Dell PowerVault 760N User Manual

Œ
'HOOŒꢀ3RZHU9DXOWŒꢀꢁꢂꢃ1ꢄꢀꢁꢅꢃ1ꢄꢀDQGꢀꢁꢆꢃ1  
86(5·6ꢁ*8,'(  
333%%%%35(/,0,  
35  
ZZZꢀGHOOꢀFRP  
6DIHW\ꢀ,QVWUXFWLRQV  
Use the following safety guidelines to ensure your own personal safety and to help  
protect your computer or storage system from potential damage.  
Throughout this guide, blocks of text may be accompanied by an icon and printed in  
bold type or in italic type. These blocks of text are notes, cautions, and warnings, and  
they are used as follows:  
NOTE: A NOTE contains important information that helps you install or operate the  
system efficiently.  
&$87,21ꢀꢁ$ꢁ&$87,21ꢁFRQWDLQVꢁLQVWUXFWLRQVꢁWKDWꢁ\RXꢁPXVWꢁIROORZꢁWRꢁDYRLGꢁ  
GDPDJHꢁWRꢁWKHꢁHTXLSPHQWꢂꢁDꢁV\VWHPꢁFUDVKꢂꢁRUꢁORVVꢁRIꢁGDWDꢃ  
:$51,1*ꢀꢁ$ꢁ:$51,1*ꢁFRQWDLQVꢁLQVWUXFWLRQVꢁWKDWꢁ\RXꢁPXVWꢁIROORZꢁWRꢁDYRLGꢁ  
SHUVRQDOꢁLQMXU\ꢃ  
6DIHW\ꢀ:DUQLQJV  
Observe the following warnings while servicing this system:  
:$51,1*ꢀꢁ7KHUHꢁLVꢁDꢁGDQJHUꢁRIꢁDꢁQHZꢁEDWWHU\ꢁH[SORGLQJꢁLIꢁLWꢁLVꢁLQFRUUHFWO\ꢁ  
LQVWDOOHGꢃꢁ5HSODFHꢁWKHꢁEDWWHU\ꢁRQO\ꢁZLWKꢁWKHꢁVDPHꢁRUꢁHTXLYDOHQWꢁW\SHꢁUHFRPꢄ  
PHQGHGꢁE\ꢁWKHꢁPDQXIDFWXUHUꢁ'LVFDUGꢁXVHGꢁEDWWHULHVꢁDFFRUGLQJꢁWRꢁWKHꢁ  
PDQXIDFWXUHU·VꢁLQVWUXFWLRQVꢃ  
:$51,1*ꢀꢁ7KHꢁSRZHUꢁVXSSOLHVꢁLQꢁ\RXUꢁFRPSXWHUꢁRUꢁVWRUDJHꢁV\VWHPꢁPD\ꢁ  
SURGXFHꢁKLJKꢁYROWDJHVꢁDQGꢁHQHUJ\ꢁKD]DUGVꢂꢁZKLFKꢁFDQꢁFDXVHꢁERGLO\ꢁKDUPꢃꢁ  
2QO\ꢁWUDLQHGꢁVHUYLFHꢁWHFKQLFLDQVꢁDUHꢁDXWKRUL]HGꢁWRꢁUHPRYHꢁWKHꢁFRPSXWHUꢁ  
FRYHUVꢁDQGꢁDFFHVVꢁDQ\ꢁRIꢁWKHꢁFRPSRQHQWVꢁLQVLGHꢁWKHꢁFRPSXWHUꢁ  
:$51,1*ꢀꢁ7KLVꢁV\VWHPꢁPD\ꢁKDYHꢁPRUHꢁWKDQꢁRQHꢁSRZHUꢁVXSSO\ꢁFDEOHꢃꢁ7Rꢁ  
UHGXFHꢁWKHꢁULVNꢁRIꢁHOHFWULFDOꢁVKRFNꢂꢁDꢁWUDLQHGꢁVHUYLFHꢁWHFKQLFLDQꢁPXVWꢁGLVFRQꢄ  
QHFWꢁDOOꢁSRZHUꢁVXSSO\ꢁFDEOHVꢁEHIRUHꢁVHUYLFLQJꢁWKHꢁV\VWHPꢃ  
'µ/(l,7¥ꢀ832=251¨1©ꢁꢀ7HQWRꢀV\VWÅPꢀPÕzHꢀPÉWꢀYÉFHꢀQDS½MHFÉFKꢀNDEHOÕꢂꢀ.Hꢀ  
VQÉzHQÉꢀUL]LNDꢀÖUD]XꢀHOHNWULFNÙPꢀSURXGHPꢀMHꢀQXWQÅꢃꢀDE\ꢀvNROHQÙꢀVHUYLVQÉꢀWHFKQLNꢀ  
SÔHGꢀSURY½GÈQÉPꢀVHUYLVXꢀV\VWÅPXꢀRGSRMLOꢀYvHFKQ\ꢀQDS½MHFÉꢀNDEHO\ꢂ  
v
$'9$56(/ꢀꢁ'HWWHꢁV\VWHPꢁNDQꢁKDYHꢁPHUHꢁHQGꢁHWꢁVWU¡PIRUV\QLQJVNDEHOꢃꢁ)RUꢁ  
DWꢁUHGXFHUHꢁULVLNRHQꢁIRUꢁHOHNWULVNꢁVW¡GꢂꢁE¡UꢁHQꢁSURIHVVLRQHOꢁVHUYLFHWHNQLNHUꢁ  
IUDNREOHꢁDOOHꢁVWU¡PIRUV\QLQJVNDEOHUꢁI¡UꢁV\VWHPHWꢁVHUYLFHUHVꢃ  
9$52,786ꢀꢁ7lVVlꢁMlUMHVWHOPlVVlꢁYRLꢁROODꢁXVHDPSLꢁNXLQꢁ\NVLꢁYLUWDMRKWRꢃꢁ6lKꢄ  
N|LVNXYDDUDQꢁSLHQHQWlPLVHNVLꢁDPPDWWLWDLWRLVHQꢁKXROWRKHQNLO|QꢁRQꢁ  
LUURWHWWDYDꢁNDLNNLꢁYLUWDMRKGRWꢁHQQHQꢁMlUMHVWHOPlQꢁKXROWDPLVWDꢃ  
