Symantec 5.1 manuel d'utilisation

1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52

Aller à la page of

Un bon manuel d’utilisation

Les règles imposent au revendeur l'obligation de fournir à l'acheteur, avec des marchandises, le manuel d’utilisation Symantec 5.1. Le manque du manuel d’utilisation ou les informations incorrectes fournies au consommateur sont à la base d'une plainte pour non-conformité du dispositif avec le contrat. Conformément à la loi, l’inclusion du manuel d’utilisation sous une forme autre que le papier est autorisée, ce qui est souvent utilisé récemment, en incluant la forme graphique ou électronique du manuel Symantec 5.1 ou les vidéos d'instruction pour les utilisateurs. La condition est son caractère lisible et compréhensible.

Qu'est ce que le manuel d’utilisation?

Le mot vient du latin "Instructio", à savoir organiser. Ainsi, le manuel d’utilisation Symantec 5.1 décrit les étapes de la procédure. Le but du manuel d’utilisation est d’instruire, de faciliter le démarrage, l'utilisation de l'équipement ou l'exécution des actions spécifiques. Le manuel d’utilisation est une collection d'informations sur l'objet/service, une indice.

Malheureusement, peu d'utilisateurs prennent le temps de lire le manuel d’utilisation, et un bon manuel permet non seulement d’apprendre à connaître un certain nombre de fonctionnalités supplémentaires du dispositif acheté, mais aussi éviter la majorité des défaillances.

Donc, ce qui devrait contenir le manuel parfait?

Tout d'abord, le manuel d’utilisation Symantec 5.1 devrait contenir:
- informations sur les caractéristiques techniques du dispositif Symantec 5.1
- nom du fabricant et année de fabrication Symantec 5.1
- instructions d'utilisation, de réglage et d’entretien de l'équipement Symantec 5.1
- signes de sécurité et attestations confirmant la conformité avec les normes pertinentes

Pourquoi nous ne lisons pas les manuels d’utilisation?

Habituellement, cela est dû au manque de temps et de certitude quant à la fonctionnalité spécifique de l'équipement acheté. Malheureusement, la connexion et le démarrage Symantec 5.1 ne suffisent pas. Le manuel d’utilisation contient un certain nombre de lignes directrices concernant les fonctionnalités spécifiques, la sécurité, les méthodes d'entretien (même les moyens qui doivent être utilisés), les défauts possibles Symantec 5.1 et les moyens de résoudre des problèmes communs lors de l'utilisation. Enfin, le manuel contient les coordonnées du service Symantec en l'absence de l'efficacité des solutions proposées. Actuellement, les manuels d’utilisation sous la forme d'animations intéressantes et de vidéos pédagogiques qui sont meilleurs que la brochure, sont très populaires. Ce type de manuel permet à l'utilisateur de voir toute la vidéo d'instruction sans sauter les spécifications et les descriptions techniques compliquées Symantec 5.1, comme c’est le cas pour la version papier.

Pourquoi lire le manuel d’utilisation?

Tout d'abord, il contient la réponse sur la structure, les possibilités du dispositif Symantec 5.1, l'utilisation de divers accessoires et une gamme d'informations pour profiter pleinement de toutes les fonctionnalités et commodités.

Après un achat réussi de l’équipement/dispositif, prenez un moment pour vous familiariser avec toutes les parties du manuel d'utilisation Symantec 5.1. À l'heure actuelle, ils sont soigneusement préparés et traduits pour qu'ils soient non seulement compréhensibles pour les utilisateurs, mais pour qu’ils remplissent leur fonction de base de l'information et d’aide.

Table des matières du manuel d’utilisation

  • Page 1

    Veritas CommandCentral ™ Getting Started Guide for Microsoft Windows and UNIX 5.1[...]

  • Page 2

    CommandCentral ™ Getting Started Guide The software described in this book is furnished under a license agreement and may be used only in accordance with the terms of the agreement. Documentation version 5.1.0 Legal Notice Copyright © 2008 Symantec Corporation. All rights reserved. Symantec, the Symantec logo, Veritas, CommandCentral, NetBackup,[...]

  • Page 3

    Symantec Corporation 20330 Stevens Creek Blvd. Cupertino, CA 95014 http://www.symantec.com[...]

  • Page 4

    Technical Support Symantec Technical Support maintains support centers globally. Technical Support ’ s primary role is to respond to specific queries about product features and functionality. The Technical Support group also creates content for our online Knowledge Base. The Technical Support group works collaboratively with the other functional [...]

  • Page 5

    ■ Version and patch level ■ Network topology ■ Router, gateway, and IP address information ■ Problem description: ■ Error messages and log files ■ Troubleshooting that was performed before contacting Symantec ■ Recent software configuration changes and network changes Licensing and registration If your Symantec product requires regist[...]

