Symantec 5.1 Bedienungsanleitung

1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52

Zur Seite of

Richtige Gebrauchsanleitung

Die Vorschriften verpflichten den Verkäufer zur Übertragung der Gebrauchsanleitung Symantec 5.1 an den Erwerber, zusammen mit der Ware. Eine fehlende Anleitung oder falsche Informationen, die dem Verbraucher übertragen werden, bilden eine Grundlage für eine Reklamation aufgrund Unstimmigkeit des Geräts mit dem Vertrag. Rechtsmäßig lässt man das Anfügen einer Gebrauchsanleitung in anderer Form als Papierform zu, was letztens sehr oft genutzt wird, indem man eine grafische oder elektronische Anleitung von Symantec 5.1, sowie Anleitungsvideos für Nutzer beifügt. Die Bedingung ist, dass ihre Form leserlich und verständlich ist.

Was ist eine Gebrauchsanleitung?

Das Wort kommt vom lateinischen „instructio”, d.h. ordnen. Demnach kann man in der Anleitung Symantec 5.1 die Beschreibung der Etappen der Vorgehensweisen finden. Das Ziel der Anleitung ist die Belehrung, Vereinfachung des Starts, der Nutzung des Geräts oder auch der Ausführung bestimmter Tätigkeiten. Die Anleitung ist eine Sammlung von Informationen über ein Gegenstand/eine Dienstleistung, ein Hinweis.

Leider widmen nicht viele Nutzer ihre Zeit der Gebrauchsanleitung Symantec 5.1. Eine gute Gebrauchsanleitung erlaubt nicht nur eine Reihe zusätzlicher Funktionen des gekauften Geräts kennenzulernen, sondern hilft dabei viele Fehler zu vermeiden.

Was sollte also eine ideale Gebrauchsanleitung beinhalten?

Die Gebrauchsanleitung Symantec 5.1 sollte vor allem folgendes enthalten:
- Informationen über technische Daten des Geräts Symantec 5.1
- Den Namen des Produzenten und das Produktionsjahr des Geräts Symantec 5.1
- Grundsätze der Bedienung, Regulierung und Wartung des Geräts Symantec 5.1
- Sicherheitszeichen und Zertifikate, die die Übereinstimmung mit entsprechenden Normen bestätigen

Warum lesen wir keine Gebrauchsanleitungen?

Der Grund dafür ist die fehlende Zeit und die Sicherheit, was die bestimmten Funktionen der gekauften Geräte angeht. Leider ist das Anschließen und Starten von Symantec 5.1 zu wenig. Eine Anleitung beinhaltet eine Reihe von Hinweisen bezüglich bestimmter Funktionen, Sicherheitsgrundsätze, Wartungsarten (sogar das, welche Mittel man benutzen sollte), eventueller Fehler von Symantec 5.1 und Lösungsarten für Probleme, die während der Nutzung auftreten könnten. Immerhin kann man in der Gebrauchsanleitung die Kontaktnummer zum Service Symantec finden, wenn die vorgeschlagenen Lösungen nicht wirksam sind. Aktuell erfreuen sich Anleitungen in Form von interessanten Animationen oder Videoanleitungen an Popularität, die den Nutzer besser ansprechen als eine Broschüre. Diese Art von Anleitung gibt garantiert, dass der Nutzer sich das ganze Video anschaut, ohne die spezifizierten und komplizierten technischen Beschreibungen von Symantec 5.1 zu überspringen, wie es bei der Papierform passiert.

Warum sollte man Gebrauchsanleitungen lesen?

In der Gebrauchsanleitung finden wir vor allem die Antwort über den Bau sowie die Möglichkeiten des Geräts Symantec 5.1, über die Nutzung bestimmter Accessoires und eine Reihe von Informationen, die erlauben, jegliche Funktionen und Bequemlichkeiten zu nutzen.