²³¨§¶²³¨©§¨°«¨ꢀꢁ§ÃÐÐÃâꢁÔËÔÕÈÏÃꢁÏÑÉÈÕꢁËÏÈÕßꢁÐÈÔÍÑÎßÍÑꢁÍÃÄÈÎÈÌꢁ  
àÎÈÍÕÓÑÒËÕÃÐËâꢂꢁꢁ¥ÑꢁËÊÄÈÉÃÐËÈꢁàÎÈÍÕÓËÚÈÔÍÑÆÑꢁÖÇÃÓÃꢁÍÅÃÎË×ËÙËÓÑÅÃÐÐÞÌꢁ  
ÕÈØÐËÍꢁÇÑÎÉÈÐꢁÑÕÍÎáÚËÕßꢁÅÔÈꢁÍÃÄÈÎËꢁàÎÈÍÕÓÑÒËÕÃÐËâꢁÒÓÈÉÇÈꢃꢁÚÈÏꢁÒÓËÔÕÖÒËÕßꢁ  
ÍꢁÑÄÔÎÖÉËÅÃÐËáꢁÔËÔÕÈÏÞꢂ  
2675=(‹(1,(ꢁꢀ6\VWHPꢀWHQꢀPR›HꢀPLHÂꢀZLÆFHMꢀQL›ꢀMHGHQꢀNDEHOꢀ]DVLODQLDꢂꢀ$E\ꢀ  
]PQLHMV]\ÂꢀU\]\NRꢀSRUD›HQLDꢀSU•GHPꢃꢀSU]HGꢀQDSUDZ•ꢀOXEꢀNRQVHUZDFM•ꢀV\VWHPXꢀ  
ZV]\VWNLHꢀNDEOHꢀ]DVLODQLDꢀSRZLQQ\ꢀE\ÂꢀRG•F]RQHꢀSU]H]ꢀSU]HV]NRORQHJRꢀWHFKQLNDꢀ  
REVXJLꢂꢀꢀ  
$'9$56(/ꢅꢁ'HWꢁHUꢁPXOLJꢁDWꢁGHWWHꢁV\VWHPHWꢁKDUꢁPHUꢁHQQꢁpQꢁVWU¡POHGQLQJꢃꢁ  
8QQJnꢁIDUHꢁIRUꢁVW¡Wꢀꢁ(QꢁHUIDUHQꢁVHUYLFHWHNQLNHUꢁPnꢁNREOHꢁIUDꢁDOOHꢁVWU¡POHGꢄ  
QLQJHUꢁI¡UꢁGHWꢁXWI¡UHVꢁVHUYLFHꢁSnꢁV\VWHPHWꢃ  
9$51,1*ꢀꢁ'HWWDꢁV\VWHPꢁNDQꢁKDꢁIOHUDꢁQlWNDEODUꢁ(QꢁEHK|ULJꢁVHUYLFHWHNQLNHUꢁ  
PnVWHꢁNRSSODꢁORVVꢁDOODꢁQlWNDEODUꢁLQQDQꢁVHUYLFHꢁXWI|UVꢁI|UꢁDWWꢁPLQVNDꢁULVNHQꢁ  
I|UꢁHOHNWULVNDꢁVW|WDUꢁ  
$GGLWLRQDOꢀ6DIHW\ꢀ3UHFDXWLRQV  
To reduce the risk of bodily injury, electrical shock, fire, and damage to the equipment,  
observe the following precautions.  
*HQHUDOꢀ3UHFDXWLRQV  
Observe the following general precautions for using and working with your system:  
Observe and follow service markings. Do not service any Dell product except as  
explained in your Dell system documentation. Opening or removing covers that  
are marked with the triangular symbol with a lightning bolt may expose you to  
electrical shock. Components inside these compartments should be serviced  
only by a Dell authorized service technician.  
If any of the following conditions occur, unplug the product from the electrical  
outlet and replace the part or contact your Dell authorized service provider:  
The power cable, extension cord, or plug is damaged.  
An object has fallen into the product.  
The product has been exposed to water.  
vi  
The product has been dropped or damaged.  
The product does not operate correctly when you follow the operating  
instructions.  
Keep your system components away from radiators and heat sources. Also, do  
not block cooling vents.  
Do not spill food or liquids on your system components, and never operate the  
product in a wet environment. If the computer gets wet, see the appropriate  
chapter in your troubleshooting guide or contact a Dell-authorized service  
provider.  
