FAQs

FAQ Overview

Overview

Q. What are the key features of the FUJITSU Cloud IaaS Trusted Public S5?
A. On-demand: scales to fit business needs at any time, hourly based pay for use
Simplified design: template library, configurable DMZ/Firewall, all virtual, all IP-based
Service Portal: create/customize infrastructure, monitor/start/stop/backup, etc…
Safety & Reliability: built-in redundancy, performance warranties, IP-VPN connectivity

Networking and Connectivity Topics

Q. Error during login to globalcloud.de.fujitsu.com with your client certificate.
A. If you get an error during login to globalcloud.de.fujitsu.com with your client certificate, check in the internet settings if protocols TLS 1.1 and/or TLS 1.2 are enabled.
Disable both protocols and retry the login.

Security & ComplianceTopics

Q. Compliance
A. Our hosted services provide full compliance with applicable legislation. In addition, the Dashboard allows users to perform detailed monitoring of the operational status of each resource in the virtual system that has been created. The FUJITSU Cloud IaaS Trusted Public S5 is provided through certified datacenters in each region of the world.

Q. If Fujitsu retains NO Admin privilege to customer servers, is there any mechanism to "assist" a locked out customer?
A. No. It is the customers responsibility to manage administrator passwords to all servers

Q. Can a customer apply their own OS Licensing (ex: windows) to a VM?
A. No, they must utilize the images with OS included.

Q. How Secure is the FUJITSU Cloud IaaS Trusted Public S5?
A. The Service Portal requires User/Password for basic functionality. The complete functionality will be provided by certificate based authentication.
Security Tiers: Customers can configure and provision secure infrastructure from single to 3 tiers (DMZ, secure1, secure2) with built-in firewall for each virtual system. Firewalls can be individually configured. Customer controls their own firewalls configurations for Global IP addresses and between all tiers.

Q. How does FUJITSU Cloud IaaS Trusted Public S5 manage the various virtuel customer environments?
A. VLAN technologies are employed internally to segment customer traffic SSL-VPN is used to provide customer connectivity to their cloud virtual systems Storage Security: Physical storage chassis encrypted with AES128 equivalent method.

Q. What other forms of security / reliability / data integrity are provided?
A. All Backups of System and Data disks are destroyed when servers are deleted Zero-Write-Disk technique used when Servers are destroyed (on system & data disks).

Resiliency / Reliability / SLA Topics

Q. How Resilient is the FUJITSU Cloud IaaS Trusted Public S5?
A. Data Center: Enterprise-Class architecture is built into local Tier III Fujitsu Data Center environment. VM Automatic Failover: in case of physical server fault, VM will restart on another server (data being processed at time of failure is not guaranteed) Network: Physical redundancy between racks as well as inside a rack. Active-Standby configuration with Linux Bonding (XenBridge = vSwitch, Bonding for dual Eth) Storage: Eternus storage with RAID5 configuration, copies of data across 4 physical disks. Virtualization and HA achieved with mirroring of PCL GDS (global disk services) Internet Connection: Fully redundant switchover time for equipment within 1 minute

Billing Topics

Q. How is billing handled for infrastructure consumption in the FUJITSU Cloud IaaS Trusted Public S5?
A. Operating time is rounded up to the next Hour (ex: 1H 45M -> 2H)
Network traffic is rounded down to the previous GB. (ex: 31.5GB -> 31GB)
Charge from the start of usage of the resource/function.
Charging type is based on service

Type – I: Rate based (1 hr units); applies to VMs, Global IP Address service, Load Balancer service
Type – II: Rate based (monthly, independent of VM or CPUs): applies to VM OS (ex: Microsoft Windows)
Type – III: Rate based (monthly and number of CPUs); applies to VM Middleware (ex: SQL Server)
Type – IV: Rate based (Time and Capacity); applies to system disk, addtl disk, template storage, backups, etc..
Type – V: Usage Amount ; applies to internect Connection service (ex: usage of SSL-VPN)
Type – VI: Usage Counts; charging performed by each single use of the service (ex: System template service for first time creation)
Note: See pricing sheets for detailed pricing information

Support Topics

Q. What forms of Service Desk and Support are available for customer infrastructure?
A. Service Desk provides a single point of contact for customers to raise and progress calls , providing the incident and problem functions for the FUJITSU Cloud IaaS Trusted Public S5.
The Service Desk is 24 x 7 hours available. You can find the contact information on the inquiries page.

Performance and Limitations

Q. Which technical limitations apply for the system infrastructure?
A.
Max. number of Resource Controllers per a contract No explicit limit
Max. number of Custom Authorization Patterns per a system (Central Management Privilege pattern) No explicit limit
Max. number of Custom Authorization Patterns per a contract (Virtual System Management Privilege pattern) No explicit limit
Max. number of systems per a contract No explicit limit
Max. number of VMs and SLB built-in servers per a segment (except Firewall) 20
Max. number of VMs and SLB built-in servers per a system (except FW) 20
Max. number of additional disks per a system No explicit limit
Max. capacity of an additional disk 10TB (=10,000GB)
Max. number of attachable additional disks per a VM 14
Max. number of global IP addresses per a system 10
Max. number of backups per a system disk No explicit limit
Max. number of backups per an additional disk No explicit limit