Ir para a página of
Manuais similares
-
Antivirus software
Symantec Norton Internet Security 2011
42 páginas -
Computer Accessories
Symantec 21197367
40 páginas 0.32 mb -
Network Card
Symantec Critical System
122 páginas 1.3 mb -
Computer Drive
Symantec BACKUP EXEC 11D
18 páginas 0.19 mb -
Antivirus software
Symantec Norton AntiVirus Dual Protection (Mac)
26 páginas -
Antivirus software
Symantec Norton 360 v4.0 Premier Edition
44 páginas -
Antivirus software
Symantec Norton AntiVirus 2011
42 páginas -
Antivirus software
Symantec Norton 360 (2013)
44 páginas
Bom manual de uso
As regras impõem ao revendedor a obrigação de fornecer ao comprador o manual com o produto Symantec 5.1. A falta de manual ou informações incorretas fornecidas ao consumidor são a base de uma queixa por não conformidade do produto com o contrato. De acordo com a lei, pode anexar o manual em uma outra forma de que em papel, o que é frequentemente utilizado, anexando uma forma gráfica ou manual electrónicoSymantec 5.1 vídeos instrutivos para os usuários. A condição é uma forma legível e compreensível.
O que é a instrução?
A palavra vem do latim "Instructio" ou instruir. Portanto, no manual Symantec 5.1 você pode encontrar uma descrição das fases do processo. O objetivo do manual é instruir, facilitar o arranque, a utilização do equipamento ou a execução de determinadas tarefas. O manual é uma coleção de informações sobre o objeto / serviço, um guia.
Infelizmente, pequenos usuários tomam o tempo para ler o manual Symantec 5.1, e um bom manual não só permite conhecer uma série de funcionalidades adicionais do dispositivo, mas evita a formação da maioria das falhas.
Então, o que deve conter o manual perfeito?
Primeiro, o manual Symantec 5.1 deve conte:
- dados técnicos do dispositivo Symantec 5.1
- nome do fabricante e ano de fabricação do dispositivo Symantec 5.1
- instruções de utilização, regulação e manutenção do dispositivo Symantec 5.1
- sinais de segurança e certificados que comprovam a conformidade com as normas pertinentes
Por que você não ler manuais?
Normalmente, isso é devido à falta de tempo e à certeza quanto à funcionalidade específica do dispositivo adquirido. Infelizmente, a mesma ligação e o arranque Symantec 5.1 não são suficientes. O manual contém uma série de orientações sobre funcionalidades específicas, a segurança, os métodos de manutenção (mesmo sobre produtos que devem ser usados), possíveis defeitos Symantec 5.1 e formas de resolver problemas comuns durante o uso. No final, no manual podemos encontrar as coordenadas do serviço Symantec na ausência da eficácia das soluções propostas. Atualmente, muito apreciados são manuais na forma de animações interessantes e vídeos de instrução que de uma forma melhor do que o o folheto falam ao usuário. Este tipo de manual é a chance que o usuário percorrer todo o vídeo instrutivo, sem ignorar especificações e descrições técnicas complicadas Symantec 5.1, como para a versão papel.
Por que ler manuais?
Primeiro de tudo, contem a resposta sobre a construção, as possibilidades do dispositivo Symantec 5.1, uso dos acessórios individuais e uma gama de informações para desfrutar plenamente todos os recursos e facilidades.
Após a compra bem sucedida de um equipamento / dispositivo, é bom ter um momento para se familiarizar com cada parte do manual Symantec 5.1. Atualmente, são cuidadosamente preparados e traduzidos para sejam não só compreensíveis para os usuários, mas para cumprir a sua função básica de informação
Índice do manual
-
Página 1
Veritas CommandCentral ™ Getting Started Guide for Microsoft Windows and UNIX 5.1[...]
-
Página 2
CommandCentral ™ Getting Started Guide The software described in this book is furnished under a license agreement and may be used only in accordance with the terms of the agreement. Documentation version 5.1.0 Legal Notice Copyright © 2008 Symantec Corporation. All rights reserved. Symantec, the Symantec logo, Veritas, CommandCentral, NetBackup,[...]
-
Página 3
Symantec Corporation 20330 Stevens Creek Blvd. Cupertino, CA 95014 http://www.symantec.com[...]
-
Página 4
Technical Support Symantec Technical Support maintains support centers globally. Technical Support ’ s primary role is to respond to specific queries about product features and functionality. The Technical Support group also creates content for our online Knowledge Base. The Technical Support group works collaboratively with the other functional [...]
