Administrator Guide
Table Of Contents
- Dell EMC PowerVault ME4 Series Storage System Administrator’s Guide
- Contents
- Getting started
- New user setup
- Configure and provision a new storage system
- Using the PowerVault Manager interface
- System concepts
- About virtual and linear storage
- About disk groups
- About RAID levels
- About ADAPT
- About SSDs
- About SSD read cache
- About spares
- About pools
- About volumes and volume groups
- About volume cache options
- About thin provisioning
- About automated tiered storage
- About initiators, hosts, and host groups
- About volume mapping
- About operating with a single controller
- About snapshots
- About copying volumes
- About reconstruction
- About quick rebuild
- About performance statistics
- About firmware updates
- About managed logs
- About SupportAssist
- About CloudIQ
- About configuring DNS settings
- About replicating virtual volumes
- About the Full Disk Encryption feature
- About data protection with a single controller
- Working in the Home topic
- Guided setup
- Provisioning disk groups and pools
- Attaching hosts and volumes in the Host Setup wizard
- Overall system status
- Configuring system settings
- Managing scheduled tasks
- Working in the System topic
- Viewing system components
- Systems Settings panel
- Resetting host ports
- Rescanning disk channels
- Clearing disk metadata
- Updating firmware
- Changing FDE settings
- Configuring advanced settings
- Changing disk settings
- Changing system cache settings
- Configuring partner firmware update
- Configuring system utilities
- Using maintenance mode
- Restarting or shutting down controllers
- Working in the Hosts topic
- Working in the Pools topic
- Working in the Volumes topic
- Viewing volumes
- Creating a virtual volume
- Creating a linear volume
- Modifying a volume
- Copying a volume or snapshot
- Abort a volume copy
- Adding volumes to a volume group
- Removing volumes from a volume group
- Renaming a volume group
- Remove volume groups
- Rolling back a virtual volume
- Deleting volumes and snapshots
- Creating snapshots
- Resetting a snapshot
- Creating a replication set from the Volumes topic
- Initiating or scheduling a replication from the Volumes topic
- Manage replication schedules from the Volumes topic
- Working in the Mappings topic
- Working in the Replications topic
- About replicating virtual volumes in the Replications topic
- Replication prerequisites
- Replication process
- Creating a virtual pool for replication
- Setting up snapshot space management in the context of replication
- Replication and empty allocated pages
- Disaster recovery
- Accessing the data while keeping the replication set intact
- Accessing the data from the backup system as if it were the primary system
- Disaster recovery procedures
- Viewing replications
- Querying a peer connection
- Creating a peer connection
- Modifying a peer connection
- Deleting a peer connection
- Creating a replication set from the Replications topic
- Modifying a replication set
- Deleting a replication set
- Initiating or scheduling a replication from the Replications topic
- Stopping a replication
- Suspending a replication
- Resuming a replication
- Manage replication schedules from the Replications topic
- About replicating virtual volumes in the Replications topic
- Working in the Performance topic
- Working in the banner and footer
- Banner and footer overview
- Viewing system information
- Viewing certificate information
- Viewing connection information
- Viewing system date and time information
- Viewing user information
- Viewing health information
- Viewing event information
- Viewing capacity information
- Viewing host information
- Viewing tier information
- Viewing recent system activity
- Other management interfaces
- SNMP reference
- Using FTP and SFTP
- Using SMI-S
- Using SLP
- Administering a log-collection system
- Best practices
- System configuration limits
- Glossary of terms
and encryption. For information about configuring trap notifications, see Setting system notification settings. For information
about the MIB, see SNMP reference.
As a user with the manage role, you can modify or delete any user other than your current user. Users with the monitor role
can change all settings for their own user except for user type and role. However, users with the monitor role can only view
the settings for other users.
User options
The following options apply to standard and SNMPv3 users:
● User Name - A user name is case sensitive and can have a maximum of 29 bytes. It cannot already exist in the system or
include a space or the following characters: " , < \
● Password - A password is case sensitive and can have 8–32 characters. If the password contains only printable ASCII
characters, then it must contain at least one uppercase character, one lowercase character, one numeric character, and
one non-alphanumeric character. A password can include printable UTF-8 characters except for a space or the following
characters: " ' , < > \
● Confirm Password - Re-enter the new password.
● User Type - When creating a new user, select Standard to show options for a standard user, or SNMPv3 to show options
for an SNMPv3 user.
The following options apply only to a standard user:
● Roles - Select one or more of the following roles:
○
Monitor - Enables the user to view but not change system status and settings. This is enabled by default and cannot be
disabled.
○ Manage - Enables the user to change system settings.
● Interfaces - Select one or more of the following interfaces:
○ WBI - Enables access to the PowerVault Manager.
○ CLI - Enables access to the command-line interface.
○ SMI-S - Enables access to the SMI-S interface, which is used for remote management of the system through your
network.
○ FTP - Enables access to the FTP interface or the SFTP interface, which can be used instead of the PowerVault Manager
to install firmware updates and to download logs.
● Base Preference - Select the base size for the entry and display of storage space sizes:
○ Base 2 - Sizes are shown as powers of 2, using 1024 as a divisor for each magnitude (MiB, GiB, TiB).
○ Base 10 - Sizes are shown as powers of 10, using 1000 as a divisor for each magnitude (MB, GB, TB).
● Precision Preference - Select the number of decimal places, 1 through 10, for display of storage-space sizes.
● Unit Preference - Select one of the following options for display of storage-space sizes:
○ Auto - Enables the system to determine the proper unit for a size. Based on the precision setting, if the selected unit is
too large to meaningfully display a size, the system uses a smaller unit for that size. For example, if the unit is set to TB
and the precision is set to 1, the size 0.11709 TB is shown as 117.1 GB.
○ TB - Display all sizes in tebibytes or terabytes.
○ GB - Display all sizes in gibibytes or gigabytes.
○ MB - Display all sizes in mebibytes or megabytes.
● Temperature Preference - Select whether to use the Celsius or Fahrenheit scale for display of temperatures.
● Timeout - Select the amount of time that the user's session can be idle before the user is automatically signed out (2– 720
minutes).
● Locale - Select a display language for the user. Installed language sets include Chinese-Simplified, English, French, German,
Japanese, Korean, and Spanish. The locale determines the character used for the decimal (radix) point.
The following options apply only to an SNMPv3 user:
● SNMPv3 Account Type - Select one of the following types:
○ User Access - Enables the user to view the SNMP MIB.
○ Trap Target - Enables the user to receive SNMP trap notifications.
● SNMPv3 Authentication Type - Select whether to use MD5 or SHA (SHA-1) authentication, or no authentication. If
authentication is enabled, the password set in the Password and Confirm Password fields must include a minimum of 8
characters and follow the other SNMPv3 privacy password rules.
● SNMPv3 Privacy Type - Select whether to use DES or AES encryption, or no encryption. To use encryption you must also
set a privacy password and enable authentication.
● SNMPv3 Privacy Password - If the privacy type is set to use encryption, specify an encryption password. This password is
case sensitive and can have 8–32 characters. If the password contains only printable ASCII characters, then it must contain
42
Working in the Home topic