Идти на страницу of
Похожие руководства по эксплуатации
-
Antivirus software
Symantec Norton Smartphone Security 5
26 страниц -
Barcode Reader
Symantec 5.1
52 страниц 0.61 mb -
Antivirus software
Symantec Norton Internet Security 2013
109 страниц -
Switch
Symantec ATCA-2210
14 страниц 0.87 mb -
Computer Drive
Symantec BACKUP EXEC 11D
18 страниц 0.19 mb -
Antivirus software
Symantec Norton AntiVirus 2013
44 страниц -
Antivirus software
Symantec Norton Internet Security 2010
38 страниц -
Server
Symantec Security Expressions Server
97 страниц 0.28 mb
Хорошее руководство по эксплуатации
Законодательство обязывает продавца передать покупателю, вместе с товаром, руководство по эксплуатации Symantec 5.1. Отсутствие инструкции либо неправильная информация, переданная потребителю, составляют основание для рекламации в связи с несоответствием устройства с договором. В законодательстве допускается предоставлении руководства в другой, чем бумажная форме, что, в последнее время, часто используется, предоставляя графическую или электронную форму инструкции Symantec 5.1 или обучающее видео для пользователей. Условием остается четкая и понятная форма.
Что такое руководство?
Слово происходит от латинского "instructio", тоесть привести в порядок. Следовательно в инструкции Symantec 5.1 можно найти описание этапов поведения. Цель инструкции заключается в облегчении запуска, использования оборудования либо выполнения определенной деятельности. Инструкция является набором информации о предмете/услуге, подсказкой.
К сожалению немного пользователей находит время для чтения инструкций Symantec 5.1, и хорошая инструкция позволяет не только узнать ряд дополнительных функций приобретенного устройства, но и позволяет избежать возникновения большинства поломок.
Из чего должно состоять идеальное руководство по эксплуатации?
Прежде всего в инструкции Symantec 5.1 должна находится:
- информация относительно технических данных устройства Symantec 5.1
- название производителя и год производства оборудования Symantec 5.1
- правила обслуживания, настройки и ухода за оборудованием Symantec 5.1
- знаки безопасности и сертификаты, подтверждающие соответствие стандартам
Почему мы не читаем инструкций?
Как правило из-за нехватки времени и уверенности в отдельных функциональностях приобретенных устройств. К сожалению само подсоединение и запуск Symantec 5.1 это слишком мало. Инструкция заключает ряд отдельных указаний, касающихся функциональности, принципов безопасности, способов ухода (даже то, какие средства стоит использовать), возможных поломок Symantec 5.1 и способов решения проблем, возникающих во время использования. И наконец то, в инструкции можно найти адресные данные сайта Symantec, в случае отсутствия эффективности предлагаемых решений. Сейчас очень большой популярностью пользуются инструкции в форме интересных анимаций или видео материалов, которое лучше, чем брошюра воспринимаются пользователем. Такой вид инструкции позволяет пользователю просмотреть весь фильм, не пропуская спецификацию и сложные технические описания Symantec 5.1, как это часто бывает в случае бумажной версии.
Почему стоит читать инструкции?
Прежде всего здесь мы найдем ответы касательно конструкции, возможностей устройства Symantec 5.1, использования отдельных аксессуаров и ряд информации, позволяющей вполне использовать все функции и упрощения.
После удачной покупки оборудования/устройства стоит посвятить несколько минут для ознакомления с каждой частью инструкции Symantec 5.1. Сейчас их старательно готовят или переводят, чтобы они были не только понятными для пользователя, но и чтобы выполняли свою основную информационно-поддерживающую функцию.
Содержание руководства
-
Страница 1
Veritas CommandCentral ™ Getting Started Guide for Microsoft Windows and UNIX 5.1[...]
-
Страница 2
CommandCentral ™ Getting Started Guide The software described in this book is furnished under a license agreement and may be used only in accordance with the terms of the agreement. Documentation version 5.1.0 Legal Notice Copyright © 2008 Symantec Corporation. All rights reserved. Symantec, the Symantec logo, Veritas, CommandCentral, NetBackup,[...]
-
Страница 3
Symantec Corporation 20330 Stevens Creek Blvd. Cupertino, CA 95014 http://www.symantec.com[...]
-
Страница 4
Technical Support Symantec Technical Support maintains support centers globally. Technical Support ’ s primary role is to respond to specific queries about product features and functionality. The Technical Support group also creates content for our online Knowledge Base. The Technical Support group works collaboratively with the other functional [...]
-
Страница 5
■ Version and patch level ■ Network topology ■ Router, gateway, and IP address information ■ Problem description: ■ Error messages and log files ■ Troubleshooting that was performed before contacting Symantec ■ Recent software configuration changes and network changes Licensing and registration If your Symantec product requires regist[...]
