'HOOꢀ3RZHU9DXOWꢀꢁꢂꢃ1ꢄꢀꢁꢅꢃ1ꢄꢀDQGꢀꢁꢆꢃ1
86(5·6ꢁ*8,'(
333%%%%35(/,0,
ꢀ
35
ZZZꢀGHOOꢀFRP
6DIHW\ꢀ,QVWUXFWLRQV
Use the following safety guidelines to ensure your own personal safety and to help
protect your computer or storage system from potential damage.
Throughout this guide, blocks of text may be accompanied by an icon and printed in
bold type or in italic type. These blocks of text are notes, cautions, and warnings, and
they are used as follows:
NOTE: A NOTE contains important information that helps you install or operate the
system efficiently.
&$87,21ꢀꢁ$ꢁ&$87,21ꢁFRQWDLQVꢁLQVWUXFWLRQVꢁWKDWꢁ\RXꢁPXVWꢁIROORZꢁWRꢁDYRLGꢁ
GDPDJHꢁWRꢁWKHꢁHTXLSPHQWꢂꢁDꢁV\VWHPꢁFUDVKꢂꢁRUꢁORVVꢁRIꢁGDWDꢃ
:$51,1*ꢀꢁ$ꢁ:$51,1*ꢁFRQWDLQVꢁLQVWUXFWLRQVꢁWKDWꢁ\RXꢁPXVWꢁIROORZꢁWRꢁDYRLGꢁ
SHUVRQDOꢁLQMXU\ꢃ
6DIHW\ꢀ:DUQLQJV
Observe the following warnings while servicing this system:
:$51,1*ꢀꢁ7KHUHꢁLVꢁDꢁGDQJHUꢁRIꢁDꢁQHZꢁEDWWHU\ꢁH[SORGLQJꢁLIꢁLWꢁLVꢁLQFRUUHFWO\ꢁ
LQVWDOOHGꢃꢁ5HSODFHꢁWKHꢁEDWWHU\ꢁRQO\ꢁZLWKꢁWKHꢁVDPHꢁRUꢁHTXLYDOHQWꢁW\SHꢁUHFRPꢄ
PHQGHGꢁE\ꢁWKHꢁPDQXIDFWXUHUꢃꢁ'LVFDUGꢁXVHGꢁEDWWHULHVꢁDFFRUGLQJꢁWRꢁWKHꢁ
PDQXIDFWXUHU·VꢁLQVWUXFWLRQVꢃ
:$51,1*ꢀꢁ7KHꢁSRZHUꢁVXSSOLHVꢁLQꢁ\RXUꢁFRPSXWHUꢁRUꢁVWRUDJHꢁV\VWHPꢁPD\ꢁ
SURGXFHꢁKLJKꢁYROWDJHVꢁDQGꢁHQHUJ\ꢁKD]DUGVꢂꢁZKLFKꢁFDQꢁFDXVHꢁERGLO\ꢁKDUPꢃꢁ
2QO\ꢁWUDLQHGꢁVHUYLFHꢁWHFKQLFLDQVꢁDUHꢁDXWKRUL]HGꢁWRꢁUHPRYHꢁWKHꢁFRPSXWHUꢁ
FRYHUVꢁDQGꢁDFFHVVꢁDQ\ꢁRIꢁWKHꢁFRPSRQHQWVꢁLQVLGHꢁWKHꢁFRPSXWHUꢃꢁ
:$51,1*ꢀꢁ7KLVꢁV\VWHPꢁPD\ꢁKDYHꢁPRUHꢁWKDQꢁRQHꢁSRZHUꢁVXSSO\ꢁFDEOHꢃꢁ7Rꢁ
UHGXFHꢁWKHꢁULVNꢁRIꢁHOHFWULFDOꢁVKRFNꢂꢁDꢁWUDLQHGꢁVHUYLFHꢁWHFKQLFLDQꢁPXVWꢁGLVFRQꢄ
QHFWꢁDOOꢁSRZHUꢁVXSSO\ꢁFDEOHVꢁEHIRUHꢁVHUYLFLQJꢁWKHꢁV\VWHPꢃ
'µ/(l,7¥ꢀ832=251¨1©ꢁꢀ7HQWRꢀV\VWÅPꢀPÕzHꢀPÉWꢀYÉFHꢀQDS½MHFÉFKꢀNDEHOÕꢂꢀ.Hꢀ
VQÉzHQÉꢀUL]LNDꢀÖUD]XꢀHOHNWULFNÙPꢀSURXGHPꢀMHꢀQXWQÅꢃꢀDE\ꢀvNROHQÙꢀVHUYLVQÉꢀWHFKQLNꢀ
SÔHGꢀSURY½GÈQÉPꢀVHUYLVXꢀV\VWÅPXꢀRGSRMLOꢀYvHFKQ\ꢀQDS½MHFÉꢀNDEHO\ꢂ
v
$'9$56(/ꢀꢁ'HWWHꢁV\VWHPꢁNDQꢁKDYHꢁPHUHꢁHQGꢁHWꢁVWU¡PIRUV\QLQJVNDEHOꢃꢁ)RUꢁ
DWꢁUHGXFHUHꢁULVLNRHQꢁIRUꢁHOHNWULVNꢁVW¡GꢂꢁE¡UꢁHQꢁSURIHVVLRQHOꢁVHUYLFHWHNQLNHUꢁ
IUDNREOHꢁDOOHꢁVWU¡PIRUV\QLQJVNDEOHUꢂꢁI¡UꢁV\VWHPHWꢁVHUYLFHUHVꢃ
9$52,786ꢀꢁ7lVVlꢁMlUMHVWHOPlVVlꢁYRLꢁROODꢁXVHDPSLꢁNXLQꢁ\NVLꢁYLUWDMRKWRꢃꢁ6lKꢄ
N|LVNXYDDUDQꢁSLHQHQWlPLVHNVLꢁDPPDWWLWDLWRLVHQꢁKXROWRKHQNLO|QꢁRQꢁ
LUURWHWWDYDꢁNDLNNLꢁYLUWDMRKGRWꢁHQQHQꢁMlUMHVWHOPlQꢁKXROWDPLVWDꢃ
²³¨§¶²³¨©§¨°«¨ꢀꢁ§ÃÐÐÃâꢁÔËÔÕÈÏÃꢁÏÑÉÈÕꢁËÏÈÕßꢁÐÈÔÍÑÎßÍÑꢁÍÃÄÈÎÈÌꢁ
àÎÈÍÕÓÑÒËÕÃÐËâꢂꢁꢁ¥ÑꢁËÊÄÈÉÃÐËÈꢁàÎÈÍÕÓËÚÈÔÍÑÆÑꢁÖÇÃÓÃꢁÍÅÃÎË×ËÙËÓÑÅÃÐÐÞÌꢁ
ÕÈØÐËÍꢁÇÑÎÉÈÐꢁÑÕÍÎáÚËÕßꢁÅÔÈꢁÍÃÄÈÎËꢁàÎÈÍÕÓÑÒËÕÃÐËâꢁÒÓÈÉÇÈꢃꢁÚÈÏꢁÒÓËÔÕÖÒËÕßꢁ
ÍꢁÑÄÔÎÖÉËÅÃÐËáꢁÔËÔÕÈÏÞꢂ
2675=((1,(ꢁꢀ6\VWHPꢀWHQꢀPRHꢀPLHÂꢀZLÆFHMꢀQLꢀMHGHQꢀNDEHOꢀ]DVLODQLDꢂꢀ$E\ꢀ
]PQLHMV]\ÂꢀU\]\NRꢀSRUDHQLDꢀSUGHPꢃꢀSU]HGꢀQDSUDZꢀOXEꢀNRQVHUZDFMꢀV\VWHPXꢀ
ZV]\VWNLHꢀNDEOHꢀ]DVLODQLDꢀSRZLQQ\ꢀE\ÂꢀRGF]RQHꢀSU]H]ꢀSU]HV]NRORQHJRꢀWHFKQLNDꢀ
REVXJLꢂꢀꢀ
$'9$56(/ꢅꢁ'HWꢁHUꢁPXOLJꢁDWꢁGHWWHꢁV\VWHPHWꢁKDUꢁPHUꢁHQQꢁpQꢁVWU¡POHGQLQJꢃꢁ
8QQJnꢁIDUHꢁIRUꢁVW¡Wꢀꢁ(QꢁHUIDUHQꢁVHUYLFHWHNQLNHUꢁPnꢁNREOHꢁIUDꢁDOOHꢁVWU¡POHGꢄ
QLQJHUꢁI¡UꢁGHWꢁXWI¡UHVꢁVHUYLFHꢁSnꢁV\VWHPHWꢃ
9$51,1*ꢀꢁ'HWWDꢁV\VWHPꢁNDQꢁKDꢁIOHUDꢁQlWNDEODUꢃꢁ(QꢁEHK|ULJꢁVHUYLFHWHNQLNHUꢁ
PnVWHꢁNRSSODꢁORVVꢁDOODꢁQlWNDEODUꢁLQQDQꢁVHUYLFHꢁXWI|UVꢁI|UꢁDWWꢁPLQVNDꢁULVNHQꢁ
I|UꢁHOHNWULVNDꢁVW|WDUꢃꢁ
$GGLWLRQDOꢀ6DIHW\ꢀ3UHFDXWLRQV
To reduce the risk of bodily injury, electrical shock, fire, and damage to the equipment,
observe the following precautions.
*HQHUDOꢀ3UHFDXWLRQV
Observe the following general precautions for using and working with your system:
Observe and follow service markings. Do not service any Dell product except as
explained in your Dell system documentation. Opening or removing covers that
are marked with the triangular symbol with a lightning bolt may expose you to
electrical shock. Components inside these compartments should be serviced
only by a Dell authorized service technician.
If any of the following conditions occur, unplug the product from the electrical
outlet and replace the part or contact your Dell authorized service provider:
The power cable, extension cord, or plug is damaged.
An object has fallen into the product.
The product has been exposed to water.
vi
The product has been dropped or damaged.
The product does not operate correctly when you follow the operating
instructions.
Keep your system components away from radiators and heat sources. Also, do
not block cooling vents.
Do not spill food or liquids on your system components, and never operate the
product in a wet environment. If the computer gets wet, see the appropriate
chapter in your troubleshooting guide or contact a Dell-authorized service
provider.
Do not push any objects into the openings of your system components. Doing so
can cause fire or electric shock by shorting out interior components.
Use the product only with Dell products or other Dell-approved equipment.
Allow the product to cool before removing covers or touching internal
components.
Use the correct external power source. Operate the product only from the type
of power source indicated on the electrical ratings label. If you are not sure of the
type of power source required, consult your Dell service provider or local power
company.
To help avoid damaging your system components, be sure the voltage selection
switch (if provided) on the power supply is set to match the power available at
your location:
115 volts (V)/60 hertz (Hz) in most of North and South America and some Far
Eastern countries such as South Korea and Taiwan
100 V/50 Hz in eastern Japan and 100 V/60 Hz in western Japan
230 V/50 Hz in most of Europe, the Middle East, and the Far East
Also be sure that your monitor and attached peripherals are electrically rated to
operate with the power available in your location.
Use only approved power cable(s). If you have not been provided with a power
cable for your computer or storage system or for any AC-powered option
intended for your system, purchase a power cable that is approved for use in your
country. The power cable must be rated for the product and for the voltage and
current marked on the products electrical ratings label. The voltage and current
rating of the cable should be greater than the ratings marked on the product.
To help prevent electric shock, plug the system components and peripheral
power cables into properly grounded electrical outlets. These cables are
equipped with three-prong plugs to help ensure proper grounding. Do not use
adapter plugs or remove the grounding prong from a cable. If you must use an
extension cord, use a three-wire cord with properly grounded plugs.
Observe extension cord and power strip ratings. Make sure that the total ampere
rating of all products plugged into the extension cord or power strip does not
exceed 80 percent of the extension cord or power strip ampere ratings limit.
vii
Do not use appliance/voltage converters or kits sold for appliances with your Dell
product.
To help protect your system components from sudden, transient increases and
decreases in electrical power, use a surge suppressor, line conditioner, or un-
interruptible power supply (UPS).
Position cables and power cords carefully; route cables and the power cord and
plug so that they cannot be stepped on or tripped over. Be sure that nothing rests
on your system components cables or power cord.
Do not modify power cables or plugs. Consult a licensed electrician or your
power company for site modifications. Always follow your local/national wiring
rules.
To help avoid possible damage to the system board, wait 5 seconds after turning
off the system before removing a component from the system board or discon-
necting a peripheral device from the computer.
Handle batteries carefully. Do not disassemble, crush, puncture, short external
contacts, dispose of in fire or water, or expose batteries to temperatures higher
than 60 degrees Celsius (140 degrees Fahrenheit). Do not attempt to open or ser-
vice batteries; replace batteries only with batteries designated for the product.
Turn down the volume before using headphones or other audio devices.
3UHFDXWLRQVꢀIRUꢀ6HUYHUꢀDQGꢀ6WRUDJHꢀ6\VWHPV
Observe the following additional safety guidelines for your system:
Unless your installation and/or troubleshooting documentation specifically allows
it, do not remove enclosure covers, attempt to override the safety interlocks, or
access any components inside the system. Depending on your system, installa-
tion and repairs may be done only by individuals who are qualified to service your
computer or storage system equipment and trained to deal with products capa-
ble of producing hazardous energy levels.
When connecting or disconnecting power to hot-pluggable power supplies, if
offered with your Dell product, observe the following guidelines:
Install the power supply before connecting the power cable to the power
supply.
Unplug the power cable before removing the power supply.
If the system has multiple sources of power, disconnect power from the sys-
all
tem by unplugging power cables from the power supplies.
Move products with care; ensure that all casters and/or stabilizers are firmly con-
nected to the computer or storage system. Avoid sudden stops and uneven
surfaces.
viii
3UHFDXWLRQVꢀIRUꢀ5DFNꢁ0RXQWDEOHꢀ3URGXFWV
Observe the following precautions for rack stability and safety. Also refer to the rack
installation documentation accompanying the system and the rack for specific warn-
ing and/or caution statements and procedures.
:$51,1*ꢀꢁ,QVWDOOLQJꢁ'HOOꢁV\VWHPꢁFRPSRQHQWVꢁLQꢁDꢁ'HOOꢁUDFNꢁZLWKRXWꢁWKHꢁ
IURQWꢁDQGꢁVLGHꢁVWDELOL]HUVꢁLQVWDOOHGꢁFRXOGꢁFDXVHꢁWKHꢁUDFNꢁWRꢁWLSꢁRYHUꢂꢁSRWHQꢄ
WLDOO\ꢁUHVXOWLQJꢁLQꢁERGLO\ꢁLQMXU\ꢁXQGHUꢁFHUWDLQꢁFLUFXPVWDQFHVꢃꢁ7KHUHIRUHꢂꢁ
DOZD\VꢁLQVWDOOꢁWKHꢁVWDELOL]HUVꢁEHIRUHꢁLQVWDOOLQJꢁFRPSRQHQWVꢁLQꢁWKHꢁUDFNꢃ
:$51,1*ꢀꢁ$IWHUꢁLQVWDOOLQJꢁV\VWHPꢁFRPSRQHQWVꢁLQꢁDꢁUDFNꢂꢁQHYHUꢁSXOOꢁPRUHꢁ
WKDQꢁRQHꢁFRPSRQHQWꢁRXWꢁRIꢁWKHꢁUDFNꢁRQꢁLWVꢁVOLGHꢁDVVHPEOLHVꢁDWꢁRQHꢁWLPHꢃꢁ7KHꢁ
ZHLJKWꢁRIꢁPRUHꢁWKDQꢁRQHꢁH[WHQGHGꢁFRPSRQHQWꢁFRXOGꢁFDXVHꢁWKHꢁUDFNꢁWRꢁWLSꢁ
RYHUꢁDQGꢁLQMXUHꢁVRPHRQHꢃ
NOTE: Dells server and storage systems are certified as components for use in Dells
rack cabinet using the Dell customer rack kit. The final installation of Dell systems and
rack kits in any other brand of rack cabinet has not been approved by any safety agen-
cies. It is the customers responsibility to have the final combination of Dell systems
and rack kits for use in other brands of rack cabinets evaluated for suitability by a certi-
fied safety agency.
System rack kits are intended to be installed in a Dell rack by trained service tech-
nicians. If you install the kit in any other rack, be sure that the rack meets the
specifications of a Dell rack.
Do not move large racks by yourself. Due to the height and weight of the rack,
Dell recommends a minimum of two people to accomplish this task.
Before working on the rack, make sure that the stabilizers are secure to the rack,
extend to the floor, and that the full weight of the rack rests on the floor. Install
front and side stabilizers on a single rack or front stabilizers for joined multiple
racks before working on the rack.
Always load the rack from the bottom up, and load the heaviest item in the rack
first.
Make sure that the rack is level and stable before extending a component from
the rack.
Extend only one component at a time from the rack.
Use caution when pressing the component rail release latches and sliding a com-
ponent into or out of a rack; the slide rails can pinch your fingers.
After a component is inserted into the rack, carefully extend the rail into a locking
position, and then slide the component into the rack.
Do not overload the AC supply branch circuit that provides power to the rack. The
total rack load should not exceed 80 percent of the branch circuit rating.
Ensure that proper airflow is provided to components in the rack.
Do not step on or stand on any system/component when servicing other
systems/components in a rack.
ix
3UHFDXWLRQVꢀIRUꢀ3URGXFWVꢀ:LWKꢀ0RGHPVꢂꢀ
7HOHFRPPXQLFDWLRQVꢂꢀRUꢀ/RFDOꢀ$UHDꢀ1HWZRUNꢀ2SWLRQV
Observe the following guidelines when working with options:
Do not connect or use a modem or telephone during a lightning storm. There
may be a risk of electrical shock from lightning.
Never connect or use a modem or telephone in a wet environment.
Do not plug a modem or telephone cable into the network interface controller
(NIC) receptacle.
Disconnect the modem cable before opening a product enclosure, touching or
installing internal components, or touching an uninsulated modem cable or jack.
Do not use a telephone line to report a gas leak while you are in the vicinity of the
leak.
3UHFDXWLRQVꢀIRUꢀ3URGXFWVꢀ:LWKꢀ/DVHUꢀ'HYLFHV
Observe the following precautions for laser devices:
Do not open any panels, operate controls, make adjustments, or perform proce-
dures on a laser device other than those specified in the products
documentation.
Only authorized service technicians should repair laser devices.
:KHQꢀ:RUNLQJꢀ,QVLGHꢀ<RXUꢀ&RPSXWHU
Before you remove the computer covers, perform the following steps in the sequence
indicated.
:$51,1*ꢀꢁ6RPHꢁ'HOOꢁV\VWHPVꢁFDQꢁEHꢁVHUYLFHGꢁRQO\ꢁE\ꢁWUDLQHGꢁVHUYLFHꢁWHFKꢄ
QLFLDQVꢁEHFDXVHꢁRIꢁKLJKꢁYROWDJHVꢁDQGꢁHQHUJ\ꢁKD]DUGVꢃꢁ'RꢁQRWꢁDWWHPSWꢁWRꢁ
VHUYLFHꢁWKHꢁFRPSXWHUꢁV\VWHPꢁ\RXUVHOIꢂꢁH[FHSWꢁDVꢁH[SODLQHGꢁLQꢁWKLVꢁJXLGHꢁDQGꢁ
HOVHZKHUHꢁLQꢁ'HOOꢁGRFXPHQWDWLRQꢃꢁ$OZD\VꢁIROORZꢁLQVWDOODWLRQꢁDQGꢁVHUYLFHꢁ
LQVWUXFWLRQVꢁFORVHO\ꢃ
&$87,21ꢀꢁ7RꢁKHOSꢁDYRLGꢁSRVVLEOHꢁGDPDJHꢁWRꢁWKHꢁV\VWHPꢁERDUGꢂꢁZDLWꢁꢆꢁVHFꢄ
RQGVꢁDIWHUꢁWXUQLQJꢁRIIꢁWKHꢁV\VWHPꢁEHIRUHꢁUHPRYLQJꢁDꢁFRPSRQHQWꢁIURPꢁWKHꢁ
V\VWHPꢁERDUGꢁRUꢁGLVFRQQHFWLQJꢁDꢁSHULSKHUDOꢁGHYLFHꢁIURPꢁWKHꢁFRPSXWHUꢃ
1. Turn off your computer and any peripherals.
2. Ground yourself by touching an unpainted metal surface on the chassis, such as
the metal around the card-slot openings at the back of the computer, before
touching anything inside your computer.
While you work, periodically touch an unpainted metal surface on the computer
chassis to dissipate any static electricity that might harm internal components.
x
3. Disconnect your computer and peripherals from their power sources. Also, dis-
connect any telephone or telecommunication lines from the computer.
Doing so reduces the potential for personal injury or shock.
In addition, take note of these safety guidelines when appropriate:
When you disconnect a cable, pull on its connector or on its strain-relief loop, not
on the cable itself. Some cables have a connector with locking tabs; if you are dis-
connecting this type of cable, press in on the locking tabs before disconnecting
the cable. As you pull connectors apart, keep them evenly aligned to avoid bend-
ing any connector pins. Also, before you connect a cable, make sure that both
connectors are correctly oriented and aligned.
Handle components and cards with care. Dont touch the components or con-
tacts on a card. Hold a card by its edges or by its metal mounting bracket. Hold a
component such as a microprocessor chip by its edges, not by its pins.
:$51,1*ꢀꢁ7KHUHꢁLVꢁDꢁGDQJHUꢁRIꢁDꢁQHZꢁEDWWHU\ꢁH[SORGLQJꢁLIꢁLWꢁLVꢁLQFRUUHFWO\ꢁ
LQVWDOOHGꢃꢁ5HSODFHꢁWKHꢁEDWWHU\ꢁRQO\ꢁZLWKꢁWKHꢁVDPHꢁRUꢁHTXLYDOHQWꢁW\SHꢁUHFRPꢄ
PHQGHGꢁE\ꢁWKHꢁPDQXIDFWXUHUꢃꢁ'LVFDUGꢁXVHGꢁEDWWHULHVꢁDFFRUGLQJꢁWRꢁWKHꢁ
PDQXIDFWXUHU·VꢁLQVWUXFWLRQVꢃ
3URWHFWLQJꢀ$JDLQVWꢀ(OHFWURVWDWLFꢀ'LVFKDUJH
Static electricity can harm delicate components inside your computer. To prevent
static damage, discharge static electricity from your body before you touch any of
your computers electronic components, such as the microprocessor. You can do so
by touching an unpainted metal surface on the computer chassis.
As you continue to work inside the computer, periodically touch an unpainted metal
surface to remove any static charge your body may have accumulated.
You can also take the following steps to prevent damage from electrostatic discharge
(ESD):
When unpacking a static-sensitive component from its shipping carton, do not
remove the component from the antistatic packing material until you are ready to
install the component in your computer. Just before unwrapping the antistatic
packaging, be sure to discharge static electricity from your body.
When transporting a sensitive component, first place it in an antistatic container
or packaging.
Handle all sensitive components in a static-safe area. If possible, use antistatic
floor pads and workbench pads.
The following notice may appear throughout this document to remind you of these
precautions:
:$51,1*ꢀꢁ6HHꢁ´3URWHFWLQJꢁ$JDLQVWꢁ(OHFWURVWDWLFꢁ'LVFKDUJHµꢁLQꢁWKHꢁVDIHW\ꢁ
LQVWUXFWLRQVꢁDWꢁWKHꢁIURQWꢁRIꢁWKLVꢁJXLGHꢃ
xi
(UJRQRPLFꢀ&RPSXWLQJꢀ+DELWV
:$51,1*ꢀꢁ,PSURSHUꢁRUꢁSURORQJHGꢁNH\ERDUGꢁXVHꢁPD\ꢁUHVXOWꢁLQꢁLQMXU\ꢃ
:$51,1*ꢀꢁ9LHZLQJꢁWKHꢁPRQLWRUꢁVFUHHQꢁIRUꢁH[WHQGHGꢁSHULRGVꢁRIꢁWLPHꢁPD\ꢁ
UHVXOWꢁLQꢁH\HꢁVWUDLQꢃ
For comfort and efficiency, observe the following ergonomic guidelines when you set
up and use your computer system:
Position your system so that the monitor and keyboard are directly in front of you
as you work. Special shelves are available (from Dell and other sources) to help
you correctly position your keyboard.
Set the monitor at a comfortable viewing distance (usually 510 to 610 millimeters
[20 to 24 inches] from your eyes).
Make sure that the monitor screen is at eye level or slightly lower when you sit in
front of the monitor.
Adjust the tilt of the monitor, its contrast and brightness settings, and the lighting
around you (such as overhead lights, desk lamps, and the curtains or blinds on
nearby windows) to minimize reflections and glare on the monitor screen.
Use a chair that provides good lower back support.
Keep your forearms horizontal with your wrists in a neutral, comfortable position
while you use the keyboard or mouse.
Always leave space to rest your hands while you use the keyboard or mouse.
Let your upper arms hang naturally at your sides.
Sit erect, with your feet resting on the floor and your thighs level.
When sitting, make sure the weight of your legs is on your feet and not on the
front of your chair seat. Adjust your chairs height or use a footrest, if necessary,
to maintain proper posture.
Vary your work activities. Try to organize your work so that you do not have to
type for extended periods of time. When you stop typing, try to do things that
use both hands.
xii
monitor screen at or below eye level
wrists relaxed and flat
monitor and
keyboard
positioned
directly
in front of user
arms at desk level
feet flat on
the floor
xiii
xiv
Appendix E, "Regulatory Notices," is for users who are interested in which
regulatory agencies have tested and approved the Dell PowerVault 720N,
740N, and 760N filers.
Appendix F, "Warranty, Return Policy, and Year 2000 Statement of
Compliance," describes the warranty for your Dell system and the "Total Sat-
isfaction" Return Policy.
The glossary provides definitions of terms, acronyms, and abbreviations
used in this guide.
:DUUDQW\ꢀDQGꢀ5HWXUQꢀ3ROLF\ꢀ,QIRUPDWLRQ
Dell Computer Corporation ("Dell") manufactures its hardware products from parts and
components that are new or equivalent to new in accordance with industry-standard
practices. For information about the Dell warranty for your system, see Appendix F,
"Warranty, Return Policy, and Year 2000 Statement of Compliance."
2WKHUꢀ'RFXPHQWVꢀ<RXꢀ0D\ꢀ1HHG
Users Guide
Besides this
, the following documentation is included with your system:
Getting Started
The
your computer system.
document provides step-by-step instructions for setting up
Quick Reference
card provides the filer commands and command options.
The
Installation and Troubleshooting Guide
The
provides instructions for installing sys-
tem hardware and includes troubleshooting and diagnostic procedures for testing
your computer system.
System Administrator and Command Reference Guide
provides information
The
about how to configure, operate, and manage Dell PowerVault 720N, 740N, and
760N filers that run Data ONTAP 5.3 software. It also contains the user
commands.
You may also have one or more of the following documents.
NOTE: Documentation updates are sometimes included with your system to describe
changes to your system or software. Always read these updates consulting
before
any other documentation because the updates often contain the latest information.
Documentation is included with any options you purchase separately from your
system. This documentation includes information that you need to configure and
install these options. Installation instructions for the options are included in the
Installation and Troubleshooting Guide
.
Technical information filessometimes called "readme" filesmay be installed
on your root volume to provide last-minute updates about technical changes to
your system or advanced technical reference material intended for experienced
users or technicians.
xvi
7HUPLQRORJ\ꢀ&RQYHQWLRQV
This guide uses the following terms:
Filer
refers to a PowerVault 720N, 740N, or 760N storage system.
System
refers, at a minimum, to a filer and a connected PowerVault 700N Disk
Array Enclosure (DAE) storage system. A tape backup device can also be a com-
ponent of the system, but is not required.
