Administrator Guide

Table Of Contents
About NAS Containers..................................................................................................................................................... 50
About the NAS Reserve................................................................................................................................................... 50
3 Set Up the iSCSI SAN...................................................................................................52
4 Post-Setup Tasks.......................................................................................................... 53
About the Group Date and Time.......................................................................................................................................53
Change or Delete an NTP Server............................................................................................................................... 53
Change the Time Zone and Clock Time......................................................................................................................54
About Session Idle Timeout..............................................................................................................................................54
Change the Session Idle Timeout............................................................................................................................... 54
Set General GUI Policies...................................................................................................................................................54
Set GUI Communication Policies...................................................................................................................................... 55
Set Alarm Policies.............................................................................................................................................................55
Display NAS Cluster Alarms........................................................................................................................................55
Set Advanced Policies......................................................................................................................................................55
Monitor Events................................................................................................................................................................ 55
Monitor Audit Log Events.................................................................................................................................................56
About Event Notications.................................................................................................................................................57
About Email Notication.............................................................................................................................................57
About Email Home......................................................................................................................................................58
Congure or Change Email Home Notications..........................................................................................................59
Congure syslog Notication......................................................................................................................................59
Enable or Disable the Display of Informational Event Messages................................................................................. 60
5 Data Security.................................................................................................................61
6 About Group-Level Security.......................................................................................... 62
Enable or Disable GUI and CLI Access..............................................................................................................................62
Switch Administration Authentication Type...................................................................................................................... 62
About Administration Accounts........................................................................................................................................ 63
Types of Administration Accounts.............................................................................................................................. 63
Dierences Between Authentication Methods...........................................................................................................65
Administration Account Attributes..............................................................................................................................65
About Security Access Protocols............................................................................................................................... 66
SSH Key Pair Authentication......................................................................................................................................66
Minimum Requirements for Administrative Access..................................................................................................... 67
Create a Local Administration Account....................................................................................................................... 67
Modify Local Administration Accounts........................................................................................................................68
Delete Local Administration Accounts........................................................................................................................ 68
About RADIUS Accounts..................................................................................................................................................69
RADIUS Attributes for Administration Accounts.........................................................................................................69
About LDAP Authorization and Active Directory...............................................................................................................73
Search Path Optimizations......................................................................................................................................... 73
Add an Active Directory Server...................................................................................................................................73
About Active Directory Groups................................................................................................................................... 76
4