Symantec 5.1 manual Language or protocol, See also hard zoning, See SAN, See device, Subnets

Page 47

 

CommandCentral Glossary 47

 

cooperating systems that must adhere to a common framework and a common

 

language or protocol.

soft zoning

A fabric zoning method that filters the visibility of objects on the storage network

 

so that an object can only see other objects that share at least one zone membership

 

with it. Unlike hard zoning, soft zoning is not enforced at the switches themselves.

 

See also hard zoning.

storage area network

See SAN

(SAN)

 

storage array

A collection of disks or tapes that are part of a storage subsystem, managed as a

 

unit by a body of control software. The disks or tapes may be housed in a single

 

physical device or in multiple devices. See also disk array tape device.

storage device

See device.

storage pool

A single entity representing a collection of LUNs. Using storage pools, storage

 

administrators can create virtual disks of different sizes. These virtual disks can

 

then be assigned to virtual machines.

Storage System

A NetApp unified storage device that operates using Data ONTAP software.

 

MultiStore Virtual Systems, also known as Multistore devices, can be configured

 

on physical filers (pfilers). See also NetApp unified storage.

storage view

A logical port defined for an array that supports SMI-S 1.1. When a storage view

 

is defined, the array can support LUN masking with multiple, heterogeneous hosts

 

through a single physical array port. See also array virtual port.

striping

A layout technique that spreads data across several physical disks by mapping

 

the data to successive media, known as stripes, in a cyclic pattern. Also RAID Level

 

0.

subnet

A portion of a storage network typically consisting of all machines in one locale,

 

in one building, or on the same local area network (LAN). Internet Request for

 

Comments 950 provides the standard procedure for creating and identifying

 

subnets.

subnet mask

A 32-bit mask that identifies the portions of an IP address to be used for locating

 

addresses in a subnetwork.

switch

A network device to which nodes attach and which provides high-speed switching

 

of node connections via link-level addressing.

Symantec Private

A common component that uses socket passing to reduce the number of ports

Branch Exchange (PBX)

required to be open across a firewall. PBX uses a paradigm similar to that of a

 

telephone switchboard in which calls placed to a switchboard are redirected to a

 

known extension. In the PBX exchange, client connections sent to the exchange’s

 

port are redirected to an extension associated with the CommandCentral Storage

 

Management Server.

Image 47
Contents Veritas CommandCentral Getting Started Guide Legal Notice CommandCentral Getting Started GuideSymantec Corporation Stevens Creek Blvd Cupertino, CA Contacting Technical Support Technical SupportLicensing and registration Customer serviceAdditional enterprise services Maintenance agreement resourcesThis document includes the following topics About the CommandCentral familyAbout Veritas CommandCentral Storage Enhanced agentless discovery of storage resources What’s new in CommandCentral StorageManagement and discovery Discovery of replication objects for HP EVA storage arrays Improved Data Module file scanningAdded in-context performance reports for certain objects ReportingSybase ASE 15 support New sample ad hoc reports InstallationAdded the Switch Port Usage Trend report VxVM volumesRed Hat Linux 5.0 support Reduced media and install footprint for the managed hostOther enhancements Windows Server 2008 supportHotfix deployment mechanism Ability to set new managed hosts in unmanaged stateStorage network technologies What you can do with CommandCentral StorageManaging the storage network introduction Storage virtualization Storage administrator requirementsData collection Discovery of storage resourcesVersatile displays of information about storage resources Policies for managing resourcesStorage provisioning About Veritas CommandCentral Storage Change ManagerWhat you can do with CommandCentral Storage Change Manager How CommandCentral Storage Change Manager works About Veritas CommandCentral Enterprise ReporterReport types and scopes Inclusion of custom storage object attributes Whats new in CommandCentral Enterprise Reporter 5.0 MP1Data rollup enhancements Inclusion of NetApp unified storage device dataData rollup view enhancements Storage tier rule builder enhancementsReporting enhancements Data source preparation enhancementsNew package and metrics NetApp VolumesDashboard customization with selected reports Security enhancements What you can do with CommandCentral Enterprise ReporterSSL mode Report access enhancementsHow CommandCentral Enterprise Reporter works Supported operating systems for CommandCentral Getting CommandCentral up and runningSystem requirements for CommandCentral Component Operating systems supported Installation overviewWeb browser support for the CommandCentral Console Getting help Where to find more information about CommandCentralCommandCentral on the Web About CommandCentral Storage documentation About CommandCentral documentationAbout CommandCentral Storage Change Manager documentation Commenting on product documentation About CommandCentral Enterprise Reporter documentationStoragemanagementdocs@symantec.com Page Database and Veritas NetBackup are examples of applications FlexVol volumes. See also volumeSee CommandCentral Storage Alarm Service See CommandCentral Storage Alert ManagerSee Command Central Configuration Utility To configuration settingsSee Symantec Product Authentication Service See Symantec Product Authorization ServiceUsers can monitor, define, and modify policies Service commands and queriesVirtualization servers Kernel-to-kernel broadcastsData to users through a standard Web browser Groups. Contrast with unconfigured storageSee CommandCentral Storage Console See CommandCentral Storage databaseExtended discovery Data is stored in the CommandCentral Storage databaseThat store data. Also storage device Also OS handleInformation about them. See also discovery Feature. See also discoveryAt least one FC switch and may also contain zones Has occurred for one or more objects on the storage networkExplorer was known as the Mgex explorer Displays the correct object typeGroup On specific applicationsPage Was known as the Agent Accessibility from specified SAN-attached hostsSee Veritas NetBackup Available storagePage Component such as an IP address or mounted file system That acts as a virtual subvolume with special attributesTypes for storage, networking, and application services Extent pool storage arraySeveral managed hosts Routinely whenever an in-band explorer executesTo peripheral devices such as disk and media drives Storage device fixed disk attached to a Scsi busSee device Language or protocolSee also hard zoning See SANConsole Task Status tab Symantec Product Authentication ServiceMark that is recorded between backup images on a tape Between themA wide range of applications in multiplatform environments SecuritySee NetApp unified storage See VailSee virtual fabric They were fabric capableCorresponds to the system’s host name. See also IP address Applications as if it were a physical computerAggregate’s disks and RAID groups. See also aggregate See Veritas Volume ManagerSee CommandCentral Storage Web Engine An extent pool. See also extent poolCommandCentral Glossary