  • Page 6

    Maintenance agreement resources If you want to contact Symantec regarding an existing maintenance agreement, please contact the maintenance agreement administration team for your region as follows: contractsadmin@symantec.com Asia-Pacific and Japan semea@symantec.com Europe, Middle-East, and Africa supportsolutions@symantec.com North America and La[...]

  • Page 7

    Getting started with the CommandCentral family This document includes the following topics: ■ About the CommandCentral family ■ About Veritas CommandCentral Storage ■ About Veritas CommandCentral Storage Change Manager ■ About Veritas CommandCentral Enterprise Reporter ■ Getting CommandCentral up and running ■ Where to find more informa[...]

  • Page 8

    ■ CommandCentral Enterprise Reporter: Provides a global view of storage assets mapped to your organization, business insight about inventory and utilization, on-demand customized reporting, and personalized dashboards. For more information, refer to the following: See “ About Veritas CommandCentral Enterprise Reporter ” on page 20. About Veri[...]

  • Page 9

    What ’ s new in CommandCentral Storage 5.1 CommandCentral Storage 5.1 contains and builds upon CommandCentral Storage 5.0 functionality, providing several new features. Management and discovery CommandCentral Storage 5.1 introduces the following management and discovery features. Enhanced agentless discovery of storage resources If you do not ins[...]

  • Page 10

    explorer polls the storage array using the polling interval — for example, a polling interval of 180 minutes. Change detection is available for the following storage arrays: ■ EMC CLARiiON ■ EMC Symmetrix ■ Hitachi HiCommand ■ HP EVA ■ NetApp unified storage devices For information about enabling change detection, see the CommandCentral[...]

  • Page 11

    Added support for discovery of ESX servers through the VMware Infrastructure SDK In CommandCentral Storage 5.1, you can now configure discovery of ESX servers through the VMware Infrastructure SDK (VI SDK). This allows you to discover individual ESX servers through VI SDK or a VirtualCenter that manages multiple ESX servers through VI SDK. For info[...]

  • Page 12

    ■ VxVM volumes Added the Switch Port Usage Trend report You can now view the Switch Port Usage Trend report, which allows you to track used and unused ports over a specified time frame. New sample ad hoc reports CommandCentral Storage now includes the following sample ad hoc reports: ■ Application Access Path Inventory Report: Presents all the [...]

  • Page 13

    ■ Managed host ■ Switch port ■ NAS (TB) Because of these new licensing options, you need to obtain new licenses when you upgrade to CommandCentral 5.1. When you upgrade to 5.1, an evaluation license installs. The evaluation license is valid for 60 days. Obtain new licenses before the evaluation license expires. For more information about obta[...]

  • Page 14

    Added links to access the CommandCentral Storage Change Manager Console If you enable CommandCentral Storage Change Manager on your Management Server, you can load the CommandCentral Storage Change Manager Console from the CommandCentral Storage Console. To do this, you can use the following links: ■ Storage Change Manager — this link appears i[...]

  • Page 15

    For more information about the hotfix deployment mechanism, see the CommandCentral Administrator ’ s Guide . What you can do with CommandCentral Storage Symantec strives to help you manage the integrity of your information by enabling you to maintain the right balance of information security and availability. Symantec delivers market-leading tech[...]

  • Page 16

    Responding to this problem, some enterprises have implemented storage area networks (SANs) in which storage is placed on its own dedicated network. This dedicated network can improve efficiency and reliability by effectively separating traffic on the storage network from traffic on the main user network. Storage virtualization CommandCentral Storag[...]

  • Page 17

    ■ Generate reports about the network ’ s physical resources and about storage usage ■ Troubleshoot network elements ■ Manage day-to-day performance and resource availability ■ Develop a data protection strategy and assure that the storage network is secure Meeting the needs of storage administrators with CommandCentral Storage CommandCent[...]

  • Page 18

    Storage provisioning Using tools provided in CommandCentral Storage, a storage administrator can allocate storage resources to specific hosts and applications and control access to storage resources. You can also create LUNs from unconfigured storage. Another feature allows provisioning jobs to be scheduled for times when the network is less busy. [...]

  • Page 19

    ■ Identifies potential risks to your storage infrastructure based on best practice policies. With risks, storage administrators can identify the impacted storage resources and take the necessary action to remove the risk from your storage infrastructure. ■ Lets you view reports that provide an enterprise – wide view of the changes that occur [...]

