
x
Monitoring and Maintaining Filer Hardware. . . . . . . . . . . . . . . . . . . . . . . . . . . 1-9
Periodic Administration Tasks . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1-9
&KDSWHU
)LOHU$GPLQLVWUDWLRQ%DVLFV
Overview. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2-1
About This Chapter . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2-1
Using the Administration Host . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2-1
About the Administration Host . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2-1
Administration Host Privileges. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2-1
Administration Host Entry in the /etc/hosts.equiv file . . . . . . . . . . . . . . . . . . . 2-2
Administration Host as the Mail Host . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2-2
Designating a Different Mail Host . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2-2
Requirements for Using an NFS Client as the Administration Host . . . . . . . . 2-2
Requirements for Using a CIFS Client as the Administration Host . . . . . . . . . 2-2
The Root Volume . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2-2
About the Root Volume . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2-2
Designating the Root Volume . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2-3
About the Volume Name Prefix. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2-3
Syntax to Refer to the Root Volume From NFS Clients. . . . . . . . . . . . . . . . . . 2-3
Editing Configuration Files . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2-3
What Editor to Use . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2-3
Where Configuration Files Reside . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2-3
Choosing an NFS or a CIFS Client . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2-3
Editing Files From an NFS Client . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2-3
Editing Files From a CIFS Client. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2-4
Obtaining Access to the Filer Shell. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2-5
Ways to Access the Command Line . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2-5
Sharing a Single telnet and Console Session. . . . . . . . . . . . . . . . . . . . . . . . . . 2-5
telnet Session Restriction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2-5
Closing a telnet Session. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2-5
telnet and Console Password Requirement . . . . . . . . . . . . . . . . . . . . . . . . . . 2-5
rsh Support . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2-5
Commands Accepted From rsh. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2-5
Use Ctrl-C to Terminate the Command That Is Running . . . . . . . . . . . . . . . . . 2-6
Changing the System Password . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2-6
Where to Go to Learn More About Security . . . . . . . . . . . . . . . . . . . . . . . . . . 2-6
About Multiple Administrative Users . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2-6
What Is an Administrative User? . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2-6
Multiple Administrative Users Increase Filer Security. . . . . . . . . . . . . . . . . . . 2-7
Command to Use to Create Administrative Users. . . . . . . . . . . . . . . . . . . . . . 2-7
Ways to Access the Filer Using an Administrative Login Name . . . . . . . . . . . 2-7
Summary of Contents for PowerVault 720N
Page 1: ... ZZZ GHOO FRP HOO 3RZHU9DXOW 1 1 DQG 1 6 67 0 0 1 675 725 1 200 1 5 5 1 8 ...
Page 6: ...viii ...
Page 48: ...l ...
Page 124: ...3 28 Dell PowerVault 720N 740N and 760N System Administrator and Command Reference Guide ...
Page 252: ...8 12 Dell PowerVault 720N 740N and 760N System Administrator and Command Reference Guide ...
Page 280: ...10 10 Dell PowerVault 720N 740N and 760N System Administrator and Command Reference Guide ...
Page 332: ...14 6 Dell PowerVault 720N 740N and 760N System Administrator and Command Reference Guide ...
Page 344: ...15 12 Dell PowerVault 720N 740N and 760N System Administrator and Command Reference Guide ...
Page 362: ...16 18 Dell PowerVault 720N 740N and 760N System Administrator and Command Reference Guide ...
Page 372: ...17 10 Dell PowerVault 720N 740N and 760N System Administrator and Command Reference Guide ...
Page 392: ...18 20 Dell PowerVault 720N 740N and 760N System Administrator and Command Reference Guide ...
Page 414: ...19 22 Dell PowerVault 720N 740N and 760N System Administrator and Command Reference Guide ...
Page 416: ...A 2 Dell PowerVault 720N 740N and 760N System Administrator and Command Reference Guide ...
Page 417: ...Command Reference A 3 8VHU RPPDQGV This section contains user commands ...
Page 531: ...Command ReferenceA 117 ...
Page 588: ...A 174 Dell PowerVault 720N 740N and 760N System Administrator and Command Reference Guide ...