Contents

 

1 Introduction...............................................................................................

6

Replication Manager Environment...............................................................................................

6

Minimum Requirements..............................................................................................................

6

Compatibility...........................................................................................................................

7

2 Getting Started..........................................................................................

8

Installing Replication Manager...................................................................................................

8

Upgrading Replication Manager................................................................................................

9

Launching and logging in to Replication Manager......................................................................

10

Identifying regions of the interface............................................................................................

12

Understanding administrator- and user-level permissions...............................................................

12

3 Configuring the Replication Manager..........................................................

14

Adding a device.....................................................................................................................

14

Adding new users or administrators..........................................................................................

15

Local authentication mechanism: adding new users or administrators .......................................

15

LDAP authentication mechanism: adding new users or administrators .......................................

15

Creating a new group.............................................................................................................

16

4 Managing devices....................................................................................

21

Viewing a group summary.......................................................................................................

21

Filtering devices to appear.......................................................................................................

21

Customizing columns to appear................................................................................................

22

Viewing topology...................................................................................................................

23

Viewing device details.............................................................................................................

24

Viewing current issues.........................................................................................................

25

Viewing virtual libraries......................................................................................................

26

Viewing NAS Shares..........................................................................................................

28

Viewing device statistics......................................................................................................

30

Viewing device disk usage.............................................................................................

31

Viewing the device deduplication ratio.............................................................................

33

Viewing replication jobs.................................................................................................

36

Managing removed devices.....................................................................................................

39

5 Performing Administration procedures.........................................................

41

Managing the Authentication Mechanism .................................................................................

41

Changing from local to LDAP authentication..........................................................................

41

Configuring LDAP authentication..........................................................................................

42

Adding a new LDAP server.............................................................................................

42

Modifying an LDAP server..............................................................................................

42

Removing an LDAP server...............................................................................................

43

Changing from LDAP to local authentication..........................................................................

43

Performing Device Management tasks.......................................................................................

43

Modifying a device polling interval or IP address...................................................................

44

Removing a device.............................................................................................................

44

Performing User Management tasks..........................................................................................

45

Modifying user details .......................................................................................................

45

Local authentication mechanism: modifying details for users or administrators.......................

45

Contents 3