  • Page 20

    ■ View reports that provide an enterprise – wide view of the changes made to your storage resources, a summary of the hosts and applications that have policies applied to them, and details about violations, including the time that it takes to resolve violations and the type of violations that have generated. ■ Display an overall view of the c[...]

  • Page 21

    organized by location, departments, or any other logical business unit. This summarized information enables you to assess trends in your storage environment, which you can then analyze to assign responsibility. If you are a storage administrator, you can use Enterprise Reporter to identify capacity trends, review storage inventory, and determine ho[...]

  • Page 22

    What's new in CommandCentral Enterprise Reporter 5.0 MP1 CommandCentral Enterprise Reporter 5.0 MP1 contains and builds upon previous Enterprise Reporter functionality, providing several new features. ■ Data rollup enhancements ■ Storage tier rule builder enhancements ■ Reporting enhancements ■ Security enhancements Data rollup enhance[...]

  • Page 23

    You can now use these custom attributes in Enterprise Reporter reports. In Query Studio, they appear in the list of storage object views with the prefix of "Custom Attribute." For example, to see custom attributes in the Switch Analysis package in Query Studio, select Switch Analysis Views > by Switch Attributes > Switch. Data sourc[...]

  • Page 24

    ■ NetApp Volumes Dashboard customization with selected reports By default, the Dashboard shows report categories and their descriptions. With Enterprise Reporter 5.0 MP1, you can customize the Dashboard to show any report, including one that you created. Enterprise Reporter provides a new "Set This as Home Report" option that enables yo[...]

  • Page 25

    Security enhancements Enterprise Reporter includes additional security features. SSL mode Cognos now runs in SSL mode, enabling enhanced security. User permission enhancements Enterprise Reporter now restricts actions based on the following user permissions: ■ Administrator ■ Read-write ■ Read-only For more information about restricting actio[...]

  • Page 26

    Business executives and storage administrators can use Enterprise Reporter to do the following: ■ Develop highly customizable business views of data from multiple data sources. For example, administrators can discover global storage usage trends and drill down to identify high consumers across geographic or business units. ■ Create storage tier[...]

  • Page 27

    Getting CommandCentral up and running To get CommandCentral up and running, review information about planning tips, system requirements, and the installation process. The following topics provide more information: ■ Planning tips for installation, configuration, and deployment of CommandCentral ■ System requirements for CommandCentral ■ Insta[...]

  • Page 28

    Table 1-1 Supported operating systems for CommandCentral components Operating systems supported Component Solaris and Windows CommandCentral Storage Management Server Solaris and Windows CommandCentral Storage Change Manager Management Server Solaris Enterprise Reporter Management Server Solaris, Windows, Red Hat Linux, SUSE Linux, AIX, and HP-UX. [...]

  • Page 29

    ■ Mount the product disc ■ Run the product installer ■ Perform post-installation setup For more information about the installation process refer to the following: ■ For CommandCentral Storage and CommandCentral Storage Change Manager, refer to the CommandCentral Installation Guide . ■ For CommandCentral Enterprise Reporter, refer to the C[...]

  • Page 30

    Diagnostic tools are also available to assist in troubleshooting problems associated with the product. These tools can be downloaded from the Symantec FTP site. The following troubleshooting tools are available specifically for use with CommandCentral Storage: ■ Run the getinfo script (on UNIX) ■ Point to the Serverport and gather data using a [...]

  • Page 31

    Provides information about supported operating systems, host resource requirements, software limitations, and known issues. CommandCentral Storage Release Notes Describes how you can use CommandCentral Storage to monitor, manage, and report on your storage infrastructure. CommandCentral Storage User ’ s Guide Provides information about third-part[...]

  • Page 32

    Describes how you can use CommandCentral Storage Change Manager to view your storage resources, view detailed descriptions about changes to those storage resources, set up policies, and view violations to those policies. CommandCentral Storage Change Manager User ’ s Guide Provides information about third-party software that is used in CommandCen[...]

  • Page 33

    storage_management_docs@symantec.com Please include the following information with your documentation comments: ■ The title and product version of the guide you are commenting on ■ The topic (if relevant) you are commenting on ■ Your comment ■ Your name 33 Getting started with the CommandCentral family Where to find more information about C[...]

  • Page 34

    Getting started with the CommandCentral family Where to find more information about CommandCentral 34[...]

  • Page 35

    access group See array virtual port. active zone set The zone set that is currently enforced on a Fibre Channel fabric. Only one zone set can be active for a fabric at a given time. See also zone set. addressable storage See LUN storage. addressable unit Any storage resource in the network that is ready to be allocated for use by hosts and applicat[...]

