Table of contents

Configure

Last modified
Table of contents
<< PrevNext >>

Hovering over the ‘Configure’ item in the menu bar exposes a menu containing items as shown in the figure below. 

 

Configuration.png

 

The following options are available under ‘Configure’:

 

  • System Settings - the ‘Systems Settings’ menu provides you the ability to configure basic and email related settings, including:
    • General Settings - the ‘General Setting’ page allows the appliance to access the network, resolve cloud storage provider hostnames, and synchronize system time with internal or external Network Time Protocol (NTP) servers.  These are the same settings that were configured using the setup wizard.
    • Notification Settings  - this page allows the user to configure the email settings for generating hardware alerts. Additionally, the user can also configure the SNMP monitoring of the appliance.
    • Alert Settings - this page allows the user to configure the alert settings for your appliance.

 

  • Security Settings - the ‘Security Settings’ menu contains pages that allow you to configure security-related elements of the system, including:
    •  CHAP Target Settings - the ‘CHAP Target Settings’ page allows you to specify the credentials sent by your appliance when mutually authenticating with a CHAP-enabled initiator.
    • CHAP Initiator Settings - the ‘CHAP Initiator Settings’ page allows you to define the CHAP credentials that may be used by initiators when attempting to login to your appliance via iSCSI (Internet SCSI).
    • Volume Access Groups - the ‘Volume Access Groups’ page allows you to configure entities that reference initiators by their IP address, iSCSI Qualified Name (IQN), or CHAP, which can be applied to volumes during volume creation to limit which initiators are able to access that volume.
    • Web User Accounts - the ‘Web User Accounts’ page allows you to add, delete a new user and manage user permission for new and existing accounts. It will also enable you to change the password for ‘admin’ and ‘monitor’ user accounts.  
    • Web Proxy Settings - the 'Web Proxy Settings' page allows you to configure the settings of your proxy server. 

 

  • Templates -  the 'Templates' page allows the user to define configurations that can be reused across other elements.
    • QoS Templates - the 'QoS' templates page allows you to specify multiple time-of-day profiles that can be applied to various cloud configurations to enforce limits on WAN bandwidth consumed by the appliance in operations involving cloud.

 

  • Cloud - the ‘Cloud’ page allows you to configure and manage cloud storage service accounts, including credentials, encryption keys, and related elements.
    • Cloud Credentials - this page allows you to define the cloud provider and associated credentials for a cloud account, including multiple credentials for the same provider.
    • Cloud Configuration - this page allows you to map a primary, secondary and a parking lot bucket for a given cloud credential. It also lets the user define an encryption key that can be used across all the three aforementioned buckets.  

 

  • Volumes  - the ‘Volumes’ page allows you to configure and manage volumes, control which initiators are able to access the volumes, specify the size and type of volume, and other items.

 

  • Data Protection  - the ‘Data Protection’ drawer allows the user to create and manage backup copies of volume data including:
    • Data Overview  - this page summarizes the available data protection options, the differences between these options and recommendations on how and when to schedule each.
    • Volume Groups - this page lists all the volume groups and volumes associated with each volume group. Volume Groups are groups of volumes that you associate with each other to form the basis of a backup or restore job. The page allows the user to create, edit or delete a volume group.
    • Policies  - this page allows you to manage policies and schedule Snapshots, Cloud Snapshots and Cloud Clones. Policies refer to job schedules. This page lists all the policies, their types, associated volume groups, number of backups retained and the option to enable these policies.

Back to Top

<< PrevNext >>
Page statistics
2803 view(s) and 41 edit(s)
Social share
Share this page?

Tags

This page has no custom tags.
This page has no classifications.

Comments

You must to post a comment.

Attachments