Symantec 5.1 manual Symantec Product Authentication Service, Between them, Console Task Status tab

Page 48

48 CommandCentral Glossary

Symantec Product

A component of Veritas Security Services (VxSS) that is used by CommandCentral

Authentication Service

Storage to provide user authentication. Authentication Service is a set of processes

 

and runtime libraries that enables users to log on to multiple Veritas products

 

with one login. See also Symantec Product Authorization Service.

Symantec Product

A common component, also known as VRTSaz, that provides a centralized access

Authorization Service

control decision-making service. After the Authentication Service has validated

 

user identities, the Authorization Service makes access control decisions,

 

determining whether specific users have the authority to perform specific tasks

 

on specific resources being protected by authorization. The Hardware Abstraction

 

Layer (HAL) is the only part of CommandCentral Storage to use the Authorization

 

Service, using it to control access for inter-process communication. See also

 

Symantec Product Authentication Service.

system

The physical hardware on which data and applications reside, and the connections

 

between them.

tape device

A storage device that writes data to tape. CommandCentral Storage identifies a

 

tape drive, tape transport, and tape arrays as a tape device.

tape mark

A mark that is recorded between backup images on a tape.

Task Manager

A CommandCentral Storage Management Server component that manages

 

user-initiated requests to requests to change the status or configuration of objects

 

in the network and to add, edit, and delete users. The Task Manager maintains a

 

list of completed, pending, and active tasks. The list can be viewed using the

 

Console Task Status tab.

topology

The physical or logical arrangement of resources on the storage network and the

 

connections between them.

Topology Map

A graphical representation of the physical or logical arrangement of storage

 

resources in the network. The Topology Map depicts both the objects on the

 

network and the connections between them. In CommandCentral Storage, the

 

Topology Map displays on the Console's Topology tab.

unallocated storage

LUNs that have not yet been allocated. A LUN is considered allocated when a host

 

operating system has written a device handle for the LUN (in other words, claimed

 

the LUN) or when the array has masked the LUN to a specific target. Contrast

 

with allocated storage

unclaimed storage

Storage that has been allocated to hosts whose operating systems have not yet

 

written device handles. This is usually wasted storage. Contrast with claimed

 

storage

unconfigured storage

Physical storage that has yet to be formatted. Contrast with configured storage

unidentified adapter

An HBA or storage device that has logged into a Fibre Channel switch and about

 

which CommandCentral Storage has no information. For HBAs, this can occur

Image 48
Contents Veritas CommandCentral Getting Started Guide CommandCentral Getting Started Guide Legal NoticeSymantec Corporation Stevens Creek Blvd Cupertino, CA Technical Support Contacting Technical SupportCustomer service Licensing and registrationMaintenance agreement resources Additional enterprise servicesAbout the CommandCentral family This document includes the following topicsAbout Veritas CommandCentral Storage What’s new in CommandCentral Storage Management and discoveryEnhanced agentless discovery of storage resources Improved Data Module file scanning Discovery of replication objects for HP EVA storage arraysReporting Sybase ASE 15 supportAdded in-context performance reports for certain objects Installation Added the Switch Port Usage Trend reportVxVM volumes New sample ad hoc reportsReduced media and install footprint for the managed host Other enhancementsWindows Server 2008 support Red Hat Linux 5.0 supportAbility to set new managed hosts in unmanaged state Hotfix deployment mechanismWhat you can do with CommandCentral Storage Managing the storage network introductionStorage network technologies Storage administrator requirements Storage virtualizationDiscovery of storage resources Versatile displays of information about storage resourcesPolicies for managing resources Data collectionAbout Veritas CommandCentral Storage Change Manager Storage provisioningWhat you can do with CommandCentral Storage Change Manager About Veritas CommandCentral Enterprise Reporter How CommandCentral Storage Change Manager worksReport types and scopes Whats new in CommandCentral Enterprise Reporter 5.0 MP1 Data rollup enhancementsInclusion of NetApp unified storage device data Inclusion of custom storage object attributesStorage tier rule builder enhancements Reporting enhancementsData source preparation enhancements Data rollup view enhancementsNetApp Volumes Dashboard customization with selected reportsNew package and metrics What you can do with CommandCentral Enterprise Reporter SSL modeReport access enhancements Security enhancementsHow CommandCentral Enterprise Reporter works Getting CommandCentral up and running System requirements for CommandCentralSupported operating systems for CommandCentral Installation overview Web browser support for the CommandCentral ConsoleComponent Operating systems supported Where to find more information about CommandCentral CommandCentral on the WebGetting help About CommandCentral documentation About CommandCentral Storage documentationAbout CommandCentral Storage Change Manager documentation About CommandCentral Enterprise Reporter documentation Commenting on product documentationStoragemanagementdocs@symantec.com Page FlexVol volumes. See also volume See CommandCentral Storage Alarm ServiceSee CommandCentral Storage Alert Manager Database and Veritas NetBackup are examples of applicationsTo configuration settings See Symantec Product Authentication ServiceSee Symantec Product Authorization Service See Command Central Configuration UtilityService commands and queries Virtualization serversKernel-to-kernel broadcasts Users can monitor, define, and modify policiesGroups. Contrast with unconfigured storage See CommandCentral Storage ConsoleSee CommandCentral Storage database Data to users through a standard Web browserData is stored in the CommandCentral Storage database That store data. Also storage deviceAlso OS handle Extended discoveryFeature. See also discovery At least one FC switch and may also contain zonesHas occurred for one or more objects on the storage network Information about them. See also discoveryDisplays the correct object type GroupOn specific applications Explorer was known as the Mgex explorerPage Accessibility from specified SAN-attached hosts See Veritas NetBackupAvailable storage Was known as the AgentPage That acts as a virtual subvolume with special attributes Types for storage, networking, and application servicesExtent pool storage array Component such as an IP address or mounted file systemRoutinely whenever an in-band explorer executes To peripheral devices such as disk and media drivesStorage device fixed disk attached to a Scsi bus Several managed hostsLanguage or protocol See also hard zoningSee SAN See deviceSymantec Product Authentication Service Mark that is recorded between backup images on a tapeBetween them Console Task Status tabSecurity See NetApp unified storageSee Vail A wide range of applications in multiplatform environmentsThey were fabric capable Corresponds to the system’s host name. See also IP addressApplications as if it were a physical computer See virtual fabricSee Veritas Volume Manager See CommandCentral Storage Web EngineAn extent pool. See also extent pool Aggregate’s disks and RAID groups. See also aggregateCommandCentral Glossary