Benutzeranleitung / Produktwartung Computer Drive des Produzenten Dell
Zur Seite of 114
www .dell.com | support.dell.com Dell™ PowerV ault™ Modular Disk Storage Manager User’ s Guide.
Notes and Notices NOTE: A NOTE indicates important information that helps you make better use of your computer . NOTICE: A NOTICE indicates either potential damage to ha rdware or loss of data and tells you how to avoid the problem. ____________________ Information in this document is subject to change without notice.
Contents 3 Contents 1 About This Guide . . . . . . . . . . . . . . . . . . . 11 User Interface . . . . . . . . . . . . . . . . . . . . . . 11 Summary T ab . . . . . . . . . . . . . . . . . . . . 12 Configure T ab . . . . . . . . . . . . . . . . . . . 12 Modify T ab .
4 Contents Setting a Password . . . . . . . . . . . . . . . . . . . 21 Password Guidelines . . . . . . . . . . . . . . . . 22 Resetting a Password . . . . . . . . . . . . . . . . . . 22 Connecting the Serial Cable . . . . . . . . . . . . 22 Sy stem Setup for Password Reset .
Contents 5 Viewing iSCSI Statistics and Setting Baseline Statistics . . . . . . . . . . . . . . . . . . . . . . . . . 37 Edit, Remove, or Rename Host T opology . . . . . . . . 38 4 Event Monitor . . . . . . . . . . . . . . . . . . . . . 41 Enabling the Event Monitor .
6 Contents 6 Disk Groups and Virtual Disks . . . . . . . . . 53 Creating Disk Groups and Virtual Disks . . . . . . . . 54 Automatic Configuration . . . . . . . . . . . . . . 55 Manual Configuration . . . . . . . . . . . . . . . 55 Hot Spare Drive Protection .
Contents 7 7 Premium Feature—Snapshot Virtual Disks 67 Creating a Snapshot Vir tual Disk Using the Simple Path . . . . . . . . . . . . . . . . . . . . . . . 68 About the Simple Path . . . . . . . . . . . . . . . 68 Preparing Host Servers to Create the Snapshot Using the Simple Path .
8 Contents Creating a Virtual Disk Copy . . . . . . . . . . . . . . 87 Preparing Host Servers to Create a Virtual Disk Copy . . . . . . . . . . . . . . . . . . . . . . 87 Copying the Virtual Disk . . . . . . . . . . . . . . 88 Storage Array Performance During Virtual Disk Copy .
Contents 9 Device Health Conditions . . . . . . . . . . . . . . . . 101 SMrepassist Utility . . . . . . . . . . . . . . . . . . . 102 Support Information Package . . . . . . . . . . . . . . 103 Unidentified Devices . . . . . . . . . . . . . . . . . . 104 Recovering from an Un identified Storage Array .
10 Contents.
About This Guide 11 About This Guide Dell™ P owerV ault™ Modular Disk (MD) Storage Manager software is used to create and manage multiple storage arra ys. The softwar e can be used on any host attached to the storage array , as well as on storage management stations connected to the same sub-network.
12 About This Guid e • Beneath the Array Selector is the Content Area . Several tabs appear in this area to group the tasks you can perfor m on the selected array . When you click on a tab, the Content Area dis plays link s for t he tasks you can perform.
About This Guide 13 To o l s Ta b • Rename a storage array • Set or change a password • View or enable pr emium features • T urn on indicator lights • Change enclosure ID numbers • Set or .
14 About This Guid e • View online help • View the event log Other Information Y ou May Need CAUTION: For complete regulatory and safety information, see your Product Information Guide . Warranty information may be included within this document or as a separate one.
Storage Array 15 About Y our Storage Array This chapter covers basic information about how to manage storage arrays from MD Storage Manager , including a dding and removing arrays from the software, performing initial setup tasks, setting passwor ds on an array , and configuring alert notifications.
16 Storage Array NOTICE: Removing or manipulating an access virtual di sk can cause a loss of management access. If yo u remove an access virtual disk mapping from an in-band-managed storage array , MD Stor age Manager can no longer access the storage array .
