System and environment requirements .............................................................................
44
Software requirements ......................................................................................
Hardware requirements .....................................................................................
45
Device firmware requirements ..........................................................
Port requirements ..............................................................................................
47
Ports used ........................................................................................
DSS Address Book access for latest generation devices .................
48
Hostname resolution .........................................................................
Backup and restore strategy ..............................................................................................
Understand DSS data structures ......................................................................
Software capabilities for backup and restore ....................................................
49
Scaling the DSS server .....................................................................................
50
Limitations ........................................................................................
Features and factors that limit scalability ..........................................
Recommendations ............................................................................
Licensing ............................................................................................................................
51
Activating licenses .............................................................................................
Install licenses ...................................................................................................
52
Trial or demo license .........................................................................................
Upgrading from previous products ....................................................................
Node locking .....................................................................................................
53
Device differences .............................................................................................................
Installation ..........................................................................................................................................
54
Pre-installation checklist ....................................................................................................
Installer screens and options .............................................................................................
Configuration ......................................................................................................................................
57
Configuration Utility ............................................................................................................
58
Add licenses ......................................................................................................
59
Remove licenses ...............................................................................................
60
Auto-generated licenses ...................................................................................
Device management ..........................................................................................................
61
Add and remove devices ...................................................................................
63
Device configuration ..........................................................................................
65
Understanding the Device List ..........................................................................
66
Device grouping ................................................................................................
Authentication ....................................................................................................................
67
Configure DSS ..................................................................................................
Authentication methods ....................................................................
LDAP bind ........................................................................................
75
How to ..............................................................................................
76
ENWW
v