1RWDWLRQDOꢀ&RQYHQWLRQV
You can enter filer commands on either the console or from any client computer that
can access the filer through telnet.
In examples that illustrate commands executed on a UNIX workstation, this guide
x
uses the command syntax of SunOS 4.1. . The command syntax and output might
differ, depending on your version of UNIX.
This guide uses the term "type" to mean pressing one or more keys on the keyboard.
It uses the term "enter" to mean pressing one or more keys and then pressing the
Enter key.
.H\ꢀ&RPELQDWLRQV
When describing key combinations, this guide uses the hyphen (-) to separate individ-
ual keys. For example, "Ctrl-D" means pressing the "Control" and "D" keys
simultaneously. Also, this guide uses the term "Enter" to refer to the key that gener-
ates a carriage return, although the key is named "Return" on some keyboards.
7\SRJUDSKLFDOꢀ&RQYHQWLRQV
Typographical conventions used in this guide are shown in the following table:
&RQYHQWLRQ
7\SHꢁRIꢁ,QIRUPDWLRQ
Italic
type
Words or characters that require special attention.
File names.
Placeholders for information you must supply. For
example, if the guide says to enter the arp -d
hostnamecommand, you enter the characters
"arp -d" followed by the actual name of the host.
Man page names.
Book titles in cross-references.
xvii
&RQYHQWLRQ
7\SHꢁRIꢁ,QIRUPDWLRQ
Monospaced font
Command and daemon names.
Information displayed on the system console or
other computer monitors.
The contents of files.
Bold monospaced
font
Words or characters you type. What you type is
always shown in lowercase letters, unless you
must type it in uppercase letters.
6SHFLDOꢀ0HVVDJHV
This guide contains special messages that are described as follows:
NOTE: A NOTE contains important information that helps you install or operate the
system efficiently.
&$87,21ꢀꢁ$ꢁ&$87,21ꢁFRQWDLQVꢁLQVWUXFWLRQVꢁWKDWꢁ\RXꢁPXVWꢁIROORZꢁWRꢁDYRLGꢁ
GDPDJHꢁWRꢁWKHꢁHTXLSPHQWꢂꢁDꢁV\VWHPꢁFUDVKꢂꢁRUꢁORVVꢁRIꢁGDWDꢃ
:$51,1*ꢀꢁ$ꢁ:$51,1*ꢁFRQWDLQVꢁLQVWUXFWLRQVꢁWKDWꢁ\RXꢁPXVWꢁIROORZꢁWRꢁDYRLGꢁ
SHUVRQDOꢁLQMXU\ꢃ
xviii
&RQWHQWV
&KDSWHUꢀꢃ
Standard Features of the Filer. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1-1
Filer Software Description. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1-1
Software Updates . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1-2
&KDSWHUꢀꢅ
&KDSWHUꢀꢆ
6HWXSꢀ:L]DUGꢀ³ꢀ,QWURGXFWLRQ ꢄꢀꢄꢀꢄꢀꢄꢀꢄꢀꢄꢀꢄꢀꢄꢀꢄꢀꢄꢀꢄꢀꢄꢀꢄꢀꢄꢀꢄꢀꢄꢀꢄꢀꢄꢀꢄꢀ ꢅꢁꢃ
Overview. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2-1
About Basic Configuration Using Setup Wizard . . . . . . . . . . . . . . . . . . . . . . . . . . . 2-2
Using Setup Wizard on a Filer With a DHCP Server . . . . . . . . . . . . . . . . . . . . . . . . 3-2
Description. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3-2
Prerequisites . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3-2
Restrictions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3-2
Steps . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3-3
Results . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3-3
Where to Go From Here. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3-3
xix
Verifying Network Connections . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3-5
Description. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3-5
Troubleshooting. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3-5
&KDSWHUꢀꢇ
Results. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4-4
Verifying Network Connections . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4-4
&KDSWHUꢀꢈ
Example . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5-1
Left Frame . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5-2
Right Frame . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5-2
Help Button. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5-2
xx
&KDSWHUꢀꢉ
&KDSWHUꢀꢊ
HTTP Configuration Information . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6-1
Prerequisites . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6-1
Procedure. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6-1
Who Should Use This Chapter. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7-1
Location of the passwd and group Files. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7-1
How the Filer Uses the passwd and group Files . . . . . . . . . . . . . . . . . . . . . . . 7-1
Default passwd File . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7-2
Default group File. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7-3
Windows 9x Workstations . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7-3
Description. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7-3
Description. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7-4
Description. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7-5
Description. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7-6
Adding Entries to the group File . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7-6
Description. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7-6
Prerequisites . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7-6
&KDSWHUꢀꢋ
Assigning Access Rights. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 8-1
Scope of Shares Access. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 8-1
cifs Command Parameters. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 8-1
Establishing Access to Shares. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 8-2
Description. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 8-2
Steps . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 8-2
xxi
&KDSWHUꢀꢌ
Configuring CIFS Clients. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 9-1
Filer Is Visible to CIFS Clients After Setup. . . . . . . . . . . . . . . . . . . . . . . . . . . . 9-1
CIFS Client Connection Methods. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 9-1
Results. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 9-2
Exporting Filer Directories for NFS Clients . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 9-4
Mounting File Systems on NFS Clients . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 9-4
&KDSWHUꢀꢃꢍ
About SecureShare. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 10-1
Description. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 10-1
Installing SecureShare Account Migrator . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 10-2
Steps . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 10-2
$SSHQGL[ꢀ$
$SSHQGL[ꢀ%
Booting From Bootable System Diskettes . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . B-1
Booting From Diskette. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . B-1
Installing Data ONTAP 5.3 Software. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . B-3
Installation From a Windows Client. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . B-3
Installation From a UNIX Client . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . B-4
xxii
Creating Bootable System Diskettes on a UNIX Client . . . . . . . . . . . . . . . . . . B-6
Creating a Diagnostics Diskette . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . B-7
$SSHQGL[ꢀ&
About This Section. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . C-1
About This Section. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . C-3
How UNIX-Style Permissions Work. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . C-4
Adding the Filer to a Windows NT Domain. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . C-4
About This Section. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . C-4
Prerequisites . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . C-5
Procedure. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . C-5
$SSHQGL[ꢀ'
Time Zone Selection . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .D-1
About This Section. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .D-1
Africa . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .D-1
America . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .D-1
Antarctica . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .D-2
Asia. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .D-2
Atlantic . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .D-3
xxiii
Australia . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . D-3
Brazil . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . D-3
Canada. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . D-3
Chile. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . D-3
GMT. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . D-4
Mexico. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . D-5
Miscellaneous . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . D-5
$SSHQGL[ꢀ(
Class A. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . E-3
Class B. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . E-3
EN 55022 Compliance (Czech Republic Only). . . . . . . . . . . . . . . . . . . . . . . . . . . . . E-5
MOC Notice (South Korea Only). . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . E-6
Class A Device. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . E-7
Class B Device. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . E-7
Polish Center for Testing and Certification Notice . . . . . . . . . . . . . . . . . . . . . . . . . E-7
Wymagania Polskiego Centrum BadaÒ i Certyfikacji . . . . . . . . . . . . . . . . . . . . . . . E-8
Pozostae instrukcje bezpieczeÒstwa . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . E-8
NOM Information (Mexico Only). . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . E-9
$SSHQGL[ꢀ)
6WDWHPHQWꢀRIꢀ&RPSOLDQFH ꢀꢄꢀꢄꢀꢄꢀꢄꢀꢄꢀꢄꢀꢄꢀꢄꢀꢄꢀꢄꢀꢄꢀꢄꢀꢄꢀꢄꢀꢄꢀꢄꢀꢄꢀꢄꢀꢄꢀꢄꢀꢄꢀꢄꢀ )ꢁꢃ
Limited Three-Year Warranty (U.S. Only) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . F-1
Coverage During Year One . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . F-1
Coverage During Years Two and Three. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . F-2
General Provisions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . F-2
xxiv
Total Satisfaction Return Policy (U.S. and Canada Only). . . . . . . . . . . . . . . . . . . F-5
Year 2000 Statement of Compliance for Dell-Branded Hardware Products . . . . . . F-6
Previous Products . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . F-7
Software. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . F-7
Additional Information . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . F-7
*ORVVDU\
,QGH[
)LJXUHV
Figure 1-1. Filer Features. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1-1
Figure 7-1. passwrd File Default Entry. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7-2
Figure 7-2. group File Default Entry. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7-3
Figure E-1. VCCI Class A ITE Regulatory Mark . . . . . . . . . . . . . . . . . . . . . . . . . . E-6
Figure E-2. VCCI Class B ITE Regulatory Mark . . . . . . . . . . . . . . . . . . . . . . . . . . E-6
Figure E-3. MOC Class A Regulatory Mark . . . . . . . . . . . . . . . . . . . . . . . . . . . . . E-7
Figure E-4. MOC Class B Regulatory Mark . . . . . . . . . . . . . . . . . . . . . . . . . . . . . E-7
7DEOHV
Table 1-1.
Table 5-1.
Table 7-1.
Table 7-2.
Table 8-1.
Table 9-1.
Table A-1.
Table C-1.
group File Field Entries . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7-3
cifs Command Parameters . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 8-1
CIFS Client Connection Methods. . . . . . . . . . . . . . . . . . . . . . . . . . . . 9-2
Technical Specifications. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . A-1
Domain and Workgroup Features . . . . . . . . . . . . . . . . . . . . . . . . . . . C-3
xxv
xxvi
& + $ 3 7 ( 5 ꢁ ꢂ
)LOHUꢀ)HDWXUHVꢀDQGꢀ6RIWZDUH
6WDQGDUGꢀ)HDWXUHVꢀRIꢀWKHꢀ)LOHU
Figure 1-1 shows the standard features that you can see from the front panel of the
Dell PowerVault 720N, 740N, or 760N filer.
)LJXUHꢀꢃꢁꢃꢄꢀꢀ)LOHUꢀ)HDWXUHV
)LOHUꢀ6RIWZDUHꢀ'HVFULSWLRQ
$ERXWꢀWKHꢀ6RIWZDUH
The filer was shipped with a CD and system boot diskettes. Because system software
has been installed at the factory, you dont need the CD or system boot diskettes to
install or configure a new filer.
Store the filer software in a safe place so that you can use it to recover in case of a
software problem in the future.
Filer Features and Software 1-1
&'ꢀDQGꢀ'LVNHWWHꢀ&RQWHQWV
Table 1-1 describes the CD and system boot diskettes:
7DEOHꢀꢃꢁꢃꢄꢀꢀ)LOHUꢀ&'ꢀDQGꢀ'LVNHWWHV
3DFNDJHꢁ,WHP
&RQWHQWV
Data ONTAP 5.3
CD
This CD contains the system software and documentation.
If you need to reinstall the system software for any reason,
you need this CD; call Dell technical support for instruc-
tions before reinstalling system software on the filer.
The Data ONTAP 5.3 CD contains the system files and sys-
tem boot software in two formats so that it can be read by
®
both UNIX and PC workstations. For full information
con-
about the contents of the CD, read the file named
tents.txt
on the CD.
System boot
diskettes
If the filer fails to boot from hard disk, or if you forget your
password, you must boot the filer from the system boot
diskettes.
Custom MIB
Use this Management Information Base (MIB) with SNMP
to get detailed information about filer operation. For further
System Administrator and Command
information, see your
Reference Guide
.
6RIWZDUHꢀ8SGDWHV
Dell regularly makes software updates available to customers who purchase software
support agreements.
You can find information about the latest software updates at Dells World Wide Web
site at http://www.dell.com.
1-2 Dell PowerVault 720N, 740N, and 760N Users Guide
& + $ 3 7 ( 5 ꢁ ꢃ
6HWXSꢀ:L]DUGꢀ³ꢀ,QWURGXFWLRQ
2YHUYLHZ
The Setup Wizard provides an easy to use Web-based method of configuring the
basic settings for a new filer.
The configuration method using the setupcommand is different from the Setup
Wizard configuration method in these ways:
Uses command-line installation and configuration commands to install and con-
figure the new filer
Provides limited on-line help
The Setup Wizard uses the network and a Web browser to perform the initial basic
setup for filers, eliminating the need for the command-line setup. The Setup Wizard
contains context-sensitive help for each field on each page.
After you finish the basic configuration, you can use the Web-based FilerView tool
to complete other types of configurations you might need on this filer. FilerView also
uses the network and a Web browser to perform general management tasks.
3UHUHTXLVLWHVꢀWRꢀ8VLQJꢀWKHꢀ6HWXSꢀ:L]DUG
The Setup Wizard needs an IP address to begin the configuration process, which you
can obtain using either of the following methods:
An existing Dynamic Host Configuration Protocol (DHCP) server on your network
during initial boot of the new filer.
If the filer cant find or obtain an IP address from the DHCP server, the normal
setupscript, using a console connected to the filer, prompts you for several
pieces of information, including an IP address, and then asks whether you want
to use the Setup Wizard. This method works with any filer; however, you must
have a console connected to the filer for the initial few pieces of setup
information.
Setup Wizard Introduction 2-1
5HVWULFWLRQꢀRQꢀ8VLQJꢀ6HWXSꢀ:L]DUG
If you dont want to switch from the console to the Web-based wizard to do the con-
figuration (when you are not using a DHCP server), you should use thesetup
command configuration that is discussed in Chapter 4, setup Command
Introduction.
$ERXWꢀ%DVLFꢀ&RQILJXUDWLRQꢀ8VLQJꢀ6HWXSꢀ
:L]DUG
The Setup Wizard uses multiple Web pages with a limited number of questions per
page to set up the filer. On-line context-sensitive help is available for each field that
you need to respond to. The Setup Wizard covers protocol licensing, based on what
you purchased; administration setup; DNS, NIS, and Windows NT setup; and routing
and email gateway setup.
2-2 Dell PowerVault 720N, 740N, and 760N Users Guide
& + $ 3 7 ( 5 ꢁ ꢄ
6HWXSꢀ:L]DUGꢀ³ꢀ%DVLFꢀ
&RQILJXUDWLRQꢀRIꢀWKHꢀ)LOHU
%HJLQQLQJꢀWKHꢀ&RQILJXUDWLRQꢀ
6WHSVꢀWRꢀ&RQILJXUDWLRQ
There are several steps to performing the basic configuration of a new filer:
Providing the filer with an IP address
Using the Setup Wizard to do the configuration
Verifying the configuration of the filer
+RZꢀWRꢀ3URYLGHꢀDQꢀ,3ꢀ$GGUHVV
There are two methods to providing the filer with an IP address:
8VLQJꢀ'+&3ꢀWRꢀ2EWDLQꢀWKHꢀ,3ꢀ$GGUHVVꢀIRUꢀWKHꢀ1HZꢀ)LOHU
To use the DHCP server to obtain an IP address for the filer, you need to ensure that
the following DHCP configuration exists:
e0
interface before you turn on and
You need the MAC address from the filers
configure your filer. You need to manually allocate a static IP address on the
DHCP server.
e0
The
MAC address is printed on a label on the back of the filers PCB carrier, in
the upper left-hand corner.
e0
Use the
MAC address to manually allocate a static IP address on the DHCP
server for your filer; or provide your DHCP administrator with the information to
e0
perform this task. The DHCP server uses the
when it boots.
MAC address to identify the filer
To avoid IP address conflicts, use a static IP address on your DHCP server. If you
use a dynamic IP address, the filer does not release that address when its lease
expires. The lease is a predetermined expiration time set on the DHCP server.
If you are using DHCP to obtain the IP address for the filer, see "Using Setup
Wizard on a Filer With a DHCP Server."
Setup Wizard Basic Configuration of the Filer3-1
(QWHULQJꢀDꢀ6WDWLFꢀ,3ꢀ$GGUHVVꢀIRUꢀWKHꢀ1HZꢀ)LOHU
If you are not using DHCP to obtain the IP address for the filer, see "Using Setup
Wizard on a New Filer Without a DHCP Server."
+RZꢀWRꢀ8VHꢀWKHꢀ6HWXSꢀ:L]DUG
After you have the IP address for the new filer, you can point your browser to the URL
address on the filer to start the Setup Wizard. You follow the pages of prompts to
complete the configuration. Each prompt field has its own context-sensitive help
screen if you need more information than the prompt gives.
The last page of the wizard displays all the configuration settings you provided and
enables you to make any changes you might want to make. You can click the field you
want to change; the wizard takes you to that specific page.
After you finish making any changes necessary, you click Finish and the Setup Wizard
configures the filer. After the Setup Wizard finishes, the filer is ready for use.
+RZꢀWRꢀ9HULI\ꢀWKHꢀ&RQILJXUDWLRQ
You can verify that the configuration is successful by using pingto see that all net-
work interfaces are up and working.
8VLQJꢀ6HWXSꢀ:L]DUGꢀRQꢀDꢀ)LOHUꢀ:LWKꢀDꢀ
'+&3ꢀ6HUYHU
'HVFULSWLRQ
This procedure configures a PowerVault 720N, 740N, or a 760N filer using the Setup
Wizard. After you complete this procedure, the filer is running the protocols for which
you purchased licenses, and is configured and ready for use.
3UHUHTXLVLWHV
You need the following requirements completed before you begin the procedure:
A static IP address on your DHCP server set up before you begin the filer
configuration
The new filer attached to the network
e0
A client browser on the same network as the filers
network
5HVWULFWLRQV
If your new filer will be using virtual interfaces, use the procedure documented in
"Using Setup Wizard on a New Filer Without a DHCP Server."
3-2 Dell PowerVault 720N, 740N, and 760N Users Guide
6WHSV
To begin the configuration, perform the following steps:
1. Turn on the filers power switch to begin the configuration process.
The first time the filer boots, it contacts the DHCP server and requests an IP
address. The DHCP server supplies the static IP address you configured it with.
2. From a client on the same network, point a web browser to
http://filer-name/api
or
http://filer-ip-address/api
filer-name
-ip-address
or filer
Replace
with either the name of the filer or the filers
IP address that you set up in the DHCP server.
The Setup Wizard loads.
3. Enter the information as requested.
5HVXOWV
After you finish configuring the filer, it is on-line. The following directories exist on
the filer:
/vol/vol0
/vol/vol0/home
NOTE: /vol is not a directoryit is a special virtual root path under which the filer
mounts its volumes. You cannot mount /vol to view all the volumes on the filer; you
must mount each filer volume separately.
/vol/vol0
If you purchased a license for the NFS protocol,
is exported to the administra-
is exported to the administration host for root
/etc/passwd
/vol0/home
tion host for root access;
access and to all clients for general access. Paths such as
/vol/vol0/etc/passwd
are referenced
as
.
/vol/vol0
If you purchased a license for the CIFS protocol,
is shared as C$; only the
system administrator with the root password has read and write access to the C$
/vol/vol0/home
share. The
to anyone.
directory is shared as HOME without access granted
:KHUHꢀWRꢀ*Rꢀ)URPꢀ+HUH
Verify the network connections of your new filer using the procedure in "Verifying
Network Connections."
Setup Wizard Basic Configuration of the Filer3-3
8VLQJꢀ6HWXSꢀ:L]DUGꢀRQꢀDꢀ1HZꢀ)LOHUꢀ
:LWKRXWꢀDꢀ'+&3ꢀ6HUYHU
'HVFULSWLRQ
This procedure enables you to use the Setup Wizard on a new filer without using a
DHCP server to obtain the new filers IP address. This procedure also enables you to
set up virtual interfaces in your new filer.
After you complete this procedure, the filer is running the protocols for which you pur-
chased licenses, and is configured and ready for use.
3UHUHTXLVLWHV
You need the following requirements completed before you begin the procedure:
Installed filer hardware and the serial console attached to the filer according to
the instructions in your hardware guide
The new filer attached to the network
e0
A client browser on the same network as the filers
network
6WHSV
To give the filer an IP address and to use the Setup Wizard to configure the filer, per-
form the following steps:
1. Turn on the filers power switch to begin the configuration process.
The first time the filer boots up, it runs setup.
If setup does not run automatically, enter setup and press Enter.
2. Enter the information as requested.
The following prompt is displayed:
:RXOGꢀ\RXꢀOLNHꢀWRꢀFRQWLQXHꢀVHWXSꢀWKURXJKꢀWKHꢀZHEꢀ
LQWHUIDFH"ꢀ>Q@
3. Enter yesto continue the setup using the Setup Wizard.
The wizard displays the following message:
3RLQWꢀDꢀZHEꢀEURZVHUꢀWRꢀ
KWWSꢁꢂꢂILOHUꢀQDPHꢂDSLꢀ
RUꢀ
KWWSꢁꢂꢂILOHUꢀLSꢀDGGUHVVꢂDSLꢀ
WRꢀFRPSOHWHꢀVHWXSꢃ
3-4 Dell PowerVault 720N, 740N, and 760N Users Guide
4. From a client attached to the network, point your browser to the filer address
given; the Setup Wizard loads.
5. Enter the information as requested.
:KHUHꢀWRꢀ*Rꢀ)URPꢀ+HUH
Verify the network connections of your new filer using the procedure in "Verifying Net-
work Connections."
9HULI\LQJꢀ1HWZRUNꢀ&RQQHFWLRQV
'HVFULSWLRQ
After you configure the filer, you use the pingcommand from a client attached to the
network to verify that the filer is set up correctly and can communicate with other
computers on the network.
6WHSV
To verify filer communication, perform the following steps:
1. At a client attached to the network, enter the following command:
SLQJꢀꢀILOHUꢁLSDGGUHVV!
2. Replace <filer ipaddress>with the Internet protocol (IP) address that you
assigned the filer.
3. Repeat the test for each interface that is installed in the filer.
([DPSOHV
The following examples test the network connections for a filer that has the host
filer
e0
with two interfaces named
f0
and installed:
name
SLQJꢀILOHUꢁHꢂ
SLQJꢀILOHUꢁIꢂ
7URXEOHVKRRWLQJ
If an interface does not respond to a pingcommand, make sure that:
The interface is securely attached to the network.
The media type is set up correctly if the interface is on an Ethernet card contain-
ing different media connectors.
The routers function properly with correct routing information if thepingcom-
mand is issued from a network not directly attached to the interface.
Setup Wizard Basic Configuration of the Filer3-5
& + $ 3 7 ( 5 ꢁ ꢅ
VHWXSꢀ&RPPDQGꢀ³ꢀ,QWURGXFWLRQ
2YHUYLHZ
&RQILJXUDWLRQꢀ3URFHVV
To configure a new filer for the first time, perform the following steps. Some of the
procedures are optional, depending on the filer options that you purchased.
1. Set up DHCP.
If you want to use the Dynamic Host Configuration Protocol (DHCP) to configure
e0
the filers onboard interface ( ), follow the instructions in "Using DHCP With the
Filer."
Using DHCP to assign an IP address to a filer enables you to use a Telnet client to
complete the first-time configuration, rather than having to attach a serial console
to the filer to complete the configuration.
2. Add the filer to a Windows NT domain.
If you purchased a license for the CIFS protocol for your filer and you plan to add
the filer to a Windows NT domain, see "Adding the Filer to a Windows NT
Domain" in Appendix C.
3. Configure the filer.
Configure your filer according to the instructions in "Configuring the Filer."
4. Verify the filers network connections.
Verify that the filer is communicating on the network by following the instructions
in "Verifying Network Connections."
5. Configure HTTP service.
If you purchased a license for the HTTP protocol for your filer, configure the HTTP
options as described in Chapter 6, "Configuring HTTP on the Filer."
6. Set up passwdand groupfiles.
setup Command Introduction 4-1
If you purchased a license for the CIFS protocol for your filer and you are not
using a Windows NT domain controller to authenticate users, configure passwd
and groupfiles according to the instructions in Chapter 7, "Setting Up passwd
and group Files."
7. Configure CIFS shares.
If you purchased a license for the CIFS protocol for your filer, configure CIFS
shares so that users can access directories on the filer.
8. Configure clients to access the filer.
You must configure clients according to the instructions in Chapter 9, "Configur-
ing Clients to Access the Filer," so that they can access information on the filer.
9. Install the SecureShare program on CIFS clients.
If you purchased a license for the CIFS protocol for your filer, you can install the
SecureShare program on Windows clients according to the instructions in Chap-
ter 10, "setup Command Installing SecureShare," This enables users to view
and modify the UNIX permissions and attributes on files stored on the filer.
10. Learn about the Data ONTAP 5.3 software.
Read Chapter 1, "Filer Features and Software."
11. Learn about FilerView.
Read Chapter 5, "Configuring the Filer Using FilerView," to learn how to adminis-
ter your filer using the FilerView Web-based administration tool.
8VLQJꢀ'+&3ꢀ:LWKꢀWKH )LOHU
'HVFULSWLRQ
Follow this procedure to use DHCP to assign a static IP address to the onboard inter-
e0
face ( ) on a filer during first-time configuration. This procedure enables you to use a
Telnet client to access the filer and complete the first-time configuration, rather than
having to attach a hard-wired console to the filer. When you use DHCP to assign an IP
address to the onboard interface, the filer:
Obtains the address from the DHCP server when the filer is turned on
Configures the onboard interface with the IP address
Becomes accessible to a Telnet client or the Setup Wizard
3UHUHTXLVLWHV
To use this procedure, you must have a DHCP server and the filer on the same net-
work segment.
4-2 Dell PowerVault 720N, 740N, and 760N Users Guide
6WHSV
To use DHCP to assign an IP address to the onboard interface, perform the following
steps:
1. Locate the MAC address for the onboard interface by looking for a label on the
back of the left side of the filers PCB carrier, if necessary.
2. Configure the DHCP server to return a static IP address for the interface based
on the MAC address for the onboard interface.
&$87,21ꢀꢁ7KHꢁ'+&3ꢁVHUYHUꢁPXVWꢁUHWXUQꢁDꢁVWDWLFꢁ,3ꢁDGGUHVVꢁIRUꢁWKHꢁ
LQWHUIDFHꢃꢁ,IꢁWKHꢁVHUYHUꢁUHWXUQVꢁDꢁG\QDPLFꢁ,3ꢁDGGUHVVꢂꢁWKHꢁILOHUꢁGLVSOD\Vꢁ
DQꢁHUURUꢁPHVVDJHꢁDQGꢁFRQWLQXHVꢁWRꢁXVHꢁWKHꢁ,3ꢁDGGUHVVꢁSHUPDQHQWO\³
ZKLFKꢁFDQꢁUHVXOWꢁLQꢁDQꢁ,3ꢁDGGUHVVꢁFRQIOLFWꢁLIꢁWKHꢁ'+&3ꢁVHUYHUꢁDVVLJQVꢁWKHꢁ
,3ꢁDGGUHVVꢁG\QDPLFDOO\ꢁWRꢁRWKHUꢁFOLHQWVꢁIURPꢁWLPHꢁWRꢁWLPHꢃ
&RQILJXULQJꢀWKHꢀ)LOHU
'HVFULSWLRQ
This procedure describes how to configure your filer whether or not you use DHCP.
Complete this procedure after you install your new filer. After you configure your filer,
it is visible on your network and available for access by users from their client
computers.
3UHUHTXLVLWHV
Before you start this procedure, you must:
Install the filer hardware and the serial console according to the instructions in
your hardware guide if you are not using DHCP.
Complete steps 1 through 3 of "Configuration Process."
6WHSV
To configure a filer, perform the following steps:
1. Turn on the filers power switch to begin the configuration process.
The first time the filer boots:
If you followed the steps in "Using DHCP With the Filer," the filer obtains an
IP address for the e0 interface.
The filer runs the setupcommand.
2. Enter the configuration information as prompted by the setupprogram.
setup Command Introduction 4-3
5HVXOWV
After you finish configuring the filer, it is on-line. The following directories exist on the
filer:
/vol/vol0
/vol/vol0/home
NOTE: /vol is not a directoryit is a special virtual root path under which the filer
ꢀ
mounts its volumes. You cannot mount /vol to view all the volumes on the filer; you
ꢀ
must mount each filer volume separately.
