Hardware manual
Group Administration Basic volume operations
9–8
– Name, status, and security (access)
– Capacity and reserve
– iSCSI connections
– Storage pool and (if a thin clone) template volume
– Replication identifiers
• Volume and snapshot space panel – Provides information ab
ou
t volume use:
– Size, capacity use, and reserve allocation
– Whether the volume is thin provisioned
– Snapshot reserve and space use
– Policies for recovery, RAID, load balancing, and me
mber striping
–
Whether the volume is a thin clone, and the
amount of shared space
See the online help for information about the data fields and options.
Displaying access control records
Click Volumes in the lower-left panel, then expand Volumes in the far-left tree, then select the volume name, and
then click the
Access tab. The Volume Access window appears, containing the following information for
volumes and snapshots:
• CHAP user name
• IP address or range
• iSCSI initiator name
An asterisk in the CHAP user, IP address, or iSCSI initiator col
umn means that any value meets the condition. If a
record shows aste
risks in all columns, the volume or snapshot has unrestricted access, which Dell does not
recommend.
See the online help for information about the data fields and options. See also iSCSI tar
get security on page 8-1.
Displaying volume snapshots
Click Volumes in the lower-left panel, then expand Volumes in the far-left tree, then select the volume name, and
then click the
Snapshots tab. The Volume Snapshots window appears, containing the following panels:
• Snapshot summary panel – Provides information about:
– Reserve space and capacity allocation
– Warning settings and recovery policy
– Snapshot schedules and schedule status
• Snapshots panel
– Provides information about:
– Creation timestamp, size, and status