-
Страница 6
Maintenance agreement resources If you want to contact Symantec regarding an existing maintenance agreement, please contact the maintenance agreement administration team for your region as follows: contractsadmin@symantec.com Asia-Pacific and Japan semea@symantec.com Europe, Middle-East, and Africa supportsolutions@symantec.com North America and La[...]
-
Страница 7
Getting started with the CommandCentral family This document includes the following topics: ■ About the CommandCentral family ■ About Veritas CommandCentral Storage ■ About Veritas CommandCentral Storage Change Manager ■ About Veritas CommandCentral Enterprise Reporter ■ Getting CommandCentral up and running ■ Where to find more informa[...]
-
Страница 8
■ CommandCentral Enterprise Reporter: Provides a global view of storage assets mapped to your organization, business insight about inventory and utilization, on-demand customized reporting, and personalized dashboards. For more information, refer to the following: See “ About Veritas CommandCentral Enterprise Reporter ” on page 20. About Veri[...]
-
Страница 9
What ’ s new in CommandCentral Storage 5.1 CommandCentral Storage 5.1 contains and builds upon CommandCentral Storage 5.0 functionality, providing several new features. Management and discovery CommandCentral Storage 5.1 introduces the following management and discovery features. Enhanced agentless discovery of storage resources If you do not ins[...]
-
Страница 10
explorer polls the storage array using the polling interval — for example, a polling interval of 180 minutes. Change detection is available for the following storage arrays: ■ EMC CLARiiON ■ EMC Symmetrix ■ Hitachi HiCommand ■ HP EVA ■ NetApp unified storage devices For information about enabling change detection, see the CommandCentral[...]
-
Страница 11
Added support for discovery of ESX servers through the VMware Infrastructure SDK In CommandCentral Storage 5.1, you can now configure discovery of ESX servers through the VMware Infrastructure SDK (VI SDK). This allows you to discover individual ESX servers through VI SDK or a VirtualCenter that manages multiple ESX servers through VI SDK. For info[...]
-
Страница 12
■ VxVM volumes Added the Switch Port Usage Trend report You can now view the Switch Port Usage Trend report, which allows you to track used and unused ports over a specified time frame. New sample ad hoc reports CommandCentral Storage now includes the following sample ad hoc reports: ■ Application Access Path Inventory Report: Presents all the [...]
-
Страница 13
■ Managed host ■ Switch port ■ NAS (TB) Because of these new licensing options, you need to obtain new licenses when you upgrade to CommandCentral 5.1. When you upgrade to 5.1, an evaluation license installs. The evaluation license is valid for 60 days. Obtain new licenses before the evaluation license expires. For more information about obta[...]
-
Страница 14
Added links to access the CommandCentral Storage Change Manager Console If you enable CommandCentral Storage Change Manager on your Management Server, you can load the CommandCentral Storage Change Manager Console from the CommandCentral Storage Console. To do this, you can use the following links: ■ Storage Change Manager — this link appears i[...]
-
Страница 15
For more information about the hotfix deployment mechanism, see the CommandCentral Administrator ’ s Guide . What you can do with CommandCentral Storage Symantec strives to help you manage the integrity of your information by enabling you to maintain the right balance of information security and availability. Symantec delivers market-leading tech[...]
-
Страница 16
Responding to this problem, some enterprises have implemented storage area networks (SANs) in which storage is placed on its own dedicated network. This dedicated network can improve efficiency and reliability by effectively separating traffic on the storage network from traffic on the main user network. Storage virtualization CommandCentral Storag[...]
-
Страница 17
■ Generate reports about the network ’ s physical resources and about storage usage ■ Troubleshoot network elements ■ Manage day-to-day performance and resource availability ■ Develop a data protection strategy and assure that the storage network is secure Meeting the needs of storage administrators with CommandCentral Storage CommandCent[...]
-
Страница 18
Storage provisioning Using tools provided in CommandCentral Storage, a storage administrator can allocate storage resources to specific hosts and applications and control access to storage resources. You can also create LUNs from unconfigured storage. Another feature allows provisioning jobs to be scheduled for times when the network is less busy. [...]
-
Страница 19
■ Identifies potential risks to your storage infrastructure based on best practice policies. With risks, storage administrators can identify the impacted storage resources and take the necessary action to remove the risk from your storage infrastructure. ■ Lets you view reports that provide an enterprise – wide view of the changes that occur [...]