-
Página 5
■ Version and patch level ■ Network topology ■ Router, gateway, and IP address information ■ Problem description: ■ Error messages and log files ■ Troubleshooting that was performed before contacting Symantec ■ Recent software configuration changes and network changes Licensing and registration If your Symantec product requires regist[...]
-
Página 6
Maintenance agreement resources If you want to contact Symantec regarding an existing maintenance agreement, please contact the maintenance agreement administration team for your region as follows: contractsadmin@symantec.com Asia-Pacific and Japan semea@symantec.com Europe, Middle-East, and Africa supportsolutions@symantec.com North America and La[...]
-
Página 7
Getting started with the CommandCentral family This document includes the following topics: ■ About the CommandCentral family ■ About Veritas CommandCentral Storage ■ About Veritas CommandCentral Storage Change Manager ■ About Veritas CommandCentral Enterprise Reporter ■ Getting CommandCentral up and running ■ Where to find more informa[...]
-
Página 8
■ CommandCentral Enterprise Reporter: Provides a global view of storage assets mapped to your organization, business insight about inventory and utilization, on-demand customized reporting, and personalized dashboards. For more information, refer to the following: See “ About Veritas CommandCentral Enterprise Reporter ” on page 20. About Veri[...]
-
Página 9
What ’ s new in CommandCentral Storage 5.1 CommandCentral Storage 5.1 contains and builds upon CommandCentral Storage 5.0 functionality, providing several new features. Management and discovery CommandCentral Storage 5.1 introduces the following management and discovery features. Enhanced agentless discovery of storage resources If you do not ins[...]
-
Página 10
explorer polls the storage array using the polling interval — for example, a polling interval of 180 minutes. Change detection is available for the following storage arrays: ■ EMC CLARiiON ■ EMC Symmetrix ■ Hitachi HiCommand ■ HP EVA ■ NetApp unified storage devices For information about enabling change detection, see the CommandCentral[...]
-
Página 11
Added support for discovery of ESX servers through the VMware Infrastructure SDK In CommandCentral Storage 5.1, you can now configure discovery of ESX servers through the VMware Infrastructure SDK (VI SDK). This allows you to discover individual ESX servers through VI SDK or a VirtualCenter that manages multiple ESX servers through VI SDK. For info[...]
-
Página 12
■ VxVM volumes Added the Switch Port Usage Trend report You can now view the Switch Port Usage Trend report, which allows you to track used and unused ports over a specified time frame. New sample ad hoc reports CommandCentral Storage now includes the following sample ad hoc reports: ■ Application Access Path Inventory Report: Presents all the [...]
-
Página 13
■ Managed host ■ Switch port ■ NAS (TB) Because of these new licensing options, you need to obtain new licenses when you upgrade to CommandCentral 5.1. When you upgrade to 5.1, an evaluation license installs. The evaluation license is valid for 60 days. Obtain new licenses before the evaluation license expires. For more information about obta[...]
-
Página 14
Added links to access the CommandCentral Storage Change Manager Console If you enable CommandCentral Storage Change Manager on your Management Server, you can load the CommandCentral Storage Change Manager Console from the CommandCentral Storage Console. To do this, you can use the following links: ■ Storage Change Manager — this link appears i[...]
-
Página 15
For more information about the hotfix deployment mechanism, see the CommandCentral Administrator ’ s Guide . What you can do with CommandCentral Storage Symantec strives to help you manage the integrity of your information by enabling you to maintain the right balance of information security and availability. Symantec delivers market-leading tech[...]
-
Página 16
Responding to this problem, some enterprises have implemented storage area networks (SANs) in which storage is placed on its own dedicated network. This dedicated network can improve efficiency and reliability by effectively separating traffic on the storage network from traffic on the main user network. Storage virtualization CommandCentral Storag[...]
-
Página 17
■ Generate reports about the network ’ s physical resources and about storage usage ■ Troubleshoot network elements ■ Manage day-to-day performance and resource availability ■ Develop a data protection strategy and assure that the storage network is secure Meeting the needs of storage administrators with CommandCentral Storage CommandCent[...]
-
Página 18
Storage provisioning Using tools provided in CommandCentral Storage, a storage administrator can allocate storage resources to specific hosts and applications and control access to storage resources. You can also create LUNs from unconfigured storage. Another feature allows provisioning jobs to be scheduled for times when the network is less busy. [...]
-
Página 19
■ Identifies potential risks to your storage infrastructure based on best practice policies. With risks, storage administrators can identify the impacted storage resources and take the necessary action to remove the risk from your storage infrastructure. ■ Lets you view reports that provide an enterprise – wide view of the changes that occur [...]