Nach dem gelungenen Kauf des Geräts, sollte man einige Zeit für das Kennenlernen jedes Teils der Anleitung von Symantec 5.1 widmen. Aktuell sind sie genau vorbereitet oder übersetzt, damit sie nicht nur verständlich für die Nutzer sind, aber auch ihre grundliegende Hilfs-Informations-Funktion erfüllen.

Inhaltsverzeichnis der Gebrauchsanleitungen

  • Seite 1

    Veritas CommandCentral ™ Getting Started Guide for Microsoft Windows and UNIX 5.1[...]

  • Seite 2

    CommandCentral ™ Getting Started Guide The software described in this book is furnished under a license agreement and may be used only in accordance with the terms of the agreement. Documentation version 5.1.0 Legal Notice Copyright © 2008 Symantec Corporation. All rights reserved. Symantec, the Symantec logo, Veritas, CommandCentral, NetBackup,[...]

  • Seite 3

    Symantec Corporation 20330 Stevens Creek Blvd. Cupertino, CA 95014 http://www.symantec.com[...]

  • Seite 4

    Technical Support Symantec Technical Support maintains support centers globally. Technical Support ’ s primary role is to respond to specific queries about product features and functionality. The Technical Support group also creates content for our online Knowledge Base. The Technical Support group works collaboratively with the other functional [...]

  • Seite 5

    ■ Version and patch level ■ Network topology ■ Router, gateway, and IP address information ■ Problem description: ■ Error messages and log files ■ Troubleshooting that was performed before contacting Symantec ■ Recent software configuration changes and network changes Licensing and registration If your Symantec product requires regist[...]

  • Seite 6

    Maintenance agreement resources If you want to contact Symantec regarding an existing maintenance agreement, please contact the maintenance agreement administration team for your region as follows: contractsadmin@symantec.com Asia-Pacific and Japan semea@symantec.com Europe, Middle-East, and Africa supportsolutions@symantec.com North America and La[...]

  • Seite 7

    Getting started with the CommandCentral family This document includes the following topics: ■ About the CommandCentral family ■ About Veritas CommandCentral Storage ■ About Veritas CommandCentral Storage Change Manager ■ About Veritas CommandCentral Enterprise Reporter ■ Getting CommandCentral up and running ■ Where to find more informa[...]

  • Seite 8

    ■ CommandCentral Enterprise Reporter: Provides a global view of storage assets mapped to your organization, business insight about inventory and utilization, on-demand customized reporting, and personalized dashboards. For more information, refer to the following: See “ About Veritas CommandCentral Enterprise Reporter ” on page 20. About Veri[...]

  • Seite 9

    What ’ s new in CommandCentral Storage 5.1 CommandCentral Storage 5.1 contains and builds upon CommandCentral Storage 5.0 functionality, providing several new features. Management and discovery CommandCentral Storage 5.1 introduces the following management and discovery features. Enhanced agentless discovery of storage resources If you do not ins[...]

  • Seite 10

    explorer polls the storage array using the polling interval — for example, a polling interval of 180 minutes. Change detection is available for the following storage arrays: ■ EMC CLARiiON ■ EMC Symmetrix ■ Hitachi HiCommand ■ HP EVA ■ NetApp unified storage devices For information about enabling change detection, see the CommandCentral[...]

  • Seite 11

    Added support for discovery of ESX servers through the VMware Infrastructure SDK In CommandCentral Storage 5.1, you can now configure discovery of ESX servers through the VMware Infrastructure SDK (VI SDK). This allows you to discover individual ESX servers through VI SDK or a VirtualCenter that manages multiple ESX servers through VI SDK. For info[...]

  • Seite 12

    ■ VxVM volumes Added the Switch Port Usage Trend report You can now view the Switch Port Usage Trend report, which allows you to track used and unused ports over a specified time frame. New sample ad hoc reports CommandCentral Storage now includes the following sample ad hoc reports: ■ Application Access Path Inventory Report: Presents all the [...]

