Assuredsan 4004 Series Raidar User Guide
Total Page:16
File Type:pdf, Size:1020Kb
AssuredSAN 4004 Series RAIDar User Guide Abstract This guide is for use by storage administrators to manage a Dot Hill AssuredSAN 4004 Series storage system by using its web interface, RAIDar Storage Management Utility. P/N 83-00006696-11-01 Revision A March 2014 Copyright © 2014 Dot Hill Systems Corp. All rights reserved. Dot Hill Systems Corp., Dot Hill, the Dot Hill logo, AssuredSAN, AssuredSnap, AssuredCopy, AssuredRemote, EcoStor, SimulCache, R/Evolution, and the R/Evolution logo are trademarks of Dot Hill Systems Corp. All other trademarks and registered trademarks are proprietary to their respective owners. The material in this document is for information only and is subject to change without notice. While reasonable efforts have been made in the preparation of this document to assure its accuracy, changes in the product design can be made without reservation and without notification to its users. Contents About this guide. 13 Intended audience . 13 Prerequisites. 13 Related documentation . 13 Document conventions and symbols . 14 1 Getting started . 15 Configuring and provisioning a new storage system . 15 Browser setup . 15 Signing in . 15 Tips for signing in and signing out . 16 Tips for using the main window . 16 Tips for using the help window . 17 System concepts . 17 About user accounts. 17 About vdisks . 18 About spares. 19 About volumes. 20 About hosts. 21 About volume mapping . 22 About volume cache options . 23 About managing remote systems . 24 About the Snapshot feature . 24 About the Volume Copy feature. 27 About the AssuredRemote replication feature. 28 About the VDS and VSS hardware providers. 28 About the Storage Replication Adapter (SRA) . 28 About RAID levels . 28 About size representations . 30 About the system date and time . 31 About storage-space color codes . 31 About Configuration View icons . 32 About disk failure and vdisk reconstruction . 32 About data protection in a single-controller storage system . 33 About managed logs . 33 About performance monitoring . 34 About firmware update. 35 About Full Disk Encryption. 36 2 Configuring the system . 37 Using the Configuration Wizard. 37 Step 1: Starting the wizard . 37 Step 2: Changing default passwords . 37 Step 3: Configuring network ports . 37 Step 4: Enabling system-management services. 38 Step 5: Setting system information . 39 Step 6: Configuring event notification. 39 Step 7: Configuring host ports. 40 Step 8: Confirming configuration changes . 41 Installing a license . 41 Configuring system services . 42 Changing management interface settings . 42 Configuring email notification . 43 Contents 3 Configuring SNMP notification . 44 Configuring syslog notification . 44 Configuring user accounts . 45 Adding users. 45 Modifying users. 46 Removing users . 48 Configuring system settings . 48 Changing the system date and time . 48 Changing host interface settings . ..