Hardware manual

xiii
Preface
This document describes PS Series group functionality and management operations. It describes how you use the
Group Manager graphical user interface (GUI) to perform tasks.
For information about using the command line inte
rface (CLI) to manage a group, see the CLI Reference manual on
the EqualLogic customer support Website.
Audience
This documentation is for administrators responsible for managing a PS Series group or SAN storage and also for
individuals interested to learn more about group operation. You can manage a PS Series array without extensive
network or storage experience. It is important that understand:
Basic networking concepts – IP addresses, network bandwidth, and network interfaces.
Current network environment – How your LAN is currently configured such as whether it is organized into
subnets, whet
her you use an NTP server, and the type of iSCSI initiators that you use.
User disk storage requirements – How you intend to
assign storage space on the group to your user community
and the kind of service level agreement you maintain for data recovery.
RAID configurations – The method of disk-level data
security that you want to implement through a RAID
policy
Disk storage management – Principles for implementing data se
curity and recovery.
Note: Although this documentation includes examples of
PS Series arrays in some common network
configurations, information about setting up a network is beyond the scope of this manual. Go to the
EqualLogic customer support Website to find more information about network requirements.
Organization
Part I: General Group Management:
Chapter 1, Storage solutions for all enterprises,
includes an introduction to PS Series arrays, group features,
and functionality.
Chapter 2, Common gr
oup tasks, describes some common post-setup tasks that Dell recommends.
Chapter 3, Group
Manager user interfaces, describes the user interfaces for managing a group and how to
access online help.
Chapter 4, Group se
curity, describes how to use accounts to protect your group from unauthorized access and
how to set up a dedicated management network.
Chapter 5, Gro
up configuration, describes how to modify the basic group configuration.
Chapter 6, Group me
mbers, describes how to set the RAID policy for a member and configure the member
network configuration.