About NAS Containers
.....................................................................................................................................................
50
About the NAS Reserve
...................................................................................................................................................
50
3 Set Up the iSCSI SAN
...................................................................................................
52
4 Post-Setup Tasks
..........................................................................................................
53
About the Group Date and Time
.......................................................................................................................................
53
Change or Delete an NTP Server
...............................................................................................................................
53
Change the Time Zone and Clock Time
......................................................................................................................
54
About Session Idle Timeout
..............................................................................................................................................
54
Change the Session Idle Timeout
...............................................................................................................................
54
Set General GUI Policies
...................................................................................................................................................
54
Set GUI Communication Policies
......................................................................................................................................
55
Set Alarm Policies
.............................................................................................................................................................
55
Display NAS Cluster Alarms
........................................................................................................................................
55
Set Advanced Policies
......................................................................................................................................................
55
Monitor Events
................................................................................................................................................................
55
Monitor Audit Log Events
.................................................................................................................................................
56
About Event
Notifications
.................................................................................................................................................
57
About Email
Notification
.............................................................................................................................................
57
About Email Home
......................................................................................................................................................
58
Configure
or Change Email Home
Notifications
..........................................................................................................
59
Configure
syslog
Notification
......................................................................................................................................
59
Enable or Disable the Display of Informational Event Messages
.................................................................................
60
5 Data Security
.................................................................................................................
61
6 About Group-Level Security
..........................................................................................
62
Enable or Disable GUI and CLI Access
..............................................................................................................................
62
Switch Administration Authentication Type
......................................................................................................................
62
About Administration Accounts
........................................................................................................................................
63
Types of Administration Accounts
..............................................................................................................................
63
Differences
Between Authentication Methods
...........................................................................................................
65
Administration Account Attributes
..............................................................................................................................
65
About Security Access Protocols
...............................................................................................................................
66
SSH Key Pair Authentication
......................................................................................................................................
66
Minimum Requirements for Administrative Access
.....................................................................................................
67
Create a Local Administration Account
.......................................................................................................................
67
Modify Local Administration Accounts
........................................................................................................................
68
Delete Local Administration Accounts
........................................................................................................................
68
About RADIUS Accounts
..................................................................................................................................................
69
RADIUS Attributes for Administration Accounts
.........................................................................................................
69
About LDAP Authorization and Active Directory
...............................................................................................................
73
Search Path Optimizations
.........................................................................................................................................
73
Add an Active Directory Server
...................................................................................................................................
73
About Active Directory Groups
...................................................................................................................................
76
4