Administrator Guide

Enable or Disable a Replication Schedule
After creating a replication schedule, enable or disable the schedule to allow the schedule to initiate replications or prevent the schedule
from initiating replications.
1 Click the Storage view.
2 In the Storage pane, select a PS Group.
3 Click the Storage tab.
4 From the Storage tab navigation pane, select a volume.
The volume must be the source of a replication relationship.
5 From the Schedules tab, select the replication schedule to enable or disable.
6 Click Edit.
The Edit Schedule dialog box appears.
To enable the replication schedule, select the Enable Schedule checkbox.
To disable the replication schedule, clear the Enable Schedule checkbox.
7 Click OK.
Delete a Replication Schedule
Delete a replication schedule to prevent it from initiating replications after the schedule is no longer needed.
1 Click the Storage view.
2 In the Storage pane, select a PS Group.
3 Click the Storage tab.
4 From the Storage tab navigation pane, select a volume.
The volume must be the source of a replication relationship.
5 From the Schedules tab, select the replication schedule to delete.
6 Click Delete.
A conrmation dialog box appears.
7 Click OK.
About Access Policies
In earlier versions of the PS Series rmware, security protection was accomplished by individually conguring an access control record for
each volume to which you wanted to secure access. Each volume supported up to 16 dierent access control records, which together
constituted an access control list (ACL). However, this approach did not work well when large numbers of volumes were present. To
address that issue, PS Series groups incorporated access policies and access policy groups that can be applied to one or more volumes.
Each access policy lets you specify one or more of the following authentication methods:
CHAP user name (Challenge Handshake Authentication Protocol)
IP address
iSCSI initiator name
You can assign up to four access policies or access policy groups to a volume. The access policies or access policy groups assigned to a
volume determine which hosts have access to that volume. In addition, you can allow or disallow volume access from multiple initiators,
depending on your conguration needs.
PS Series Storage Array Administration
219