Adaptec iSA1500 User Guide - Page 66

Next Steps

Page 66 highlights

Building Your IPSAN Next Steps Once your basic IPSAN is set up, you can modify it to meet your requirements. ■ Add Users and Control Access - Add users, assign passwords, and control access to storage on your IPSAN. For more information, see Chapter 5, Controlling Access and Adding Security. ■ Add iSCSI Target Authentication - For security, the Adaptec iSA1500 subsystem offers two user authentication methods. (You can also choose to have no authentication.) See Chapter 5, Controlling Access and Adding Security for more information. ■ Manage Your IPSAN - Manage your IPSAN using Adaptec Storage Manager (see Chapter 6, Managing Your IPSAN) or using the CLI (see Chapter 8, Using CLI.) ■ Use the Event Log - Monitor the status of your Adaptec iSA1500 subsystem using the Event Log in Adaptec Storage Manager. See Chapter 7, Managing Events for more information. 4-15

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • 148
  • 149
  • 150
  • 151
  • 152
  • 153
  • 154
  • 155
  • 156
  • 157
  • 158
  • 159
  • 160
  • 161
  • 162
  • 163
  • 164
  • 165
  • 166
  • 167
  • 168
  • 169
  • 170
  • 171
  • 172
  • 173
  • 174
  • 175
  • 176
  • 177
  • 178
  • 179
  • 180
  • 181
  • 182
  • 183
  • 184
  • 185
  • 186
  • 187
  • 188
  • 189
  • 190
  • 191
  • 192
  • 193
  • 194
  • 195
  • 196
  • 197
  • 198
  • 199
  • 200
  • 201
  • 202
  • 203
  • 204
  • 205
  • 206
  • 207
  • 208
  • 209
  • 210
  • 211
  • 212
  • 213
  • 214
  • 215
  • 216
  • 217
  • 218

4-15
Building Your IPSAN
Next Steps
Once your basic IPSAN is set up, you can modify it to meet your
requirements.
Add Users and Control Access
Add users, assign passwords,
and control access to storage on your IPSAN. For more
information, see
Chapter 5,
Controlling Access and Adding Security
.
Add iSCSI Target Authentication
— For security, the Adaptec
iSA1500 subsystem offers two user authentication methods.
(You can also choose to have no authentication.) See
Chapter 5,
Controlling Access and Adding Security
for more information.
Manage Your IPSAN
— Manage your IPSAN using Adaptec
Storage Manager (see
Chapter 6,
Managing Your IPSAN
) or
using the CLI (see
Chapter 8,
Using CLI
.)
Use the Event Log
— Monitor the status of your Adaptec
iSA1500 subsystem using the Event Log in Adaptec Storage
Manager. See
Chapter 7,
Managing Events
for more information.