System and environment requirements | 44 |
Software requirements | 44 |
Hardware requirements | 45 |
Device firmware requirements | 45 |
Port requirements | 47 |
Ports used | 47 |
DSS Address Book access for latest generation devices | 48 |
Hostname resolution | 48 |
Backup and restore strategy | 48 |
Understand DSS data structures | 48 |
Software capabilities for backup and restore | 49 |
Scaling the DSS server | 50 |
Limitations | 50 |
Features and factors that limit scalability | 50 |
Recommendations | 50 |
Licensing | 51 |
Activating licenses | 51 |
Install licenses | 52 |
Trial or demo license | 52 |
Upgrading from previous products | 52 |
Node locking | 53 |
Device differences | 53 |
Installation | 54 |
| 54 |
Installer screens and options | 54 |
Configuration | 57 |
Configuration Utility | 57 |
Licensing | 58 |
Add licenses | 59 |
Remove licenses | 60 |
60 | |
Device management | 61 |
Add and remove devices | 63 |
Device configuration | 65 |
Understanding the Device List | 66 |
Device grouping | 66 |
Authentication | 67 |
Configure DSS | 67 |
Authentication methods | 67 |
LDAP bind | 75 |
How to | 76 |
ENWW | v |