Chapter 5 Operation Procedures
III-12
5
5
5.
.
.4
4
4.
.
.7
7
7
S
S
St
t
ta
a
ar
r
rt
t
ti
i
in
n
ng
g
g
t
t
th
h
he
e
e
A
A
Ac
c
cc
c
ce
e
es
s
ss
s
s
C
C
Co
o
on
n
nt
t
tr
r
ro
o
ol
l
l
Start the Access Control. Starting the Access Control activates its setting from the business server to the logical disk.
For specific procedures, refer to 10.4 "Starting the Access Control".
5
5
5.
.
.4
4
4.
.
.8
8
8
S
S
St
t
ta
a
ar
r
rt
t
ti
i
in
n
ng
g
g
t
t
th
h
he
e
e
S
S
Se
e
er
r
rv
v
ve
e
er
r
r
Start the business server connected to the disk array.