  • Seite 13

    ■ Managed host ■ Switch port ■ NAS (TB) Because of these new licensing options, you need to obtain new licenses when you upgrade to CommandCentral 5.1. When you upgrade to 5.1, an evaluation license installs. The evaluation license is valid for 60 days. Obtain new licenses before the evaluation license expires. For more information about obta[...]

  • Seite 14

    Added links to access the CommandCentral Storage Change Manager Console If you enable CommandCentral Storage Change Manager on your Management Server, you can load the CommandCentral Storage Change Manager Console from the CommandCentral Storage Console. To do this, you can use the following links: ■ Storage Change Manager — this link appears i[...]

  • Seite 15

    For more information about the hotfix deployment mechanism, see the CommandCentral Administrator ’ s Guide . What you can do with CommandCentral Storage Symantec strives to help you manage the integrity of your information by enabling you to maintain the right balance of information security and availability. Symantec delivers market-leading tech[...]

  • Seite 16

    Responding to this problem, some enterprises have implemented storage area networks (SANs) in which storage is placed on its own dedicated network. This dedicated network can improve efficiency and reliability by effectively separating traffic on the storage network from traffic on the main user network. Storage virtualization CommandCentral Storag[...]

  • Seite 17

    ■ Generate reports about the network ’ s physical resources and about storage usage ■ Troubleshoot network elements ■ Manage day-to-day performance and resource availability ■ Develop a data protection strategy and assure that the storage network is secure Meeting the needs of storage administrators with CommandCentral Storage CommandCent[...]

  • Seite 18

    Storage provisioning Using tools provided in CommandCentral Storage, a storage administrator can allocate storage resources to specific hosts and applications and control access to storage resources. You can also create LUNs from unconfigured storage. Another feature allows provisioning jobs to be scheduled for times when the network is less busy. [...]

  • Seite 19

    ■ Identifies potential risks to your storage infrastructure based on best practice policies. With risks, storage administrators can identify the impacted storage resources and take the necessary action to remove the risk from your storage infrastructure. ■ Lets you view reports that provide an enterprise – wide view of the changes that occur [...]

  • Seite 20

    ■ View reports that provide an enterprise – wide view of the changes made to your storage resources, a summary of the hosts and applications that have policies applied to them, and details about violations, including the time that it takes to resolve violations and the type of violations that have generated. ■ Display an overall view of the c[...]

  • Seite 21

    organized by location, departments, or any other logical business unit. This summarized information enables you to assess trends in your storage environment, which you can then analyze to assign responsibility. If you are a storage administrator, you can use Enterprise Reporter to identify capacity trends, review storage inventory, and determine ho[...]

  • Seite 22

    What's new in CommandCentral Enterprise Reporter 5.0 MP1 CommandCentral Enterprise Reporter 5.0 MP1 contains and builds upon previous Enterprise Reporter functionality, providing several new features. ■ Data rollup enhancements ■ Storage tier rule builder enhancements ■ Reporting enhancements ■ Security enhancements Data rollup enhance[...]

  • Seite 23

    You can now use these custom attributes in Enterprise Reporter reports. In Query Studio, they appear in the list of storage object views with the prefix of "Custom Attribute." For example, to see custom attributes in the Switch Analysis package in Query Studio, select Switch Analysis Views > by Switch Attributes > Switch. Data sourc[...]

  • Seite 24

    ■ NetApp Volumes Dashboard customization with selected reports By default, the Dashboard shows report categories and their descriptions. With Enterprise Reporter 5.0 MP1, you can customize the Dashboard to show any report, including one that you created. Enterprise Reporter provides a new "Set This as Home Report" option that enables yo[...]

  • Seite 25

    Security enhancements Enterprise Reporter includes additional security features. SSL mode Cognos now runs in SSL mode, enabling enhanced security. User permission enhancements Enterprise Reporter now restricts actions based on the following user permissions: ■ Administrator ■ Read-write ■ Read-only For more information about restricting actio[...]