-
Страница 20
■ View reports that provide an enterprise – wide view of the changes made to your storage resources, a summary of the hosts and applications that have policies applied to them, and details about violations, including the time that it takes to resolve violations and the type of violations that have generated. ■ Display an overall view of the c[...]
-
Страница 21
organized by location, departments, or any other logical business unit. This summarized information enables you to assess trends in your storage environment, which you can then analyze to assign responsibility. If you are a storage administrator, you can use Enterprise Reporter to identify capacity trends, review storage inventory, and determine ho[...]
-
Страница 22
What's new in CommandCentral Enterprise Reporter 5.0 MP1 CommandCentral Enterprise Reporter 5.0 MP1 contains and builds upon previous Enterprise Reporter functionality, providing several new features. ■ Data rollup enhancements ■ Storage tier rule builder enhancements ■ Reporting enhancements ■ Security enhancements Data rollup enhance[...]
-
Страница 23
You can now use these custom attributes in Enterprise Reporter reports. In Query Studio, they appear in the list of storage object views with the prefix of "Custom Attribute." For example, to see custom attributes in the Switch Analysis package in Query Studio, select Switch Analysis Views > by Switch Attributes > Switch. Data sourc[...]
-
Страница 24
■ NetApp Volumes Dashboard customization with selected reports By default, the Dashboard shows report categories and their descriptions. With Enterprise Reporter 5.0 MP1, you can customize the Dashboard to show any report, including one that you created. Enterprise Reporter provides a new "Set This as Home Report" option that enables yo[...]
-
Страница 25
Security enhancements Enterprise Reporter includes additional security features. SSL mode Cognos now runs in SSL mode, enabling enhanced security. User permission enhancements Enterprise Reporter now restricts actions based on the following user permissions: ■ Administrator ■ Read-write ■ Read-only For more information about restricting actio[...]
-
Страница 26
Business executives and storage administrators can use Enterprise Reporter to do the following: ■ Develop highly customizable business views of data from multiple data sources. For example, administrators can discover global storage usage trends and drill down to identify high consumers across geographic or business units. ■ Create storage tier[...]
-
Страница 27
Getting CommandCentral up and running To get CommandCentral up and running, review information about planning tips, system requirements, and the installation process. The following topics provide more information: ■ Planning tips for installation, configuration, and deployment of CommandCentral ■ System requirements for CommandCentral ■ Insta[...]
-
Страница 28
Table 1-1 Supported operating systems for CommandCentral components Operating systems supported Component Solaris and Windows CommandCentral Storage Management Server Solaris and Windows CommandCentral Storage Change Manager Management Server Solaris Enterprise Reporter Management Server Solaris, Windows, Red Hat Linux, SUSE Linux, AIX, and HP-UX. [...]
-
Страница 29
■ Mount the product disc ■ Run the product installer ■ Perform post-installation setup For more information about the installation process refer to the following: ■ For CommandCentral Storage and CommandCentral Storage Change Manager, refer to the CommandCentral Installation Guide . ■ For CommandCentral Enterprise Reporter, refer to the C[...]
-
Страница 30
Diagnostic tools are also available to assist in troubleshooting problems associated with the product. These tools can be downloaded from the Symantec FTP site. The following troubleshooting tools are available specifically for use with CommandCentral Storage: ■ Run the getinfo script (on UNIX) ■ Point to the Serverport and gather data using a [...]
-
Страница 31
Provides information about supported operating systems, host resource requirements, software limitations, and known issues. CommandCentral Storage Release Notes Describes how you can use CommandCentral Storage to monitor, manage, and report on your storage infrastructure. CommandCentral Storage User ’ s Guide Provides information about third-part[...]
-
Страница 32
Describes how you can use CommandCentral Storage Change Manager to view your storage resources, view detailed descriptions about changes to those storage resources, set up policies, and view violations to those policies. CommandCentral Storage Change Manager User ’ s Guide Provides information about third-party software that is used in CommandCen[...]
-
Страница 33
storage_management_docs@symantec.com Please include the following information with your documentation comments: ■ The title and product version of the guide you are commenting on ■ The topic (if relevant) you are commenting on ■ Your comment ■ Your name 33 Getting started with the CommandCentral family Where to find more information about C[...]
-
Страница 34
Getting started with the CommandCentral family Where to find more information about CommandCentral 34[...]
-
Страница 35
access group See array virtual port. active zone set The zone set that is currently enforced on a Fibre Channel fabric. Only one zone set can be active for a fabric at a given time. See also zone set. addressable storage See LUN storage. addressable unit Any storage resource in the network that is ready to be allocated for use by hosts and applicat[...]
