Instrukcja obsługi Dell PowerVault NX3600

Dell Niesklasyfikowane PowerVault NX3600

Przeczytaj poniżej 📖 instrukcję obsługi w języku polskim dla Dell PowerVault NX3600 (93 stron) w kategorii Niesklasyfikowane. Ta instrukcja była pomocna dla 3 osób i została oceniona przez 2 użytkowników na średnio 4.5 gwiazdek

Strona 1/93
Dell FluidFS NAS Solutions
Dell FluidFS NAS Solutions
Dell FluidFS NAS Solutions
Dell FluidFS NAS SolutionsDell FluidFS NAS Solutions
CLI Reference Guide
CLI Reference Guide
CLI Reference Guide
CLI Reference GuideCLI Reference Guide
Notes, Cautions, and Warnings
Notes, Cautions, and Warnings
Notes, Cautions, and Warnings
Notes, Cautions, and WarningsNotes, Cautions, and Warnings
NOTE:
NOTE:
NOTE:
NOTE: NOTE: A NOTE indicates important information that helps you make better use of your computer.
CAUTION: A CAUTION indicates either potential damage to hardware or loss of data and tells you how to avoid the
CAUTION: A CAUTION indicates either potential damage to hardware or loss of data and tells you how to avoid the
CAUTION: A CAUTION indicates either potential damage to hardware or loss of data and tells you how to avoid the
CAUTION: A CAUTION indicates either potential damage to hardware or loss of data and tells you how to avoid the CAUTION: A CAUTION indicates either potential damage to hardware or loss of data and tells you how to avoid the
problem.
problem.
problem.
problem.problem.
WARNING: A WARNING indicates a potential for property damage, personal injury, or death.
WARNING: A WARNING indicates a potential for property damage, personal injury, or death.
WARNING: A WARNING indicates a potential for property damage, personal injury, or death.
WARNING: A WARNING indicates a potential for property damage, personal injury, or death.WARNING: A WARNING indicates a potential for property damage, personal injury, or death.
© 2012 Dell Inc.
2012 Dell Inc.
2012 Dell Inc.
2012 Dell Inc. 2012 Dell Inc.
Trademarks used in this text: Dell
, the Dell logo, Dell Boomi, Dell Precision , OptiPlex, Latitude, PowerEdge, PowerVault,
PowerConnect, OpenManage, EqualLogic, Compellent, KACE, FlexAddress, Force10 and Vostro are trademarks of Dell
Inc. Intel®, Pentium®, Xeon®, Core® and Celeron® are registered trademarks of Intel Corporation in the U.S. and other countries. AMD
®
is a registered trademark and AMD Opteron
, AMD Phenom and AMD Sempron are trademarks of Advanced Micro Devices, Inc.
Microsoft®, Windows®, Windows Server®, Internet Explorer®
, MS-DOS®, Windows Vista®
and Active Directory® are either trademarks
or registered trademarks of Microsoft Corporation in the United States and/or other countries. Red Hat
® and Red Hat®
Enterprise Linux® are registered trademarks of Red Hat, Inc. in the United States and/or other countries. Novell
® and SUSE® are
registered trademarks of Novell Inc. in the United States and other countries. Oracle
® is a registered trademark of Oracle Corporation
and/or its affiliates. Citrix
®, Xen®
, XenServer® and XenMotion
® are either registered trademarks or trademarks of Citrix Systems, Inc. in
the United States and/or other countries. VMware
®, Virtual SMP®, vMotion®, vCenter® and vSphere®
are registered trademarks or
trademarks of VMware, Inc. in the United States or other countries. IBM® is a registered trademark of International Business Machines
Corporation.
2012 - 06
Rev. A00
Contents
Contents
Contents
ContentsContents
Notes, Cautions, and Warnings
Notes, Cautions, and Warnings
Notes, Cautions, and Warnings
Notes, Cautions, and WarningsNotes, Cautions, and Warnings...................................................................................................2
...................................................................................................2
...................................................................................................2
...................................................................................................2...................................................................................................2
1 Command Line Interface
1 Command Line Interface
1 Command Line Interface
1 Command Line Interface1 Command Line Interface............................................................................................................7
............................................................................................................7
............................................................................................................7
............................................................................................................7............................................................................................................7
Overview...................................................................................................................................................................7
Accessing The CLI....................................................................................................................................................7
Navigating The CLI....................................................................................................................................................8
One Menu At A Time..........................................................................................................................................8
Single Line Command.........................................................................................................................................8
Understanding The CLI Command Syntax................................................................................................................8
CLI Menu Options.....................................................................................................................................................9
2 Protecting Data..........................................................................................................................
2 Protecting Data..........................................................................................................................
2 Protecting Data..........................................................................................................................
2 Protecting Data..........................................................................................................................2 Protecting Data..........................................................................................................................11
11
11
1111
replication...............................................................................................................................................................11
nas-replication.................................................................................................................................................11
partner-systems...............................................................................................................................................17
snapshots................................................................................................................................................................19
revert................................................................................................................................................................19
actions..............................................................................................................................................................19
policies.............................................................................................................................................................21
antivirus..................................................................................................................................................................24
hosts.................................................................................................................................................................24
ndmp.......................................................................................................................................................................25
active-jobs........................................................................................................................................................25
configuration....................................................................................................................................................26
3 Managing The System..............................................................................................................
3 Managing The System..............................................................................................................
3 Managing The System..............................................................................................................
3 Managing The System..............................................................................................................3 Managing The System..............................................................................................................27
27
27
2727
general....................................................................................................................................................................27
info....................................................................................................................................................................27
cluster-id..........................................................................................................................................................28
background-operations....................................................................................................................................28
administrators..................................................................................................................................................29
cluster-name....................................................................................................................................................31
licensing...........................................................................................................................................................32
time-configuration..................................................................................................................................................33
view..................................................................................................................................................................33
list-timezones...................................................................................................................................................33
set.....................................................................................................................................................................33


Specyfikacje produktu

Marka: Dell
Kategoria: Niesklasyfikowane
Model: PowerVault NX3600

Potrzebujesz pomocy?

Jeśli potrzebujesz pomocy z Dell PowerVault NX3600, zadaj pytanie poniżej, a inni użytkownicy Ci odpowiedzą




Instrukcje Niesklasyfikowane Dell

Instrukcje Niesklasyfikowane

Najnowsze instrukcje dla Niesklasyfikowane

Stihl

Stihl HT 70 Instrukcja

15 Października 2024
Ernesto

Ernesto H14270 Instrukcja

15 Października 2024
Uniden

Uniden BT MIC KIT Instrukcja

15 Października 2024
Vaude

Vaude Omnis Bike 26 Instrukcja

15 Października 2024
ART

ART ProChannel II Instrukcja

15 Października 2024
Aukey

Aukey DR02J Instrukcja

15 Października 2024
Master Lock

Master Lock 653EURD Instrukcja

15 Października 2024
Roland

Roland FR-18 Diatonic Instrukcja

15 Października 2024