Storage Array 17 Adding Storage Array s T o add a storage array to MD Storage Manager , click New in the Array Selector area. A window is displayed that allows you to choose the automatic or manual process to add a new storage array .
18 Storage Array • T o add a storage array that uses out-of-band management, specify the host name or IP address of each controller in the storage array . NOTE: It can take several mi nutes for MD Storage Ma nager to c onnect to the specified storage array .
Storage Array 19 T o remove a storage array : 1 Click Remove located to the right of the drop-down menu in the Array Selector . 2 Click OK in the Rem ove dialog box. Y ou can still manage the storage ar ray from other storage management stations where it has been added.
20 Storage Array 6 Configure Host Access — Set up one or mor e hosts to access the storage array . See "Configuring Host Access" on page 43 for more information.
Storage Array 21 Storage Array Support Data Aggregated support data can be generate d for a storage array to aid in r emote troubleshooting and issue analysis. T o generate the support data report: 1 Click the Support tab, then click Gather Support Information .
22 Storage Array T o remove a password: • Enter the curr ent password in the Current password text box. • Leave the New password and Confirm new password text box es blank.
Storage Array 23 Sy stem Setup for Password Reset Microsoft ® Windows ® Operating Sy stems 1 Click Start → P rograms → Accessories → Communication → HyperT erminal to run HyperT erminal.
24 Storage Array 7 P ress <I> to set the speed to 115200. 8 P ress <Q> to set the data , parity , and stopbits to 8-N-1 , then press <Enter>. 9 P ress <Enter> to exit the Comm P arameters screen. 10 Select Exit and press <Enter> again to e xit the setup screen.
Storage Array 25 NOTE: If you require help wi th this procedure, co ntact Dell for technical assistance. For more information on contacting Dell, see the "Getting Help" chapter of the Hardware Owners Manua l.
26 Storage Array Sender e-mail settings include the SMTP and e-mail address information MD Storage Manager uses to send e-mail alerts. T o configure sender e-mail settings: 1 Click the T ools tab, then click Set Up Email Alerts .
Storage Array 27 • Every x hours — Sends an e-mail at the sp ecified interval if an event occurred during that period. Y ou can select this option only if the Information to send option is set to Event + Profile or Event + Support . 4 Click Save .
28 Storage Array Starting or Restarting the Host-Agent Software in Windows The SMagent software automatically start s after you r eboot the host. If you add a storage array after the host server has s.
Storage Array 29 After the program completes the startup process, text similar to the following messages is displayed: Storage Manager Agent, Version 09.
30 Storage Array.
Using iSCSI 31 Using iSCSI This chapter provides information on using iSCSI in MD Storage Manager . F or iSCSI prer equisite requirements and detailed step-by-step instructions on setting up and configuring iSCSI, see the Installation Guide .
32 Using iSCSI Changing the iSCSI T arget Authentication If an initiator requir es mutual (bi -directional) authentication see "Entering Mutual Authentication P ermissions" on page 32. 1 Click the iSCSI tab, and then click Change T arget Authentication .
Using iSCSI 33 must enter the same CHAP secret that is defined in the iSCSI initiator , and you must define a CHAP secret on the tar g et (the storage array) that must be configured in every iSCSI initiator that will connect to the tar get.
34 Using iSCSI Changing the iSCSI T arget Identification Y ou cannot change the iSCSI target name , but you can associate an alias with the target for simpler identification. Aliases ar e useful because the iSCSI target names ar e not intuitive. Y ou should provide an iSCSI tar get alias that is meaningful and easy to remember .
Using iSCSI 35 Configuring the MD3000i iSCSI Host Ports Use the configuration dialog for the iS CSI host ports to se t up the MD3000i iSCSI host ports to use with storage a rrays in a storage area network (SAN). 1 Click the iSCSI tab, and then click Configure iSCSI Host P orts .
36 Using iSCSI NOTE: Changing any of these sett ings resets the iSCSI port. I/O is interrupted to any host accessing that port. Y ou can ac cess the I/O automatically after the port restarts and the host logs in again. V iewing or Ending an iSCSI Session 1 Click the iSCSI tab, and then click V iew/End iSCSI Sessions .