/vol/vol0
If you purchased a license for the NFS protocol,
is exported to the administra-
is exported to the administration host for root
/vol0/home
tion host for root access;
access and to all clients for general access.
/vol/vol0
If you purchased a license for the CIFS protocol,
is shared as C$; only the
system administrator with the root password has read and write access to the C$
/vol/vol0/home
share. The
anyone.
directory is shared as HOME without access granted to
9HULI\LQJꢀ1HWZRUNꢀ&RQQHFWLRQV
8VLQJꢀWKHꢀSLQJꢀ&RPPDQG
After you configure the filer, you use thepingcommand from a client attached to the
network to verify that the filer can communicate with other computers on the
network.
3URFHGXUH
To verify filer communication, perform the following steps:
1. At a client attached to the network, enter the following command:
ping hostname-interface
hostname
Replace the variable
with the host name that you assigned to the filer
interface
when you ran setup; replace the variable
with one of the interface
names that the filer assigned when you ran setup.
2. Repeat the test once for each interface that is installed in the filer.
([DPSOHV
The following examples test the network connections for a filer that has the host
filer
e0
with two interfaces named
f0
and installed:
name
ping filer-e0
ping filer-f0
4-4 Dell PowerVault 720N, 740N, and 760N Users Guide
+RZꢀWRꢀ7URXEOHVKRRWꢀ3UREOHPV
If an interface does not respond to a pingcommand, make sure that:
The interface is securely attached to the network.
The media type is set up correctly if the interface is using a multi-port Ethernet
card with different port speeds.
The routers function properly with correct routing information if thepingcom-
mand is issued from a network not directly attached to the interface.
setup Command Introduction 4-5
4-6 Dell PowerVault 720N, 740N, and 760N Users Guide
& + $ 3 7 ( 5 ꢁ ꢆ
8VLQJꢀ)LOHU9LHZ
$GPLQLVWHULQJꢀ<RXUꢀ)LOHUꢀ)URPꢀ)LOHU9LHZ
8VLQJꢀ)LOHU9LHZ
This chapter introduces FilerView, the Web-based administration tool for Data
ONTAP 5.3.
FilerView enables you to perform most administration tasks from any client on your
network that has a compatible Web browser. FilerView is a GUI-based administration
tool, using Java applets, that performs tasks that would otherwise require you to
enter commands at the filer console or edit configuration files.
You can use FilerView even if you did not purchase a license for the HTTP protocol.
If you prefer to manage the filer by using a command-line interface and editing config-
System Administrator and Command Reference Guide
uration files, see your
.
3UHUHTXLVLWHV
You need Netscape Navigator 4 or later or Microsoft Internet Explorer 4 or later to
access FilerView. FilerView has not been tested with other Web browsers.
$FFHVVLQJꢀ)LOHU9LHZ
system
If you used the Setup Wizard, you can access FilerView by clicking the
management tools
link on the Setup Wizards Finished page.
If you used the setupcommand, you can access FilerView by pointing your browser
http://hostname/na_admin
to the filer home page ( ), substituting the filers name for
hostname
.
([DPSOH
If your hosts name is filer, enter the following URL:
KWWSꢃꢄꢄILOHUꢄQDBDGPLQ
Using FilerView 5-1
When your browser connects to the filer, the filer home page is loaded. The initial
page contains the choices shown in Table 5-1.
7DEOHꢀꢈꢁꢃꢄꢀꢀ)LOHU9LHZꢀ+RPHꢀ3DJHꢀ&KRLFHV
8VLQJꢀWKHꢀ)LOHU9LHZꢀ,QWHUIDFH
The FilerView interface consists of two frames: a left frame and a right frame.
/HIWꢀ)UDPH
The left frame contains an expandable list of categories:
The Real-time Displays category contains choices that launch separate tools that
monitor filer performance.
The other categories represent management functions.
To view the Real-time Displays or the functions in a category, double-click the
Real-time Displays or a category name. To select a Real-time Display or a function,
double-click the display or function name.
NOTE: The first time you select a function, FilerView prompts you to enter the filers
administration password. After you enter the correct password, FilerView does not
prompt you for the password again.
5LJKWꢀ)UDPH
The right frame contains a logo initially.
As you select functions from the left frame, the right frame changes to display forms
that provide information about the filer configuration and enable you to change the
5-2 Dell PowerVault 720N, 740N, and 760N Users Guide
& + $ 3 7 ( 5 ꢁ ꢇ
&RQILJXULQJꢀ+773ꢀRQꢀWKHꢀ)LOHU
+773ꢀ&RQILJXUDWLRQꢀ,QIRUPDWLRQ
$ERXWꢀ7KLVꢀ&KDSWHU
This chapter contains instructions for configuring the filer to provide HTTP service. If
you purchased a license for the HTTP protocol, follow the instructions in this chapter
to configure the HTTP service; otherwise, continue with Chapter 7, "Setting Up
passwd and group Files."
3UHUHTXLVLWHV
Before configuring the filer to provide HTTP service, you must decide which directory
path that the filer uses as the home directory for files to be accessed by HTTP clients.
The path name for the directory uses the following format:
/vol/volume_name/directory_name
/home/html_files
vol0
volume, you use
For example, to use the
the following path:
directory path on the
/vol/vol0/home/html_files
3URFHGXUH
NOTE: All lines within filer configuration files must end with a carriage return.
To configure HTTP service, perform the following steps:
1. At the filer console, enter the following command to enable the HTTP daemon:
options httpd.enable on
2. Use the following command syntax to specify the root of the path that HTTP
requests can use:
pathname
options httpd.rootdir
Configuring HTTP on the Filer 6-1
For example, if you want HTTP clients to gain access to files or subdirectories
/vol0/home/html_files
under
, enter
options httpd.rootdir /vol/vol0/home/html_files
When Web browsers request files using HTTP, the filer delivers the files using the
http://filer/demo/
root directory. For example, if a browser requests the URL
index.htm /vol0/home/html_files/demo/index.htm
, the filer sends the file
.
3. If you want the HTTP service started whenever the filer is booted, use an editor
®
®
from an NFS or Microsoft Windows operating system client to enter the fol-
/etc/rc
lowing lines to the filers
file:
options httpd.enable on
options httpd.rootdir pathname
5HVXOWV
The filer is configured to respond to requests from Web browsers.
6-2 Dell PowerVault 720N, 740N, and 760N Users Guide
& + $ 3 7 ( 5 ꢁ ꢈ
6HWWLQJꢀ8SꢀSDVVZGꢀDQGꢀJURXSꢀ
)LOHV
SDVVZGꢀDQGꢀJURXSꢀ,QIRUPDWLRQ
$ERXWꢀ7KLVꢀ&KDSWHU
passwd
group
files on the filer so that
This chapter describes how to set up the
the filer can authenticate users.
and
:KRꢀ6KRXOGꢀ8VHꢀ7KLVꢀ&KDSWHU
You should use the information in this chapter if your filer is licensed for the CIFS pro-
tocol and does not use a Windows NT domain controller to authenticate users.
If your filer does use a Windows NT domain controller, skip this chapter and continue
with Chapter 8, "Configuring Access to CIFS Shares."
/RFDWLRQꢀRIꢀWKHꢀSDVVZGꢀDQGꢀJURXSꢀ)LOHV
passwd
group
/etc
files in the directory of the
The setupprogram created default
and
filer default volume.
+RZꢀWKHꢀ)LOHUꢀ8VHVꢀWKHꢀSDVVZGꢀDQGꢀJURXSꢀ)LOHV
group
files for the following reasons:
passwd
The filer uses
and
To authenticate users for CIFS access and to translate user and group names in
/etc/quotas
the
file to UIDs and GIDs
If the filer uses a Windows NT domain controller to authenticate CIFS users, the
domain controller verifies the users login name and password, and the filer veri-
passwd
fies that the user has an entry in the
file.
passwd
If the filer uses the
file to authenticate NFS or CIFS users, the filer uses
passwd
the encrypted password in the
password.
file to verify the users login name and
Setting Up passwd and group Files 7-1
To determine CIFS guest access
System Administrator
For additional information about guest access, see your
and Command Reference Guide
.
To determine users rights to access files
For information about how the filer uses the files to determine access rights in an
System Administrator and
environment with both NFS and CIFS users, see your
Command Reference Guide
.
'HIDXOWꢀSDVVZGꢀ)LOH
passwd
Figure 7-1 shows the default entry in the
file.
)LJXUHꢀꢊꢁꢃꢄꢀꢀSDVVZUGꢀ)LOHꢀ'HIDXOWꢀ(QWU\
Table 7-1 describes the fields in an entry.
7DEOHꢀꢊꢁꢃꢄꢀꢀSDVVZUGꢀ)LOHꢀ)LHOGꢀ(QWULHV
)LHOG
'HVFULSWLRQ
User name
Contains a user name for the user.
Encrypted
password
Contains a password for the user. The filer disregards this
®
field if NIS or a Microsoft Windows NT operating system
domain controller is used to authenticate user names and
passwords.
UID
GID
Contains a unique integer that is the UID (user ID).
Contains a unique integer that is the users primary GID
(group ID).
Users full name Contains the users full name. The filer ignores this field.
UNIX home
directory
Contains the path of the users home directory. The filer
ignores this field.
Default shell
Contains the path of the users default shell. The filer
ignores this field.
7-2 Dell PowerVault 720N, 740N, and 760N Users Guide
'HIDXOWꢀJURXSꢀ)LOH
Figure 7-2 shows the default entry in the
group
file.
)LJXUHꢀꢊꢁꢅꢄꢀꢀJURXSꢀ)LOHꢀ'HIDXOWꢀ(QWU\
Table 7-2 describes the fields in an entry.
7DEOHꢀꢊꢁꢅꢄꢀꢀJURXSꢀ)LOHꢀ)LHOGꢀ(QWULHV
)LHOG
'HVFULSWLRQ
Group name
Contains a unique group name.
Encrypted
password
Contains a password. This field is never used and is blank.
GID
Contains a unique integer that is the GID.
User names
Contains a comma-separated list of user names that belong
to the group.
$FFHVVLQJꢀSDVVZGꢀDQGꢀJURXSꢀ)LOHVꢀ)URPꢀ
:LQGRZVꢀ17ꢀDQGꢀ:LQGRZVꢀꢌ[ꢀ
:RUNVWDWLRQV
'HVFULSWLRQ
passwd
group
files from a Windows NT
This procedure enables you to access the
and
x
or Windows 9 workstation.
Setting Up passwd and group Files 7-3
6WHSV
x
To access the files from a Windows NT or Windows 9 workstation, perform the fol-
lowing steps:
1. Map a drive to the root of the default filer volume using the following Universal
filername
Naming Convention (UNC) path; replace
with the name of your filer:
??ILOHUQDPH?&ꢄ
When prompted, enter a password based on one of the following scenarios:
If Windows displays a dialog box asking for a user name and a password,
use Administrator as the user name.
If you set up the filer to use a Windows NT domain controller to authenticate
users, use the domains administrator password.
passwd
file to authenticate users, use the
administrator password that you entered during setup.
If you set up the filer to use the
etc
2. Change to the /
directory.
$FFHVVLQJꢀSDVVZGꢀDQGꢀJURXSꢀ)LOHVꢀ)URPꢀ
81,;ꢎ1)6ꢀ&OLHQWV
'HVFULSWLRQ
passwd
group
files from a UNIX/NFS
This procedure enables you to access the
client.
and
6WHSV
To access the files from a UNIX/NFS client, perform the following steps:
1. Mount the root of the default filer volume to the clients file system using the fol-
filername
lowing path; replace
with the name of your filer:
filername
:/vol/vol0
/etc
2. Change to the
directory.
$GGLQJꢀ(QWULHVꢀWRꢀWKHꢀSDVVZGꢀ)LOH
/etc/passwd
The procedure you use to add entries to the
file depends on whether you
file or either a Windows NT domain controller or NIS to
/etc/passwd
are using the
authenticate users.
/etc/passwd
If you are using the
file to authenticate users, see "Adding Entries to the
passwd File From a UNIX Client."
If you are using either a Windows NT domain controller or NIS to authenticate users,
see "Adding Entries to the passwd File From a Windows/NFS Client."
7-4 Dell PowerVault 720N, 740N, and 760N Users Guide
$GGLQJꢀ(QWULHVꢀWRꢀWKHꢀSDVVZGꢀ)LOHꢀ)URPꢀDꢀ
81,;ꢀ&OLHQW
'HVFULSWLRQ
passwd
In this procedure, you add entries to a
then transfer the file to the filer. You add entries to the
because each entry in the file requires an encrypted password and the filer does not
file on a UNIX client using a text editor,
passwd
file on a UNIX client
passwd
have a command for creating passwords. The format for entries in the
as follows:
file is
XVHUQDPHꢁSDVVZRUGꢁXLGꢁJLGꢁIXOOꢀQDPHꢁꢂꢁGHIDXOWꢀVKHOO
6WHSV
passwd
To add entries to a
1. Log in to a UNIX client as the root user.
etc
file, perform the following steps:
2. Change to the /
3. Make a copy of the existing
passwd
directory.
passwd
passwd.old
file under a new name, such as
file in a text editor.
5. Add an entry for each user who needs access to files.
.
4. Open the existing
Leave the password and default shell fields empty. You set passwords in step 8.
The filer does not use the default shell field.
6. If you did not purchase a license for the NFS protocol, delete any entries from the
passwd
file that are for non-CIFS users.
7. Save the file and exit the editor.
8. Set a password for each user by entering the following command:
SDVVZGꢀXVHUQDPH
The passwdprogram prompts you to enter the new password twice.
passwd
/etc
9. Copy the
file from the UNIX client to the
directory on the filer.
file from the UNIX client and rename the saved file to
passwd
10. Delete the
passwd
.
11. Continue with "Adding Entries to the group File."
Setting Up passwd and group Files 7-5
$GGLQJꢀ(QWULHVꢀWRꢀWKHꢀSDVVZGꢀ)LOHꢀ)URPꢀDꢀ
:LQGRZVꢎ1)6ꢀ&OLHQW
'HVFULSWLRQ
In this procedure, you edit the
passwd
x
file from a Windows NT or Windows 9 work-
passwd
station or a UNIX/NFS client using a text editor. The format for entries in the
file is as follows:
XVHUQDPHꢁSDVVZRUGꢁJLGꢁXLGꢁIXOOꢀQDPHꢁGHIDXOWꢀVKHOO
6WHSV
To add entries to the
passwd
file, perform the following steps:
passwd
/etc
directory of the default filer
1. In a text editor, open the
volume.
file from the
2. Add an entry for each user who needs to access files.
Leave the password and default shell fields empty. The filer does not use them
when users are authenticated by a Windows NT domain controller or NIS.
3. Save the file and exit the text editor.
4. Continue with "Adding Entries to the group File."
$GGLQJꢀ(QWULHVꢀWRꢀWKHꢀJURXSꢀ)LOH
'HVFULSWLRQ
In this procedure, you edit the
group
x
file from either a Windows NT or Windows 9
workstation or a UNIX/NFS client using a text editor. This enables you to add users to
a specific group that has rights to access the filer.
The format for entries in the group file is as follows:
JURXSQDPHꢁꢁJLGꢁXVHUQDPHꢅꢃꢃꢃꢅXVHUQDPH
3UHUHTXLVLWHV
This procedure assumes that you already connected to the root filer volume using the
instructions in one of the following sections:
x
"Accessing passwd and group Files From Windows NT and Windows 9
Workstations"
"Accessing passwd and group Files From UNIX/NFS Clients"
7-6 Dell PowerVault 720N, 740N, and 760N Users Guide
6WHSV
To add entries to the
group
file, perform the following steps:
/etc/group
1. Use a text editor to open the
file.
2. Add entries to the file for each group.
3. Save the file and exit the text editor.
5HVXOWV
passwd
group
files on the filer now contain entries for users and groups. The
The
and
filer can verify users rights to access the filer.
Setting Up passwd and group Files 7-7
7-8 Dell PowerVault 720N, 740N, and 760N Users Guide
& + $ 3 7 ( 5 ꢁ ꢉ
&RQILJXULQJꢀ$FFHVVꢀWRꢀ&,)6ꢀ6KDUHV
$VVLJQLQJꢀ$FFHVVꢀ5LJKWVꢀ
$ERXWꢀ7KLVꢀ&KDSWHU
This chapter describes how to assign users and groups access rights to CIFS shares
System Administrator and Command Reference
(directories) using FilerView; see your
Guide
for instructions about using Windows NT Server Manager to assign access
rights.
If you did not purchase a license for the CIFS protocol, continue on to Chapter 9, "Con-
figuring Clients to Access the Filer."
6FRSHꢀRIꢀ6KDUHVꢀ$FFHVV
The rights you assign to a share apply to the entire share; for example, if you assign a
user rights to a share named HOME, the user gains rights to the directory specified
by the HOME share and to all subdirectories under the directory. When you assign
rights, they are recorded in the share ACL.
FLIVꢀ&RPPDQGꢀ3DUDPHWHUV
FilerView enables you to grant users and groups access to CIFS shares, using the fol-
lowing form of the cifscommand:
FLIVꢀDFFHVVꢀVKDUHꢀ>ꢆJ@ꢀ^XVHU_JURXS`ꢀULJKWV
The cifscommand parameters are described in Table 8-1.
7DEOHꢀꢋꢁꢃꢄꢀꢀFLIVꢀ&RPPDQGꢀ3DUDPHWHUV
3DUDPHWHU
access
share
'HVFULSWLRQ
Specifies that an access entry is to be created.
Specifies the name of the share.
user | group Specifies the name of the user or group for which access
to the share is granted. When prefixed with the -goption,
this field specifies a UNIX group.
Configuring Access to CIFS Shares 8-1
7DEOHꢀꢋꢁꢃꢄꢀꢀFLIVꢀ&RPPDQGꢀ3DUDPHWHUVꢀꢁFRQWLQXHGꢂ
3DUDPHWHU
'HVFULSWLRQ
rights
Specifies which rights the user or group have to the share.
In UNIX-style permissions, rights are specified by three
rwx
, which stand for read, write, and execute. A
characters,
dash (-) in any position denies the user the right specified by
the character it replaces.
Examples:
rwx
grants read, write, and execute rights.
grants only the right to read files.
r--
rw-
grants only the rights to read and write files.
grants only the rights to read and execute files.
r-x
In Windows NT-style permissions, rights are specified as:
No Access, Read, Change, and Full Control.
(VWDEOLVKLQJꢀ$FFHVVꢀWRꢀ6KDUHV
'HVFULSWLRQ
The following procedure creates the access rights to the current CIFS shares.
6WHSV
To establish access to shares, perform the following steps:
1. From FilerView, select the CIFS option.
2. From the CIFS option, select Share/Access Editor.
3. Select the specific share you want to provide access to and click New Access.
4. Choose either Access by Group or Access by User.
5. Enter the name of the user or group for whom you want to specify access rights
to the share.
6. In the Rights field, select the type of permissions you want to set for this share.
7. Click OK to create the new access.
8-2 Dell PowerVault 720N, 740N, and 760N Users Guide
& + $ 3 7 ( 5 ꢁ ꢊ
&RQILJXULQJꢀ&OLHQWVꢀWRꢀ$FFHVVꢀWKHꢀ
)LOHU
&,)6ꢀDQGꢀ1)6ꢀ&OLHQWꢀ&RQILJXUDWLRQ
This chapter describes how to configure CIFS and NFS clients to access directories
and files on the filer.
&RQILJXULQJꢀ&,)6ꢀ&OLHQWV
$ERXWꢀ7KLVꢀ6HFWLRQ
Follow the instructions in this section to configure CIFS clients to access information
on the filer.
)LOHUꢀ,Vꢀ9LVLEOHꢀWRꢀ&,)6ꢀ&OLHQWVꢀ$IWHUꢀ6HWXS
After setup finishes, the filer becomes visible to CIFS clients by automatically regis-
tering with the master browser on its local network.
If cross-subnet browsing is configured correctly, the filer is now visible to all CIFS cli-
ents. For more information about cross-subnet browsing, refer to the Microsoft
networking documentation.
&,)6ꢀ&OLHQWꢀ&RQQHFWLRQꢀ0HWKRGV
Table 9-1 describes the various methods by which CIFS clients can connect to the
filer. For more information about the following commands and windows, refer to the
System Administrator and Command Reference Guide
.
Configuring Clients to Access the Filer 9-1
7DEOHꢀꢌꢁꢃꢄꢀꢀ&,)6ꢀ&OLHQWꢀ&RQQHFWLRQꢀ0HWKRGV
&OLHQWꢁRSHUDWLQJꢁ
0HWKRG
V\VWHP
&RPPDQGꢁRUꢁZLQGRZ
'HVFULSWLRQ
x
1
Windows 9 ,
Map Network Drive
window (from
Connect to the filer as a
network drive.
Windows NT 4.0
Windows Explorer)
x
2
3
4
Windows 9 ,
Network Neighbor-
hood
Click the filer icon in the
Network Neighborhood
window.
Windows NT 4.0
Windows NT
3.51, Windows
for Workgroups
Connect Network
Drive window (from
the File Manager)
Connect to the filer as a
network drive.
Any operating
system that sup-
ports the
Map a share to a drive
letter on the command
line. For example:
net use
net use command
®
MS-DOS com-
mand-line inter-
face and
f:\\filer\home
supports the
net use
command
6WHSV
To inform users about how to access the filer, perform the following steps:
1. Determine the connection methods that are correct for your CIFS clients.
2. If your CIFS clients can use methods 1, 3, and 4 to connect to the filer, inform
your users of the filers UNC path.
The UNC path consists of a computer name and a share name in the following
format:
??FRPSXWHUBQDPH?VKDUHBQDPH
If the filer is named filer and the directory that contains users directories is
\\filer\home
shared with the name "home," the UNC path is
.
3. If your CIFS clients can use method 2 to connect to the filer, inform your users of
the filer name so that they can locate the filer in Network Neighborhood.
5HVXOWV
After you provide users with information about how to access the filer, they can con-
nect to the filer, view directories, and read and write files.
9-2 Dell PowerVault 720N, 740N, and 760N Users Guide
&RQILJXULQJꢀ1)6ꢀ&OLHQWV
$ERXWꢀ7KLVꢀ6HFWLRQ
If you purchased a license for the NFS protocol, follow the instructions in this section
to prepare NFS clients to mount file systems from the filer.
+RVWꢀDQGꢀ,QWHUIDFHꢀ1DPHV
When you ran the Setup Wizard or the setupcommand, the filer generated a host
name for each interface by appending the number of the interface to the filer host
name.
For example, the interface name for the first interface on a filer named filer might be
filer-e0
; the second interface might be
filer-e1
.
&RQILJXULQJꢀ1)6ꢀ&OLHQWVꢀ8VLQJꢀ7ZRꢀ7\SHVꢀRIꢀ1DPHꢀ
5HVROXWLRQ
To configure NFS clients, choose one of the following methods for name resolution:
DNS or NIS
/etc/hosts file
&RQILJXULQJꢀ1)6ꢀ&OLHQWVꢀ8VLQJꢀ'16ꢀRUꢀ1,6ꢀ
IRUꢀ1DPHꢀ5HVROXWLRQ
If you use DNS or NIS for name resolution, add an entry in your DNS or NIS databases
for each of the filer interfaces.
The following example shows how the entries might look for a filer with these
interfaces:
255.255.255.145
255.255.255.155
filer-e0 filer
filer-e1
In the first line of the preceding example, the filer host name itself is used as an alias
for the first network interface.
&RQILJXULQJꢀ1)6ꢀ&OLHQWVꢀ8VLQJꢀ
ꢎHWFꢎKRVWVꢀ)LOHꢀIRUꢀ1DPHꢀ5HVROXWLRQ
/etc/hosts
/etc/hosts
file
If you use
file for name resolution, add an entry in each hosts
for each of the filer interfaces.
Configuring Clients to Access the Filer 9-3
The following example shows how the entries might look for a filer with these
interfaces:
255.255.255.145
255.255.255.155
filer-e0 filer
filer-e1
In the first line of the preceding example, the filer host name itself is used as an alias
for the first network interface.
([SRUWLQJꢀ)LOHUꢀ'LUHFWRULHVꢀIRUꢀ1)6ꢀ&OLHQWV
You must export the filers file systems before clients can mount them.
/etc/exports
Use an editor from an NFS or CIFS client to edit the
directories.
file to export filer
0RXQWLQJꢀ)LOHꢀ6\VWHPVꢀRQꢀ1)6ꢀ&OLHQWV
'HVFULSWLRQ
For clients to mount file systems from the filer, you must create entries for the direc-
/etc/fstab /etc/vfstab
or
tories exported from the filer in each clients
file.
/etc/fstab /etc/vfstab
or
After you edit the clients
file, the clients mount the file sys-
tems automatically when they boot.
6WHSV
To prepare clients to mount the filers file systems, perform the following steps:
NOTE: The /vol/vol0/home directory is used as a sample filer directory in this proce-
dure. You should use a path that exists on the filer.
/n/filer/
1. Create a directory on the client to act as a mount point. For example,
home
.
/vol/vol0/home
/n/filer/home
, add the following
2. To mount the filers
directory to
/etc/fstab /etc/vfstab
line to the clients
or
file:
filername:/vol/vol0/home /n/filer/home nfs rw 0 0
filername
Replace
The file system is mounted when the client reboots.
/vol/vol0/home
with the name of your file.
3. To mount the
command at the client:
directory without a client reboot, enter the following
mount filername:/vol/vol0/home /n/filer/home
9-4 Dell PowerVault 720N, 740N, and 760N Users Guide
5HVXOW
After the
/vol/vol0/home
directory on the filer is mounted, the user on the client sys-
/n/filer/home
tem can create, modify, or remove files in
.
:KHUHꢀWRꢀ*Rꢀ)URPꢀ+HUH
If you configured the filer using the setupcommand, continue on to Chapter 10,
"setup Command Installing SecureShare.
If you configured the filer using the Setup Wizard, your configuration is complete.
SecureShare was automatically installed by the Setup Wizard.
Configuring Clients to Access the Filer 9-5
9-6 Dell PowerVault 720N, 740N, and 760N Users Guide
& + $ 3 7 ( 5 ꢁ ꢂ ꢋ
VHWXSꢀ&RPPDQGꢀ³ꢀ,QVWDOOLQJꢀ
6HFXUH6KDUHꢀ
$ERXWꢀ6HFXUH6KDUH
)HDWXUHVꢀLQꢀ6HFXUH6KDUH
For multiprotocol environments, Data ONTAP 5.3 provides two SecureShare features:
SecureShare Access, which makes it easy for Windows users to change UNIX
file permissions on the filer.
SecureShare Access appears as a tab in the Properties dialog box of a set of files
you select if at least one of the files is a UNIX file. To use SecureShare Access,
System Administrator and Command Reference Guide
see your
.
SecureShare Account Migrator, which makes it easy to convert users and groups
/etc/
from a Windows NT domain into the format necessary to populate the
passwd
/etc/group
files on your filer. It enables you to perform the following
and
tasks:
Create the commands necessary to build CIFS shares for each user and
apply appropriate rights to these shares.
/etc
/etc
files, so you can keep your
Synchronize a Windows NT domain with
files current by running the program daily.
You can run SecureShare Account Migrator only from Windows NT, and only if
you have administrative access to the filer.
,QVWDOOLQJꢀ6HFXUH6KDUHꢀ$FFHVV
'HVFULSWLRQ
This procedure installs SecureShare Access from the CD onto the filer.
setup Command Installing SecureShare10-1
6WHSV
To install SecureShare Access from the CD, perform the following steps:
1. Make sure that the Data ONTAP 5.3 CD is in the CD-ROM drive.
2. Click the CD-ROM drive icon.
3. Click UTILS.
4. Click SSACCESS.
5. Click SSACCESS.EXE.
6. Follow the prompts in the SecureShare Access installer program.
,QVWDOOLQJꢀ6HFXUH6KDUHꢀ$FFRXQWꢀ0LJUDWRU
'HVFULSWLRQ
The following procedure installs the SecureShare Account Migrator from the
CD onto the filer.
