Port requirements | 27 |
Ports used | 27 |
DSS Address Book access for latest generation devices | 28 |
Hostname resolution | 28 |
Backup and restore strategy | 28 |
Understand DSS data structures | 28 |
Software capabilities for backup and restore | 29 |
Scaling the DSS server | 29 |
Limitations | 30 |
Features and factors that limit scalability | 30 |
Recommendations | 30 |
Licensing | 30 |
Activating licenses | 31 |
Install licenses | 32 |
Trial or demo license | 32 |
Upgrading from previous products | 32 |
Node locking | 32 |
Device differences | 33 |
Installation | 34 |
| 34 |
Installer screens and options | 34 |
Configuration | 36 |
Configuration Utility | 36 |
Licensing | 37 |
Add licenses | 38 |
Remove licenses | 39 |
39 | |
Device management | 40 |
Add and remove devices | 42 |
Device configuration | 44 |
Understanding the Device List | 45 |
Device grouping | 45 |
Authentication | 46 |
Configure DSS | 46 |
Authentication methods | 46 |
LDAP bind | 53 |
How to | 54 |
Configure the Device | 56 |
How to | 57 |
General Device configuration | 58 |
General subtab | 59 |
Addressing subtab | 60 |
Log subtab | 62 |
Preferences subtab | 63 |
iv | ENWW |