Using iSCSI 37 b In the confirmation window , type yes to confirm that you want to end the iSCSI session, and then click OK . NOTE: If you end a session, any correspond ing connections terminate the link between the host and the storage array , and the data on the storage array is no longer available.
38 Using iSCSI c Confirm that you want to set the ba seline statistics in the dialog that appears. The baseline time shows the latest time you set the baseline. The sampling interval is the difference in time from when you set the baseline until you launch the dialog or click Ref re sh .
Using iSCSI 39 Add an iSCSI Initiator . 1 Click the Modify tab, and then click Edit Host To p o l o g y . 2 Select the host you want to add an iSCSI initiator to and click Add . 3 T ype or select an iSCSI initiator name and label for the iSCSI initiator and click OK .
40 Using iSCSI.
Event Monitor 41 Event Monitor An event monitor is provided with MD Storage Manager . When enabled, the event monitor runs continuously in the ba ckground and monitors activity on the managed storage arrays.
42 Event Monitor Disabling the Event Monitor Disable the event monitor if you do not want the system to send alert notifications. If you are running the event monitor on multiple systems, disabling the event monitor on all bu t one system prevents the sending of duplicate messages.
About Y our Host 43 About Y our Host This chapter covers basic information ab out configuring host groups and host access, host topology , and I/O data path protection. A host is a system that accesses a stor age array and is mapped to the virtual disks through one or more host connections.
44 About Y our Host T o begin configuring host access, click the Configure tab and then click either Configure Host Access (Automatic) or Configure Host Access (Manual) . See the appropriate section for manual configuration, depending on whether you are using SAS HBA or iSCSI.
About Y our Host 45 4 Specify the HBA host ports by choosing known host ports or by manually defining host ports. T o select a host port that is alread y recognized by MD Storage Manager , click a host port in the Known HBA host ports list, then click Add .
46 About Y our Host T o manually define an initiator , click New , enter the iSCSI initiator name and iSCSI initiator label in the Enter new iSCSI initiator dialog box, and then click Add . NOTE: The initiator name entered must match the name on a host server that will connect to the storage array .
About Y our Host 47 Host Groups A host group is a logical entity of two or more hosts that shar e access to specific virtual disks on the storage a rray . Y ou create host groups with MD Storage Manager . All hosts in a host group must have the same host type (operating system).
48 About Y our Host 4 Select the host group to which you want to move the host. 5 Click OK . The host is moved into the host group. The host retains the virtual disk mapp ings assigned to it, and inherits the virtual disk mappings assigned to t he group.
About Y our Host 49 The host retains the virtual disk ma ppings assigned to it, and inherits the virtual disk mappings assigned to the group to which it is moved. The host loses the virtual disk mappings assig ned to the group from which it was moved.
50 About Y our Host Host Context Agent The host context agent discovers the host topology . The host context agent starts when the host is started and stops when the host is turned off. The topology discovered by the host cont e xt agent can be viewed by clicking Configure Host Access (Automatic) in the Configure tab in the MD Storage Manager .
About Y our Host 51 I/O Data Path Protection Y ou can have multiple host-to-array connections for a host. Make sur e to select all of the connectio ns to the array when configuring host access to the storage array . NOTICE: Refer to the Installation Guide for more information on cabling configurations.
52 About Y our Host After the host is rebooted, the L UN is properly mapped and the MPP driver is loaded. All other sequential L UNs can be created and register ed to the operating system by running hot_add .
Disk Groups and Virtual Disks 53 Disk Groups and V irtual Disks F ollowing is a list of terms us ed throughout this chapter: • Disk Group — A set of physical dis ks that are logically grouped and assigned a R AID level. Every disk group provides the overall capacity requir ed to create one or mor e virtual disks.
54 Disk Groups and Virtual Disks Creating Disk Groups and V irtual Disks Disk groups are cr eated in the unconfigured capacity of a storage array , and virtual disks are cr eated in the free ca pacity of a disk group. The maximum number of physical disks supported in a disk group is 30.
