Setting A Password........................................................................................................................ 51
Adding Or Editing A Comment To An Existing Storage Array......................................................51
Removing Storage Arrays..............................................................................................................52
Enabling Premium Features.......................................................................................................... 52
Displaying Failover Alert................................................................................................................52
Changing The Cache Settings On The Storage Array..................................................................53
Changing Expansion Enclosure ID Numbers............................................................................... 53
Changing The Enclosure Order....................................................................................................53
Configuring Alert Notifications...........................................................................................................54
Configuring E-mail Alerts..............................................................................................................54
Configuring SNMP Alerts...............................................................................................................55
Battery Settings................................................................................................................................... 58
Changing The Battery Settings..................................................................................................... 59
Setting The Storage Array RAID Controller Module Clocks.............................................................. 59
4 Using iSCSI................................................................................................................61
Changing The iSCSI Target Authentication........................................................................................61
Entering Mutual Authentication Permissions..................................................................................... 61
Creating CHAP Secrets....................................................................................................................... 62
Initiator CHAP Secret.................................................................................................................... 62
Target CHAP Secret...................................................................................................................... 62
Valid Characters For CHAP Secrets.............................................................................................. 62
Changing The iSCSI Target Identification..........................................................................................63
Changing The iSCSI Target Discovery Settings................................................................................. 63
Configuring The iSCSI Host Ports...................................................................................................... 64
Advanced iSCSI Host Port Settings.....................................................................................................65
Viewing Or Ending An iSCSI Session.................................................................................................. 65
Viewing iSCSI Statistics And Setting Baseline Statistics.....................................................................66
Edit, Remove, Or Rename Host Topology.........................................................................................66
5 Event Monitor..........................................................................................................69
Enabling Or Disabling The Event Monitor..........................................................................................69
Windows........................................................................................................................................69
Linux...............................................................................................................................................70
6 About Your Host......................................................................................................71
Configuring Host Access.....................................................................................................................71
Using The Host Mappings Tab............................................................................................................72
Defining A Host..............................................................................................................................72
Removing Host Access....................................................................................................................... 73
Managing Host Groups....................................................................................................................... 73
Creating A Host Group........................................................................................................................73
Comentarios a estos manuales