Professional Documents
Culture Documents
Table of contents
Reference architecture overview ........................................................................................................... 4
Document purpose .......................................................................................................................... 4
Solution purpose ............................................................................................................................. 4
The business challenge.................................................................................................................... 4
The technology solution ................................................................................................................... 5
Data management............................................................................................................................ 5
Key components ................................................................................................................................... 6
Introduction ..................................................................................................................................... 6
Genetec Security Center ................................................................................................................... 6
Digital video streams ................................................................................................................... 6
Genetec Security Center main server and expansion server ......................................................... 7
Genetec SV-16 appliance ................................................................................................................. 7
Genetec Video Offload server and agent .......................................................................................... 7
VMware vSphere .............................................................................................................................. 7
EMC storage ..................................................................................................................................... 8
Physical architecture ............................................................................................................................ 9
Genetec architecture .......................................................................................................................... 10
Genetec servers ............................................................................................................................. 10
Genetec deployment size ............................................................................................................... 10
Main roles ...................................................................................................................................... 11
Domain secured by EMC RSA .............................................................................................................. 12
Overview ........................................................................................................................................ 12
RSA login ....................................................................................................................................... 12
VMware ESXi architecture................................................................................................................... 13
VMware ESXi reference architecture ............................................................................................... 13
VMware High Availability................................................................................................................ 13
VMware ESX/ESXi requirements and recommendations ................................................................. 14
Minimum requirements ............................................................................................................. 14
Recommended vCPU, memory, and network .............................................................................. 14
Validated environment profile ............................................................................................................ 15
Profile characteristics..................................................................................................................... 15
Hardware resources ....................................................................................................................... 15
Software resources ........................................................................................................................ 16
Conclusion ......................................................................................................................................... 17
This solution enables a security team to view real-time video streams while also
receiving policy-based and anomaly-based alerts. Genetecs sophisticated software
analyzes data from remote locations and historical archives, and generates alerts
based on your criteria.
Additionally, you may deploy VMware as part of this solution. VMware provides a
platform for integrating legacy and state-of-the-art physical security and surveillance
infrastructures, while using virtualization technology to:
The business
challenge
Private businesses and public entities alike have responded to rising concerns about
theft, fraud, and terrorism by sharpening their focus on physical security and
surveillance systems. Organizations such as retailers, casinos, financial institutions,
higher education institutions, transportation companies, law enforcement, school
systems, prison systems, and government agencies all need to manage and protect
their ever-growing volume of physical security information.
The ability to access the right data at the right time from anywhere is crucial to
supporting physical security and surveillance needs. However, the following factors
can hinder achieving a comprehensive solution:
Proprietary software
Lost data
The high expansion costs of legacy video surveillance systems, based on closedcircuit television (CCTV), digital video recorders (DVRs), or network video recorder
(NVR) technologies and non-integrated IT and physical security systems, further
amplify these limitations.
EMC physical security solutions and RSAs two-factor user authentication provide
flexibility to control video surveillance and analyze security incidents in real time,
collect evidence faster, and easily review archived data from anywhere.
EMC storage arrays provide quality storage for the smallest to the largest customers
using a variety of storage topologies including SAN (FC and iSCSI) and NAS (NFS and
CIFS).
Genetec is a global provider of IP video surveillance, access control, and license plate
recognition unified in a single platform called Security Center.
Virtualization with VMware consolidates the number of Genetec Archivers required at
a given site. Aggregating multiple Genetec Archivers onto VMware ESX/ESXi hosts
enables more bandwidth per physical host than is normally recognized from a
physical host.
EMC Physical Security Labs VMware ESXi/EMC storage array bundles provide tested
solutions optimized for various implementation tiers.
With EMC Isilon's easy installation, management, and scalability, this solution also
adds value to non-IT-centric and IT-centric customers alike.
EMC RSA is a security, compliance, and risk-management solution. Using RSAs
constantly changing RSA tokens increases site security and provides a single login
structure for accessing multiple Security Center applications.
Lenovo and EMC have created a new joint venture based on Lenovos record as one of
the fastest-growing technology companies and Iomegas heritage as a leader in
network storage. LenovoEMC delivers quality and ease-of-use for home and smalloffice video security implementations.
Data management
This solution integrates EMC and Genetec technology to help meet the challenges of
video-surveillance information convergence and management. This enterprise-class
solution provides data management in each phase of the video surveillance lifecycle,
including:
Analyzing
Archiving
Authenticating
Key components
Introduction
Genetec Security
Center
VMware vSphere
EMC storage
Although you can use EMC VNX and EMC Isilon storage for high-throughput solutions,
alternate storage solutions include EMC VMAX and LenovoEMC.