Disk Groups and Virtual Disks 55 performed in the department: Accoun ts Receivable (AR), Accounts P ayable (AP), internal billing, and so forth. In this scenario , the AR and AP virtual disks probably need more capacity th an the internal billing virtual disk.
56 Disk Groups and Virtual Disks 3 Select Manual on the Create V irtual Disks – Ph ysical Disk Selection Choices page, then click Next . 4 Select the R AID level for the new disk group. 5 T o select one physical disk to add to the disk group, click the disk of your choice in the Unselected physical disks list.
Disk Groups and Virtual Disks 57 14 T o map the new virtual disk to a host now , select Map now and assign a logical unit number (L UN) to the vi rtual disk in the drop-down box. T o map the new virtual disk to a host later , select Map later . 15 Click Fi n i s h to create the new disk group a nd the first virtual disk in the group.
58 Disk Groups and Virtual Disks If you plan to create multiple virtual di sks, wait until you have cr eated all the virtual disks to register them. W aiting prevents you from having to register virtual disks more than once. Linux NOTE: Y ou need super -user (Linux) privileges to run the hot_add utility .
Disk Groups and Virtual Disks 59 coverage for the storage array . The num ber and type of hot spare drives is determined based on the number , type, an d capacity of physical disks in the storage array . T o add hot spare drive protectio n using automatic configuration: 1 Click the Configure tab, then click Configure Hot Spares .
60 Disk Groups and Virtual Disks Host-to-V irtual Disk Mapping After you create virtual disks, you mu st map them to the host(s) connected to the array . When you configure host-to- virtual disk mapping, consider these guidelines: • Each virtual disk in the storage array can be mapped to only one host or host group.
Disk Groups and Virtual Disks 61 4 T o map the disk to a differe nt host or host group, click Change located to the right of the list. 5 T o remove the disk mapping to a host or host group, click Remove located to the right of the list.
62 Disk Groups and Virtual Disks Administrative T ools and select the Disk Management MMC option to format and partition the disk. If the host serv er is running Windows Server 2008 Core version, partition and format the vir tual disk using the Microsoft DiskPart utility .
Disk Groups and Virtual Disks 63 If you receive a warning that the snapshot r epository virtual disk is becoming full, you may expand the snapshot r epo sitory virtual disk from MD Storage Manager . See "Snapshot Repository Capa city" on page 79 for step-by-step instructions.
64 Disk Groups and Virtual Disks 3 In the Select virtual disks to scan box, click the virtual disk you want to include in the media scan. NOTE: Press <Ctrl> and click to add more than one virtual disk to the media scan. Click Select All to include all virtual disks in the media scan.
Disk Groups and Virtual Disks 65 V olume Shadow-Copy Service The Microsoft V olume Shadow-copy Serv ice (VSS) is a st orage management interface for Microsoft W indows operating systems. VSS en ables your storage array to interact with third-party appl ications that use the VSS Application P rogramming Interface.
66 Disk Groups and Virtual Disks.
Snapshot Virtual Disks 67 Premium Feature—Snapshot V irtual Disks NOTE: If you ordered this feature, you received a Premium Feature Activation card shipped in the same box as your Dell PowerV ault MD storage array. Follow the directions on the card to obtain a key file and to enable the feature.
68 Snapshot Virtual Disks When you create a snapshot virtual disk, you specify wher e to create the snapshot repository virtual disk, its capacity , and other parameters. Y ou can disable or delete the snapshot virtual disk when you no longer need it, such as when the backup is complete.
Snapshot Virtual Disks 69 • Snapshot Repository V irtual Disk Name — A user -specified name that helps you associate the snapshot repository virtual disk to its corr esponding snapshot virtual disk a nd source virtual disk.
70 Snapshot Virtual Disks Before cr eating a Snapshot Virtual Disk, note the following: • The following types of virtual disks are not valid source virtual disks: snapshot repository virtual disks, snap shot virtual disks, tar get virtual disks that are participating in a virtual disk copy .