6WHSV
To install SecureShare Account Migrator from the CD, perform the following steps:
1. Make sure that the Data ONTAP 5.3 CD is in the CD-ROM drive.
2. Click the CD-ROM drive icon.
3. Click UTILS.
4. Click SSAM.
5. Open the README file.
6. Click SSACMIGR.EXE.
7. Follow the prompts in the SecureShare Account Migrator installer program.
10-2 Dell PowerVault 720N, 740N, and 760N Users Guide
$ 3 3 ( 1 ' , ; ꢁ $
7HFKQLFDOꢀ6SHFLILFDWLRQV
7DEOHꢀ$ꢁꢃꢄꢀꢀ7HFKQLFDOꢀ6SHFLILFDWLRQV
0LFURSURFHVVRUꢁ
Microprocessor type . . . . . . . . . . . . . . . . 21164A Alpha 400MHz on the PowerVault
720N and 740N filers; Alpha 600MHz on
the PowerVault 760N filer
Internal cache . . . . . . . . . . . . . . . . . . . . . No cache on the PowerVault 720N filer;
1-MB onboard cache on the PowerVault
740N filer; 2-MB onboard cache on the
PowerVault 760N filer
Math coprocessor . . . . . . . . . . . . . . . . . . internal to microprocessor
([SDQVLRQꢁ%XV
Bus types . . . . . . . . . . . . . . . . . . . . . . . . PCI
Bus speed: PCI . . . . . . . . . . . . . . . . . . . . 33 MHz
PCI expansion-card connectors. . . . . . . . Four in PowerVault 720N filer; two 32-bit
and two 64-bit
Seven in PowerVault 740N filer; two 32-bit
and five 64-bit
Nine in the PowerVault 760N filer; three
32-bit and six 64-bit
PCI expansion-card connector data
width (maximum). . . . . . . . . . . . . . . . . . . 64 bits
NOTE: For the full name of an abbreviation or acronym used in this table, see the Glossary.
Technical Specifications A-1
7DEOHꢀ$ꢁꢃꢄꢀꢀ7HFKQLFDOꢀ6SHFLILFDWLRQVꢀꢁFRQWLQXHGꢂ
0HPRU\
Architecture. . . . . . . . . . . . . . . . . . . . . . . . 3.3-V DIMM, unbuffered SDRAM (ECC)
DIMM sockets. . . . . . . . . . . . . . . . . . . . . . four; gold contacts
DIMM capacities. . . . . . . . . . . . . . . . . . . . 256 MB on the PowerVault 720N; 512 MB
on the PowerVault 740N; and 1 GB on the
PowerVault 760N, unbuffered SDRAM
Maximum RAM. . . . . . . . . . . . . . . . . . . . . 256 MB on the PowerVault 720N; 512 MB
on the PowerVault 740N; and 1 GB on the
PowerVault 760N
'ULYHV
Externally accessible bays. . . . . . . . . . . . . one 3.5-inch bay for a diskette drive
3RUWVꢁDQGꢁ&RQQHFWRUV
Externally accessible: Serial . . . . . . . . . . . one 9-pin console connector; one 9-pin
diagnostics connector
&RQWUROVꢁDQGꢁ,QGLFDWRUV
Reset control. . . . . . . . . . . . . . . . . . . . . . . push button
Power control . . . . . . . . . . . . . . . . . . . . . . power switch on the back
Status indicator . . . . . . . . . . . . . . . . . . . . . green LED
Hard-disk drive activity indicator . . . . . . . . green LED
Power indicator . . . . . . . . . . . . . . . . . . . . . green LED
Activity indicator (on NIC connector). . . . . yellow LED
3RZHUꢁ
DC power supply:
Wattage . . . . . . . . . . . . . . . . . . . . . . . 240 W
Heat dissipation . . . . . . . . . . . . . . . . . 1025 BTUs
Voltage. . . . . . . . . . . . . . . . . . . . . . . . 90 to 250 V AC single phase
Current. . . . . . . . . . . . . . . . . . . . . . . . 4 A at 90 V AC (rated)
Frequency . . . . . . . . . . . . . . . . . . . . . 47 to 63 Hz
NOTE: For the full name of an abbreviation or acronym used in this table, see the Glossary.
A-2 Dell PowerVault 720N, 740N, and 760N Users Guide
7DEOHꢀ$ꢁꢃꢄꢀꢀ7HFKQLFDOꢀ6SHFLILFDWLRQVꢀꢁFRQWLQXHGꢂ
3K\VLFDO
Height . . . . . . . . . . . . . . . . . . . . . . . . . . . 22.23 cm (8.75 inches)
Width. . . . . . . . . . . . . . . . . . . . . . . . . . . . 43.18 cm (17.0 inches)
Depth. . . . . . . . . . . . . . . . . . . . . . . . . . . . 64.14 cm (25.25 inches)
Weight . . . . . . . . . . . . . . . . . . . . . . . . . . 28.8 kg (64.0 lb)
(QYLURQPHQWDO
Temperature:
Operating . . . . . . . . . . . . . . . . . . . . . 10° to 40°C (50° to 95°F)
Storage. . . . . . . . . . . . . . . . . . . . . . . -20° to 65°C (4° to 149°F)
Relative humidity:
Operating . . . . . . . . . . . . . . . . . . . . . 10% to 90% (noncondensing)
Storage. . . . . . . . . . . . . . . . . . . . . . . 10% to 90% (noncondensing) in original
shipping container; 50% otherwise
Altitude:
Operating . . . . . . . . . . . . . . . . . . . . . 16 to 3077 m (50 to 10,000 ft) at 37° C
Storage. . . . . . . . . . . . . . . . . . . . . . . 16 to 7625 m (50 to 25,000 ft)
NOTE: For the full name of an abbreviation or acronym used in this table, see the Glossary.
Technical Specifications A-3
A-4 Dell PowerVault 720N, 740N, and 760N Users Guide
$ 3 3 ( 1 ' , ; ꢁ %
,QVWDOOLQJꢀ3RZHU9DXOWꢀ)LOHUꢀ
6RIWZDUH
3RZHU9DXOWꢀ)LOHUꢀ6RIWZDUHꢀ,QVWDOODWLRQ
:KDWꢀ7KLVꢀ$SSHQGL[ꢀ&RQWDLQV
This appendix contains information for:
Booting from bootable system diskettes
Installing Data ONTAP 5.3 software
Changing to CIFS-compatible security styles
Creating bootable system diskettes
Creating a Diagnostics diskette
,QVWDOOLQJꢀWKHꢀ2SHUDWLQJꢀ6\VWHP
To perform the installation, you must have access to either of the following clients,
which must have write permission to the filers root directory:
x
a system running a Microsoft Windows 9 or Windows NT 4.0, and a CD-ROM
drive
a UNIX workstation running NFS Client version 2 or 3, and a CD-ROM drive
You must be able to log into the filer as Administrator and have access to the filers
system console.
%RRWLQJꢀ)URPꢀ%RRWDEOHꢀ6\VWHPꢀ'LVNHWWHV
%RRWLQJꢀ)URPꢀ'LVNHWWH
To boot the filer, complete the following steps:
System Boot Diskette 1
1. Insert the diskette labeled
into the filers diskette drive.
Installing PowerVault Filer Software B-1
2. Ensure the filer is running.
3. At the system console, enter:
reboot
The filer displays the following boot menu:
ꢇꢈꢀ1RUPDOꢀ%RRW
ꢉꢈꢀ%RRWꢀZLWKRXWꢀꢂHWFꢂUF
ꢊꢈꢀ&KDQJHꢀ3DVVZRUG
ꢋꢈꢀ,QLWLDOL]HꢀDOOꢀGLVNV
ꢌꢈꢀ0DLQWHQDQFHꢀPRGHꢀERRW
6HOHFWLRQꢀꢍꢇꢆꢌꢈ"
4. Choose one of the boot types shown below by entering the corresponding
number:
Normal Boot (1) Use Normal Boot to run the filer normally, but
from a diskette.
Boot without /etc/rc (2) Use Boot without /etc/rc to troubleshoot
and repair configuration problems.
NOTE: Booting without
causes the filer to use only default options
, and disabling
/etc/rc
/etc/rc
settings, disregarding all the options settings you put in
some services, such as
.
syslog
Change Password (3) Use Change Password to reset your filers adminis-
trative password.
Initialize all disks (4) Use Initialize all disks to zero all disks attached to the
filer.
NOTE: This action will result in a loss of all data on the disks.
Maintenance mode boot (5) Use Maintenance mode boot to go into
Maintenance mode and perform some volume and disk operations and get
detailed volume and disk information. Maintenance mode is special for the
following reasons:
Most normal functions, including file/system operations, are disabled.
A limited set of commands is available for diagnosing and repairing disk
and volume problems.
You exit Maintenance mode with the haltcommand.
5. Remove the system boot diskette and store it.
B-2 Dell PowerVault 720N, 740N, and 760N Users Guide
,QVWDOOLQJꢀ'DWDꢀ217$3ꢀꢈꢄꢆꢀ6RIWZDUH
,QVWDOODWLRQꢀ)URPꢀDꢀ:LQGRZVꢀ&OLHQW
From a Windows NT or Windows 9x client, you must install the files from the CD to
the filer by performing the following steps.
NOTE: CIFS must be licensed and configured on the filer. To register the CIFS license,
enter the following commands from the filer console:
filer>license cifs=<license number>
where <license number>is the provided CIFS license.
filer>cifs setup
To access the system files from the CD and install them on the filer, perform the fol-
lowing steps:
1. As the Domain Administrator from a Windows client, right-click My Computer
and click Map Network Drive.
2. In the Map Drive dialog box that appears, select an unused drive letter.
3. In the Path field of the dialog box, enter a path similar to the following example:
//filer/c
$
filer
c$
is the name assigned to the hidden
where
is the name of the filer, and
share of its root directory.
Do not change the Connect As field.
4. Insert the CD in the CD-ROM drive, and from the root directory of the CD, run the
setup.bat
file to begin the installation process.
5. After viewing the Welcome screen and the software license agreement screen,
specify a destination folder (this folder is the mapped, root-level directory of the
filer).
You must accept the license agreement to continue with this procedure.
The Browse option allows this mapping to be specified.
6. Select the appropriate setup installation method.
Typical installs Data ONTAP 5.3 operating system and local help files.
Compact installs Data ONTAP 5.3.
Custom allows you to select from the available components and install.
7. Once the files have been copied to the filer, enterdownloadat the filers console
to complete the installation.
The filer can now be rebooted; no boot diskettes are needed.
Installing PowerVault Filer Software B-3
,QVWDOODWLRQꢀ)URPꢀDꢀ81,;ꢀ&OLHQW
From a UNIX client running NFS Client version 2 or 3, you must install the files from
the CD to the filer by performing the following steps.
NOTE: An NFS license must be purchased and registered on the filer to proceed. To
register the NFS license, enter the following command from the filer console:
filer>license nfs=<license number>
where <license number>is the provided NFS license.
To access the system files from the CD and install them on the filer, perform the fol-
lowing steps:
1. Mount the filers root file system to a directory on the client. For example, enter:
mount filer:/ /mnt
/mnt
where
file system.
is the directory on the client where you want to mount the filers root
2. Change the directory to a local temporary directory on the client system. For
example, enter:
FGꢀ/tmp
/tmp
where
is a local temporary directory on the client.
3. Insert the CD into the CD-ROM drive and extract the files, specifying the input
file, output file, and block size. For example, enter:
tar xvf /CD-ROM_MNT_PT/ontap/5_3/alpha/sysfiles.tar
CD-ROM_MNT_PT
where
is the name of your CD mount point.
Result: The tarcommand reports the names of the files that are copied
tar_image.Z
(
dell_filer_install
and
).
dell_filer_install
4. Run the
script with an argument that tells the script where to
install the files; this is the mount point for the filers root directory. You can keep
or delete the tarfiles.
To delete the tarfiles, enter:
./dell_filer_install /mnt
To keep the tarfiles, enter:
./dell_filer_install -k /mnt
/mnt
where
is the directory on the client where you mounted the filers root file
system.
Result: The install script decompresses and extracts files.
5. From the client system, unmount the filers root file system (/) by entering the fol-
lowing commands:
B-4 Dell PowerVault 720N, 740N, and 760N Users Guide
cd /
umount /mnt
/mnt
where
is the directory on the client where you mounted the filers root file
system.
6. At the filer console, enter download to complete the installation.
&KDQJLQJꢀWRꢀ&,)6ꢁ&RPSDWLEOHꢀ6HFXULW\ꢀ
6W\OHV
Every volume and qtree has a default security style of UNIX, which permits only
UNIX-style permissions.
6HFXULW\ꢀ6W\OHV
To enable NTFS-style file security on one or more volumes, you can change the
security style of the volumes you want to one of the following styles:
Mixed allows both UNIX-style and Windows NT-style permissions.
NTFS allows only Windows NT-style permissions.
NOTE: If you have only one volume, that volume is also the root volume.
&KDQJLQJꢀWKHꢀ5RRWꢀ9ROXPHꢀ6HFXULW\ꢀ6W\OH
To change the security style of the root volume to mixed, use the following command:
qtree security /vol/vol0/ mixed
/vol/vol0
, and you must put a slash after the
The default name of the root volume is
name of the root volume.
For additional information about security styles, volumes, and qtrees, refer to your
System Administrator and Command Reference Guide
.
&UHDWLQJꢀ%RRWDEOHꢀ6\VWHPꢀ'LVNHWWHV
2YHUYLHZꢀRIꢀ&UHDWLQJꢀ%RRWDEOHꢀ6\VWHPꢀ'LVNHWWHV
You can create the bootable system diskettes from the CD. Refer to the appropriate
procedure that follows depending on whether you are working from a Windows client
or a UNIX client to administer your filer.
Installing PowerVault Filer Software B-5
&UHDWLQJꢀ%RRWDEOHꢀ6\VWHPꢀ'LVNHWWHVꢀRQꢀDꢀ:LQGRZVꢀ&OLHQW
To create the boot diskette from a Windows client system, perform the following
steps:
1. Use the RaWrite utility to extract the system boot diskette software and copy it
to the diskette.
If you do not already have this utility on your system, it is on the CD in the
drive>:\utils\Rawrite
drive
is the CD-ROM drive.
<
directory where
2. Insert a blank, write-enabled diskette into the diskette drive. Label the diskette
"System Boot Diskette 1, Data ONTAP 5.3."
Rawrite.exe
3. Open the RaWrite folder and double-click the
file.
The RaWrite utility starts and prompts you for an image source file.
4. Enter the name used for the image file (for example, boot1 for boot diskette 1 or
boot2 for boot diskette 2).
The utility prompts you for a target diskette drive.
5. Enter the drive letter for the formatted diskette that will be the system boot
diskette.
The status of the operation is displayed in messages. When the operation is
done, continue to the next step.
6. Remove the diskette from the drive and write-protect the diskette.
7. Repeat this procedure for the second system boot diskette and label it "System
Boot Diskette 2, Data ONTAP 5.3."
&UHDWLQJꢀ%RRWDEOHꢀ6\VWHPꢀ'LVNHWWHVꢀRQꢀDꢀ81,;ꢀ&OLHQW
To create the boot diskette from a UNIX client, perform the following steps:
/mnt/ontap/5_3/alpha/
/mnt/ontap/5_3/alpha/boot2
in the CD, where /mntis the directory on the
Replace the variable filename with the name of the image to be
boot1
and
client where you mounted the CD-ROM drive.
If the diskette drive in your administration client is not named /dev/fd0, replace
/dev/fd0with the name of your diskette drive by performing the following steps:
1. Insert a blank, write-enabled diskette into the diskette drive on the administration
client system. Label the diskette "System Boot Diskette 1, Data ONTAP 5.3."
2. Copy the boot diskette 1 image to the diskette using the ddcommand. For
example,
dd if=filename of=/dev/fd0 bs=512
3. Remove the diskette from the drive and write-protect the diskette.
4. Repeat this procedure for the second system boot diskette and label it "System
Boot Diskette 2, Data ONTAP 5.3."
B-6 Dell PowerVault 720N, 740N, and 760N Users Guide
&UHDWLQJꢀDꢀ'LDJQRVWLFVꢀ'LVNHWWH
&UHDWLQJꢀ'LVNHWWHVꢀ)URPꢀ'LVNHWWHꢀ,PDJHꢀ)LOHV
This section describes how to make a Diagnostics boot diskette from a diskette image
file supplied on the CD for a Windows client system or a DOS shell window or a UNIX
client.
&UHDWLQJꢀDꢀ'LDJQRVWLFVꢀ'LVNHWWHꢀRQꢀDꢀ:LQGRZVꢀ&OLHQWꢀ
6\VWHP
To create the diagnostics diskette from a Windows client system or a DOS shell win-
dow, perform the following steps:
1. Use the RaWrite utility to extract the diagnostics boot diskette software and copy
it to the diskette.
If you do not already have this utility on your system, it is on the CD in the
drive>:\utils\Rawrite
<
drive
is the CD-ROM drive.
directory where
2. Insert the CD in the Windows client system CD-ROM drive.
3. Insert a blank, write-enabled diskette into the Windows client diskette drive.
Label the diskette "System Diagnostics Diskette".
Rawrite.exe
4. Open the RaWrite folder and double-click the
file.
The RaWrite utility starts and prompts you for an image source file.
5. Enter the name used for the image file (for example, boot1 for boot diskette 1 or
boot2 for boot diskette 2).
The utility prompts you for a target diskette drive.
6. Enter the drive letter for the formatted diskette that will be the system diagnos-
tics diskette.
The status of the operation is displayed. When the operation is done, continue to
the next step.
7. Remove the diskette from the drive and write-protect the diskette.
&UHDWLQJꢀDꢀ'LDJQRVWLFVꢀ'LVNHWWHꢀRQꢀDꢀ81,;ꢀ&OLHQW
To create the diagnostics diskette from a UNIX client, perform the following steps:
1. Insert the CD in the UNIX client CD-ROM drive.
2. Mount the CD (some UNIX clients do this automatically when the CD is inserted
into the drive; others require that you use the mountcommand).
3. Insert a blank, write-enabled diskette into the UNIX client diskette drive (in this
cdrom
procedure, it is assumed that the CD is mounted at / ). Label the diskette
"System Diagnostics Diskette" and include the filer name and model on this label.
4. Copy the boot diskette 1 image to the diskette using the GG command. For
example,
Installing PowerVault Filer Software B-7
dd if=cdrom/ontap/5_3/alpha/diag_1_6 of=/dev/fd0 bs=512
/dev/fd0 /dev/fd0
.
Replace
with the device name of your diskette drive if it is not
5. Remove the diskette from the drive and write-protect the diskette.
B-8 Dell PowerVault 720N, 740N, and 760N Users Guide
$ 3 3 ( 1 ' , ; ꢁ &
3UHSDULQJꢀIRUꢀ&,)6ꢀ&RQILJXUDWLRQ
&,)6ꢀ,QIRUPDWLRQꢀ1HHGHG
$ERXWꢀ7KLVꢀ$SSHQGL[
This appendix contains information to help you understand the following CIFS config-
uration issues:
Deciding on a domain or workgroup configuration
Choosing between PC-style or UNIX-style permissions
Adding the filer to a Windows NT domain
'HFLGLQJꢀRQꢀDꢀ'RPDLQꢀRUꢀ:RUNJURXSꢀ
&RQILJXUDWLRQ
$ERXWꢀ7KLVꢀ6HFWLRQ
You can install the filer into a Windows NT domain or Windows workgroup. Use the
information in this section to help you decide which to choose.
&$87,21ꢀꢁ,WꢁLVꢁGLIILFXOWꢁWRꢁFKDQJHꢁWKLVꢁGHFLVLRQꢁDIWHUꢁ\RXꢁUXQꢁsetupꢃ
'HILQLWLRQꢀRIꢀDꢀ'RPDLQ
A domain:
Is a collection of Windows NT computers that share a common directory data-
base defined by a Windows NT server administrator
Has a unique domain name
Provides access to centralized user and group accounts
Enables centralized administration of user and group accounts
Preparing for CIFS Configuration C-1
'HILQLWLRQꢀRIꢀDꢀ:RUNJURXS
A workgroup:
Is a collection of Windows NT computers
Has a unique workgroup name
Is grouped for viewing purposes
Does not provide access to centralized user and group accounts
Does not enable centralized administration of user and group accounts
:KHQꢀWRꢀ,QVWDOOꢀ,QWRꢀDꢀ:LQGRZVꢀ17ꢀ'RPDLQ
Install the filer into a Windows NT domain:
If you want centralized administration using a Windows NT domain
If you want to integrate the filer into the Windows NT domain topology
If you want user authentication to be handled by Windows NT domain controllers
&$87,21ꢀꢁ<RXUꢁQHWZRUNꢁPXVWꢁKDYHꢁDWꢁOHDVWꢁRQHꢁ:LQGRZVꢁ17ꢁGRPDLQꢁFRQꢄ
WUROOHUꢁWRꢁLQVWDOOꢁWKHꢁILOHUꢁLQWRꢁDꢁ:LQGRZVꢁ17ꢁGRPDLQꢃ
:KHQꢀWRꢀ,QVWDOOꢀ,QWRꢀDꢀ:LQGRZVꢀ:RUNJURXS
Install the filer into a Windows workgroup:
If you do not want centralized administration through a Windows NT domain
/etc/passwd
If you want UNIX-style authentication using an
file or NIS
&$87,21ꢀꢁ,Iꢁ\RXꢁLQVWDOOꢁWKHꢁILOHUꢁLQWRꢁDꢁ:LQGRZVꢁZRUNJURXSꢂꢁLWꢁLVꢁQRWꢁFRPꢄ
SDWLEOHꢁZLWKꢁFOLHQWVꢁWKDWꢁKDYHꢁ:LQGRZVꢁ17ꢁꢇꢃꢈꢁ6HUYLFHꢁ3DFNꢁꢉꢁRUꢁKLJKHUꢁRUꢁ
:LQGRZV ꢊ[ꢁFOLHQWVꢁZLWKꢁ0LFURVRIWꢁ'LVWULEXWHGꢁ)LOHꢁ6\VWHPꢁꢋ')6ꢌꢁꢇꢃꢍꢁ
LQVWDOOHGꢃꢁ&OLHQWVꢁFDQꢁEHꢁPDGHꢁFRPSDWLEOHꢁE\ꢁDGGLQJꢁDꢁUHJLVWU\ꢁHQWU\ꢁWRꢁ
UHHQDEOHꢁSODLQꢄWH[WꢁSDVVZRUGVꢃ
7RꢁUHHQDEOHꢁSODLQꢄWH[WꢁSDVVZRUGVꢁRQꢁDꢁ:LQGRZVꢁ17ꢁFOLHQWꢂꢁFRQVXOWꢁWKHꢁ
0LFURVRIWꢁ.QRZOHGJHꢁ%DVHꢁRQꢁWKHꢁ:HEꢁDWꢁKWWSꢏꢎꢎZZZꢄPLFURVRIWꢄFRPꢎNEꢎ
GHIDXOWꢄDVSꢎꢁUHIHUꢁWRꢁDUWLFOHꢁ4ꢍꢏꢏꢐꢉꢈꢂꢁꢑ:LWKꢁ8QHQFU\SWHGꢁ3DVVZRUGꢁ63ꢉꢁ
)DLOVꢁWRꢁ&RQQHFWꢁWRꢁ60%ꢁ6HUYHUꢃꢑ
7RꢁUHHQDEOHꢁSODLQꢄWH[WꢁSDVVZRUGVꢁRQꢁDꢁ:LQGRZVꢁꢊ[ꢁFOLHQWꢂꢁFRQVXOWꢁWKHꢁIROꢄ
ORZLQJꢁILOHꢁLQꢁWKHꢁ0LFURVRIWꢁ.QRZOHGJHꢁ%DVHꢁRQꢁWKHꢁ:HEꢀ
KWWSꢏꢎꢎZZZꢄPLFURVRIWꢄFRPꢎQWVHUYHUꢎGIVꢎUHDGPHꢄDVSꢃ
6XPPDU\ꢀRIꢀ'RPDLQꢀDQGꢀ:RUNJURXSꢀ)HDWXUHV
Table C-1 shows which authentication features are available to domains and which are
available to workgroups.
C-2 Dell PowerVault 720N, 740N, and 760N Users Guide
7DEOHꢀ&ꢁꢃꢄꢀꢀ'RPDLQꢀDQGꢀ:RUNJURXSꢀ)HDWXUHV
)HDWXUH
'RPDLQ
:RUNJURXS
Compatible with Windows NT 4.0 Service
Pack 3 or higher (encryption).
Y
N
Compatible with Windows NT 4.0 Service
Pack 3 or higher (message signing).
N
N
Support for Windows NT-only users.
Encrypted password sent to filer.
Y
Y
Y
N
N
Y
/etc/passwd
/etc/group
files on the filer
and
determine User Identification numbers
(UIDs) and Group Identification numbers
(GIDs) for multiprotocol.
/etc/passwd
passwords.
file on the filer contains users
N
Y
Single login.
Y
Y
N
Change password remotely.
Y (only with
NIS)
Multiple net segments.
Y
N
&KRRVLQJꢀ%HWZHHQꢀ3&ꢁ6W\OHꢀRUꢀ81,;ꢁ6W\OHꢀ
3HUPLVVLRQV
$ERXWꢀ7KLVꢀ6HFWLRQ
When you configure the CIFS protocol, you must choose whether the filer uses PC-
style or UNIX-style permissions.
NOTE: If you are setting up a filer in a Windows NT-only environment, you can skip
this section.
This section provides a brief overview of PC-style and UNIX-style permissions and
provides guidelines for choosing which style to use. PC-style permissions are similar
to FAT (File Allocation Table); they maintain security with share level ACLs (Access
Control Lists).
In addition, PC-style permissions also allow you to further restrict file security using
file permissions. UNIX-style permissions do not use share level ACLs. Therefore,
using PC-style permissions only affects PC access to files with UNIX security.
Preparing for CIFS Configuration C-3
+RZꢀ3&ꢁ6W\OHꢀ3HUPLVVLRQVꢀ:RUN
PC-style permissions are determined by the rights assigned in a shares ACL and are
limited by the UNIX permissions assigned to a file. To write to a file when PC-style
permissions are in effect, a user must meet the following criteria:
The user must have write permission for the file in the ACL.
The user must have write permission for the file according to the UNIX-style per-
missions associated with the file.
If the user is the owner of the file, the filer uses the UNIX-style permissions set
for the owner of the file. If the user is not the owner of the file, the filer uses the
UNIX-style permissions set for the UNIX group associated with the file. Note that
the UNIX "other" permissions are not used.
:KHQꢀWRꢀ&KRRVHꢀ3&ꢁ6W\OHꢀ3HUPLVVLRQV
Choose PC-style permissions if you need file access to be controlled by ACLs.
+RZꢀ81,;ꢁ6W\OHꢀ3HUPLVVLRQVꢀ:RUN
UNIX-style permissions are determined by the rights associated with the UNIX UID
and GID and are limited by the ACL permissions assigned to a file. To write to a file
when UNIX-style permissions are in effect, a user must meet the following criteria:
If the user is the owner of the file, the write permission for the users UID must
be set.
If the user is not the owner of the file, he or she must be a member of the group
(GID) associated with the file and the write permission for the groups GID must
be set.
The user must have write permission for the file in the ACL.
:KHQꢀWRꢀ&KRRVHꢀ81,;ꢁ6W\OHꢀ3HUPLVVLRQV
Choose UNIX-style permissions if you want to implement simple security and need
access to be controlled using exact UNIX rules.
NOTE: If you choose UNIX-style permissions, set the share ACL permission to
rwx
for . With this setting, the UNIX rights work just as they do on a UNIX
everyone
system.