  • Seite 26

    Business executives and storage administrators can use Enterprise Reporter to do the following: ■ Develop highly customizable business views of data from multiple data sources. For example, administrators can discover global storage usage trends and drill down to identify high consumers across geographic or business units. ■ Create storage tier[...]

  • Seite 27

    Getting CommandCentral up and running To get CommandCentral up and running, review information about planning tips, system requirements, and the installation process. The following topics provide more information: ■ Planning tips for installation, configuration, and deployment of CommandCentral ■ System requirements for CommandCentral ■ Insta[...]

  • Seite 28

    Table 1-1 Supported operating systems for CommandCentral components Operating systems supported Component Solaris and Windows CommandCentral Storage Management Server Solaris and Windows CommandCentral Storage Change Manager Management Server Solaris Enterprise Reporter Management Server Solaris, Windows, Red Hat Linux, SUSE Linux, AIX, and HP-UX. [...]

  • Seite 29

    ■ Mount the product disc ■ Run the product installer ■ Perform post-installation setup For more information about the installation process refer to the following: ■ For CommandCentral Storage and CommandCentral Storage Change Manager, refer to the CommandCentral Installation Guide . ■ For CommandCentral Enterprise Reporter, refer to the C[...]

  • Seite 30

    Diagnostic tools are also available to assist in troubleshooting problems associated with the product. These tools can be downloaded from the Symantec FTP site. The following troubleshooting tools are available specifically for use with CommandCentral Storage: ■ Run the getinfo script (on UNIX) ■ Point to the Serverport and gather data using a [...]

  • Seite 31

    Provides information about supported operating systems, host resource requirements, software limitations, and known issues. CommandCentral Storage Release Notes Describes how you can use CommandCentral Storage to monitor, manage, and report on your storage infrastructure. CommandCentral Storage User ’ s Guide Provides information about third-part[...]

  • Seite 32

    Describes how you can use CommandCentral Storage Change Manager to view your storage resources, view detailed descriptions about changes to those storage resources, set up policies, and view violations to those policies. CommandCentral Storage Change Manager User ’ s Guide Provides information about third-party software that is used in CommandCen[...]

  • Seite 33

    storage_management_docs@symantec.com Please include the following information with your documentation comments: ■ The title and product version of the guide you are commenting on ■ The topic (if relevant) you are commenting on ■ Your comment ■ Your name 33 Getting started with the CommandCentral family Where to find more information about C[...]

  • Seite 34

    Getting started with the CommandCentral family Where to find more information about CommandCentral 34[...]

  • Seite 35

    access group See array virtual port. active zone set The zone set that is currently enforced on a Fibre Channel fabric. Only one zone set can be active for a fabric at a given time. See also zone set. addressable storage See LUN storage. addressable unit Any storage resource in the network that is ready to be allocated for use by hosts and applicat[...]

  • Seite 36

    array virtual port A logical — or, as it is commonly called, "virtual" — port defined for some array types that support SMI-S 1.0.2 and earlier. When an array virtual port (or AVP) is defined, the array can support LUN masking with multiple, heterogeneous hosts through a single physical array port. Depending on the array vendor, array[...]

  • Seite 37

    CLARiiON storage group In an EMC CLARiiON storage array, a set of addressable units (LUNs) defined so that an operator can perform one LUN masking operation for the entire set of LUNs rather than separately for each LUN. Contrast with storage group. cluster A set of hosts (each termed a node) that share a set of disks and are connected by a set of [...]

  • Seite 38

    Console provides a central point to display and manage storage resources, create and modify policies, provision storage, administer access control, and view reports. CommandCentral Storage database A database, residing on the Management Server, that gathers data related to performance and monitoring, reports, alarms, service requests, and the Hardw[...]