Snapshot Virtual Disks 71 3 Remove the drive letter(s) of the source in W indows or unmount the virtual drive(s) in Linux to help guaran tee a stable copy of the drive for the Snapshot. If this is not done, the snapsh ot operation will report that it has completed successfully , but the snapshot data will not be updated properly .
72 Snapshot Virtual Disks 5 On the Create Snapshot V irtual Disks – Select P ath screen, select the Simple path. NOTE: A snapshot repository virtual disk re quires 8 MB of free space. If the required free space is n ot available in the disk group of the source virtual disk, the Create Snapshot Virtual Disks feature defaults to the advanced path.
Snapshot Virtual Disks 73 Creating a Snapshot V irtual Disk Using the Advanced Path About the Advanced Path Use the advanced path to choose whethe r to place the snapshot repository virtual disk on free capacity or unconf igur ed capacity and to change the snapshot repository virtual disk parame ters.
74 Snapshot Virtual Disks • Snapshot Repository V irtual Disk Full Conditions — Y ou can choose whe ther to f ail writ es to the source virtual disk or fail the snapshot virtual disk when the snapshot reposi tory virtual disk becomes full.
Snapshot Virtual Disks 75 Before cr eating a Snapshot V irtual Disk, note the following: • The following types of virtual disks are not valid source virtual disks: snapshot repository virtual disks, snapsh ot virtual disks, target virtual disks that are participating in a virtual disk copy .
76 Snapshot Virtual Disks 4 F ollow any additional instructions for your operating system. F ailure to follow these additional instructions can create unusable snapshot virtual disks. NOTE: If your operating sy stem requires addi tional instructions, you can find those instructions in your o perating sy stem documentation.
Snapshot Virtual Disks 77 6 Click Next . 7 T ype a name for the snapshot in the Snapshot virtual disk name text box. 8 T ype a name for the snapshot repository virtual disk in the Snapshot repository virtual disk name text box. 9 Click Next . 10 Choose whether to create the snap shot virtual disk from unconfigur ed capacity or free capacity .
78 Snapshot Virtual Disks T o map later , select Map later . 15 Click F inish to create the snapshot virtual disk and the associated snapshot repository virtual disk. 16 After you have created one or mor e snapshot virtual disks, mount or reassign a drive letter of the source virtual disk.
Snapshot Virtual Disks 79 • Whether you use the software-supplied sequence number that (by default) populates the Snapshot virtual disk name or the Snapshot repository virtual disk name field, the next default name for a snapshot or snapshot repository virtual disk still uses the sequence number determined by the software.
80 Snapshot Virtual Disks • Any virtual disk in the disk grou p is in any state of modification. • The controller that has ownership of this virtual disk is currently adding capacity to another virtual disk. Each controller can add capacity to only one virtual disk at a time.
Snapshot Virtual Disks 81 T o disable a snapshot virtual disk: 1 Click the Modify tab, then click Modify snapshot virtual disks . 2 Click Disable Snapshot V irtual Disks . 3 Highlight the snapshot virtual disk to be disabled and click Disable beneath the list.
82 Snapshot Virtual Disks 4 Remove the drive letter(s) of the sour ce and (if mounted) snapshot virtual disk in W indows or unmount the virtual drive(s) in Linux to help guarantee a stable copy of the drive for the Snapshot.
Virtual Disk Copy 83 Premium Feature—V irtual Disk Copy NOTICE: A virtual disk copy overwr ites data on th e target virtual disk. Before starting a virtual disk copy , ensure that you no longer need the d ata or back up the data on the targ et virtual disk.
84 Virtual Disk Copy Reasons to use virtual disk copy include the following: • Copying data for improved access — As your storage requir ements for a virtual disk change, you can use a virtual disk copy to copy data to a virtual disk in a disk group that uses drives with larger capacity within the same storage array .
Virtual Disk Copy 85 V irtual Disk Read/Write Permissions After the virtual disk copy is complete, the target virtual disk automatically bec omes rea d-on ly to the hosts .
