Table of contents


Last modified
Table of contents
<< PrevNext >>

Hovering over the ‘Configure’ item in the menu bar exposes a menu containing items as shown in the figure below. 




The following options are available under ‘Configure’:


  • System Settings - the ‘Systems Settings’ menu provides you the ability to configure basic and email related settings, including:
    • General Settings - the ‘General Setting’ page allows the appliance to access the network, resolve cloud storage provider hostnames, and synchronize system time with internal or external Network Time Protocol (NTP)servers. These are the same settings that were configured using the setup wizard. This page will also allow you to 'Run Diagnostics' to validate the network settings for your appliance.
    • Notification Settings  - this page allows the user to configure the email settings for generating hardware alerts. Additionally, the user can also configure the SNMP monitoring of the appliance.
    • Alert Settings - this page allows the user to enable or disable alerts corresponding to certain conditions in your appliance.
    • QoS Templates - the 'QoS' templates page allows you to specify multiple time-of-day profiles that can be applied to various cloud configurations to enforce limits on WAN bandwidth consumed by the appliance in operations involving cloud.


  • Security Settings - the ‘Security Settings’ menu contains pages that allow you to configure security-related elements of the system, including:
    • Administrative Access - the 'Adminstrative Access' page allows you to configure various administrative settings related to the appliance such as how you access the appliance and settings for your proxy server when communicating with the cloud. It also allows you to  add, delete a new user and manage user permissions for new and existing accounts.The page will also alllow you to configure the 'Active Directory or LDAP Settings'.
    • Client Certificates - the 'Client Certificates' page allows you to upload or delete the security certificates required for the windows host - appliance Remote Procedure Call (RPC) communication.
    •  CHAP Target Settings - the ‘CHAP Target Settings’ page allows you to specify the credentials sent by your appliance when mutually authenticating with a CHAP-enabled initiator.
    • CHAP Initiator Settings - the ‘CHAP Initiator Settings’ page allows you to define the CHAP credentials that may be used by initiators when attempting to login to your appliance via iSCSI (Internet SCSI).
    • Access Control Records - the ‘Access Control Records' page allows you to configure entities that reference initiators by their iSCSI Qualified Name (IQN), or CHAP which can be applied to volumes during volume creation to limit which initiators are able to access that volume.


  • Cloud - the ‘Cloud’ page allows you to configure and manage cloud storage service accounts, including credentials, encryption keys, and related elements.
    • Cloud Credentials - this page allows you to define the cloud provider and associated credentials for a cloud account, including multiple credentials for the same provider.
    • Cloud Configuration - this page allows you to map a primary and a secondary backup credential. It also lets the user define an encryption key that can be used across the two aforementioned credentials.  


  • Volumes  - the ‘Volumes’ page allows you to configure and manage volumes, control which initiators are able to access the volumes, specify the size and type of volume, and other items.


  • Data Protection  - the ‘Data Protection’ drawer allows the user to create and manage backup copies of volume data including:
    • Overview  - this page summarizes the available data protection options, the differences between these options and recommendations on how and when to schedule each.
    • Volume Groups - this page lists all the volume groups and volumes associated with each volume group. Volume Groups are groups of volumes that you associate with each other to form the basis of a backup or restore job. The page allows the user to create, edit or delete a volume group.
    • Policies  - this page allows you to manage policies and schedule Snapshots, Cloud Snapshots and Cloud Clones. Policies refer to job schedules. This page lists all the policies, their types, associated volume groups, number of backups retained and the option to enable these policies.


<< PrevNext >>
Page statistics
3209 view(s) and 16 edit(s)
Social share
Share this page?


This page has no custom tags.
This page has no classifications.