-
Página 20
■ View reports that provide an enterprise – wide view of the changes made to your storage resources, a summary of the hosts and applications that have policies applied to them, and details about violations, including the time that it takes to resolve violations and the type of violations that have generated. ■ Display an overall view of the c[...]
-
Página 21
organized by location, departments, or any other logical business unit. This summarized information enables you to assess trends in your storage environment, which you can then analyze to assign responsibility. If you are a storage administrator, you can use Enterprise Reporter to identify capacity trends, review storage inventory, and determine ho[...]
-
Página 22
What's new in CommandCentral Enterprise Reporter 5.0 MP1 CommandCentral Enterprise Reporter 5.0 MP1 contains and builds upon previous Enterprise Reporter functionality, providing several new features. ■ Data rollup enhancements ■ Storage tier rule builder enhancements ■ Reporting enhancements ■ Security enhancements Data rollup enhance[...]
-
Página 23
You can now use these custom attributes in Enterprise Reporter reports. In Query Studio, they appear in the list of storage object views with the prefix of "Custom Attribute." For example, to see custom attributes in the Switch Analysis package in Query Studio, select Switch Analysis Views > by Switch Attributes > Switch. Data sourc[...]
-
Página 24
■ NetApp Volumes Dashboard customization with selected reports By default, the Dashboard shows report categories and their descriptions. With Enterprise Reporter 5.0 MP1, you can customize the Dashboard to show any report, including one that you created. Enterprise Reporter provides a new "Set This as Home Report" option that enables yo[...]
-
Página 25
Security enhancements Enterprise Reporter includes additional security features. SSL mode Cognos now runs in SSL mode, enabling enhanced security. User permission enhancements Enterprise Reporter now restricts actions based on the following user permissions: ■ Administrator ■ Read-write ■ Read-only For more information about restricting actio[...]
-
Página 26
Business executives and storage administrators can use Enterprise Reporter to do the following: ■ Develop highly customizable business views of data from multiple data sources. For example, administrators can discover global storage usage trends and drill down to identify high consumers across geographic or business units. ■ Create storage tier[...]
-
Página 27
Getting CommandCentral up and running To get CommandCentral up and running, review information about planning tips, system requirements, and the installation process. The following topics provide more information: ■ Planning tips for installation, configuration, and deployment of CommandCentral ■ System requirements for CommandCentral ■ Insta[...]
-
Página 28
Table 1-1 Supported operating systems for CommandCentral components Operating systems supported Component Solaris and Windows CommandCentral Storage Management Server Solaris and Windows CommandCentral Storage Change Manager Management Server Solaris Enterprise Reporter Management Server Solaris, Windows, Red Hat Linux, SUSE Linux, AIX, and HP-UX. [...]
-
Página 29
■ Mount the product disc ■ Run the product installer ■ Perform post-installation setup For more information about the installation process refer to the following: ■ For CommandCentral Storage and CommandCentral Storage Change Manager, refer to the CommandCentral Installation Guide . ■ For CommandCentral Enterprise Reporter, refer to the C[...]
-
Página 30
Diagnostic tools are also available to assist in troubleshooting problems associated with the product. These tools can be downloaded from the Symantec FTP site. The following troubleshooting tools are available specifically for use with CommandCentral Storage: ■ Run the getinfo script (on UNIX) ■ Point to the Serverport and gather data using a [...]
-
Página 31
Provides information about supported operating systems, host resource requirements, software limitations, and known issues. CommandCentral Storage Release Notes Describes how you can use CommandCentral Storage to monitor, manage, and report on your storage infrastructure. CommandCentral Storage User ’ s Guide Provides information about third-part[...]
-
Página 32
Describes how you can use CommandCentral Storage Change Manager to view your storage resources, view detailed descriptions about changes to those storage resources, set up policies, and view violations to those policies. CommandCentral Storage Change Manager User ’ s Guide Provides information about third-party software that is used in CommandCen[...]
-
Página 33
storage_management_docs@symantec.com Please include the following information with your documentation comments: ■ The title and product version of the guide you are commenting on ■ The topic (if relevant) you are commenting on ■ Your comment ■ Your name 33 Getting started with the CommandCentral family Where to find more information about C[...]
-
Página 34
Getting started with the CommandCentral family Where to find more information about CommandCentral 34[...]
-
Página 35
access group See array virtual port. active zone set The zone set that is currently enforced on a Fibre Channel fabric. Only one zone set can be active for a fabric at a given time. See also zone set. addressable storage See LUN storage. addressable unit Any storage resource in the network that is ready to be allocated for use by hosts and applicat[...]
