Symantec 5.1 manual CommandCentral Getting Started Guide, Legal Notice

Page 2

CommandCentral™ Getting Started Guide

The software described in this book is furnished under a license agreement and may be used only in accordance with the terms of the agreement.

Documentation version 5.1.0

Legal Notice

Copyright © 2008 Symantec Corporation. All rights reserved.

Symantec, the Symantec logo, Veritas, CommandCentral, NetBackup, SANPoint, SANPoint Control, and Storage Foundation are trademarks or registered trademarks of Symantec Corporation or its affiliates in the U.S. and other countries. Other names may be trademarks of their respective owners.

This Symantec product may contain third party software for which Symantec is required to provide attribution to the third party (“Third Party Programs”). Some of the Third Party Programs are available under open source or free software licenses. The License Agreement accompanying the Software does not alter any rights or obligations you may have under those open source or free software licenses. Please see the Third Party Legal Notice documentation accompanying this Symantec product for more information on the Third Party Programs.

AIX is a registered trademark of IBM Corporation.

HP-UX is a registered trademark of Hewlett-Packard Development Company, L.P.

Linux is a registered trademark of Linus Torvalds.

Solaris is a trademark of Sun Microsystems, Inc.

The product described in this document is distributed under licenses restricting its use, copying, distribution, and decompilation/reverse engineering. No part of this document may be reproduced in any form by any means without prior written authorization of Symantec Corporation and its licensors, if any.

THEDOCUMENTATIONISPROVIDED"ASIS"ANDALLEXPRESSORIMPLIEDCONDITIONS, REPRESENTATIONS AND WARRANTIES, INCLUDING ANY IMPLIED WARRANTY OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE OR NON-INFRINGEMENT, ARE DISCLAIMED, EXCEPT TO THE EXTENT THAT SUCH DISCLAIMERS ARE HELD TO BELEGALLYINVALID. SYMANTECCORPORATIONSHALLNOTBELIABLEFORINCIDENTAL OR CONSEQUENTIAL DAMAGES IN CONNECTION WITH THE FURNISHING, PERFORMANCE, OR USE OF THIS DOCUMENTATION. THE INFORMATION CONTAINED IN THIS DOCUMENTATION IS SUBJECT TO CHANGE WITHOUT NOTICE.

The Licensed Software and Documentation are deemed to be commercial computer software as defined in FAR 12.212 and subject to restricted rights as defined in FAR Section 52.227-19 "Commercial Computer Software - Restricted Rights" and DFARS 227.7202, "Rights in Commercial Computer Software or Commercial Computer Software Documentation", as applicable, and any successor regulations.

Image 2
Contents Veritas CommandCentral Getting Started Guide CommandCentral Getting Started Guide Legal NoticeSymantec Corporation Stevens Creek Blvd Cupertino, CA Technical Support Contacting Technical SupportCustomer service Licensing and registrationMaintenance agreement resources Additional enterprise servicesAbout the CommandCentral family This document includes the following topicsAbout Veritas CommandCentral Storage Enhanced agentless discovery of storage resources What’s new in CommandCentral StorageManagement and discovery Improved Data Module file scanning Discovery of replication objects for HP EVA storage arraysAdded in-context performance reports for certain objects ReportingSybase ASE 15 support VxVM volumes InstallationAdded the Switch Port Usage Trend report New sample ad hoc reportsWindows Server 2008 support Reduced media and install footprint for the managed hostOther enhancements Red Hat Linux 5.0 supportAbility to set new managed hosts in unmanaged state Hotfix deployment mechanismStorage network technologies What you can do with CommandCentral StorageManaging the storage network introduction Storage administrator requirements Storage virtualizationPolicies for managing resources Discovery of storage resourcesVersatile displays of information about storage resources Data collectionAbout Veritas CommandCentral Storage Change Manager Storage provisioningWhat you can do with CommandCentral Storage Change Manager About Veritas CommandCentral Enterprise Reporter How CommandCentral Storage Change Manager worksReport types and scopes Inclusion of NetApp unified storage device data Whats new in CommandCentral Enterprise Reporter 5.0 MP1Data rollup enhancements Inclusion of custom storage object attributesData source preparation enhancements Storage tier rule builder enhancementsReporting enhancements Data rollup view enhancementsNew package and metrics NetApp VolumesDashboard customization with selected reports Report access enhancements What you can do with CommandCentral Enterprise ReporterSSL mode Security enhancementsHow CommandCentral Enterprise Reporter works Supported operating systems for CommandCentral Getting CommandCentral up and runningSystem requirements for CommandCentral Component Operating systems supported Installation overviewWeb browser support for the CommandCentral Console Getting help Where to find more information about CommandCentralCommandCentral on the Web About CommandCentral documentation About CommandCentral Storage documentationAbout CommandCentral Storage Change Manager documentation About CommandCentral Enterprise Reporter documentation Commenting on product documentationStoragemanagementdocs@symantec.com Page See CommandCentral Storage Alert Manager FlexVol volumes. See also volumeSee CommandCentral Storage Alarm Service Database and Veritas NetBackup are examples of applicationsSee Symantec Product Authorization Service To configuration settingsSee Symantec Product Authentication Service See Command Central Configuration UtilityKernel-to-kernel broadcasts Service commands and queriesVirtualization servers Users can monitor, define, and modify policiesSee CommandCentral Storage database Groups. Contrast with unconfigured storageSee CommandCentral Storage Console Data to users through a standard Web browserAlso OS handle Data is stored in the CommandCentral Storage databaseThat store data. Also storage device Extended discoveryHas occurred for one or more objects on the storage network Feature. See also discoveryAt least one FC switch and may also contain zones Information about them. See also discoveryOn specific applications Displays the correct object typeGroup Explorer was known as the Mgex explorerPage Available storage Accessibility from specified SAN-attached hostsSee Veritas NetBackup Was known as the AgentPage Extent pool storage array That acts as a virtual subvolume with special attributesTypes for storage, networking, and application services Component such as an IP address or mounted file systemStorage device fixed disk attached to a Scsi bus Routinely whenever an in-band explorer executesTo peripheral devices such as disk and media drives Several managed hostsSee SAN Language or protocolSee also hard zoning See deviceBetween them Symantec Product Authentication ServiceMark that is recorded between backup images on a tape Console Task Status tabSee Vail SecuritySee NetApp unified storage A wide range of applications in multiplatform environmentsApplications as if it were a physical computer They were fabric capableCorresponds to the system’s host name. See also IP address See virtual fabricAn extent pool. See also extent pool See Veritas Volume ManagerSee CommandCentral Storage Web Engine Aggregate’s disks and RAID groups. See also aggregateCommandCentral Glossary