-
Страница 36
array virtual port A logical — or, as it is commonly called, "virtual" — port defined for some array types that support SMI-S 1.0.2 and earlier. When an array virtual port (or AVP) is defined, the array can support LUN masking with multiple, heterogeneous hosts through a single physical array port. Depending on the array vendor, array[...]
-
Страница 37
CLARiiON storage group In an EMC CLARiiON storage array, a set of addressable units (LUNs) defined so that an operator can perform one LUN masking operation for the entire set of LUNs rather than separately for each LUN. Contrast with storage group. cluster A set of hosts (each termed a node) that share a set of disks and are connected by a set of [...]
-
Страница 38
Console provides a central point to display and manage storage resources, create and modify policies, provision storage, administer access control, and view reports. CommandCentral Storage database A database, residing on the Management Server, that gathers data related to performance and monitoring, reports, alarms, service requests, and the Hardw[...]
-
Страница 39
deleted objects, destroyed objects cannot be restored to the CommandCentral Storage database by a rediscover operation. Contrast with delete. device A collective term for disks, tapes, disk arrays, tape arrays, and any other objects that store data. Also storage device. device handle The name the operating system uses to identify a storage resource[...]
-
Страница 40
event A notification that indicates when an action, such as an alert or a change in state, has occurred for one or more objects on the storage network. explorer A software tool that uses a unique methodology to discover information about a particular kind of resource on the storage network. The CommandCentral Storage product includes several explor[...]
-
Страница 41
GBIC Gigabit interface converter. A widely used transceiver module for Fibre Channel. A GBIC is modular and hot-swappable and can be either copper or optical. generic device A disk or tape device. When generic storage devices are visible to a host running the Hardware Abstraction Layer (HAL), the CommandCentral Storage Console displays the correct [...]
-
Страница 42
host storage domain See array virtual port. hub A common connection point for devices in the storage network. The hub may be unmanaged, IP-managed, or FC-managed. An unmanaged hub is passive in the sense that it serves simply as a conduit for data, moving the data from one storage resource to another. IP-managed and FC-managed hubs are intelligent,[...]
-
Страница 43
associated with the LUN (the access path) between that AddrUnit and an array port to which it is bound. The access control list for a LUN contains the World Wide Name of each HBA port that is allowed to access that LUN within the array. LUN Query Tool A CommandCentral Storage tool that helps you find LUNs on your storage network that match one or m[...]
-
Страница 44
object A single, unique addressable entity on a storage network. It is possible for objects to be present within objects. For example, while a tape array is an object, each individual tape drive within the array is also an object. A host is an object, and the HBA inside the host is also an object. Each object has one or more attributes and can be a[...]
-
Страница 45
Push Install See CommandCentral Storage Agent Push Install Utility. QoSS (Quality of storage service) A technique for managing storage resources to fulfill predefined service-level criteria. For each service level, or tier, policy rules are used to ensure the appropriate level of availability and performance. Also called storage tiering. qtree In N[...]
-
Страница 46
SAN Access Layer (SAL) A component that performed discovery and access control in the SANPoint Control and CommandCentral Storage 4.x products. See Hardware Abstraction Layer (HAL). scan An operation that detects all resources visible to an explorer through either an in-band connection or a device manager. A CommandCentral Storage operator can init[...]
-
Страница 47
cooperating systems that must adhere to a common framework and a common language or protocol. soft zoning A fabric zoning method that filters the visibility of objects on the storage network so that an object can only see other objects that share at least one zone membership with it. Unlike hard zoning, soft zoning is not enforced at the switches t[...]
-
Страница 48
Symantec Product Authentication Service A component of Veritas Security Services (VxSS) that is used by CommandCentral Storage to provide user authentication. Authentication Service is a set of processes and runtime libraries that enables users to log on to multiple Veritas products with one login. See also Symantec Product Authorization Service. S[...]
-
Страница 49
when the SAN runs an unsupported HBA card or driver version, there is no managed host attached to the HBA, or the Management Server is not configured to communicate with the managed host. For storage devices, this can occur when no LUNs are visible to a managed host (usually due to zoning or LUN masking security). unified logging A common logging l[...]
-
Страница 50
administrative operations on resources, including starting, stopping, restarting, and monitoring at the service group level. Veritas NetBackup A Symantec product family that provides a fast, reliable backup and recovery solution for environments ranging from terabytes to petabytes in size. The term NetBackup refers to either of two products that in[...]
-
Страница 51
volume In storage media managed by Veritas Volume Manager, a virtual disk made up of a portion or portions of one or more physical disks and representing an addressable range of disk blocks. It is used by applications such as file systems or databases. In an IBM DS6000 or DS8000 array, an addressable unit (LUN) that is created from an extent pool. [...]
-
Страница 52
CommandCentral Glossary 52[...]