![Nexsan UNITY5000 Hardware Reference Manual Download Page 14](http://html.mh-extra.com/html/nexsan/unity5000/unity5000_hardware-reference-manual_1682144014.webp)
USB flash drive, a SATADom, or other attached
storage—can be used.
C
CHAP authentication
iSCSI initiators and targets prove their identity to
each other using the Challenge Handshake
Authentication Protocol (CHAP). You can use
CHAP authentication to restrict iSCSI access to
LUNs on the to servers (initiators) that provide
the correct user name and password (or secret)
combination. The ’s iSCSI implementation
provides several layers of CHAP authentication.
CIFS
(Common Internet File System) The protocol
used in Windows environments for shared
folders.
Command-line interface
A means of interaction between a human user
and a computer program, or between two
programs, where the user (or client) passes
commands in the form of a line of text to a
computer program. The Nexsan offers a
command-line interface. Abbreviated “CLI”.
Controller
The controller in the acts as the interface
between the and network clients. The has two
controller nodes, represented by the Clusters
node in E-Centre™, for which you can configure
both cluster and network settings. Can also be
referred to as Controller Node or Node.
D
DHCP
(Dynamic Host Configuration Protocol) A
communication protocol that lets network
administrators manage centrally and automate
the assignment of Internet Protocol (IP)
addresses in a network.
DIMM
Dual In-line Memory Module. The type of
random-access memory (RAM) that the Nexsan
uses.
Directory Service
A directory service is the software system that
stores, organizes and provides access to
information in a directory. A directory service
called a naming service, maps the names of
network resources to their respective network
addresses. With the name service type of
directory, a user does not have to remember the
physical address of a network resource;
providing a name will locate the resource. Each
resource on the network is considered an object
on the directory server. Information about a
particular resource is stored as attributes of that
object. Information within objects can be made
secure so that only users with the available
permissions are able to access it. In LDAP, the
name is called the Distinguished name (DN) and
is used to refer to a collection of attributes
(relative distinguished names) which make up
the name of a directory entry.
DNS
(Domain Name System) A program or computer
server that implements a name-service protocol.
It maps a human-recognizable identifier to a
system-internal, often numeric, identification or
addressing component (usually an IP address).
E
E-Centre
Web-based graphical user interface for managing
and E-Series storage devices. It provides a
hierarchical view of a site and overall system
components; as well as wizard-based
configuration tools for creating storage pools, file
systems, shares, replication sites, and for
performing other storage management tasks on
the system.
Electrostatic discharge (ESD)
The sudden and momentary electric current that
flows between two objects at different electrical
Glossary
Nexsan Unity Hardware Reference Guide
www.nexsan.com
7