86 Virtual Disk Copy V irtual Disk Copy Restrictions Before you perform any virtual disk co py tasks, understand and adher e to the restrictions listed in this section. The r estrictions apply to the source virtual disk, the target virtual disk, and the storage array .
Virtual Disk Copy 87 Creating a V irtual Disk Copy Use the Create V irtual Disk Copies featur e on the Configure tab to create a full copy of a source virtual disk. This operation overwrites any existing data on the target virtual disk. Once the v irtual disk copy has started, all I/O activity to the source virtual disk is read-only .
88 Virtual Disk Copy 4 Remove the drive letter(s) of the so urce and (if mounted) virtual disk in W indows or unmount the virtual driv e(s) in Linux to help guarantee a stable copy of the drive for the virtua l disk.
Virtual Disk Copy 89 5 Set the copy priority for the virtual disk copy and click Next . The source virtual disk, the target virt ual disk, and the copy priority setting that you selected appear on the Create virtual disk copies—Confirm Copy Settings dialog.
90 Virtual Disk Copy Y ou can change the copy priority for a virtual disk copy in the following circumstances: • Before the virtual disk copy begins See "Creating a V irtual Disk Copy" on page 87. • While the virtual disk copy is in progress Click the Modify tab, then click Manage V irtual Disk Copies .
Virtual Disk Copy 91 Preparing Host Servers to Recopy a Virtual Disk NOTICE: Before you create a new copy of a so urce virtual disk, stop any data access (I/O) activity or sus pend data transfer to the sour ce virtual disk (and, if applicable, the targe t disk) to ensure that you captu re an accurate point-in-time image of the source virtual disk.
92 Virtual Disk Copy Recopying the Virtual Disk After first preparing the host server(s) as specified in the pr eceding procedure, complete the following steps to create a new virtual disk copy for an e xisting copy pair: 1 Click the Modify tab, and then click Manage virtual disk copies .
Virtual Disk Copy 93 3 Y ou must register the tar get virtual di sk with the operating system before you can use the new virtual disk. P erform the following steps: a Enable write permission on the ta.
94 Virtual Disk Copy.
Firmware Downloads 95 Firmware Downloads Y ou can download the following types of firmware images with MD Storage Manager: • R AID controller module firmware that manages the storage array controlle.
96 Firmware Downloads Downloading Both RAID Controller and NVSRAM Firmware NOTE: I/O to the array can continue while yo u are upgrading RAID controller and NVSRAM firmware. NOTE: The RAID enclosure must contain at leas t two disk drives in order to update the firmware on the controller .
Firmware Downloads 97 11 A Confirm Download dialog box appears listing the current versions and the versions you selected of the R A ID controller and NVSRAM firmwar e .
98 Firmware Downloads 3 Click Select F ile to browse to the file that you want to download. By default, only firmware images that ar e compatible with the current storage array configuration appear . 4 Click the non-redundant-MSCS NVSR AM file in the F ile Selection area and then click OK .
Firmware Downloads 99 7 A Confirm Download dialog box appears listing the current versions and the versions you selected of physical disk firmware. T o complete the download, click Ye s . Downloading EMM Firmware NOTICE: Do not make any configuration changes to the storage array while you are dow nload ing the EMM firmwa re.
100 Firmware Downloads.
T roubleshooting 101 T roubleshooting Problems The following sections provide information to assist you in resolving problems that may occur with your MD Storage Array .
102 T roubleshooti ng A storage array is always in one of six possible health status conditions, which you can identify by the status icon. • Optimal status — Every component in the managed device is in the desired working condition. • Needs Attention status — A problem exis ts with the managed device that requir es intervention.
T roubleshooting 103 where -f flushes all the memory-r esident data for the file system indicated by < fi le sy st em- identifier > , and < filesystem-identifier > specifies a unique file .
104 T roubleshooti ng Unidentified Devices An unidentified node or device occurs when the MD Storage Manager cannot access a new storage array . Causes fo r this error include network connection problems, the storage array is turned off, or the storage array does not exist.