$GGLQJꢀWKHꢀ)LOHUꢀWRꢀDꢀ:LQGRZVꢀ17ꢀ'RPDLQ
$ERXWꢀ7KLVꢀ6HFWLRQ
Use the information in this section to add the filer to a Windows NT domain before
you configure the filer.
C-4 Dell PowerVault 720N, 740N, and 760N Users Guide
NOTE: This section presents one method of adding the filer to a Windows NT domain.
For alternative ways of adding the filer to a Windows NT domain, consult the
Microsoft Knowledge Base on the Web at
http://www.microsoft.com/kb/
and refer to article Q140387, "Batch File Adds/Removes Machine
default.asp
Accounts in Server Manager."
3UHUHTXLVLWHV
&$87,21ꢀꢁ,WꢁLVꢁGLIILFXOWꢁWRꢁFKDQJHꢁWKHꢁGHFLVLRQꢁWRꢁDGGꢁWKHꢁILOHUꢁWRꢁDꢁ:LQGRZVꢁ
17ꢁGRPDLQꢁDIWHUꢁ\RXꢁKDYHꢁUXQꢁsetupꢃ
To add the filer to a Windows NT domain, you must meet the following prerequisites:
You must have a permanent Windows NT domain.
You must have the "add workstation to domain" privilege.
You must be able to connect to the Primary Domain Controller (PDC).
3URFHGXUH
To add the filer to a Windows NT domain, perform the following steps:
1. Log in as Administrator at a Windows NT server that is a member of the Win-
dows NT domain into which you are adding the filer.
2. Run Server Manager.
3. From the Computer menu, select Add to Domain.
The Add Computer To Domain window appears.
4. Click the Windows NT Workstation or Server option button.
5. Enter the name of the filer.
The filer name can have up to 15 of the following characters:
letters (AZ), numerals (09), !, #, $, @, %, , (, ), -, ^, _, {, }, and ~
6. Click Add.
5HVXOWV
The filer was added to the Windows NT domain.
&$87,21ꢀꢁ'RꢁQRWꢁXVHꢁWKLVꢁDFFRXQWꢁXQWLOꢁ\RXꢁILQLVKꢁFRQILJXULQJꢁWKHꢁILOHUꢃ
Preparing for CIFS Configuration C-5
C-6 Dell PowerVault 720N, 740N, and 760N Users Guide
$ 3 3 ( 1 ' , ; ꢁ '
7LPHꢀ=RQHV
7LPHꢀ=RQHꢀ6HOHFWLRQ
$ERXWꢀ7KLVꢀ6HFWLRQ
You must enter one of the following time zones when setupprompts for a time
zone.
$IULFD
Africa/Abidjan
Africa/Algiers
Africa/Bangui
Africa/Blantyre
Africa/Cairo
Africa/Accra
Africa/Asmera
Africa/Banjul
Africa/Addis_Ababa
Africa/Bamako
Africa/Bissau
Africa/Bujumbura
Africa/Conakry
Africa/Djibouti
Africa/Gaborone
Africa/Kampala
Africa/Kinshasa
Africa/Lome
Africa/Brazzaville
Africa/Casablanca
Africa/Dar_es_Salaam
Africa/Freetown
Africa/Johannesburg
Africa/Kigali
Africa/Libreville
Africa/Lumumbashi
Africa/Maputo
Africa/Mogadishu
Africa/Ndjamena
Africa/Ouagadougou
Africa/Timbuktu
Africa/Windhoek
Africa/Dakar
Africa/Douala
Africa/Harare
Africa/Khartoum
Africa/Lagos
Africa/Luanda
Africa/Malabo
Africa/Mbabane
Africa/Nairobi
Africa/Nouakchott
Africa/Sao_Tome
Africa/Tunis
Africa/Lusaka
Africa/Maseru
Africa/Monrovia
Africa/Niamey
Africa/Porto-Novo
Africa/Tripoli
$PHULFD
America/Adak
America/Antigua
America/Atka
America/Bogota
America/Caracas
America/Cayman
America/Costa_Rica
America/Anchorage
America/Aruba
America/Barbados
America/Boise
America/Catamarca
America/Chicago
America/Cuiaba
America/Anguilla
America/Asuncion
America/Belize
America/Buenos_Aires
America/Cayenne
America/Cordoba
America/Curacao
Time Zones D-1
America/Dawson
America/Detroit
America/Dawson_Creek America/Denver
America/Dominica
America/Ensenada
America/Glace_Bay
America/Grand_Turk
America/Guatemala
America/Halifax
America/Edmonton
America/Fort_Wayne
America/Godthab
America/Grenada
America/Guayaquil
America/Havana
America/El_Salvador
America/Fortaleza
America/Goose_Bay
America/Guadeloupe
America/Guyana
America/Indiana
America/Iqaluit
America/Indianapolis
America/Jamaica
America/Inuvik
America/Jujuy
America/Juneau
America/Knox_IN
America/La_Paz
America/Lima
America/Maceio
America/Martinique
America/Menominee
America/Montevideo
America/Nassau
America/Los_Angeles
America/Managua
America/Mazatlan
America/Mexico_City
America/Montreal
America/New_York
America/Noronha
America/Paramaribo
America/Port-au-Prince
America/Rainy_River
America/Rosario
America/Louisville
America/Manaus
America/Mendoza
America/Miquelon
America/Montserrat
America/Nipigon
America/Panama
America/Phoenix
America/Porto_Acre
America/Rankin_Inlet
America/Santiago
America/Scoresbysund
America/St_Kitts
America/St_Vincent
America/Thule
America/Nome
America/Pangnirtung
America/Port_of_Spain
America/Puerto_Rico
America/Regina
America/Santo_Domingo America/Sao_Paulo
America/Shiprock
America/St_Johns
America/St_Thomas
America/Tegucigalpa
America/Tijuana
America/Virgin
America/Yakutat
America/St_Lucia
America/Swift_Current
America/Thunder_Bay
America/Vancouver
America/Winnipeg
America/Tortola
America/Whitehorse
America/Yellowknife
$QWDUFWLFD
Antarctica/Casey
Antarctica/DumontDUrville Antarctica/Mawson
Antarctica/McMurdo
Antarctica/Palmer
Antarctica/South_Pole
$VLD
Asia/Aden
Asia/Alma-Ata
Asia/Aqtau
Asia/Baghdad
Asia/Bangkok
Asia/Brunei
Asia/Colombo
Asia/Dubai
Asia/Harbin
Asia/Ishigaki
Asia/Jayapura
Asia/Kamchatka
Asia/Katmandu
Asia/Kuching
Asia/Magadan
Asia/Amman
Asia/Aqtobe
Asia/Bahrain
Asia/Beirut
Asia/Calcutta
Asia/Dacca
Asia/Dushanbe
Asia/Hong_Kong
Asia/Istanbul
Asia/Jerusalem
Asia/Karachi
Asia/Krasnoyarsk
Asia/Kuwait
Asia/Anadyr
Asia/Ashkhabad
Asia/Baku
Asia/Bishkek
Asia/Chungking
Asia/Damascus
Asia/Gaza
Asia/Irkutsk
Asia/Jakarta
Asia/Kabul
Asia/Kashgar
Asia/Kuala_Lumpur
Asia/Macao
Asia/Manila
D-2 Dell PowerVault 720N, 740N, and 760N Users Guide
Asia/Muscat
Asia/Omsk
Asia/Qatar
Asia/Saigon
Asia/Singapore
Asia/Tbilisi
Asia/Thimbu
Asia/Ulan_Bator
Asia/Vladivostok
Asia/Yerevan
Asia/Nicosia
Asia/Phnom_Penh
Asia/Rangoon
Asia/Seoul
Asia/Taipei
Asia/Tehran
Asia/Tokyo
Asia/Novosibirsk
Asia/Pyongyang
Asia/Riyadh
Asia/Shanghai
Asia/Tashkent
Asia/Tel_Aviv
Asia/Ujung_Pandang
Asia/Vientiane
Asia/Yekaterinburg
Asia/Urumqi
Asia/Yakutsk
$WODQWLF
Atlantic/Azores
Atlantic/Bermuda
Atlantic/Faeroe
Atlantic/Reykjavik
Atlantic/Stanley
Atlantic/Canary
Atlantic/Jan_Mayen
Atlantic/South_Georgia
Atlantic/Cape_Verde
Atlantic/Madeira
Atlantic/St_Helena
$XVWUDOLDꢀ
Australia/ACT
Australia/Adelaide
Australia/Canberra
Australia/LHI
Australia/Melbourne
Australia/Perth
Australia/Brisbane
Australia/Darwin
Australia/Lindeman
Australia/NSW
Australia/Queensland
Australia/Tasmania
Australia/Yancowinna
Australia/Broken_Hill
Australia/Hobart
Australia/Lord Howe
Australia/North
Australia/South
Australia/Victoria
Australia/Sydney
Australia/West
%UD]LO
Brazil/Acre
Brazil/West
Brazil/DeNoronha
Brazil/East
&DQDGD
Canada/Atlantic
Canada/Central
Canada/East-
Saskatchewan
Canada/Eastern
Canada/Pacific
Canada/Mountain
Canada/Saskatchewan
Canada/Newfoundland
Canada/Yukon
&KLOH
Chile/Continental
Chile/EasterIsland
Time Zones D-3
(WF
Etc/GMT
Etc/GMT+0
Etc/GMT+3
Etc/GMT+6
Etc/GMT+9
Etc/GMT+12
Etc/GMT-1
Etc/GMT-4
Etc/GMT-7
Etc/GMT-10
Etc/GMT-13
Etc/UCT
Etc/GMT+1
Etc/GMT+4
Etc/GMT+7
Etc/GMT+10
Etc/GMT0
Etc/GMT-2
Etc/GMT-5
Etc/GMT-8
Etc/GMT-11
Etc/GMT-14
Etc/Universal
Etc/GMT+2
Etc/GMT+5
Etc/GMT+8
Etc/GMT+11
Etc/GMT-0
Etc/GMT-3
Etc/GMT-6
Etc/GMT-9
Etc/GMT-12
Etc/Greenwich
Etc/UTC
Etc/Zulu
(XURSH
Europe/Amsterdam
Europe/Belfast
Europe/Bratislava
Europe/Budapest
Europe/Dublin
Europe/Istanbul
Europe/Lisbon
Europe/Luxembourg
Europe/Minsk
Europe/Oslo
Europe/Riga
Europe/Sarajevo
Europe/Sofia
Europe/Tirane
Europe/Vienna
Europe/Zagreb
Europe/Andorra
Europe/Belgrade
Europe/Brussels
Europe/Chisinau
Europe/Gibraltar
Europe/Kiev
Europe/Ljubljana
Europe/Madrid
Europe/Monaco
Europe/Paris
Europe/Athens
Europe/Berlin
Europe/Bucharest
Europe/Copenhagen
Europe/Helsinki
Europe/Kuybyshev
Europe/London
Europe/Malta
Europe/Moscow
Europe/Prague
Europe/San_Marino
Europe/Skopje
Europe/Rome
Europe/Simferopol
Europe/Stockholm
Europe/Vaduz
Europe/Vilnius
Europe/Zurich
Europe/Tallinn
Europe/Vatican
Europe/Warsaw
*07
GMT
GMT+1
GMT+4
GMT+7
GMT+10
GMT+13
GMT-3
GMT-6
GMT-9
GMT-12
GMT+2
GMT+5
GMT+8
GMT+11
GMT-1
GMT-4
GMT-7
GMT-10
GMT+3
GMT+6
GMT+9
GMT+12
GMT-2
GMT-5
GMT-8
GMT-11
D-4 Dell PowerVault 720N, 740N, and 760N Users Guide
,QGLDQꢀꢐ,QGLDQꢀ2FHDQꢑ
Indian/Antananarivo
Indian/Cocos
Indian/Mahe
Indian/Chagos
Indian/Christmas
Indian/Kerguelen
Indian/Mauritius
Indian/Comoro
Indian/Maldives
Indian/Reunion
Indian/Mayotte
0H[LFR
Mexico/BajaNorte
Mexico/BajaSur
Mexico/General
0LVFHOODQHRXV
Arctic/Longyearbyen
Cuba
Eire
Factory
Greenwich
Iceland
Jamaica
Libya
CET
EET
EST
GB
Hongkong
Iran
Japan
MET
CST6CDT
Egypt
EST5EDT
GB-Eire
HST
Israel
Kwajalein
MST
MST7MDT
NZ-CHAT
PRC
ROK
UCT
Navajo
Poland
PST8PDT
Singapore
Universal
W-SU
NZ
Portugal
ROC
Turkey
UTC
Zulu
WET
3DFLILF
Pacific/Apia
Pacific/Auckland
Pacific/Efate
Pacific/Fiji
Pacific/Chatham
Pacific/Enderbury
Pacific/Funafuti
Pacific/Guadalcanal
Pacific/Johnston
Pacific/Kwajalein
Pacific/Midway
Pacific/Norfolk
Pacific/Palau
Pacific/Port_Moresby
Pacific/Samoa
Pacific/Tongatapu
Pacific/Wallis
Pacific/Easter
Pacific/Fakaofo
Pacific/Galapagos
Pacific/Guam
Pacific/Kiritimati
Pacific/Majuro
Pacific/Nauru
Pacific/Noumea
Pacific/Pitcairn
Pacific/Rarotonga
Pacific/Tahiti
Pacific/Gambier
Pacific/Honolulu
Pacific/Kosrae
Pacific/Marquesas
Pacific/Niue
Pacific/Pago_Pago
Pacific/Ponape
Pacific/Saipan
Pacific/Tarawa
Pacific/Wake
Pacific/Truk
Pacific/Yap
Time Zones D-5
6\VWHPꢀ9
SystemV/AST4
SystemV/AST4ADT
SystemV/EST5
SystemV/MST7
SystemV/CST6
SystemV/CST6CDT
SystemV/HST10
SystemV/PST8
SystemV/EST5EDT
SystemV/MST7MDT
SystemV/YST9
SystemV/PST8PDT
SystemV/YST9YDT
86ꢀꢐ8QLWHGꢀ6WDWHVꢑ
US/Alaska
US/Central
US/Hawaii
US/Mountain
US/Samoa
US/Aleutian
US/Arizona
US/Eastern
US/Michigan
US/Pacific-New
US/East-Indiana
US/Indiana-Starke
US/Pacific
$OLDVHV
GMT=Greenwich, UCT, UTC, Universal, Zulu
CET=MET (Middle European Time)
US/Eastern=Jamaica
US/Mountain=Navajo
D-6 Dell PowerVault 720N, 740N, and 760N Users Guide
$ 3 3 ( 1 ' , ; ꢁ (
5HJXODWRU\ꢀ1RWLFHV
Electromagnetic Interference (EMI) is any signal or emission, radiated in free space or
conducted along power or signal leads, that endangers the functioning of a radio navi-
gation or other safety service or seriously degrades, obstructs, or repeatedly
interrupts a licensed radio communications service. Radio communications services
include but are not limited to AM/FM commercial broadcast, television, cellular ser-
vices, radar, air-traffic control, pager, and Personal Communication Services (PCS).
These licensed services, along with unintentional radiators such as digital devices,
including computer systems, contribute to the electromagnetic environment.
Electromagnetic Compatibility (EMC) is the ability of items of electronic equipment to
function properly together in the electronic environment. While this computer system
has been designed and determined to be compliant with regulatory agency limits for
EMI, there is no guarantee that interference will not occur in a particular installation. If
this equipment does cause interference with radio communications services, which
can be determined by turning the equipment off and on, you are encouraged to try to
correct the interference by one or more of the following measures:
Reorient the receiving antenna.
Relocate the computer with respect to the receiver.
Move the computer away from the receiver.
Plug the computer into a different outlet so that the computer and the receiver
are on different branch circuits.
If necessary, consult a Technical Support representative of Dell Computer Corporation
or an experienced radio/television technician for additional suggestions. You may find
FCC Interference Handbook, 1986
, to be helpful. It is available from the U.S. Gov-
the
ernment Printing Office, Washington, DC 20402, Stock No. 004-000-00450-7 or on
the World Wide Web at http://www.fcc.gov/Bureaus/Compliance/WWW/
tvibook.html.
Dell computer systems are designed, tested, and classified for their intended electro-
magnetic environment. These electromagnetic environment classifications generally
refer to the following harmonized definitions:
Class A is typically for business or industrial environments.
Class B is typically for residential environments.
Regulatory Notices E-1
Information Technology Equipment (ITE), including peripherals, expansion cards, print-
ers, input/output (I/O) devices, monitors, and so on, that are integrated into or
connected to the system should match the electromagnetic environment classifica-
tion of the computer system.
$ꢁ1RWLFHꢁ$ERXWꢁ6KLHOGHGꢁ6LJQDOꢁ&DEOHVꢀꢁ8VHꢁRQO\ꢁVKLHOGHGꢁFDEOHVꢁIRUꢁFRQꢄ
QHFWLQJꢁSHULSKHUDOVꢁWRꢁDQ\ꢁ'HOOꢁGHYLFHꢁWRꢁUHGXFHꢁWKHꢁSRVVLELOLW\ꢁRIꢁ
LQWHUIHUHQFHꢁZLWKꢁUDGLRꢁFRPPXQLFDWLRQVꢁVHUYLFHVꢃꢁ8VLQJꢁVKLHOGHGꢁFDEOHVꢁ
HQVXUHVꢁWKDWꢁ\RXꢁPDLQWDLQꢁWKHꢁDSSURSULDWHꢁ(0&ꢁFODVVLILFDWLRQꢁIRUꢁWKHꢁ
LQWHQGHGꢁHQYLURQPHQWꢃꢁ)RUꢁSDUDOOHOꢁSULQWHUVꢂꢁDꢁFDEOHꢁLVꢁDYDLODEOHꢁIURPꢁ'HOOꢁ
&RPSXWHUꢁ&RUSRUDWLRQꢃꢁ,Iꢁ\RXꢁSUHIHUꢂꢁ\RXꢁFDQꢁRUGHUꢁDꢁFDEOHꢁIURPꢁ'HOOꢁ&RPꢄ
SXWHUꢁ&RUSRUDWLRQꢁRQꢁWKHꢁ:RUOGꢁ:LGHꢁ:HEꢁDWꢁKWWSꢀꢒꢒZZZꢃGHOOꢃFRPꢒ
SURGXFWVꢒGHOOZDUHꢒLQGH[ꢃKWPꢃꢁ
$ꢁ1RWLFHꢁ$ERXWꢁ1HWZRUNHGꢁ&RPSXWHUꢁ6\VWHPVꢀꢁ6RPHꢁ'HOOꢁFRPSXWHUꢁV\VWHPVꢁ
WKDWꢁDUHꢁFODVVLILHGꢁIRUꢁ&ODVVꢁ%ꢁHQYLURQPHQWVꢁPD\ꢁLQFOXGHꢁDQꢁRQꢄERDUGꢁQHWꢄ
ZRUNꢁLQWHUIDFHꢁFRQWUROOHUꢁꢋ1,&ꢌꢃꢁ,Iꢁ\RXUꢁ&ODVVꢁ%ꢁV\VWHPꢁFRQWDLQVꢁDꢁ1,&ꢂꢁLWꢁPD\ꢁ
EHꢁFRQVLGHUHGꢁWRꢁEHꢁDꢁ&ODVVꢁ$ꢁV\VWHPꢁDWꢁWKHꢁWLPHꢁWKDWꢁWKHꢁ1,&ꢁLVꢁFRQQHFWHGꢁ
WRꢁDꢁQHWZRUNꢃꢁ:KHQꢁWKHꢁ1,&ꢁLVꢁQRWꢁFRQQHFWHGꢁWRꢁDꢁQHWZRUNꢂꢁ\RXUꢁV\VWHPꢁLVꢁ
FRQVLGHUHGꢁWRꢁEHꢁDꢁ&ODVVꢁ%ꢁGLJLWDOꢁGHYLFHꢃ
Most Dell computer systems are classified for Class B environments. To determine
the electromagnetic classification for your system or device, refer to the following
sections specific for each regulatory agency. Each section provides country-specific
EMC/EMI or product safety information.
)&&ꢀ1RWLFHVꢀꢐ8ꢄ6ꢄꢀ2QO\ꢑ
Most Dell computer systems are classified by the Federal Communications Commis-
sion (FCC) as Class B digital devices. However, the inclusion of certain optionscan
change the rating of some configurations to Class A. To determine which classification
applies to your computer system, examine all FCC registration labels located on the
bottom or back panel of your computer, on card-mounting brackets, and on the cards
themselves. If any one of the labels carries a Class A rating, your entire system is con-
all
sidered to be a Class A digital device. If labels carry an FCC Class B rating as
distinguished by either an FCC ID number or the FCC logo, (
sidered to be a Class B digital device.
), your system is con-
Once you have determined your systems FCC classification, read the appropriate
FCC notice. Note that FCC regulations provide that changes or modifications not
expressly approved by Dell Computer Corporation could void your authority to operate
this equipment.
This device complies with Part 15 of the FCC Rules. Operation is subject to the follow-
ing two conditions:
This device may not cause harmful interference.
This device must accept any interference received, including interference that
may cause undesired operation.
E-2 Dell PowerVault 720N, 740N, and 760N Users Guide
&ODVVꢀ$
This equipment has been tested and found to comply with the limits for a Class A dig-
ital device pursuant to Part 15 of the FCC Rules. These limits are designed to provide
reasonable protection against harmful interference when the equipment is operated
in a commercial environment. This equipment generates, uses, and can radiate radio
frequency energy and, if not installed and used in accordance with the manufacturers
instruction manual, may cause harmful interference with radio communications.Oper-
ation of this equipment in a residential area is likely to cause harmful interference, in
which case you will be required to correct the interference at your own expense.
&ODVVꢀ%
This equipment has been tested and found to comply with the limits for a Class B dig-
ital device pursuant to Part 15 of the FCC Rules. These limits are designed to provide
reasonable protection against harmful interference in a residential installation. This
equipment generates, uses, and can radiate radio frequency energy and, if not
installed and used in accordance with the manufacturers instruction manual, may
cause interference with radio communications. However, there is no guarantee that
interference will not occur in a particular installation. If this equipment does cause
harmful interference to radio or television reception, which can be determined by turn-
ing the equipment off and on, you are encouraged to try to correct the interference by
one or more of the following measures:
Reorient or relocate the receiving antenna.
Increase the separation between the equipment and the receiver.
Connect the equipment into an outlet on a circuit different from that to which the
receiver is connected.
Consult the dealer or an experienced radio/television technician for help.
The following information is provided on the device or devices covered in this docu-
ment in compliance with FCC regulations:
Product name: Dell PowerVault 720N, 740N, and 760N
Model number: LMM
Company name: Dell Computer Corporation
EMC Engineering Department
One Dell Way
Round Rock, Texas 78682 USA
512-338-4400
,&ꢀ1RWLFHꢀꢐ&DQDGDꢀ2QO\ꢑ
Most Dell computer systems (and other Dell digital apparatus) are classified by the
Industry Canada (IC) Interference-Causing Equipment Standard #3 (ICES-003) as
Class B digital devices. To determine which classification (Class A or B) applies to your
computer system (or other Dell digital apparatus), examine all registration labels
located on the bottom or the back panel of your computer (or other digital apparatus).
Regulatory Notices E-3
A statement in the form of IC Class A ICES-3 or IC Class B ICES-3 will be located
on one of these labels. Note that Industry Canada regulations provide that changes or
modifications not expressly approved by Dell Computer Corporation could void your
authority to operate this equipment.
This Class B (or Class A, if so indicated on the registration label) digital apparatus
meets the requirements of the Canadian Interference-Causing Equipment
Regulations.
Cet appareil numérique de la Classe B (ou Classe A, si ainsi indiqué sur létiquette
denregistration) respecte toutes les exigences du Reglement sur le Materiel
Brouilleur du Canada.
&(ꢀ1RWLFHꢀꢐ(XURSHDQꢀ8QLRQꢑꢀ
Marking by the symbol
indicates compliance of this Dell system to the EMC
Directive and the Low Voltage Directive of the European Union. Such marking is indic-
ative that this Dell system meets the following technical standards:
EN 55022 Limits and Methods of Measurement of Radio Interference Char-
acteristics of Information Technology Equipment.
EN 50082-1: 1992 Electromagnetic compatibilityGeneric immunity stan-
dard Part 1: Residential, commercial, and light industry.
EN 60950 Safety of Information Technology Equipment.
NOTE: EN 55022 emissions requirements provide for two classifications:
Class A is for typical commercial areas.
Class B is for typical domestic areas.
5)ꢁ,17(5)(5(1&(ꢁ:$51,1*ꢀꢁ7KLVꢁLVꢁDꢁ&ODVVꢁ$ꢁSURGXFWꢃꢁ,QꢁDꢁGRPHVWLFꢁHQYLꢄ
URQPHQWꢁWKLVꢁSURGXFWꢁPD\ꢁFDXVHꢁUDGLRꢁIUHTXHQF\ꢁꢋ5)ꢌꢁLQWHUIHUHQFHꢂꢁLQꢁZKLFKꢁ
FDVHꢁWKHꢁXVHUꢁPD\ꢁEHꢁUHTXLUHGꢁWRꢁWDNHꢁDGHTXDWHꢁPHDVXUHVꢃ
A Declaration of Conformity in accordance with the preceding directives and stan-
dards has been made and is on file at Dell Products Europe BV, Limerick, Ireland.
%DWWHU\ꢀ'LVSRVDO
Your computer system uses a lithium-ion battery. The lithium-ion battery is a long-life
battery, and it is very possible that you will never need to replace it. However, should
you need to replace it, refer to your service manual for instructions.
Do not dispose of the battery along with household waste. Contact your local waste
disposal agency for the address of the nearest battery deposit site.
NOTE: Your system may also include circuit cards or other components that contain
batteries. These batteries must also be disposed of in a battery deposit site. For infor-
mation about such batteries, refer to the documentation for the specific card or
component.
E-4 Dell PowerVault 720N, 740N, and 760N Users Guide
(1ꢀꢈꢈꢍꢅꢅꢀ&RPSOLDQFHꢀꢐ&]HFKꢀ5HSXEOLFꢀ
2QO\ꢑ
This device belongs to Class B devices as described in EN 55022, unless it is spe-
cifically stated that it is a Class A device on the specification label. The following
applies to devices in Class A of EN 55022 (radius of protection up to 30 meters).
The user of the device is obliged to take all steps necessary to remove sources of
interference to telecommunication or other devices.
1PLVEꢀ OFOÇꢀ OBꢀ UZQPWÃNꢀ tUJULVꢀ QPÂÇUBÂFꢀ VWFEFOPꢁꢀ xFꢀ TQBE»ꢀ EPꢀ UÒÇEZꢀ "ꢀ QPEMF
&/ ꢂꢂꢃꢄꢄꢁꢀTQBE»ꢀBVUPNBUJDLZꢀEPꢀUÒÇEZꢀ#ꢀQPEMFꢀ&/ꢀꢂꢂꢃꢄꢄꢅꢀꢀ1SPꢀ[BÒÇ[FOÇꢀ[BÒB[FO»
EPꢀUÒÇEZꢀ"ꢀ PDISBOOÃꢀꢀQ»TNPꢀꢆꢃNꢇꢀQPEMFꢀ&/ꢀꢂꢂꢃꢄꢄꢀQMBUÇꢀO»TMFEVKÇDÇꢅꢀꢀ%PKEFꢀMJꢀL
SVtFOÇꢀUFMFLPNVOJLBÂOÇDIꢀOFCPꢀKJOZDIꢀ[BÒÇ[FOÇꢁꢀKFꢀVxJWBUFMꢀQPWJOFOꢀQSPWÃTUꢀUBLPW»
PQBUÒFOÇꢁꢀBCZꢀSVtFOÇꢀPETUSBOJMꢅ
9&&,ꢀ1RWLFHꢀꢐ-DSDQꢀ2QO\ꢑ
Most Dell computer systems are classified by the Voluntary Control Council for Inter-
ference (VCCI) as Class B information technology equipment (ITE). However, the
inclusion of certain options can change the rating of some configurations to Class A.