Digital video streams
A Security Center Archiver captures digital video streams over TCP/IP and then
typically writes the video to EMC VNX or Isilon storage.
Genetec Video
Offload server and
agent
VMware vSphere
Genetec Omnicast records video through the Omnicast Archiver service. This archived
video is available to users who connect to this systems directory. For mobile
solutions, such as those for cars, trains, planes, and boats, the connection between
the Omnicast Archiver and the Omnicast Directory or even the Omnicast Federation
server is not always available. For this reason, we offload video to an accessible
location. After offloading the video, the archived video is available to all users on the
system, even if the mobile system does not have an active connection to the server.
The video offload system consists of two components:
Control you application service levels with advanced availability and security
features
EMC storage
vMotion: Adds the capability to move a running virtual machine from one ESXi
host to another.
Storage vMotion: Provides the ability to move a running virtual machine from
one storage device to another.
High Availability (HA): In the case of a failure, automatically restarts the virtual
servers (Archivers) on another host in the cluster. VMware HA works well for all
servers.
This reference architecture uses LenovoEMC storage platforms and EMC VNXe, VNX,
and Isilon storage platforms. However, you can integrate different EMC storage
platforms and array sizes with Genetec Security Center to provide a physical security
solution to meet the requirements of any size application.
Table 1 describes EMC storage platforms that are compatible with Genetec software
for physical security.
Table 1.
EMC storage
Description
VNX/VNXe
Isilon
LenovoEMC
The LenovoEMC px12, ix12, px4d, and px2 storage arrays may be
used in many scenarios.
Symmetrix VMAX
The EMC Physical Security Lab tested the EMC Symmetrix VMAX
storage array as part of a Unisys ES7000 G2 test case.
This solution is ideal for very large, demanding installations or
environments that already have Symmetrix VMAX storage arrays.
Physical architecture
Figure 1 shows the overall physical architecture of the core solution.
Figure 1.
Solution architecture
Genetec architecture
Genetec servers
Genetec
deployment size
Deployment guidelines
Component
Validated system
Storage
VMAX, VNX, CX4, CX3, AX4, VNXe, Isilon, NS, NX, LenovoEMC px
series and ix12
Platform
Operating system
VMware
10
Main roles
Table 3 describes the main roles provided by Genetec Security Center for video
surveillance.
Table 3.
Service
Description
Media Router
Directory
Health
monitoring
Archiver
Agent: Controls the transfer of video to the Video Offload server. The
Video Offload agent software is executed on the mobile Omnicast
Archiver.
Server: Receives video from the Video Offload agent. As with the
agent software, the Video Offload server software is executed on a
mobile Omnicast Archiver.
11
This Genetec Security Center solution, installed with EMC RSAs secured domain,
increases Windows and Security Center security. RSA authentication, which uses
constantly changing RSA tokens, increases the users Security Center experience by
providing a single login structure for accessing multiple Security Center applications.
For more information, refer to the EMC white paper entitled EMC Physical Security
In general, the login process for Genetec Security Center applications consists of the
following steps:
1.
The login request using RSA authentication (token) sends the request to the
EMC RSA SecurID appliance.
2.
If the user credentials are correct, the EMC RSA SecurID appliance proxies the
login to Active Directory, and Active Directory authenticates the login into the
requested Windows domain.
3.
4.
The user accesses the requested application. The user may be required to
press Enter before continuing into the application (this is applicationspecific).
5.
User credentials are verified to ensure that the user has access rights for the
requested application.
Figure 2.
12
Figure 3.
13
Minimum requirements
VMware minimum system requirements are as follows:
For a list of compatible hardware, see the VMware Compatibility Guide at the VMware
Technical Resource Center.
Recommended vCPU, memory, and network
Our test environment was configured with the following:
8 GB memory
14
Validated environment
Profile characteristic
Value
Storage topology
Hardware
resources
Solution hardware
Hardware
Quantity
Configuration
Based on
solution
requirements
15
Solution software
Software
Version
Configuration
SP2/R2
64-bit
Genetec Omnicast
Server
4.4 4.8
5.0 5.2
EMC PowerPath
Latest version
EMC Naviagent
Latest version
Security Center,
Security Desk, and
Configuration Tool
Same version as
Omnicast or Security
Center
16
Conclusion
EMC Physical Security enabled by EMC storage arrays, optional EMC RSA security, and
Genetec Security Center products is an ideal solution for surveillance management
and IT infrastructure. The solution provides a flexible and highly scalable
infrastructure that can meet a broad range of demanding physical security
requirements.
As requirements change and become more sophisticated, this EMC Physical Security
solutions flexibility and modular architecture can be enhanced to meet any
customers individual needs.
17