Do not push any objects into the openings of your system components. Doing so  
can cause fire or electric shock by shorting out interior components.  
Use the product only with Dell products or other Dell-approved equipment.  
Allow the product to cool before removing covers or touching internal  
components.  
Use the correct external power source. Operate the product only from the type  
of power source indicated on the electrical ratings label. If you are not sure of the  
type of power source required, consult your Dell service provider or local power  
company.  
To help avoid damaging your system components, be sure the voltage selection  
switch (if provided) on the power supply is set to match the power available at  
your location:  
115 volts (V)/60 hertz (Hz) in most of North and South America and some Far  
Eastern countries such as South Korea and Taiwan  
100 V/50 Hz in eastern Japan and 100 V/60 Hz in western Japan  
230 V/50 Hz in most of Europe, the Middle East, and the Far East  
Also be sure that your monitor and attached peripherals are electrically rated to  
operate with the power available in your location.  
Use only approved power cable(s). If you have not been provided with a power  
cable for your computer or storage system or for any AC-powered option  
intended for your system, purchase a power cable that is approved for use in your  
country. The power cable must be rated for the product and for the voltage and  
current marked on the products electrical ratings label. The voltage and current  
rating of the cable should be greater than the ratings marked on the product.  
To help prevent electric shock, plug the system components and peripheral  
power cables into properly grounded electrical outlets. These cables are  
equipped with three-prong plugs to help ensure proper grounding. Do not use  
adapter plugs or remove the grounding prong from a cable. If you must use an  
extension cord, use a three-wire cord with properly grounded plugs.  
Observe extension cord and power strip ratings. Make sure that the total ampere  
rating of all products plugged into the extension cord or power strip does not  
exceed 80 percent of the extension cord or power strip ampere ratings limit.  
vii  
Do not use appliance/voltage converters or kits sold for appliances with your Dell  
product.  