-
Página 36
array virtual port A logical — or, as it is commonly called, "virtual" — port defined for some array types that support SMI-S 1.0.2 and earlier. When an array virtual port (or AVP) is defined, the array can support LUN masking with multiple, heterogeneous hosts through a single physical array port. Depending on the array vendor, array[...]
-
Página 37
CLARiiON storage group In an EMC CLARiiON storage array, a set of addressable units (LUNs) defined so that an operator can perform one LUN masking operation for the entire set of LUNs rather than separately for each LUN. Contrast with storage group. cluster A set of hosts (each termed a node) that share a set of disks and are connected by a set of [...]
-
Página 38
Console provides a central point to display and manage storage resources, create and modify policies, provision storage, administer access control, and view reports. CommandCentral Storage database A database, residing on the Management Server, that gathers data related to performance and monitoring, reports, alarms, service requests, and the Hardw[...]
-
Página 39
deleted objects, destroyed objects cannot be restored to the CommandCentral Storage database by a rediscover operation. Contrast with delete. device A collective term for disks, tapes, disk arrays, tape arrays, and any other objects that store data. Also storage device. device handle The name the operating system uses to identify a storage resource[...]
-
Página 40
event A notification that indicates when an action, such as an alert or a change in state, has occurred for one or more objects on the storage network. explorer A software tool that uses a unique methodology to discover information about a particular kind of resource on the storage network. The CommandCentral Storage product includes several explor[...]
-
Página 41
GBIC Gigabit interface converter. A widely used transceiver module for Fibre Channel. A GBIC is modular and hot-swappable and can be either copper or optical. generic device A disk or tape device. When generic storage devices are visible to a host running the Hardware Abstraction Layer (HAL), the CommandCentral Storage Console displays the correct [...]
-
Página 42
host storage domain See array virtual port. hub A common connection point for devices in the storage network. The hub may be unmanaged, IP-managed, or FC-managed. An unmanaged hub is passive in the sense that it serves simply as a conduit for data, moving the data from one storage resource to another. IP-managed and FC-managed hubs are intelligent,[...]
-
Página 43
associated with the LUN (the access path) between that AddrUnit and an array port to which it is bound. The access control list for a LUN contains the World Wide Name of each HBA port that is allowed to access that LUN within the array. LUN Query Tool A CommandCentral Storage tool that helps you find LUNs on your storage network that match one or m[...]
-
Página 44
object A single, unique addressable entity on a storage network. It is possible for objects to be present within objects. For example, while a tape array is an object, each individual tape drive within the array is also an object. A host is an object, and the HBA inside the host is also an object. Each object has one or more attributes and can be a[...]
-
Página 45
Push Install See CommandCentral Storage Agent Push Install Utility. QoSS (Quality of storage service) A technique for managing storage resources to fulfill predefined service-level criteria. For each service level, or tier, policy rules are used to ensure the appropriate level of availability and performance. Also called storage tiering. qtree In N[...]
-
Página 46
SAN Access Layer (SAL) A component that performed discovery and access control in the SANPoint Control and CommandCentral Storage 4.x products. See Hardware Abstraction Layer (HAL). scan An operation that detects all resources visible to an explorer through either an in-band connection or a device manager. A CommandCentral Storage operator can init[...]
-
Página 47
cooperating systems that must adhere to a common framework and a common language or protocol. soft zoning A fabric zoning method that filters the visibility of objects on the storage network so that an object can only see other objects that share at least one zone membership with it. Unlike hard zoning, soft zoning is not enforced at the switches t[...]
-
Página 48
Symantec Product Authentication Service A component of Veritas Security Services (VxSS) that is used by CommandCentral Storage to provide user authentication. Authentication Service is a set of processes and runtime libraries that enables users to log on to multiple Veritas products with one login. See also Symantec Product Authorization Service. S[...]
-
Página 49
when the SAN runs an unsupported HBA card or driver version, there is no managed host attached to the HBA, or the Management Server is not configured to communicate with the managed host. For storage devices, this can occur when no LUNs are visible to a managed host (usually due to zoning or LUN masking security). unified logging A common logging l[...]
-
Página 50
administrative operations on resources, including starting, stopping, restarting, and monitoring at the service group level. Veritas NetBackup A Symantec product family that provides a fast, reliable backup and recovery solution for environments ranging from terabytes to petabytes in size. The term NetBackup refers to either of two products that in[...]
-
Página 51
volume In storage media managed by Veritas Volume Manager, a virtual disk made up of a portion or portions of one or more physical disks and representing an addressable range of disk blocks. It is used by applications such as file systems or databases. In an IBM DS6000 or DS8000 array, an addressable unit (LUN) that is created from an extent pool. [...]
-
Página 52
CommandCentral Glossary 52[...]