Table of Contents
ETERNUS Web GUI User’s Guide
11
Copyright 2011 FUJITSU LIMITED P2X0-1090-02ENZ0
11.1.6 Event/Dump ............................................................................................................................. 450
11.1.7 Utility ........................................................................................................................................ 451
11.1.8 System Settings ....................................................................................................................... 451
11.1.9 ECO Mode Schedule Detail ..................................................................................................... 452
11.2 Functions in the Action Area for System ........................................................ 453
11.2.1 Change User Password ........................................................................................................... 455
11.2.2 Set SSH Public Key ................................................................................................................. 456
11.2.3 Network Management ............................................................................................................. 458
11.2.4 Remote Support Management ................................................................................................501
11.2.5 User Settings ........................................................................................................................... 523
11.2.6 ECO Mode Management ......................................................................................................... 539
11.2.7 Event/Dump Management ....................................................................................................... 550
11.2.8 Utility Management .................................................................................................................. 570
11.2.9 System Management ............................................................................................................... 575
Appendix A User Roles and Policies.......................................................592
A.1 Roles ............................................................................................................... 592
A.2 Availability of Functions for each Policy .......................................................... 593
Appendix B Status List .............................................................................612
B.1 Device General Status .................................................................................... 612
B.2 Volume Status................................................................................................. 613
B.3 RAID Group Status ......................................................................................... 614
B.4 Thin Provisioning Pool Status ......................................................................... 615
B.5 Component Status .......................................................................................... 615
B.5.1 Drive Status ............................................................................................................................. 616
Appendix C Naming Conventions of Volumes and Hosts.....................617
C.1 Naming Convention of Volumes...................................................................... 617
C.2 Naming Convention of Hosts .......................................................................... 618
C.2.1 For FC Hosts ........................................................................................................................... 618
C.2.2 For iSCSI Hosts....................................................................................................................... 619
C.2.3 For SAS Hosts......................................................................................................................... 620
Appendix D Installing the Security Certificate .......................................622
D.1 For Internet Explorer ....................................................................................... 622
D.2 For Firefox....................................................................................................... 627
Appendix E Using RADIUS Authentication ............................................630
E.1 Using RADIUS Authentication to
Access the ETERNUS DX Disk Storage System............................................ 630
E.2 Notes when Using RADIUS Authentication for GUI ........................................ 631
E.3 Setting Up the RADIUS Server ....................................................................... 631