To help protect your system components from sudden, transient increases and  
decreases in electrical power, use a surge suppressor, line conditioner, or un-  
interruptible power supply (UPS).  
Position cables and power cords carefully; route cables and the power cord and  
plug so that they cannot be stepped on or tripped over. Be sure that nothing rests  
on your system components’ cables or power cord.  
Do not modify power cables or plugs. Consult a licensed electrician or your  
power company for site modifications. Always follow your local/national wiring  
rules.  
To help avoid possible damage to the system board, wait 5 seconds after turning  
off the system before removing a component from the system board or discon-  
necting a peripheral device from the computer.  
Handle batteries carefully. Do not disassemble, crush, puncture, short external  
contacts, dispose of in fire or water, or expose batteries to temperatures higher  
than 60 degrees Celsius (140 degrees Fahrenheit). Do not attempt to open or ser-  
vice batteries; replace batteries only with batteries designated for the product.  
Turn down the volume before using headphones or other audio devices.  
3UHFDXWLRQVꢀIRUꢀ6HUYHUꢀDQGꢀ6WRUDJHꢀ6\VWHPV  
Observe the following additional safety guidelines for your system:  
Unless your installation and/or troubleshooting documentation specifically allows  
it, do not remove enclosure covers, attempt to override the safety interlocks, or  
access any components inside the system. Depending on your system, installa-  
tion and repairs may be done only by individuals who are qualified to service your  
computer or storage system equipment and trained to deal with products capa-  
ble of producing hazardous energy levels.  
When connecting or disconnecting power to hot-pluggable power supplies, if  
offered with your Dell product, observe the following guidelines:  
Install the power supply before connecting the power cable to the power  
supply.  
Unplug the power cable before removing the power supply.  
If the system has multiple sources of power, disconnect power from the sys-  
all  
tem by unplugging power cables from the power supplies.  
Move products with care; ensure that all casters and/or stabilizers are firmly con-  
nected to the computer or storage system. Avoid sudden stops and uneven  
surfaces.  
viii  
3UHFDXWLRQVꢀIRUꢀ5DFNꢁ0RXQWDEOHꢀ3URGXFWV  
Observe the following precautions for rack stability and safety. Also refer to the rack  
installation documentation accompanying the system and the rack for specific warn-  
ing and/or caution statements and procedures.  
:$51,1*ꢀꢁ,QVWDOOLQJꢁ'HOOꢁV\VWHPꢁFRPSRQHQWVꢁLQꢁDꢁ'HOOꢁUDFNꢁZLWKRXWꢁWKHꢁ  
IURQWꢁDQGꢁVLGHꢁVWDELOL]HUVꢁLQVWDOOHGꢁFRXOGꢁFDXVHꢁWKHꢁUDFNꢁWRꢁWLSꢁRYHUꢁSRWHQꢄ  
WLDOO\ꢁUHVXOWLQJꢁLQꢁERGLO\ꢁLQMXU\ꢁXQGHUꢁFHUWDLQꢁFLUFXPVWDQFHVꢃꢁ7KHUHIRUHꢂꢁ  
DOZD\VꢁLQVWDOOꢁWKHꢁVWDELOL]HUVꢁEHIRUHꢁLQVWDOOLQJꢁFRPSRQHQWVꢁLQꢁWKHꢁUDFNꢃ  
:$51,1*ꢀꢁ$IWHUꢁLQVWDOOLQJꢁV\VWHPꢁFRPSRQHQWVꢁLQꢁDꢁUDFNꢂꢁQHYHUꢁSXOOꢁPRUHꢁ  
WKDQꢁRQHꢁFRPSRQHQWꢁRXWꢁRIꢁWKHꢁUDFNꢁRQꢁLWVꢁVOLGHꢁDVVHPEOLHVꢁDWꢁRQHꢁWLPHꢃꢁ7KHꢁ  
ZHLJKWꢁRIꢁPRUHꢁWKDQꢁRQHꢁH[WHQGHGꢁFRPSRQHQWꢁFRXOGꢁFDXVHꢁWKHꢁUDFNꢁWRꢁWLSꢁ  
RYHUꢁDQGꢁLQMXUHꢁVRPHRQHꢃ  
NOTE: Dell’s server and storage systems are certified as components for use in Dells  
rack cabinet using the Dell customer rack kit. The final installation of Dell systems and  
rack kits in any other brand of rack cabinet has not been approved by any safety agen-  
cies. It is the customers responsibility to have the final combination of Dell systems  
and rack kits for use in other brands of rack cabinets evaluated for suitability by a certi-  
fied safety agency.  