  • Page 36

    array virtual port A logical — or, as it is commonly called, "virtual" — port defined for some array types that support SMI-S 1.0.2 and earlier. When an array virtual port (or AVP) is defined, the array can support LUN masking with multiple, heterogeneous hosts through a single physical array port. Depending on the array vendor, array[...]

  • Page 37

    CLARiiON storage group In an EMC CLARiiON storage array, a set of addressable units (LUNs) defined so that an operator can perform one LUN masking operation for the entire set of LUNs rather than separately for each LUN. Contrast with storage group. cluster A set of hosts (each termed a node) that share a set of disks and are connected by a set of [...]

  • Page 38

    Console provides a central point to display and manage storage resources, create and modify policies, provision storage, administer access control, and view reports. CommandCentral Storage database A database, residing on the Management Server, that gathers data related to performance and monitoring, reports, alarms, service requests, and the Hardw[...]

  • Page 39

    deleted objects, destroyed objects cannot be restored to the CommandCentral Storage database by a rediscover operation. Contrast with delete. device A collective term for disks, tapes, disk arrays, tape arrays, and any other objects that store data. Also storage device. device handle The name the operating system uses to identify a storage resource[...]

  • Page 40

    event A notification that indicates when an action, such as an alert or a change in state, has occurred for one or more objects on the storage network. explorer A software tool that uses a unique methodology to discover information about a particular kind of resource on the storage network. The CommandCentral Storage product includes several explor[...]

  • Page 41

    GBIC Gigabit interface converter. A widely used transceiver module for Fibre Channel. A GBIC is modular and hot-swappable and can be either copper or optical. generic device A disk or tape device. When generic storage devices are visible to a host running the Hardware Abstraction Layer (HAL), the CommandCentral Storage Console displays the correct [...]

  • Page 42

    host storage domain See array virtual port. hub A common connection point for devices in the storage network. The hub may be unmanaged, IP-managed, or FC-managed. An unmanaged hub is passive in the sense that it serves simply as a conduit for data, moving the data from one storage resource to another. IP-managed and FC-managed hubs are intelligent,[...]

  • Page 43

    associated with the LUN (the access path) between that AddrUnit and an array port to which it is bound. The access control list for a LUN contains the World Wide Name of each HBA port that is allowed to access that LUN within the array. LUN Query Tool A CommandCentral Storage tool that helps you find LUNs on your storage network that match one or m[...]

  • Page 44

    object A single, unique addressable entity on a storage network. It is possible for objects to be present within objects. For example, while a tape array is an object, each individual tape drive within the array is also an object. A host is an object, and the HBA inside the host is also an object. Each object has one or more attributes and can be a[...]

  • Page 45

    Push Install See CommandCentral Storage Agent Push Install Utility. QoSS (Quality of storage service) A technique for managing storage resources to fulfill predefined service-level criteria. For each service level, or tier, policy rules are used to ensure the appropriate level of availability and performance. Also called storage tiering. qtree In N[...]

  • Page 46

    SAN Access Layer (SAL) A component that performed discovery and access control in the SANPoint Control and CommandCentral Storage 4.x products. See Hardware Abstraction Layer (HAL). scan An operation that detects all resources visible to an explorer through either an in-band connection or a device manager. A CommandCentral Storage operator can init[...]

  • Page 47

    cooperating systems that must adhere to a common framework and a common language or protocol. soft zoning A fabric zoning method that filters the visibility of objects on the storage network so that an object can only see other objects that share at least one zone membership with it. Unlike hard zoning, soft zoning is not enforced at the switches t[...]

  • Page 48

    Symantec Product Authentication Service A component of Veritas Security Services (VxSS) that is used by CommandCentral Storage to provide user authentication. Authentication Service is a set of processes and runtime libraries that enables users to log on to multiple Veritas products with one login. See also Symantec Product Authorization Service. S[...]

  • Page 49

    when the SAN runs an unsupported HBA card or driver version, there is no managed host attached to the HBA, or the Management Server is not configured to communicate with the managed host. For storage devices, this can occur when no LUNs are visible to a managed host (usually due to zoning or LUN masking security). unified logging A common logging l[...]

  • Page 50

    administrative operations on resources, including starting, stopping, restarting, and monitoring at the service group level. Veritas NetBackup A Symantec product family that provides a fast, reliable backup and recovery solution for environments ranging from terabytes to petabytes in size. The term NetBackup refers to either of two products that in[...]

  • Page 51

    volume In storage media managed by Veritas Volume Manager, a virtual disk made up of a portion or portions of one or more physical disks and representing an addressable range of disk blocks. It is used by applications such as file systems or databases. In an IBM DS6000 or DS8000 array, an addressable unit (LUN) that is created from an extent pool. [...]

  • Page 52

    CommandCentral Glossary 52[...]