Do you have a question about the NEC Storage Manager and is the answer not in the manual?
Describes the overview of a disk array, which is the object of iSM management.
Explains the composition of a disk array, including controllers and enclosures.
Explains the virtual medium called pool or RANK and its logical disk configurations.
Describes logical disks as equivalent to physical disks viewed from the OS.
Introduces the concept of LD Set for assigning logical disks collectively to ports and WWNs.
Explains setting accessible logical disks based on each business server's HBA WWN.
Explains that Configuration Setting and Access Control functions are installed simultaneously with the iSM server.
Outlines the basic procedure for installing a system and disk array.
Describes the procedure for expanding physical disks on an operating disk array.
Details the procedure for installing Access Control when initially setting it up.
Lists the specifiable and referenceable parameters on each disk array series.
Specifies physical disks for RAID configuration and assigns the RAID type to bind a pool.
Explains the procedure for binding logical disks according to PD group.
Explains binding physical disks and RAID type for binding RAID to a RANK.
Explains the procedure for binding logical disks according to PD group.
Provides nicknames and settings affecting the entire disk array.
Describes how to make various network settings.
Explains how to change the port mode on the disk array.
Details the process of setting LD Sets.
Describes how to assign logical disks to LD Sets for business server access.
Explains how to start the Access Control function.
Shows the maximum number of LD Sets that can be located in one disk array.
Explains how to operate the configuration setup command via CLI from the iSM server.
Introduces the concept of RAID and its purposes.
Provides important notes and considerations for binding logical disks.
Explains the difference between pool used capacity and logical disk capacity.
Describes the format of the nickname setting file for batch operations.
Explains the guard function for ACOS-4 resources to prevent system destruction.