System and environment requirements .............................................................................

44

Software requirements ......................................................................................

44

Hardware requirements .....................................................................................

45

Device firmware requirements ..........................................................

45

Port requirements ..............................................................................................

47

Ports used ........................................................................................

47

DSS Address Book access for latest generation devices .................

48

Hostname resolution .........................................................................

48

Backup and restore strategy ..............................................................................................

48

Understand DSS data structures ......................................................................

48

Software capabilities for backup and restore ....................................................

49

Scaling the DSS server .....................................................................................

50

Limitations ........................................................................................

50

Features and factors that limit scalability ..........................................

50

Recommendations ............................................................................

50

Licensing ............................................................................................................................

51

Activating licenses .............................................................................................

51

Install licenses ...................................................................................................

52

Trial or demo license .........................................................................................

52

Upgrading from previous products ....................................................................

52

Node locking .....................................................................................................

53

Device differences .............................................................................................................

53

Installation ..........................................................................................................................................

54

Pre-installation checklist ....................................................................................................

54

Installer screens and options .............................................................................................

54

Configuration ......................................................................................................................................

57

Configuration Utility ............................................................................................................

57

Licensing ............................................................................................................................

58

Add licenses ......................................................................................................

59

Remove licenses ...............................................................................................

60

Auto-generated licenses ...................................................................................

60

Device management ..........................................................................................................

61

Add and remove devices ...................................................................................

63

Device configuration ..........................................................................................

65

Understanding the Device List ..........................................................................

66

Device grouping ................................................................................................

66

Authentication ....................................................................................................................

67

Configure DSS ..................................................................................................

67

Authentication methods ....................................................................

67

LDAP bind ........................................................................................

75

How to ..............................................................................................

76

ENWW

v