  • Seite 39

    deleted objects, destroyed objects cannot be restored to the CommandCentral Storage database by a rediscover operation. Contrast with delete. device A collective term for disks, tapes, disk arrays, tape arrays, and any other objects that store data. Also storage device. device handle The name the operating system uses to identify a storage resource[...]

  • Seite 40

    event A notification that indicates when an action, such as an alert or a change in state, has occurred for one or more objects on the storage network. explorer A software tool that uses a unique methodology to discover information about a particular kind of resource on the storage network. The CommandCentral Storage product includes several explor[...]

  • Seite 41

    GBIC Gigabit interface converter. A widely used transceiver module for Fibre Channel. A GBIC is modular and hot-swappable and can be either copper or optical. generic device A disk or tape device. When generic storage devices are visible to a host running the Hardware Abstraction Layer (HAL), the CommandCentral Storage Console displays the correct [...]

  • Seite 42

    host storage domain See array virtual port. hub A common connection point for devices in the storage network. The hub may be unmanaged, IP-managed, or FC-managed. An unmanaged hub is passive in the sense that it serves simply as a conduit for data, moving the data from one storage resource to another. IP-managed and FC-managed hubs are intelligent,[...]

  • Seite 43

    associated with the LUN (the access path) between that AddrUnit and an array port to which it is bound. The access control list for a LUN contains the World Wide Name of each HBA port that is allowed to access that LUN within the array. LUN Query Tool A CommandCentral Storage tool that helps you find LUNs on your storage network that match one or m[...]

  • Seite 44

    object A single, unique addressable entity on a storage network. It is possible for objects to be present within objects. For example, while a tape array is an object, each individual tape drive within the array is also an object. A host is an object, and the HBA inside the host is also an object. Each object has one or more attributes and can be a[...]

  • Seite 45

    Push Install See CommandCentral Storage Agent Push Install Utility. QoSS (Quality of storage service) A technique for managing storage resources to fulfill predefined service-level criteria. For each service level, or tier, policy rules are used to ensure the appropriate level of availability and performance. Also called storage tiering. qtree In N[...]

  • Seite 46

    SAN Access Layer (SAL) A component that performed discovery and access control in the SANPoint Control and CommandCentral Storage 4.x products. See Hardware Abstraction Layer (HAL). scan An operation that detects all resources visible to an explorer through either an in-band connection or a device manager. A CommandCentral Storage operator can init[...]

  • Seite 47

    cooperating systems that must adhere to a common framework and a common language or protocol. soft zoning A fabric zoning method that filters the visibility of objects on the storage network so that an object can only see other objects that share at least one zone membership with it. Unlike hard zoning, soft zoning is not enforced at the switches t[...]

  • Seite 48

    Symantec Product Authentication Service A component of Veritas Security Services (VxSS) that is used by CommandCentral Storage to provide user authentication. Authentication Service is a set of processes and runtime libraries that enables users to log on to multiple Veritas products with one login. See also Symantec Product Authorization Service. S[...]

  • Seite 49

    when the SAN runs an unsupported HBA card or driver version, there is no managed host attached to the HBA, or the Management Server is not configured to communicate with the managed host. For storage devices, this can occur when no LUNs are visible to a managed host (usually due to zoning or LUN masking security). unified logging A common logging l[...]

  • Seite 50

    administrative operations on resources, including starting, stopping, restarting, and monitoring at the service group level. Veritas NetBackup A Symantec product family that provides a fast, reliable backup and recovery solution for environments ranging from terabytes to petabytes in size. The term NetBackup refers to either of two products that in[...]

  • Seite 51

    volume In storage media managed by Veritas Volume Manager, a virtual disk made up of a portion or portions of one or more physical disks and representing an addressable range of disk blocks. It is used by applications such as file systems or databases. In an IBM DS6000 or DS8000 array, an addressable unit (LUN) that is created from an extent pool. [...]

  • Seite 52

    CommandCentral Glossary 52[...]