ITE, including peripherals, expansion cards, printers, input/output (I/O) devices, moni-
tors, and so on, integrated into or connected to the system, should match the
electromagnetic environment classification (Class A or B) of the computer system.
To determine which classification applies to your computer system, examine theregu-
latory labels/markings (see Figures E-1 and E-2) located on the bottom or back panel
of your computer. Once you have determined your systems VCCI classification, read
the appropriate VCCI notice.
&ODVVꢀ$ꢀ,7(
This is a Class A product based on the standard of the Voluntary Control Council for
Interference (VCCI) for information technology equipment. If this equipment is used in
a domestic environment, radio disturbance may arise. When such trouble occurs, the
user may be required to take corrective actions.
Regulatory Notices E-5
9&&,ꢀ$
)LJXUHꢀ(ꢁꢃꢄꢀꢀ9&&,ꢀ&ODVVꢀ$ꢀ,7(ꢀ5HJXODWRU\ꢀ0DUNꢀ
&ODVVꢀ%ꢀ,7(
This is a Class B product based on the standard of the Voluntary Control Council for
Interference (VCCI) for information technology equipment. If this equipment is used
near a radio or television receiver in a domestic environment, it may cause radio inter-
ference. Install and use the equipment according to the instruction manual.
)LJXUHꢀ(ꢁꢅꢄꢀꢀ9&&,ꢀ&ODVVꢀ%ꢀ,7(ꢀ5HJXODWRU\ꢀ0DUN
02&ꢀ1RWLFHꢀꢐ6RXWKꢀ.RUHDꢀ2QO\ꢑ
To determine which classification (Class A or B) applies to your computer system (or
other Dell digital device), examine the South Korean Ministry of Communications
(MOC) registration labels located on your computer (or other Dell digital device). The
MOC label may be located separately from the other regulatory marking applied to
your product. The English text, EMI (A), for Class A products, or EMI (B) for Class
B products, appears in the center of the MOC label (see Figures E-3 and E-4).
NOTE: MOC emissions requirements provide for two classifications:
Class A devices are for business purposes.
Class B devices are for nonbusiness purposes.
E-6 Dell PowerVault 720N, 740N, and 760N Users Guide
&ODVVꢀ$ꢀ'HYLFHꢀ
Note that this device has been approved for business purposes with regard to electro-
magnetic interference. If you find that this device is not suitable for your use, you may
exchange it for a nonbusiness device.
(0,ꢁꢂꢁ$ꢁꢃ
)LJXUHꢀ(ꢁꢆꢄꢀꢀ02&ꢀ&ODVVꢀ$ꢀ5HJXODWRU\ꢀ0DUN
&ODVVꢀ%ꢀ'HYLFH
Note that this device has been approved for nonbusiness purposes and may be used
in any environment, including residential areas.
(0,ꢁꢂꢁ%ꢁꢃ
)LJXUHꢀ(ꢁꢇꢄꢀꢀ02&ꢀ&ODVVꢀ%ꢀ5HJXODWRU\ꢀ0DUN
3ROLVKꢀ&HQWHUꢀIRUꢀ7HVWLQJꢀDQGꢀ&HUWLILFDWLRQꢀ
1RWLFHꢀ
The equipment should draw power from a socket with an attached protection circuit (a
three-prong socket). All equipment that works together (computer, monitor, printer,
and so on) should have the same power supply source.
Regulatory Notices E-7
The phasing conductor of the rooms electrical installation should have a reserve
short-circuit protection device in the form of a fuse with a nominal value no larger than
16 amperes (A).
To completely switch off the equipment, the power supply cable must be removed
from the power supply socket, which should be located near the equipment and easily
accessible.
A protection mark B confirms that the equipment is in compliance with the protec-
tion usage requirements of standards PN-93/T-42107 and PN-89/E-06251.
8ZNBHBOJBꢀ1PMTLJFHPꢀ$FOUSVNꢀ#BEBËꢀJꢀ
$FSUZGJLBDKJ
6S[E[FOJFꢀQPXJOOPꢀCZÀꢀ[BTJMBOFꢀ[ꢀHOJB[EBꢀ[ꢀQS[ZD[POZNꢀPCXPEFNꢀPDISPOOZNꢀ
HOJB[EPꢀ[ꢀLPLJFNꢇꢅꢀ8TQÍQSBDVKDFꢀ[FꢀTPCꢀVS[E[FOJBꢀ LPNQVUFSꢁꢀNPOJUPSꢁꢀ
ESVLBSLBꢇꢀQPXJOOZꢀCZÀꢀ[BTJMBOFꢀ[ꢀUFHPꢀTBNFHPꢀySÍEBꢅ
*OTUBMBDKBꢀFMFLUSZD[OBꢀQPNJFT[D[FOJBꢀQPXJOOBꢀ[BXJFSBÀꢀXꢀQS[FXPE[JFꢀGB[PXZNꢀ
SF[FSXPXꢀPDISPOÄꢀQS[FEꢀ[XBSDJBNJꢁꢀXꢀQPTUBDJꢀCF[QJFD[OJLBꢀPꢀXBSUPvDJꢀ[OBNJPOPXFKꢀ
OJFꢀXJÄLT[FKꢀOJꢀꢈꢉ"ꢀ BNQFSÍXꢇꢅꢀ
8ꢀDFMVꢀDBLPXJUFHPꢀXZD[FOJBꢀVS[E[FOJBꢀ[ꢀTJFDJꢀ[BTJMBOJBꢁꢀOBMFZꢀXZKÀꢀXUZD[LÄꢀ
LBCMBꢀ[BTJMBKDFHPꢀ[ꢀHOJB[ELBꢁꢀLUÍSFꢀQPXJOOPꢀ[OBKEPXBÀꢀTJÄꢀXꢀQPCMJVꢀVS[E[FOJBꢀJꢀ
CZÀꢀBUXPꢀEPTUÄQOFꢅꢀ
;OBLꢀCF[QJFD[FËTUXBꢀꢊ#ꢊꢀQPUXJFSE[Bꢀ[HPEOPvÀꢀVS[E[FOJBꢀ[ꢀXZNBHBOJBNJꢀ
CF[QJFD[FËTUXBꢀVZULPXBOJBꢀ[BXBSUZNJꢀXꢀ1/ꢀꢋꢆꢌ5ꢀꢍꢄꢈꢃꢎꢀJꢀ1/ꢀꢏꢋꢌ&ꢀꢃꢉꢄꢂꢈꢅ
1P[PTUBFꢀJOTUSVLDKFꢀCF[QJFD[FËTUXB
/JFꢀOBMFZꢀVZXBÀꢀXUZD[FLꢀBEBQUFSPXZDIꢀMVCꢀVTVXBÀꢀLPLBꢀPCXPEVꢀPDISPOOFHPꢀ
[ꢀXUZD[LJꢅꢀ+FFMJꢀLPOJFD[OFꢀKFTUꢀVZDJFꢀQS[FEVBD[BꢀUPꢀOBMFZꢀVZÀꢀQS[FEVBD[Bꢀ
ꢆꢀZPXFHPꢀ[ꢀQSBXJEPXPꢀQPD[POZNꢀQS[FXPEFNꢀPDISPOOZNꢅ
4ZTUFNꢀLPNQVUFSPXZꢀOBMFZꢀ[BCF[QJFD[ZÀꢀQS[FEꢀOBHZNJꢁꢀDIXJMPXZNJꢀ
X[SPTUBNJꢀMVCꢀTQBELBNJꢀOBQJÄDJBꢁꢀVZXBKDꢀFMJNJOBUPSBꢀQS[FQJÄÀꢁꢀVS[E[FOJBꢀ
EPQBTPXVKDFHPꢀMVCꢀCF[[BLÍDFOJPXFHPꢀySÍEBꢀ[BTJMBOJBꢅ
/BMFZꢀVQFXOJÀꢀTJÄꢁꢀBCZꢀOJDꢀOJFꢀMFBPꢀOBꢀLBCMBDIꢀTZTUFNVꢀLPNQVUFSPXFHPꢁꢀ
PSB[ꢀBCZꢀLBCMFꢀOJFꢀCZZꢀVNJFT[D[POFꢀXꢀNJFKTDVꢁꢀHE[JFꢀNPOBꢀCZPCZꢀOBꢀOJFꢀ
OBEFQUZXBÀꢀMVCꢀQPUZLBÀꢀTJÄꢀPꢀOJFꢅ
/JFꢀOBMFZꢀSP[MFXBÀꢀOBQPKÍXꢀBOJꢀJOOZDIꢀQZOÍXꢀOBꢀTZTUFNꢀLPNQVUFSPXZꢅ
/JFꢀOBMFZꢀXQZDIBÀꢀBEOZDIꢀQS[FENJPUÍXꢀEPꢀPUXPSÍXꢀTZTUFNVꢀLPNQVUFSPXFHPꢁꢀ
HEZꢀNPFꢀUPꢀTQPXPEPXBÀꢀQPBSꢀMVCꢀQPSBFOJFꢀQSEFNꢁꢀQPQS[F[ꢀ[XBSDJFꢀ
FMFNFOUÍXꢀXFXOÄUS[OZDIꢅ
4ZTUFNꢀLPNQVUFSPXZꢀQPXJOJFOꢀ[OBKEPXBÀꢀTJÄꢀ[ꢀEBMBꢀPEꢀHS[FKOJLÍXꢀJꢀySÍEFꢀ
DJFQBꢅꢀ1POBEUPꢁꢀOJFꢀOBMFZꢀCMPLPXBÀꢀPUXPSÍXꢀXFOUZMBDZKOZDIꢅꢀ/BMFZꢀVOJLBÀꢀ
LBE[FOJBꢀMVyOZDIꢀQBQJFSÍXꢀQPEꢀLPNQVUFSꢀPSB[ꢀVNJFT[D[BOJBꢀLPNQVUFSBꢀXꢀ
DJBTOZNꢀNJFKTDVꢀCF[ꢀNPMJXPvDJꢀDZSLVMBDKJꢀQPXJFUS[BꢀXPLÍꢀOJFHPꢅ
E-8 Dell PowerVault 720N, 740N, and 760N Users Guide
120ꢀ,QIRUPDWLRQꢀꢐ0H[LFRꢀ2QO\ꢑ
The following information is provided on the device(s) described in this document in
compliance with the requirements of the official Mexican standards (NOM):
Exporter:
Importer:
Dell Computer Corporation
One Dell Way
Round Rock, TX 78682
Dell Computer de México,
S.A. de C.V.
Rio Lerma No. 302 - 4° Piso
Col. Cuauhtemoc
16500 México, D.F.
Ship to:
Dell Computer de México,
S.A. de C.V. al Cuidado
de Kuehne & Nagel de
México S. de R.I.
Avenida Soles No. 55
Col. Peñon de los Baños
15520 México, D.F.
Supply voltage:
Frequency:
100-240 VAC
60/50 Hz
Input current
rating:
Input current rating: 5.0 A
,QIRUPDFLyQꢀSDUDꢀ120ꢀꢐ~QLFDPHQWHꢀSDUDꢀ
0p[LFRꢑ
La información siguiente se proporciona en el dispositivo o en los dispositivos descri-
tos en este documento, en cumplimiento con los requisitos de la Norma Oficial
Mexicana (NOM):
Exportador:
Importador:
Dell Computer Corporation
One Dell Way
Round Rock, TX 78682
Dell Computer de México,
S.A. de C.V.
Rio Lerma No. 302 - 4° Piso
Col. Cuauhtemoc
16500 México, D.F.
Regulatory Notices E-9
Exportador:
Embarcar a:
Dell Computer Corporation
One Dell Way
Round Rock, TX 78682
Dell Computer de México,
S.A. de C.V. al Cuidado
de Kuehne & Nagel de
México S. de R.I.
Avenida Soles No. 55
Col. Peñon de los Baños
15520 México, D.F.
Tensión
alimentación:
100-240 VAC
60/50 Hz
Frecuencia:
Consumo de
corriente:
5.0 A
%60,ꢀ1RWLFHꢀꢐ7DLZDQꢀ2QO\ꢑ
E-10 Dell PowerVault 720N, 740N, and 760N Users Guide
$ 3 3 ( 1 ' , ; ꢁ )
:DUUDQW\ꢂꢀ5HWXUQꢀ3ROLF\ꢂꢀDQGꢀ<HDUꢀ
ꢅꢍꢍꢍꢀ6WDWHPHQWꢀRIꢀ&RPSOLDQFH
/LPLWHGꢀ7KUHHꢁ<HDUꢀ:DUUDQW\ꢀꢐ8ꢄ6ꢄꢀ2QO\ꢑ
Dell Computer Corporation (Dell) manufactures its hardware products from parts
and components that are new or equivalent to new in accordance with industry-
standard practices. Dell warrants that the hardware products it manufactures will be
free from defects in materials and workmanship. The warranty term is three years
beginning on the date of invoice, as described in the following text.
Damage due to shipping the products to you is covered under this warranty. Other-
wise, this warranty does not cover damage due to external causes, including
accident, abuse, misuse, problems with electrical power, servicing not authorized by
Dell, usage not in accordance with product instructions, failure to perform required
preventive maintenance, and problems caused by use of parts and components not
supplied by Dell.
This warranty does not cover any items that are in one or more of the following cate-
gories: software; external devices (except as specifically noted); accessories or parts
added to a Dell system after the system is shipped from Dell; accessories or parts
added to a Dell system through Dells system integration department; accessories or
parts that are not installed in the Dell factory; or DellWareSM products. Monitors, key-
boards, and mice that are Dell-branded or that are included on Dells standard price list
are covered under this warranty; all other monitors, keyboards, and mice (including
those sold through the DellWare program) are not covered. Batteries for portable
computers are covered only during the initial one-year period of this warranty.
&RYHUDJHꢀ'XULQJꢀ<HDUꢀ2QH
During the one-year period beginning on the invoice date, Dell will repair or replace
products covered under this limited warranty that are returned to Dells facility. To
request warranty service, you must call Dells Customer Technical Support within the
warranty period. Refer to the chapter titled Getting Help in your systems trouble-
shooting documentation to find the appropriate telephone number for obtaining
customer assistance. If warranty service is required, Dell will issue a Return Material
Authorization Number. You must ship the products back to Dell in their original or
equivalent packaging, prepay shipping charges, and insure the shipment or accept the
risk of loss or damage during shipment. Dell will ship the repaired or replacement
Warranty, Return Policy, and Year 2000 Statement of Compliance F-1
products to you freight prepaid if you use an address in the continental U.S., where
applicable. Shipments to other locations will be made freight collect.
NOTE: Before you ship the product(s) to Dell, back up the data on the hard-disk
drive(s) and any other storage device(s) in the product(s). Remove any removable
media, such as diskettes, CDs, or PC Cards. Dell does not accept liability for lost data
or software.
Dell owns all parts removed from repaired products. Dell uses new and reconditioned
parts made by various manufacturers in performing warranty repairs and building
replacement products. If Dell repairs or replaces a product, its warranty term is not
extended.
&RYHUDJHꢀ'XULQJꢀ<HDUVꢀ7ZRꢀDQGꢀ7KUHH
During the second and third years of this limited warranty, Dell will provide, on an
exchange basis and subject to Dells Exchange Policy in effect on the date of the
exchange, replacement parts for the Dell hardware product(s) covered under this lim-
ited warranty when a part requires replacement. You must report each instance of
hardware failure to Dells Customer Technical Support in advance to obtain Dells con-
currence that a part should be replaced and to have Dell ship the replacement part.
Dell will ship parts (freight prepaid) if you use an address in the continental U.S. or
Canada, where applicable. Shipments to other locations will be made freight collect.
Dell will include a prepaid shipping container with each replacement part for your use
in returning the replaced part to Dell. Replacement parts are new or reconditioned.
Dell may provide replacement parts made by various manufacturers when supplying
parts to you. The warranty term for a replacement part is the remainder of the limited
warranty term.
You will pay Dell for replacement parts if the replaced part is not returned to Dell. The
process for returning replaced parts, and your obligation to pay for replacement parts
if you do not return the replaced parts to Dell, will be in accordance with Dells
Exchange Policy in effect on the date of the exchange.
You accept full responsibility for your software and data. Dell is not required to advise
or remind you of appropriate backup and other procedures.
*HQHUDOꢀ3URYLVLRQV
THIS WARRANTY GIVES YOU SPECIFIC LEGAL RIGHTS WHICH VARY FROM STATE
TO STATE (OR JURISDICTION TO JURISDICTION). DELL'S RESPONSIBILITY FOR
MALFUNCTIONS AND DEFECTS IN HARDWARE IS LIMITED TO REPAIR AND
REPLACEMENT AS SET FORTH IN THIS WARRANTY STATEMENT. ALL EXPRESS
AND IMPLIED WARRANTIES FOR THE PRODUCT, INCLUDING BUT NOT LIMITED
TO ANY IMPLIED WARRANTIES OF AND CONDITIONS OF MERCHANTIBILITY AND
FITNESS FOR A PARTICULAR PURPOSE, ARE LIMITED IN DURATION TO THE WAR-
RANTY PERIOD SET FORTH ABOVE AND NO WARRANTIES, WHETHER EXPRESS
OR IMPLIED, WILL APPLY AFTER SUCH PERIOD.
SOME STATES (OR JURISDICTIONS) DO NOT ALLOW LIMITATIONS ON HOW
LONG AN IMPLIED WARRANTY LASTS, SO THE PRECEDING LIMITATION MAY NOT
APPLY TO YOU.
F-2 Dell PowerVault 720N, 740N, and 760N Users Guide
DELL DOES NOT ACCEPT LIABILITY BEYOND THE REMEDIES SET FORTH IN THIS
WARRANTY STATEMENT OR LIABILITY FOR INCIDENTAL OR CONSEQUENTIAL
DAMAGES, INCLUDING WITHOUT LIMITATION ANY LIABILITY FOR PRODUCTS
NOT BEING AVAILABLE FOR USE OR FOR LOST DATA OR SOFTWARE.
SOME STATES (OR JURISDICTIONS) DO NOT ALLOW THE EXCLUSION OR LIMITA-
TION OF INCIDENTAL OR CONSEQUENTIAL DAMAGES, SO THE PRECEDING
EXCLUSION OR LIMITATION MAY NOT APPLY TO YOU.
These provisions apply to Dells limited three-year warranty only. For provisions of any
service contract covering your system, refer to your invoice or the separate service
contract that you will receive.
If Dell elects to exchange a system or component, the exchange will be made in
accordance with Dells Exchange Policy in effect on the date of the exchange.In any
instance in which Dell issues a Return Material Authorization Number, Dell must
receive the product(s) for repair prior to the expiration of the warranty period in order
for the repair(s) to be covered by the warranty.
NOTE: If you chose one of the available warranty and service options in place of the
standard limited three-year warranty described in the preceding text, the option you
chose will be listed on your invoice.
/LPLWHGꢀ7KUHHꢁ<HDUꢀ:DUUDQW\ꢀꢐ&DQDGDꢀ
2QO\ꢑ
Dell Computer Corporation (Dell) manufactures its hardware products from parts
and components that are new or equivalent to new in accordance with industry-
standard practices. Dell warrants that the hardware products it manufactures will be
free from defects in materials and workmanship. The warranty term is three years
beginning on the date of invoice, as described in the following text.
Damage due to shipping the products to you is covered under this warranty. Other-
wise, this warranty does not cover damage due to external causes, including
accident, abuse, misuse, problems with electrical power, servicing not authorized by
Dell, usage not in accordance with product instructions, failure to perform required
preventive maintenance, and problems caused by use of parts and components not
supplied by Dell.
This warranty does not cover any items that are in one or more of the following cate-
gories: software; external devices (except as specifically noted); accessories or parts
added to a Dell system after the system is shipped from Dell; accessories or parts
added to a Dell system through Dells system integration department; accessories or
parts that are not installed in the Dell factory; or DellWareSM products. Monitors, key-
boards, and mice that are Dell-branded or that are included on Dells standard price list
are covered under this warranty; all other monitors, keyboards, and mice (including
those sold through the DellWare program) are not covered. Batteries for portable
computers are covered only during the initial one-year period of this warranty.
Warranty, Return Policy, and Year 2000 Statement of Compliance F-3
&RYHUDJHꢀ'XULQJꢀ<HDUꢀ2QH
During the one-year period beginning on the invoice date, Dell will repair or replace
products covered under this limited warranty that are returned to Dells facility. To
request warranty service, you must call Dells Customer Technical Support within the
warranty period. Refer to the chapter titled Getting Help in your systemstrouble-
shooting documentation to find the appropriate telephone number for obtaining
customer assistance. If warranty service is required, Dell will issue a Return Material
Authorization Number. You must ship the products back to Dell in their original or
equivalent packaging, prepay shipping charges, and insure the shipment or accept the
risk of loss or damage during shipment. Dell will ship the repaired or replacement
products to you freight prepaid if you use an address in Canada, where applicable.
Shipments to other locations will be made freight collect.
NOTE: Before you ship the product(s) to Dell, back up the data on the hard-disk
drive(s) and any other storage device(s) in the product(s). Remove any removable
media, such as diskettes, CDs, or PC Cards. Dell does not accept liability for lost data
or software.
Dell owns all parts removed from repaired products. Dell uses new and reconditioned
parts made by various manufacturers in performing warranty repairs and building
replacement products. If Dell repairs or replaces a product, its warranty term is not
extended.
&RYHUDJHꢀ'XULQJꢀ<HDUVꢀ7ZRꢀDQGꢀ7KUHH
During the second and third years of this limited warranty, Dell will provide, on an
exchange basis and subject to Dells Exchange Policy in effect on the date of the
exchange, replacement parts for the Dell hardware product(s) covered under this lim-
ited warranty when a part requires replacement. You must report each instance of
hardware failure to Dells Customer Technical Support in advance to obtain Dells con-
currence that a part should be replaced and to have Dell ship the replacement part.
Dell will ship parts (freight prepaid) if you use an address in the continental U.S. or
Canada, where applicable. Shipments to other locations will be made freight collect.
Dell will include a prepaid shipping container with each replacement part for your use
in returning the replaced part to Dell. Replacement parts are new or reconditioned.
Dell may provide replacement parts made by various manufacturers when supplying
parts to you. The warranty term for a replacement part is the remainder of the limited
warranty term.
You will pay Dell for replacement parts if the replaced part is not returned to Dell. The
process for returning replaced parts, and your obligation to pay for replacement parts
if you do not return the replaced parts to Dell, will be in accordance with Dells
Exchange Policy in effect on the date of the exchange.
You accept full responsibility for your software and data. Dell is not required to advise
or remind you of appropriate backup and other procedures.
F-4 Dell PowerVault 720N, 740N, and 760N Users Guide
*HQHUDOꢀ3URYLVLRQV
DELL MAKES NO EXPRESS WARRANTIES OR CONDITIONS BEYOND THOSE
STATED IN THIS WARRANTY STATEMENT. DELL DISCLAIMS ALL OTHER WARRAN-
TIES AND CONDITIONS, EXPRESS OR IMPLIED, INCLUDING WITHOUT
LIMITATION IMPLIED WARRANTIES AND CONDITIONS OF MERCHANTABILITY
AND FITNESS FOR A PARTICULAR PURPOSE. SOME STATES (OR JURISDICTIONS)
DO NOT ALLOW LIMITATIONS ON IMPLIED WARRANTIES OR CONDITIONS, SO
THIS LIMITATION MAY NOT APPLY TO YOU.
DELLS RESPONSIBILITY FOR MALFUNCTIONS AND DEFECTS IN HARDWARE IS
LIMITED TO REPAIR AND REPLACEMENT AS SET FORTH IN THIS WARRANTY
STATEMENT. THESE WARRANTIES GIVE YOU SPECIFIC LEGAL RIGHTS, AND YOU
MAY ALSO HAVE OTHER RIGHTS, WHICH VARY FROM STATE TO STATE (OR JURIS-
DICTION TO JURISDICTION).
DELL DOES NOT ACCEPT LIABILITY BEYOND THE REMEDIES SET FORTH IN THIS
WARRANTY STATEMENT OR LIABILITY FOR INCIDENTAL OR CONSEQUENTIAL
DAMAGES, INCLUDING WITHOUT LIMITATION ANY LIABILITY FOR PRODUCTS
NOT BEING AVAILABLE FOR USE OR FOR LOST DATA OR SOFTWARE.
SOME STATES (OR JURISDICTIONS) DO NOT ALLOW THE EXCLUSION OR LIMITA-
TION OF INCIDENTAL OR CONSEQUENTIAL DAMAGES, SO THE PRECEDING
EXCLUSION OR LIMITATION MAY NOT APPLY TO YOU.
These provisions apply to Dells limited three-year warranty only. For provisions of any
service contract covering your system, refer to your invoice or the separate service
contract that you will receive.
If Dell elects to exchange a system or component, the exchange will be made in
accordance with Dells Exchange Policy in effect on the date of the exchange. In any
instance in which Dell issues a Return Material Authorization Number, Dell must
receive the product(s) for repair prior to the expiration of the warranty period in order
for the repair(s) to be covered by the warranty.
NOTE: If you chose one of the available warranty and service options in place of the
standard limited three-year warranty described in the preceding text, the option you
chose will be listed on your invoice.
´7RWDOꢀ6DWLVIDFWLRQµꢀ5HWXUQꢀ3ROLF\ꢀꢐ8ꢄ6ꢄꢀDQGꢀ
&DQDGDꢀ2QO\ꢑ
If you are an end-user customer who bought new products directly from a Dell com-
pany, you may return them to Dell within 30 days of the date of invoice for a refund or
credit of the product purchase price. If you are an end-user customer who bought
reconditioned or refurbished products from a Dell company, you may return them to
Dell within 14 days of the date of invoice for a refund or credit of the product purchase
price. In either case, the refund or credit will not include any shipping and handling
charges shown on your invoice. If you are an organization that bought the products
under a written agreement with Dell, the agreement may contain different terms for
the return of products than specified by this policy.
Warranty, Return Policy, and Year 2000 Statement of Compliance F-5
To return products, you must call Dell Customer Service to receive a Credit Return
Authorization Number. Refer to the chapter titled Getting Help in your system's
troubleshooting documentation or, for some systems, the section titled Contacting
Dell in your system's online guide to find the appropriate telephone number for
obtaining customer assistance. To expedite the processing of your refund or credit,
Dell expects you to return the products to Dell in their original packaging within five
days of the date that Dell issues the Credit Return Authorization Number. You must
also prepay shipping charges and insure the shipment or accept the risk of loss or
damage during shipment. You may return software for refund or credit only if the
sealed package containing the diskette(s) or CD(s) is unopened. Returned products
must be in as-new condition, and all of the manuals, diskette(s), CD(s), power cables,
and other items included with a product must be returned with it. For customers who
want to return, for refund or credit only, either applications software or an operating
system that has been installed by Dell, the whole system must be returned, along
with any media and documentation that may have been included in the original
shipment.
This Total Satisfaction Return Policy does not apply to DellWare products, which
may be returned under DellWare's then-current return policy. In addition, recondi-
tioned parts purchased through Dell Spare Parts Sales in Canada are nonreturnable.
<HDUꢀꢅꢍꢍꢍꢀ6WDWHPHQWꢀRIꢀ&RPSOLDQFHꢀIRUꢀ
'HOOꢁ%UDQGHGꢀ+DUGZDUHꢀ3URGXFWV
Dell-branded hardware products shipped on or after January 1, 1997, are eligible to
carry the NSTL Hardware Tested Year 2000 Compliant logo by virtue of formal test-
ing with, and successful completion of, the National Software Testing Laboratories
(NSTL) YMARK2000 test.* Dell will treat a failure to pass the YMARK2000 test as a
covered event under Dell's warranty for the product, subject to the normal warranty
limitations.** For a complete copy of Dell's warranty, see the product's documenta-
tion. Dell-branded hardware products will also recognize the year 2000 as a leap year.