T roubleshooting 105 b Make sur e that the network can access the host by using the ping command in the following syntax: ping <host-name-or-IP-address-of-the-host> . If the network can access the host, cont inue to step c. If the network cannot access the host, skip to step d.
106 T roubleshooti ng d Make sur e that the applicable netw ork configuration tasks have been done (for example, the IP addr esses have been assigned to each controller). 5 Make sur e that the controller firmware is compatible with the MD Storage Manager on your management station .
Hardware Considerations 107 Enclosure Hardware Replacement, Maintenance, and Configuration Considerations Removing and Inserting Enclosure Management Modules on Attached Expansion Enclosures The follo.
108 Hardware Considerations 2 After attaching the SAS cables, wait at least three minutes for the EMM to reach optimal state. NOTE: Y ou may experience a transitional failu re on multiple E MMs in the MEL log while the sy stem updates.
Hardware Considerations 109 MD3000 Cluster Configuration Guidelines for Standalone Host Servers If one of the standalone host servers you are planning to configur e into a cluster environment is running MD Storage Manager and has a virtual disk mapped to the array , use that host to create the Host Group and quorum virtual disk mapping.
110 Hardware Considerations.
Index 111 Index A alert e-mail, 2 7 SNMP , 2 7 B backup, 84 C Configure tab, 12 copy pairs removing, 9 3 copy priority , 89 D disk expansion, 6 2 disk group, 12, 53-55, 80 documentation, 14 download f.
112 Index I iSCSI advanced host port settings, 3 5 changing target discovery , 3 4 changing target identification, 3 4 configuring host ports, 3 5 edit, remove, or r ename host topology , 3 8 iSCSI ta.
Index 113 U unconfigured capacity , 53 utilities hot_add, 5 8 V virtual disk, 53-54 access, 1 5 deleting in Linux, 5 5 n a m e , 78-79 recopy , 9 0 registering, 5 7 s o u r c e , 67, 79 virtual disk c.
114 Index.
Ein wichtiger Punkt beim Kauf des Geräts Dell Computer Drive (oder sogar vor seinem Kauf) ist das durchlesen seiner Bedienungsanleitung. Dies sollten wir wegen ein paar einfacher Gründe machen:
Wenn Sie Dell Computer Drive noch nicht gekauft haben, ist jetzt ein guter Moment, um sich mit den grundliegenden Daten des Produkts bekannt zu machen. Schauen Sie zuerst die ersten Seiten der Anleitung durch, die Sie oben finden. Dort finden Sie die wichtigsten technischen Daten für Dell Computer Drive - auf diese Weise prüfen Sie, ob das Gerät Ihren Wünschen entspricht. Wenn Sie tiefer in die Benutzeranleitung von Dell Computer Drive reinschauen, lernen Sie alle zugänglichen Produktfunktionen kennen, sowie erhalten Informationen über die Nutzung. Die Informationen, die Sie über Dell Computer Drive erhalten, werden Ihnen bestimmt bei der Kaufentscheidung helfen.
Wenn Sie aber schon Dell Computer Drive besitzen, und noch keine Gelegenheit dazu hatten, die Bedienungsanleitung zu lesen, sollten Sie es aufgrund der oben beschriebenen Gründe machen. Sie erfahren dann, ob Sie die zugänglichen Funktionen richtig genutzt haben, aber auch, ob Sie keine Fehler begangen haben, die den Nutzungszeitraum von Dell Computer Drive verkürzen könnten.
Jedoch ist die eine der wichtigsten Rollen, die eine Bedienungsanleitung für den Nutzer spielt, die Hilfe bei der Lösung von Problemen mit Dell Computer Drive. Sie finden dort fast immer Troubleshooting, also die am häufigsten auftauchenden Störungen und Mängel bei Dell Computer Drive gemeinsam mit Hinweisen bezüglich der Arten ihrer Lösung. Sogar wenn es Ihnen nicht gelingen sollte das Problem alleine zu bewältigen, die Anleitung zeigt Ihnen die weitere Vorgehensweise – den Kontakt zur Kundenberatung oder dem naheliegenden Service.