Hardware manual

Group Administration Index
Index-3
members 6-1
MIBs 14-6, 14-7
monitoring 15-1
name 5-5
network configuration 5-5
notification of events 14-2
pools 7-1
RAID support 6-4
removing members 6-14
scalability 1-3
security 1-4, 1-5
shutting down 5-6
SMTP servers 14-3
snapshots 11-1
SNMP access 4-11
user interfaces 3-1
VDS/VSS access 4-12
volumes 9-1
group IP address 5-5
modifying 5-5, 5-6
usage 5-5
GUI
alarm notification
3-6
communication policies 3-6
controlling operation 3-5
event display 3-6
help location 3-7
icons 3-4
navigating 3-2
reconnecting 3-6
refresh data interval 3-6
requirements 3-1
standalone application 3-1
starting 3-1
user preferences 3-5
H
hardware
monitoring
15-16, 15-17
help, accessing 3-7
host-based applications 1-6
access requirements 4-12
I
iSCSI
snapshot security
11-2
iSCSI connections
monitoring
15-3, 15-24
iSCSI discovery
configuring iSNS servers
8-5
preventing 8-6
iSCSI targets
authentication
8-4
connecting to 8-7
controlling access 8-1
multi-host access 8-4, 8-6
mutual authentication 8-4
naming 9-1
preventing discovery 8-6
security 1-5
snapshots 11-1
iSNS discovery
enabling on a volume
9-14
restriction 8-5
iSNS servers
configuring
8-5
deleting 8-5
modifying 8-5
J
Java
requirements for standalone GUI
3-1
L
load balancing
disabling automatic
5-6
enabling automatic 5-6
types of 1-4
local replication reserve 12-8
borrowing pool space 12-8
sizing 12-9, 12-10
specifying 12-25
lost blocks
snapshots
10-17
volumes 10-17
M
management network
adding a member
4-17
disadvantages 4-14
displaying 4-16
post-setup tasks 4-16
prerequisites 4-14
unconfiguring 4-18
manual transfer replication 12-3, 12-28
Manual Transfer Utility 12-3
members
adding to group
5-4
behavior
during drive failure
15-23
during drive replacement 15-23
binding a volume to 10-16