*The YMARK2000 standard tests the ability of system hardware and firmware to support the
transition to the year 2000 (and to recognize leap years, when appropriate, for years 2000
through 2009 inclusive) and not that of options, operating systems, or applications software.
Dell-branded hardware products that pass the YMARK2000 test conform to BSI-DISC
PD 2000-1.
** Except for this clarification of Dell's warranty for NSTL logo hardware, all other warranties,
conditions and remedies, express or implied, relating to year 2000 readiness or compliance are
disclaimed. To make a claim under this warranty for NSTL logo hardware, customers must con-
tact Dell prior to January 1, 2001.
To make a claim, write to:
Dell Computer Corporation
P.O. Box 149258
Austin, Texas 78714-9258
Attention: Year 2000
F-6 Dell PowerVault 720N, 740N, and 760N Users Guide
Despite a system's ability to pass the YMARK2000 test, actual rollover results in specific operat-
ing environments may vary depending on other factors including, but not limited to, other
hardware, operating systems, and applications software.
3UHYLRXVꢀ3URGXFWV
For Dell-branded hardware products shipped prior to January 1, 1997, that have an
upgradable basic input/output system (BIOS), Dell makes available a BIOS upgrade.
Although these products may not have been tested under the YMARK2000 test, Dell
believes that the hardware would pass the YMARK2000 test, provided the appropri-
ate BIOS upgrade is properly loaded.
For Dell-branded hardware products that do not have an upgradable BIOS, Dell has
made available, as a convenience to customers, the Dell Program Patch, a software
utility designed to assist customers in managing the year 2000 rollover.
6RIWZDUH
Dell specifically excludes all non-Dell-developed software from this compliance state-
ment. All software run on Dell-branded hardware products should be independently
verified by customers to be year 2000-compliant.
$GGLWLRQDOꢀ,QIRUPDWLRQ
For additional information on year 2000 compliance of Dell-branded hardware prod-
ucts, refer to Dell's Year 2000 Web site at http://www.dell.com/year2000 or
contact a Dell customer service representative in your area.
Warranty, Return Policy, and Year 2000 Statement of Compliance F-7
F-8 Dell PowerVault 720N, 740N, and 760N Users Guide
*ORVVDU\
The following list defines or identifies
technical terms, abbreviations, and acro-
nyms used in Dell user documents.
directories, and to use this client as the
mailhost for sending autosupport email
messages. At any time after you run the
setupprogram, you can configure the
filer to work with other clients in the
same way as it does with the administra-
tion host.
$
Abbreviation for ampere(s).
$&
Abbreviation for alternating current.
$,
Abbreviation for artificial intelligence.
$&/
Access control list. A list that contains the
users or groups access rights to each
share.
$16,
AcronymforAmericanNationalStandards
Institute.
DGDSWHUꢀFDUG
$3&
Abbreviation for American Power
Conversion.
An expansion card that plugs into an
expansion-card connector on the comput-
ers system board. An adapter card adds
some specialized function to the comput-
er by providing an interface between the
expansionbusandaperipheraldevice. Ex-
amples of adapter cards include network
cards, sound boards, and SCSI adapters.
DSSOLFDWLRQꢀSURJUDP
Software designed to help you perform a
specific task, such as a spreadsheet or
wordprocessor.Applicationprogramsare
distinct from operating system and utility
software.
$'&
Abbreviation for analog-to-digital
converter.
$6&,,
Acronym for American Standard Code for
Information Interchange. A text file con-
taining only characters from the ASCII
character set (usually created with a text
$',
Abbreviation for Autodesk Device
Interface.
®
editor, such as MS-DOS Editor or Note-
pad in Windows), is called an ASCII file.
DGPLQLVWUDWLRQꢀKRVW
$6,&
Acronym for application-specific integrat-
ed circuit.
The client you specify during filer setup
for managing the filer. The setuppro-
gram automatically configures the filer to
accept telnetand rshconnections
from this client, to give permission to
$63,
Advanced SCSI programming interface.
/
/home
this client for mounting the and
Glossary
1
DXWKHQWLFDWLRQ
A security step performed by a domain
controller for the filers domain, or by the
TechConnect BBS contains the latest ver-
sion of softwaresuch asvideo drivers and
the
modem, you can access the BBS and
download the most recent version of this
software.
Dell Directory
. If your system has a
/etc/passwd
filer itself, using its
file.
DXWRH[HFꢃEDWꢀILOH
When you boot your computer, MS-DOS
runs any commands contained in the text
file, autoexec.bat (after running any com-
mands in the config.sys file). An
autoexec.bat file is not required to boot
MS-DOS, butprovidesaconvenientplace
to run commands that are essential for
setting up a consistent computing envi-
ronmentsuch as loading mouse or
network software.
EHHSꢀFRGH
A diagnostic system message in the form
of a seriesofbeeps from your computers
Diagnostics and
for a complete dis-
speaker. Refer to your
Troubleshooting Guide
cussion of system beep codes.
%,26
Acronym for basic input/output system.
YourcomputersBIOScontainsprograms
stored on a ROM chip. The BIOS controls
the following:
EDFNXS
A copy of a program or data file. As a
precaution, you should back up your
computers hard-disk drive on a regular
basis. Before making a change to the con-
figuration of your computer, you should
back up important start-up files, such as
autoexec.bat and config.sys for
MS-DOS or win.ini and system.ini for
Windows.
Communications between the
microprocessor and peripheral
devices, such as the keyboard and
the video adapter
Miscellaneous functions, such as
system messages
ELW
The smallest unit of information interpret-
ed by your computer.
EDVHꢀPHPRU\
Synonym for conventional memory. See
also conventional memory.
EORFNꢀVL]H
The size of a block. See also block and
striping.
%$6,&
Acronym for Beginners All-Purpose Sym-
bolic Instruction Code, a programming
language. MS-DOS includes a version of
BASIC.
ERRWꢀURXWLQH
When you start your computer, it clears
all memory, initializes devices, and loads
the operating system. Unless the operat-
ing system fails to respond, you can
reboot (also called warm boot) your com-
puter by pressing <Ctrl><Alt><Del>;
otherwise, you must perform a cold boot
by pressing the reset button (if your com-
puter has one) or by turning the computer
off, then back on.
EDWFKꢀILOH
An ASCII text file containing a list of com-
mands that run in sequence. Batch files
must have a filename extension of bat.
EDXGꢀUDWH
Data transmission speed. For example,
modems are designed to transmit data at
one or more specified baud rate(s)
through the COM (serial) port of a
computer.
ERRWDEOHꢀGLVNHWWH
You can start your computer from a dis-
kette in drive A. To make a bootable
diskette, insert a diskette in drive A, type
sys a:at the command line prompt, then
press <Enter>. Use this bootable diskette
%%6
Abbreviation for bulletin board service. A
computer system that serves as a central
location for accessing data or relaying
messagesbymodem.Forexample,Dells
2
Dell PowerVault 720N, 740N, and 760N Users Guide
if your computer will not boot from the hard-
disk drive.
&%7
Abbreviation for computer-based training.
ESL
Abbreviation for bits per inch.
&&)7
Abbreviation for cold cathode fluorescent
tube.
ESV
Abbreviation for bits per second.
&'ꢁ520
Abbreviation for compact disc read-only
memory. CD-ROM drives use optical
technology to read data from compact
discs. Compact discs are read-only stor-
age devices; you cannot write new data
to a compact disc with standard CD-ROM
drives.
%78
Abbreviation for British thermal unit.
EXV
A bus forms an information pathway be-
tween the components of a computer.
Yourcomputercontainsanexpansionbus
that allows the microprocessor to com-
municate with controllers for all the
various peripheral devices connected to
the computer. Your computer also con-
tains an address bus and a data bus for
communications between the micro-
processor and RAM.
&*$
Abbreviation for color graphics adapter.
&,)6
Common Internet File System. A protocol
for networking PCs.
FOLHQW
A computer that shares files on a filer.
E\WH
Eight contiguous bits of information, the
basic data unit used by your computer.
&,2
Abbreviation for comprehensive input/
output.
%=7
Bundesamt fur Zulassun-
Abbreviation for
gen in der Telekommunikation
.
FP
Abbreviation for centimeter(s).
&
Abbreviation for Celsius.
&026
Acronym for complementary metal-oxide
semiconductor. In computers, CMOS
memory chips are often used for NVRAM
storage.
FDFKH
To facilitate quicker data retrieval, a stor-
age area for keeping a copy of data or
instructions. For example, your comput-
ers BIOS may cache ROM code in faster
RAM. Or, a disk-cache utility may reserve
RAM in which to store frequently access-
ed information from your computers disk
drives; when a program makes a request
to a disk drive for data that is in the cache,
the disk-cache utility can retrieve the data
from RAM faster than from the disk drive.
&20Q
The MS-DOS device names for the first
through fourth serial ports on your com-
puter are COM1, COM2, COM3, and
COM4.MS-DOSsupportsuptofourserial
ports. However, the default interrupt for
COM1andCOM3isIRQ4, andthedefault
interrupt for COM2 and COM4 is IRQ3.
Therefore, you must be careful when con-
figuring software that runs a serial device
so that you dont create an interrupt
conflict.
FDUGꢁHGJHꢀFRQQHFWRU
On the bottom of an expansion card, the
metal-contact section that plugs into an
expansion-card connector.
Glossary
3
&21
FXUVRU
The MS-DOS device name for the con-
sole, which includes your computers
keyboard and text displayed on the
screen.
In character-based MS-DOS programs,
the cursor is usually a block or an under-
score (possibly blinking) that represents
the position at which the next character
typedwillappear.Windowsprogramscan
design their own cursorscommon cur-
sorsymbolsincludethepointerarrowand
the text-insertion I-beam.
FRQILJꢃV\VꢀILOH
When you boot your computer, MS-DOS
runs any commands contained in the text
file, config.sys (before running any com-
mands in the autoexec.bat file). A
config.sys file is not required to boot
MS-DOS, but provides a convenient place
to run commands that are essential for
setting up a consistent computing environ-
mentsuch as loading device drivers with
a device= statement.
'$&
Acronym for digital-to-analog converter.
'$7
Acronym for digital audio tape.
G%
Abbreviation for decibel(s).
FRQVROH
A terminal that is attached to a filers serial
port and is used to monitor and manage
filer operation.
G%$
Abbreviation for adjusted decibel(s).
'&
Abbreviation for direct current.
FRQWUROOHU
A chip or expansion card that controls the
transfer of data between the micro-
processor and a peripheral, such as a disk
drive or the keyboard.
''&
Acronym for display data channel. A
®
VESA standard mechanism that allows
the system to communicate with the
monitor and retrieve information about its
capabilities.
FRQYHQWLRQDOꢀPHPRU\
The first 640 KB of RAM. Unless they are
specially designed, MS-DOS programs
are limited to running in conventional
memory. SeealsoEMM,expandedmem-
ory, extended memory, HMA, memory
manager, uppermemoryarea, andXMM.
'HOOꢀ2SHQ0DQDJHꢀ&OLHQWꢀDQGꢀ
&OLHQWꢀ$GPLQLVWUDWRU
The Dell OpenManage program is a DMI
browser that allows you to view informa-
tion about various components of your
system.
FRSURFHVVRU
A coprocessor relieves the computers
microprocessor of specific processing
tasks. A math coprocessor, for example,
handles numeric processing. A graphics
coprocessorhandlesvideorendering.The
GHYLFHꢀGULYHU
A device driver allows the operating sys-
tem or a program to interface correctly
with a peripheral, such as a printer or net-
work card. Some device driverssuch as
network driversmust be loaded from
the config.sys file (with a device= state-
ment) or as memory-resident programs
(usually, from the autoexec.bat file). Oth-
erssuch as video driversmust load
when you start the program for which they
were designed.
®
®
Intel Pentium microprocessor includes a
built-in math coprocessor.
FSL
Abbreviation for characters per inch.
&38
Abbreviation for central processing unit.
See also microprocessor.
4
Dell PowerVault 720N, 740N, and 760N Users Guide
'HVNWRSꢀ0DQDJHU
Desktop Manager, a component of the
root directory
Fꢁ\
®
Intel LANDesk Configuration Manager
systemmanagementsoftware, isusedto
manage clients after installing an operat-
ing system, management agents, and
applications.
Fꢁ?ZLQGRZV
Fꢁ?GRV
subdirectorie
Fꢁ?GHOO
'+&3
Acronym for Dynamic Host Configuration
Protocol.
Fꢁ?ZLQGRZV?V\VWHP
GLVNHWWHꢁEDVHGꢀGLDJQRVWLFV
GLDJQRVWLFV
See diskette-based diagnostics.
A comprehensive set of diagnostic tests
for your Dell computer. To use the
diskette-based diagnostics, you must
',00
DellDiagnos-
boot your computer from the
Acronym for dual in-line memory
module.
tics Installation and
for a complete
diskette. Refer to your
Troubleshooting Guide
discussion about how to use the diskette-
based diagnostics.
',1
Acronym for
Deutsche Industrie Norm
.
GLVSOD\ꢀDGDSWHU
See video adapter.
',3
Acronym for dualin-line package. A circuit
board, such as a system board or expan-
sion card, may contain DIP switches for
configuring the circuit board. DIP switch-
es are always toggle switches, with an
ON position and an OFF position.
'0$
Abbreviation for direct memory access. A
DMA channel allows certain types of data
transfer between RAM and a device to
bypass the microprocessor.
'0,
Abbreviation for Desktop Management
Interface. DMI enables the management
of your computer systems software and
hardware. DMI defines the software, in-
terfaces, and data files that enable your
system to determine and report informa-
tion about its components.
DIP switches
GLUHFWRU\
Directories help keep related files orga-
nized on a disk in a hierarchical, inverted
tree structure. Each disk has a root
directory; for example, a C:\>prompt nor-
mally indicates that you are at the root
directory of hard-disk drive C. Additional di-
rectoriesthatbranchoffoftherootdirectory
IfDMIisinstalledonyoursystem,youcan
enable DMI support as you complete the
setup of your system by double-clicking
the DMI icon in the Windows Control Pan-
el. For further instructions on enabling
DMI support or for more information
about DMI, refer to the DMI online help.
subdirectories
. Subdirectories
are called
maycontainadditionaldirectoriesbranching
off of them.
'07)
Acronym for Desktop Management Task
Force, a consortium of companies repre-
sentinghardwareandsoftwareproviders,
of which Dell Computer Corporation is a
steering committee member.
Glossary
5
'2&
Abbreviation for Department of Commu-
nications (in Canada).
'7(
Abbreviationfordataterminalequipment.
Any device (such as a computer system)
that can send data in digital form by
means of a cable or communications line.
The DTE is connected to the cable or
communications line through a data com-
munications equipment (DCE) device,
such as a modem.
GSL
Abbreviation for dots per inch.
'306
Abbreviation for Display Power Manage-
ment Signaling. A standard developed by
the Video Electronics Standards Associa-
tion that defines the hardware signals
sent by a video controller to activate pow-
er management states in a video display
or monitor. A monitor is said to be DPMS-
compliant when it is designed to enter a
power management state after receiving
the appropriate signal from a computers
video controller.
(&&
Abbreviation for error checking and
correction.
(&3
Abbreviation for Extended Capabilities
Port.
('2
Abbreviation for extended-data output. A
type of RAM chip that holds data on the
chips output data lines for a longer period
of time than fast-page mode RAM chips.
The EDO RAM chips are also faster than
fast-page mode RAM chips.
'5$&
Acronym for Dell Remote Assistant Card.
'5$0
Abbreviation for dynamic random-access
memory. A computers RAM is usually
made up entirely of DRAM chips. Be-
cause DRAM chips cannot store an
electrical charge indefinitely, your com-
puter continually refreshes each DRAM
chip in the computer.
((3520
Acronym for electrically erasable pro-
grammable read-only memory.
(*$
Abbreviation for enhanced graphics
adapter.
GULYHꢁW\SHꢀQXPEHU
Yourcomputercanrecognizeanumberof
specifichard-diskdrives. Eachisassigned
a drive-type number that is stored in
NVRAM. The hard-disk drive(s) specified
in your computers System Setup pro-
gram must match the actual drive(s)
installed in the computer. The System
Setup program also allows you to specify
physical parameters (cylinders, heads,
write precomp, landing zone, and capaci-
ty) for drives not included in the table of
drive types stored in NVRAM.
(,6$
Acronym for Extended Industry-Standard
Architecture, a 32-bit expansion-bus de-
sign.Theexpansion-cardconnectorsinan
EISA computer are also compatible with
8- or 16-bit ISA expansion cards.
To avoid a configuration conflict when in-
stalling an EISA expansion card, you must
use the EISA Configuration Utility. This
utility allows you to specify which expan-
sion slot contains the card and obtains
information about the cards required sys-
temresourcesfromacorrespondingEISA
configuration file.
'6ꢎ''
Abbreviation for double-sided/double-
density.
(0&
Abbreviation for Electromagnetic
Compatibility.
'6ꢎ+'
Abbreviation for double-sided/high-
density.
6
Dell PowerVault 720N, 740N, and 760N Users Guide
(0,
Abbreviation for electromagnetic
interference.
H[SDQVLRQꢀEXV
Yourcomputercontainsanexpansionbus
that allows the microprocessor to com-
municate with controllers for peripheral
devices, such as a network card or an in-
ternal modem.
(00
Abbreviation for expanded memory
manager. A software utility that uses ex-
tended memory to emulate expanded
H[SDQVLRQꢀFDUG
memory on computers with an Intel386
A SCSI card, NVRAM card, network card,
hot swap card, or console card that plugs
into a filer expansion slot.
or higher microprocessor. See alsoconven-
tional memory, expanded memory,
extended memory, memory manager,
and XMM.
H[SDQVLRQꢁFDUGꢀFRQQHFWRU
A connector on the computers system
board for plugging in an expansion card.
(06
Abbreviation for Expanded Memory Spec-
ification. See also expanded memory,
memory manager, and XMS.
H[WHQGHGꢀPHPRU\
RAMabove1MB. Mostsoftwarethatcan
use it, such as Windows, requires that ex-
tended memory be under the control of
anXMM.Seealsoconventionalmemory,
expanded memory, memory manager,
and XMM.
HQWHUSULVH
A systems-management software product
that is either a source or a receiver of SNMP
traps.
(3520
Acronym for erasable programmable
read-only memory.
H[WHUQDOꢀFDFKHꢀPHPRU\
A RAM cache using SRAM chips. Be-
cause SRAM chips operate at several
times the speed of DRAM chips, the
microprocessor can retrieve data and in-
structions faster from external cache
memory than from RAM.
(6'
Abbreviation for electrostatic discharge.
Refer to Safety Instructions at the front
Users Guide
of your
for a complete discus-
)
sion of ESD.
Abbreviation for Fahrenheit.
(60
Abbreviation for embedded server
management.
)$7
Acronym for file allocation table. The file
system structure used by MS-DOS to or-
ganize and keep track of file storage. The
(6',
Acronym for enhanced small-device
interface.
®
®
Microsoft Windows NT operating sys-
tem can optionally use a FAT file system
structure.
H[SDQGHGꢀPHPRU\
)&&
AbbreviationforFederalCommunications
Commission.
A technique for accessing RAM above
1 MB. To enable expanded memory on
your computer, you must use an EMM.
You should configure your system to sup-
port expanded memory only if you run
application programs that can use (or
require) expanded memory. See also
conventional memory, EMM, extended
memory, and memory manager.
ILOHU
A filer is a dedicated, special-purpose
networkdataserverthatprovidesfastand
reliable file service to network clients
connected to Ethernet networks.
Glossary
7
IODVKꢀPHPRU\
in systems with a very high storage capac-
ity. However, guarded configurations are
significantly slower for applications that
frequently write to the array, because
eachattempttowritetothearrayrequires
multiple read and write commands to
maintain the parity information. If this is a
problem, mirroringorduplexingisabetter
choice. See also mirroring, RAID 4, and
RAID 5.
A type of EEPROM chip that can be re-
programmed from a utility on diskette
while still installed in a computer; most
EEPROMchipscanonlyberewrittenwith
special programming equipment.
IRUPDW
Toprepareahard-diskdriveordiskettefor
storing files. An unconditional format de-
letes all data stored on the disk. The
format command in MS-DOS 5.0 or higher
includes an option that allows you to unfor-
mat a disk, if you have not yet used the disk
for file storage.
*8,
Acronym for graphical user interface.
K
Abbreviation for hexadecimal. A base-16
numbering system, often used in pro-
gramming to identify addresses in the
computers RAM and I/O memory ad-
dresses for devices. The sequence of
decimal numbers from 0 through 16, for
example, is expressed in hexadecimal no-
tation as: 0, 1, 2, 3, 4, 5, 6, 7, 8, 9, A, B,
C, D, E, F, 10. In text, hexadecimal num-
IW
Abbreviation for feet.
)73
Abbreviation for file transport protocol.
J
Abbreviation for gram(s).
h
bers are often followed by or preceded
0x
by . MS-DOS conventionalmemorythe
*
first 640 KB of memory addressesis from
00000h to 9FFFFh; the MS-DOS upper
memory areamemory addresses be-
tween 640 KB and 1 MBis from A0000h
to FFFFFh.
Abbreviation for gravities.
*%
Abbreviation for gigabyte(s). A gigabyte
equals 1,024 megabytes or
1,073,741,824 bytes.
KHDWꢀVLQN
A metal plate with metal pegs or ribs
that help dissipate heat. Some micro-
processors include a heat sink.
*,'
Group identification number.
JURXS
A group of users defined in the filers
+0$
Abbreviation for high memory area. The
first 64 KB of extended memory above
1 MB. A memory manager that conforms
to the XMS can make the HMA a direct
extension of conventional memory. See
also conventional memory, memory
manager, uppermemoryarea, andXMM.
/etc/group
file.
JUDSKLFVꢀFRSURFHVVRU
See coprocessor.
JUDSKLFVꢀPRGH
See video mode.
+,3
JXDUGLQJ
Acronym for the Dell OpenManage Hard-
ware Instrumentation Package. HIP
provides seamless integration with the In-
tel LANDesk Server Manager. Together,
HIP and LANDesk Server Manager allow
you to monitor your Dell servers and track
status information about Dell server
components.
A type of data redundancythat uses a set
of physical drives to store data and a sin-
gle, additional drive to store parity data.
Using guarding, the users data is protect-
ed from the loss of a single drive.
Guarding is sometimes preferred over
mirroringbecauseitismorecosteffective
8
Dell PowerVault 720N, 740N, and 760N Users Guide
KRVWꢀDGDSWHU
LQWHUQDOꢀPLFURSURFHVVRUꢀFDFKH
An instruction and data cache built in to
the microprocessor. The Pentium micro-
processor, for example, includes a 16-KB
internal cache, which is set up as an 8-KB
read-only instruction cache and an 8-KB
read/write data cache.
A host adapter implements communica-
tion between the computers bus and the
controllerforaperipheral. (Hard-diskdrive
controller subsystems include integrated
host adapter circuitry.) To add a SCSI ex-
pansion bus to your system, you must
install the appropriate host adapter.
,3
Acronym for Internet Protocol.
+3)6
Abbreviation for the High Performance
File System option in the Windows NT
operating system.
,3;
Acronym for internetwork packet
exchange.
+773
Hypertext Transfer Protocol. An object-ori-
ented protocol that can be used for many
tasks, such as name servers and distrib-
uted object management systems,
through extension of its request methods
(commands).
,54
Abbreviation for interrupt request. A sig-
nal that data is about to be sent to or
received by a peripheral travels by an IRQ
line to the microprocessor. Each peripher-
al connection must be assigned an IRQ
number. For example, the first serial port
in your computer (COM1) is assigned to
IRQ4 by default. Two devices can share
thesameIRQassignment,butyoucannot
operate both devices simultaneously.
+]
Abbreviation for hertz.
,ꢎ2
Abbreviation for input/output. The key-
board and a printer, for example, are I/O
devices. In general, I/O activity can be dif-
ferentiated from computational activity.
For example, when a program sends a
document to the printer, it is engaging in
I/O activity; when the program sorts a list
of terms, it is engaging in computational
activity.
,6$
Acronym for Industry-Standard Architec-
ture. A 16-bit expansion bus design. The
expansion-card connectors in an ISA com-
puter are also compatible with 8-bit ISA
expansion cards.
,60
Abbreviation for Internet Service
Manager.
,'
Abbreviation for identification.
,7(
Abbreviation for information technology
equipment.
,+9
Abbreviation for independent hardware
vendor.
-(,'$
AcronymforJapaneseElectronicIndustry
Development Association.
LQꢁEDQG
Communication across the network be-
tween the console and server.
.
LQWHUODFLQJ
Abbreviation for kilo-, indicating 1,000.
A technique for increasing video resolu-
tion by only updating alternate horizontal
lines on the screen. Because interlacing
can result in noticeable screen flicker,
most users prefer noninterlaced video
adapter resolutions.
.%
Abbreviation for kilobyte(s), 1,024 bytes.
.%ꢎVHF
Abbreviation for kilobyte(s) per second.
Glossary
9
.ELWꢐVꢑ
Abbreviation for kilobit(s), 1,024 bits.
microprocessor chip to be installed or re-
moved with minimal stress to the device.
/,0
Acronym for Lotus/Intel/Microsoft. LIM
usually refers to version 4.0 of the EMS.
.ELWꢐVꢑꢎVHF
Abbreviation for kilobit(s) per second.
NH\ꢀFRPELQDWLRQ
/1
Abbreviation for load number.
A command requiring that you press mul-
tiple keys at the same time. For example,
youcanrebootyourcomputerbypressing
the <Ctrl><Alt><Del> key combination.
ORFDOꢀEXV
On a computer with local-bus expansion
capability, certain peripheral devices
(such as the video adapter circuitry) can
be designed to run much faster than they
would with a traditional expansion bus.
Some local-bus designs allow peripherals
to run at the same speed and with the
same width data path as the computers
microprocessor.
NJ
Abbreviation for kilogram(s), 1,000 grams.
N+]
Abbreviation for kilohertz, 1,000 hertz.
/$1
Acronym for local area network. A LAN
system is usually confined to the same
building or a few nearby buildings, with all
equipment linked by wiring dedicated
specifically to the LAN.
/37Q
The MS-DOS device names for the first
through third parallel printer ports on your
computer are LPT1, LPT2, and LPT3.
OE
Abbreviation for pound(s).
/81
Acronym for logical unit number.
/&'
P
Abbreviation for liquid crystal display. A
low-power display often used for note-
book computers. An LCD consists of a
liquid crystal solution between two
sheets of polarizing material. An electric
current causes each crystal to act like a
shutter that can open to allow light past
or close to block the light.
Abbreviation for meter(s).
P$
Abbreviation for milliampere(s).
P$K
Abbreviation for milliampere-hour(s).
/'60
Abbreviation for LANDesk Server
Manager.
PDWKꢀFRSURFHVVRU
See coprocessor.
0%
Abbreviation for megabyte(s). The term
megabyte
means 1,048,576 bytes; how-
/('
ever, when referring to hard-disk drive
storage, the term is often rounded to mean
1,000,000 bytes.
Abbreviation for light-emitting diode. An
electronic device that lights up when a
current is passed through it.
0%5
Abbreviation for master boot record.
/,)
Acronym for low insertion force. Some
computers use LIF sockets and connec-
tors to allow devices such as the
0'$
Abbreviation for monochrome display
adapter.
