.

Whether the USG6000 virtual firewall supports DHCP
The USG6000 virtual system supports configuring DHCP and DHCP relay but not DHCPv6 or DHCP Snooping. The configuration commands are the same as those for the root system. For details, see the DHCP chapter of the product documentation.

If you have more questions, you can seek help from following ways:
To iKnow To Live Chat
Scroll to top