10
Dell PowerVault 720N, 740N, and 760N Users Guide
PHPRU\
PLUURULQJ
A computer can contain several different
forms of memory, such as RAM, ROM,
and video memory. Frequently, the word
A type of data redundancythat uses a set
of physical drivesto store data and one or
more sets of additional drives to store du-
plicate copies of the data. Mirroring is the
preferred data redundancy technique in
lower-capacity systems and in systems
where performance is extremely impor-
tant. See also guarding, RAID 1, and RAID
10.
memory
is used as a synonym for RAM; for
example, an unqualified statement such as
… a computer with 8 MB of memory re-
fers to a computer with 8 MB of RAM.
PHPRU\ꢀDGGUHVV
A specific location, usually expressed as
a hexadecimal number, in the computers
RAM.
PP
Abbreviation for millimeter(s).
PHPRU\ꢀPDQDJHU
PRXVH
A utility that controls the implementation
of memory in addition to conventional
memory, such as extended or expanded
memory.Seealsoconventionalmemory,
EMM, expanded memory, extended
memory, HMA, upper memory area, and
XMM.
A pointing device that controls the
movement of the cursor on a screen.
Mouse-aware software allows you to ac-
tivate commands by clicking a mouse
button while pointing at objects displayed
on the screen.
PV
Abbreviation for millisecond(s).
0*$
Abbreviation for monochrome graphics
adapter.
06ꢁ'26
AbbreviationforMicrosoftDiskOperating
System.
0+]
Abbreviation for megahertz.
07%)
Abbreviation for mean time between
failures.
0,%
Acronym for management information
base.
PXOWLIUHTXHQF\ꢀPRQLWRU
0,)
Abbreviation for management informa-
tion format.
A monitor that supports several video
standards. A multifrequency monitor can
adjusttothefrequencyrangeofthesignal
from a variety of video adapters.
PLFURSURFHVVRU
P9
Abbreviation for millivolt(s).
Because it is the primary computational
chip inside the computer, it is customary
to refer to the microprocessor as the
computers brain. The microprocessor
containsanarithmeticprocessingunitand
a control unit. Software written for one
microprocessor must usually be revised
1)6
Network File System. A protocol for
networking PCs.
CPU
to run on another microprocessor.
a synonym for microprocessor.
is
1,&
Acronym for network interface card.
PLQ
Abbreviation for minute(s).
1L&DG
Acronym for nickel cadmium.
1L0+
Abbreviation for nickel-metal hydride.
Glossary
11
1/0
SDUDPHWHU
A value or option that you specify to a pro-
gram. A parameter is sometimes called a
®
®
Acronym forNovell NetWare Loadable
Module.
switch
argument
.
or an
10,
SDUWLWLRQ
You can divide a hard-disk drive into mul-
partitions
with the fdisk command. Each partition can
contain multiple logical drives. For example,
you could partition a 200-MB hard-disk drive
into two physically separate partitions with
threelogicaldriveassignments,asshownin
the following table.
Abbreviationfornonmaskableinterrupt.A
device sends an NMI to signal the micro-
processor about hardware errors, such as
a parity error.
tiple physical sections called
QRQLQWHUODFHG
A technique for decreasing screen flicker
by sequentially refreshing each horizontal
line on the screen.
ꢀꢀ3DUWLWLRQLQJꢀWKHꢀ+DUGꢁ'LVNꢀ'ULYH
QV
Abbreviation for nanosecond(s), one bil-
lionth of a second.
3K\VLFDOꢁ3DUWLWLRQVꢁDQGꢁ6L]HV
Partition 1 120 MB
Partition 2 80 MB
17)6
Abbreviation for the NT File System op-
tion in the Windows NT operating system.
/RJLFDOꢁ'ULYHꢁ$VVLJQPHQWVꢁDQGꢁ6L]HV
Drive C 120 MB
Drive D 50 MB
Drive E 30 MB
195$0
Abbreviation for nonvolatile random-
access memory. Memory that does not
lose its contents when you turn off your
computer. NVRAM is used for maintain-
ing the date, time, and system setup
options.
After partitioning the hard-disk drive, you
must format each logical drive with the
format command.
26ꢎꢅ
Abbreviation for Operating System/2.
3&ꢀ&DUG
Slightlylargerthanacreditcard, aPCCard
is a removable I/O cardsuch as a mo-
dem, LAN, SRAM, or flash memory
cardthat adheres to the PCMCIA stan-
dards. See also PCMCIA.
RXWꢁRIꢁEDQG
Communications that do not use the net-
work but are passed via modem. The out-
of-band path is used for remote manage-
ment of a server or for accessing server
information when the server or network
is down.
3&,
Abbreviation for Peripheral Component
Interconnect. A standard for local-bus
implementation developed by Intel
Corporation.
273
Abbreviation for one-time programmable.
3&0&,$
SDUDOOHOꢀSRUW
Abbreviation for Personal Computer
Memory Card International Association.
See also PC Card.
An I/O port used most often to connect a
parallel printer to your computer. You can
usuallyidentifyaparallelportonyourcom-
puter by its 25-hole connector.
3'&
Primary Domain Controller. The domain
controllerthathasnegotiatedtobe, orhas
been assigned as, the primary authentica-
tion server for the domain.
12
Dell PowerVault 720N, 740N, and 760N Users Guide
SHULSKHUDOꢀGHYLFH
Virtual memory, a method for
increasing addressable memory by
using the hard-disk drive
An internal or external devicesuch as a
printer, a disk drive, or a keyboardcon-
nected to a computer.
The Windows NT 32-bit operating system
runs in protected mode. MS-DOS cannot
run in protected mode; however, some
programs that you can start from
MS-DOSsuch as Windowsare able to
put the computer into protected mode.
3*$
Abbreviation for pin grid array, a type of
microprocessor socket that allows you to
remove the microprocessor chip.
SL[HO
36ꢎꢅ
Abbreviation for Personal System/2.
Arranged in rows and columns, a pixel is
a single point on a video display. Video
resolution640 x 480, for exampleis
expressed as the number of pixels across
by the number of pixels up and down.
363%
Abbreviation for power-supply paralleling
board.
3267
39&
Abbreviation for polyvinyl chloride.
Acronym for power-on self-test. Before
theoperatingsystemloadswhenyouturn
onyourcomputer, thePOSTtestsvarious
system components such as RAM, the
disk drives, and the keyboard.
4,&
Abbreviation for quarter-inch cartridge.
5$,'
SSP
Abbreviation for pages per minute.
Acronym for redundant arrays of indepen-
dentdisks. Thisphrasewasintroducedby
DavidPatterson,GarthGibson,andRandy
Katz at the University of California at Ber-
keley in 1987. The goal of RAID is to use
multiple small, inexpensive disk drives to
provide high storage capacity and perfor-
mancewhilemaintainingorimprovingthe
reliability of the disk subsystem.
34)3
Abbreviation for plastic quad flat pack, a
type of microprocessor socket in which
the microprocessor chip is permanently
mounted.
351
A synonym for the MS-DOS device name
LPT1.
Patterson, Gibson, and Katz described
five different methods, which are known
as RAID levels 1 through 5. Each level
uses one or more extra drives to provide
a means of recovering data lost when a
disk fails, so that the effective failure rate
of the whole disk subsystem becomes
very low.
SURJUDPꢀGLVNHWWHꢀVHW
The set of diskettes from which you can
perform a complete installation of an ap-
plication program. When you reconfigure
aprogram, youoftenneeditsprogramdis-
kette set.
Recently, Katz has defined a sixth meth-
od, RAID 6, which improves reliability
even further, and a configuration that pro-
vides no data recovery has popularly
become known as RAID 0.
SURWHFWHGꢀPRGH
An operating mode supported by 80286
or higher microprocessors, protected
mode allows operating systems to
implement:
5$,'ꢀꢍ
RAID 0 is commonly called
was not originally defined as a RAID level
but has since come into popular use. In
this array configuration, data is written
A memory address space of 16 MB
(80286 microprocessor) to 4 GB
(Intel386 or higher microprocessor)
striping
. This
Multitasking
Glossary
13
sequentiallyacrosstheavailabledisksand
no redundancy is provided. RAID 0 config-
urations provide very high performance
but relatively low reliability. RAID 0 is the
best choice when DSA controller cards
are duplexed. See also striping.
5$0
Acronym for random-access memory.
The computers primary temporary stor-
age area for program instructions and
data. Each location in RAM is identified by
memory address
. Any
a number called a
information stored in RAM is lost when you
turn off your computer.
5$,'ꢀꢃ
RAID 1 is commonly called
mirroring
.
RAID 1 also uses striping, so RAID 1 may
be regarded as the mirroring of RAID 0
configurations. RAID 1 is the best choice
inhigh-availabilityapplicationsthatrequire
highperformanceorrelativelylowdataca-
pacity. See also mirroring, RAID 10,
striping.
5$0'$&
Acronym for random-access memory
digital-to-analog converter.
UHDGꢁRQO\ꢀILOH
A read-only file is one that you are prohib-
ited from editing or deleting. A file can
have read-only status if:
5$,'ꢀꢇ
Its read-only attribute is enabled.
guarding
. It
RAID 4 is commonly called
uses data striping, like RAID 0, but adds a
single, dedicated parity drive. The parity
data stored on this drive can be used to
recoverdatalostfromasinglefaileddrive.
RAID 4 configurations write data slowly
because parity data has to be generated
and written to the parity drive, and the
generation of the parity data frequently re-
quires reading data frommultiple physical
drives. See also guarding and striping.
It resides on a physically write-
protected diskette.
It is located on a network in a
directory to which the system
administrator has assigned read-
only rights to you.
UHDOꢀPRGH
An operating mode supported by 80286
or higher microprocessors, real mode
imitates the architecture of an 8086
microprocessor. Designed to run in real
mode, MS-DOS (unassisted by additional
software techniques) can address only
640 KB of conventional memory.
5$,'ꢀꢈ
RAID 5, like RAID 4, is commonly called
guarding
. RAID 5 is identical to RAID 4,
except that the parity data is distributed
evenly across all physical drives instead
of a parity drive. In configurations using a
large number of physical drives in which
a large number of simultaneous small
write operations are being performed,
RAID 5 offers potentially higher perfor-
mance than RAID 4. RAID 4 and RAID 5
configurations are appropriate in high-
availability applications where perfor-
mance is less critical or where high data
capacity is required. See also guarding.
UHIUHVKꢀUDWH
The frequency, measured in Hz, at which
the screens horizontal lines are re-
charged. A monitors refresh rate is also
vertical frequency
referred to as its
.
5(1
Abbreviation for ringer equivalence
number.
5$,'ꢀꢃꢍ
5),
Abbreviation for radio frequency
interference.
RAID 10 is a mirroring technique in which
data is duplicated across two identical
RAID 0 arrays or hard-disk drives. All data
on a physical drive in one array is duplicat-
5*%
Abbreviation for red/green/blue.
mirrored
, on a drive in the second
ed, or
array. Mirroring offers complete redun-
dancy of data for greater data security.
See also mirroring, RAID 1, and striping.
14
Dell PowerVault 720N, 740N, and 760N Users Guide
520
VHULDOꢀSRUW
Acronym for read-only memory. Your
computer contains some programs es-
sential to its operation in ROM code.
Unlike RAM, a ROM chip retains its
contents even after you turn off your com-
puter. Examples of code in ROM include
theprogramthatinitiatesyourcomputers
boot routine and the POST.
An I/O port used most often to connect a
modemoramousetoyourcomputer.You
can usually identify a serial port on your
computer by its 9-pin connector.
VKDGRZLQJ
A computers system and video BIOS
code is usually stored on ROM chips.
Shadowing refers to the performance-
enhancementtechniquethatcopiesBIOS
code to faster RAM chips in the upper
memory area (above 640 KB) during the
boot routine.
USP
Abbreviation for revolutions per minute.
57&
Abbreviation for real-time clock. Battery-
powered clock circuitry inside the com-
puter that keeps the date and time after
you turn off the computer.
VKDUH
A directory or directory structure on the
filer that has been made available to net-
work users and can be mapped to a drive
letter on a CIFS client.
6&6,
Acronym for small computer system in-
terface. An I/O bus interface with faster
data transmission rates than standard
ports. You can connect up to seven devic-
es to one SCSI interface.
60$57
Acronym for Self-Monitoring Analysis Re-
porting Technology. A technology that
allows hard-disk drives to report errors
and failures to the system BIOS, which
then displays an error message on the
screen. To take advantage of this technol-
ogy, you must have a SMART-compliant
hard-disk drive and the proper support in
the system BIOS.
6'06
Abbreviation for SCSIdevice management
system.
6'5$0
Abbreviation for Synchronous Dynamic
Random Access Memory.
60%
Acronym for system management bus.
6'6
Abbreviation for scalable disk system.
600
Abbreviation for server monitor module.
An ISAexpansion card that provides a mo-
dem interface for out-of-band monitoring
and control of a server.
6(&
Abbreviation for single-edge connector
cartridge.
603
Abbreviation for symmetric
mutiprocessing.
VHF
Abbreviation for second(s).
VHFWRU
606
Abbreviation for Systems Management
Server.
The fundamental unit of data access for a
hard-disk drive. For PC-compatible sys-
tems, a sector is usually 512 bytes. See
also block and block size.
6103
Abbreviation for Simple Network Man-
agement Protocol.
VHULDOꢀFRQVROH
An ASCII or ANSI terminal attached to a
filers serial port. Used to monitor and
manage filer operations.
Glossary
15
64/
Abbreviation for Structured Query
Language.
V\VWHPꢀGLVNHWWH
Systemdisketteisasynonymfor
bootable
diskette
.
VWULSLQJ
V\VWHPꢀPHPRU\
System memory is a synonym for
RAM
.
In composite drivers with two or more
physicaldrives, thedrivearraysubsystem
uses a method of data storage called strip-
ing. With this method, data is divided into
a series of pieces called blocks and each
data block is stored on a different physical
drive. When each drive contains a block
of data, the process starts over with the
first physical drive. By carefully selecting
the size of the data block, the chance that
the information needed can be read from
or written to multiple physical drives at
once is increased, greatly increasing the
performance of the composite drive. See
also block, block size, and RAID.
6\VWHPꢀ6HWXSꢀSURJUDP
System Setup program options allow you
to configure your computers hardware.
Some options in the System Setup
program require that you reboot the
computer in order to make a hardware-
configuration change. Because the Sys-
tem Setup program is stored in NVRAM,
any options that you set remain in effect
until you change them again.
V\VWHPꢃLQLꢀILOH
When you start Windows, it consults the
system.ini file to determine a variety of
options for the Windows operating
environment. Among other things, the
system.inifilerecordswhichvideo,mouse,
and keyboard drivers are installed for
Windows.
65$0
Abbreviation for static random-access
memory. Because SRAM chips do not
require continual refreshing, they are sub-
stantially faster than DRAM chips. SRAM
is used mostly for external cache
memory.
Running the Control Panel or Windows
Setupprogrammaychange options in the
system.ini file. On other occasions, you
may need to change or add options to the
system.ini file manually with a text editor,
such as Notepad.
69*$
Abbreviation for super video graphics
array. See also VGA.
VZLWFK
See parameter.
7&3ꢎ,3
Abbreviation for Transmission Control
Protocol/Internet Protocol.
V\QFꢀQHJRWLDWLRQ
Sync negotiation is a SCSI feature that
allows the host adapter and its attached
SCSI devices to transfer data in synchro-
nous mode. Synchronous data transfer is
faster than asynchronous data transfer.
7,5&3
Abbreviation for Transport Independent
Remote Procedure Call.
WHUPLQDWRU
Some devices, especially disk drives, con-
tain a terminator to absorb and dissipate
excess current. When more than one
such device is connected in a series, you
may need to remove the terminatoror
change a jumper setting to disable itun-
less it is the last device in the series.
However,somedeviceshaveterminators
that should never be removed or disabled.
V\QWD[
The rules that dictate how you must type
a command or instruction so thatthe com-
puter will understand it.
V\VWHPꢀERDUG
As the main circuit board, the system
board usually contains most of your filers
integral components, such as the micro-
processor, RAM, and expansion-card
connectors.
16
Dell PowerVault 720N, 740N, and 760N Users Guide
WH[WꢀHGLWRU
8,'
An application program for editing text
files consisting exclusively of ASCII
characters. MS-DOS Editor and Notepad
(in Windows) are text editors, for exam-
ple. Most word processors use
proprietary file formats containing binary
characters, although some can read and
write text files.
User identification number.
8/
Abbreviation for Underwriters
Laboratories.
80%
Abbreviation for upper memory blocks.
See also conventional memory, HMA,
memory manager, and upper memory
area.
WH[WꢀPRGH
See video mode.
7)7
Abbreviation for thin film transistor. A flat-
panel display for notebook computers
where each pixel is controlled by one to
four transistors.
XSSHUꢀPHPRU\ꢀDUHD
The 384 KB of RAM located between
640 KB and 1 MB. If the computer has an
Intel386 or higher microprocessor, a soft-
memory manager
ware utility called a
can
WSL
Abbreviation for tracks per inch.
create UMBs in the upper memory area, in
which you can load device drivers and
memory-resident programs. See also
conventional memory, HMA, and memo-
ry manager.
WUDS
An alert, error, or system message from
a server reporting an exception (for exam-
ple, a device failure or a threshold
violation) in a server.
836
Abbreviation for uninterruptible power
supply. A battery-powered unit that
automatically supplies power to your
computer in the event of an electrical
failure.
765
Abbreviation for terminate-and-stay-
resident. A TSR program runs in the
background. Most TSR programs imple-
ment a predefined key combination
(sometimes referred to as a hot key)
that allows you to activate the TSR pro-
grams interface while running another
MS-DOS program. When you finish using
the TSR program, you can return to the
other application program and leave the
TSR program resident in memory for later
use.
862&
Abbreviation for Universal Service Order-
ing Code.
XWLOLW\
A program used to manage system re-
sources memory, disk drives, or
printers, for example. The diskcopy com-
mand for duplicating diskettes and the
himem.sys device driver for managing ex-
tended memory are utilities included in
MS-DOS.
Because MS-DOS is not designed to
support multiple programs running simul-
taneously, TSR programs can sometimes
cause memory conflicts. When trouble-
shooting, rule out the possibility of such a
conflict by rebooting your computer with-
out starting any TSR programs.
9
Abbreviation for volt(s).
9$&
Abbreviation for volt(s) alternating
current.
8'$
Acronym for user-defined attribute.
8'3
Abbreviation for User Datagram Protocol.
Glossary
17
9&&,
AbbreviationforVoluntaryControlCouncil
for Interference.
application programs and operating envi-
ronments in a variety of video modes.
On most current Dell computers, a video
adapter is integrated into the system
board. Also available are many video
adapter cards that plug into an expansion-
card connector.
9'&
Abbreviation for volt(s) direct current.
9'(
Abbreviation for
Elektrotechniker
Verband Deutscher
Video adapters can include memory sep-
aratefromRAMonthesystemboard. The
amount of video memory, along with the
adapters video drivers, may affect the
number of colors that can be simulta-
neously displayed. Video adapters can
also include their own coprocessor chip
for faster graphics rendering.
.
9'6
Abbreviation for Virtual Direct Memory
Access Services.
9(6$
Acronym for Video Electronics Standards
Association.
YLGHRꢀGULYHU
Graphics-mode application programs and
operating environments, such as Win-
dows, often require video drivers in order
to display at a chosen resolution with the
desired number of colors. A program may
include some generic video drivers.
Any additional video drivers may need to
match the video adapter; you can find
these drivers on a separate diskette with
your computer or video adapter.
9*$
Abbreviationforvideographicsarray.VGA
and SVGA are video standards for video
adapters with greater resolution and color
display capabilities than EGA and CGA,
the previous standards.
To display a program at a specific resolu-
tion, you must install the appropriate
video drivers and your monitor must sup-
port the resolution. Similarly, the number
of colors that a program can display de-
pends on the capabilities of the monitor,
the video driver, and the amount of mem-
ory installed for the video adapter.
YLGHRꢀPHPRU\
Most VGA and SVGA video adapters in-
clude VRAM or DRAM memory chips in
addition to your computers RAM. The
amount of video memory installed prima-
rily influences the number of colors that a
program can display (with the appropriate
video drivers and monitor capability).
9*$ꢀIHDWXUHꢀFRQQHFWRU
On some systems with a built-in VGA
video adapter, a VGA feature connector
allows you to add an enhancement adapt-
er, such as a video accelerator, to your
computer. A VGA feature connector can
YLGHRꢀPRGH
Video adapters normally support multiple
text and graphics display modes. Charac-
ter-based software (such as MS-DOS)
displaysintextmodesthatcanbedefined
VGA pass-through
also be called a
connector
.
x
y
as columnsby rowsofcharacters.Graph-
ics-based software (such as Windows)
displays in graphics modes that can be de-
YLGHRꢀDGDSWHU
The logical circuitry that providesin
combination with the monitor or display
your computers video capabilities. A
video adapter may support more or fewer
features than a specific monitor offers.
Typically, a video adapter comes with
video drivers for displaying popular
x
y
z
fined as horizontal by vertical pixels by
colors.
YLGHRꢀUHVROXWLRQ
Video resolution640 x 480, for exam-
pleisexpressedasthenumberofpixels
across by the number of pixels up and
down. To display a program at a specific
18
Dell PowerVault 720N, 740N, and 760N Users Guide
graphics resolution, you must install the
appropriate video drivers and your moni-
tor must support the resolution.
9/ꢁ%XV
An abbreviation for VESA local bus. A
standard for local bus implementation de-
veloped by the Video Electronics
Standards Association.
YLHZHU
A system running the remote control
viewer window, usually the console.
9/6,
Abbreviation for very-large-scale
integration.
YLUWXDOꢀꢋꢍꢋꢉꢀPRGH
An operatingmodesupported by Intel386
or higher microprocessors, virtual 8086
mode allows operating environments
such as Windowsto run multiple pro-
grams in separate 1-MB sections of
memory. Each 1-MB section is called a
9SS
Abbreviation for peak-point voltage.
95$0
Abbreviation for video random-access
memory.SomevideoadaptersuseVRAM
chips (or a combination of VRAM and
DRAM) to improve video performance.
VRAM is dual-ported, allowing the video
adapter to update the screen and receive
new image data at the same time.
virtual machine
.
YLUWXDOꢀPHPRU\
A method for increasing addressable
RAM by using the hard-disk drive.
(MS-DOS does not support true virtual
memory, which must be implemented at
the operating system level.) For example,
in a computer with 8 MB of RAM and
16 MB of virtual memory set up on the
hard-disk drive, the operating system
would manage the system as though it
had 24 MB of physical RAM.
:
Abbreviation for watt(s).
ZLQꢃLQLꢀILOH
When you start Windows, it consults the
win.ini file to determine a variety of options
for the Windows operating environment.
Among otherthings, thewin.ini file records
what printer(s) and fonts are installed for
Windows. The win.ini file also usually
includes sections that contain optional set-
tingsforWindowsapplicationprogramsthat
are installed on the hard-disk drive.
YLUXV
A self-starting program designed to incon-
venience you. Virus programs have been
known to corrupt the files stored on a
hard-disk drive or to replicate themselves
until a system or network runs out of
memory.
Running the Control Panel or Windows
Setup program may change optionsinthe
win.ini file. On other occasions, you may
needtochangeoraddoptionstothewin.ini
file manually with a text editor, such as
Notepad.
The most common way that virus pro-
grams move from one system to another
is via infected diskettes, from which
they copy themselves to the hard-disk
drive. To guard against virus programs,
you should do the following:
ZRUNJURXS
Periodically run a virus-checking util-
ity on your computers hard-disk
drive
A collection of computers running Mi-
crosoft Windows NT or Windows for
Workgroups operating systems that is
grouped for browsing and sharing.
Always run a virus-checking utility on
any diskettes (including commer-
cially sold software) before using
them
ZULWHꢁSURWHFWHG
Read-only files are said to be
write-
protected
. You can write-protect a 3.5-inch
diskettebyslidingitswrite-protecttabtothe
open position and a 5.25-inch diskette by
Glossary
19
placing an adhesive label over its write-
protect notch.
;06
Abbreviation for eXtended Memory Spec-
ification. See also EMS, extended
memory, and memory manager.
:::
Abbreviation for World Wide Web.
=,)
;00
Acronym for zero insertion force. Some
computers use ZIF sockets and connec-
tors to allow devices such as the
microprocessor chip to be installed or
removed with no stress applied to
the device.
Abbreviation for extended memory man-
ager, a utility that allows application
programs and operating environments to
useextendedmemoryinaccordancewith
theXMS.Seealsoconventionalmemory,
EMM, expanded memory, extended
memory, and memory manager.
20
Dell PowerVault 720N, 740N, and 760N Users Guide
,QGH[
$
Aliases, time zone names for, D-6
Antartica, time zone names for, D-2
Asia, time zone names for, D-2
Atlantic, time zone names for, D-3
Canada, time zone names for, D-3
caution message, xviii
CE notice for European Union, E-4
CIFS client configuration
steps, 9-2
authenticating users
using passwd and group files, 7-1
with Windows NT domain controller,
7-1
CIFS shares
access
assigning rights, 8-1
scope, 8-1
without Windows NT domain
cifs command, 8-1
%
setup command, 4-1
Setup Wizard, 2-1
bootable system diskettes
booting from, B-1
creating on a UNIX client, B-6
creating on a Windows client, B-6
configuring clients to access filer
CIFS, 9-1
NFS, 9-1
Brazil, time zones for, D-3
BSMI notice for Taiwan, E-10
Index
1
FilerView
accessing, 5-1
'
Data ONTAP
administering the filer, 5-1
overview, 5-1
prerequisites, 5-1
installing, overview, B-1
using the interface, 5-2
Setup Wizard, 3-2
GMT, time zone names for, D-4
domain
features, C-2
Windows NT or Windows Workgroup,
C-1
accessing from
adding entries
from UNIX/NFS, 7-6
Windows 9x, 7-6
drives
(
See
electrostatic discharge.
ESD
EN 55022 compliance for Czech
environmental specifications, A-3
ESD, xi
HTTP
Etc, time zone names for, D-4
Europe, time zone names for, D-4
IC notice for Canada, E-3
)
DHCP, 3-1
filer
technical specifications, A-1
filer software
CD and diskettes, 1-2
installing Data ONTAP, B-1
updates, 1-2
.
filer, features, 1-1
key combinations, xvii
2
Dell PowerVault 720N, 740N, and 760N Users Guide
setting up, 7-1
0
permissions
Mexico, time zone names for, D-5
MIB, Dell custom, 1-2
PC-style, C-3
physical specifications, A-3
ping command, 4-4
microprocessor specifications, A-1
MOC notice for South Korea, E-6
Polish notice, E-7
ports and connectors specifications, A-2
1
network connections
regulatory notices, E-1
return policy
U.S. and Canada, F-5
NFS client configuration
filer directories, 9-4
name resolution, DNS or NIS, 9-3
overview, 9-3
safety instructions
NOM information for Mexico, E-9
notational conventions, xvii
SecureShare Access, 10-1
SecureShare Account Migrator, 10-2
3
Pacific, time zone names for, D-5
passwd file
accessing from
setup command, 4-4
overview, 4-1
SecureShare, installing, 10-1
adding entries from a UNIX client, 7-5
adding entries from a Windows/NFS
client, 7-6
Setup Wizard
basic configuration, 3-1
DHCP server
adding entries, overview, 7-4
default, 7-2
filer with, 3-2
location, 7-1
filer without, 3-4
Index
3
different from setup command, 2-1
how to use, 3-2
IP address, 3-1
static, 3-2
overview, 2-1
verifying network connections, 3-5, 4-4
Canada, F-3
software
configuring clients to access, 9-1
Windows NT domain
adding a filer, C-4
specifications, of the filer, A-1
CIFS configuration, C-1
Windows Workgroup
CIFS configuration, C-1
definition, C-2
7
technical specifications, A-1
terminology conventions, xvii
typographical conventions, xvii
year 2000 compliance, F-6
8
United States, time zone names for, D-6
4
Dell PowerVault 720N, 740N, and 760N Users Guide
|