System rack kits are intended to be installed in a Dell rack by trained service tech-  
nicians. If you install the kit in any other rack, be sure that the rack meets the  
specifications of a Dell rack.  
Do not move large racks by yourself. Due to the height and weight of the rack,  
Dell recommends a minimum of two people to accomplish this task.  
Before working on the rack, make sure that the stabilizers are secure to the rack,  
extend to the floor, and that the full weight of the rack rests on the floor. Install  
front and side stabilizers on a single rack or front stabilizers for joined multiple  
racks before working on the rack.  
Always load the rack from the bottom up, and load the heaviest item in the rack  
first.  
Make sure that the rack is level and stable before extending a component from  
the rack.  
Extend only one component at a time from the rack.  
Use caution when pressing the component rail release latches and sliding a com-  
ponent into or out of a rack; the slide rails can pinch your fingers.  
After a component is inserted into the rack, carefully extend the rail into a locking  
position, and then slide the component into the rack.  
Do not overload the AC supply branch circuit that provides power to the rack. The  
total rack load should not exceed 80 percent of the branch circuit rating.  
Ensure that proper airflow is provided to components in the rack.  
Do not step on or stand on any system/component when servicing other  
systems/components in a rack.  
ix  
3UHFDXWLRQVꢀIRUꢀ3URGXFWVꢀ:LWKꢀ0RGHPVꢂꢀ  
7HOHFRPPXQLFDWLRQVꢂꢀRUꢀ/RFDOꢀ$UHDꢀ1HWZRUNꢀ2SWLRQV  
Observe the following guidelines when working with options:  
Do not connect or use a modem or telephone during a lightning storm. There  
may be a risk of electrical shock from lightning.  
Never connect or use a modem or telephone in a wet environment.  
Do not plug a modem or telephone cable into the network interface controller  
(NIC) receptacle.  
Disconnect the modem cable before opening a product enclosure, touching or  
installing internal components, or touching an uninsulated modem cable or jack.  
Do not use a telephone line to report a gas leak while you are in the vicinity of the  
leak.  
3UHFDXWLRQVꢀIRUꢀ3URGXFWVꢀ:LWKꢀ/DVHUꢀ'HYLFHV  
Observe the following precautions for laser devices:  
Do not open any panels, operate controls, make adjustments, or perform proce-  
dures on a laser device other than those specified in the products  
documentation.  
Only authorized service technicians should repair laser devices.  
:KHQꢀ:RUNLQJꢀ,QVLGHꢀ<RXUꢀ&RPSXWHU  
Before you remove the computer covers, perform the following steps in the sequence  
indicated.  
:$51,1*ꢀꢁ6RPHꢁ'HOOꢁV\VWHPVꢁFDQꢁEHꢁVHUYLFHGꢁRQO\ꢁE\ꢁWUDLQHGꢁVHUYLFHꢁWHFKꢄ  
QLFLDQVꢁEHFDXVHꢁRIꢁKLJKꢁYROWDJHVꢁDQGꢁHQHUJ\ꢁKD]DUGVꢃꢁ'RꢁQRWꢁDWWHPSWꢁWRꢁ  
VHUYLFHꢁWKHꢁFRPSXWHUꢁV\VWHPꢁ\RXUVHOIꢂꢁH[FHSWꢁDVꢁH[SODLQHGꢁLQꢁWKLVꢁJXLGHꢁDQGꢁ  
HOVHZKHUHꢁLQꢁ'HOOꢁGRFXPHQWDWLRQꢃꢁ$OZD\VꢁIROORZꢁLQVWDOODWLRQꢁDQGꢁVHUYLFHꢁ  
LQVWUXFWLRQVꢁFORVHO\ꢃ  
&$87,21ꢀꢁ7RꢁKHOSꢁDYRLGꢁSRVVLEOHꢁGDPDJHꢁWRꢁWKHꢁV\VWHPꢁERDUGꢂꢁZDLWꢁꢆꢁVHFꢄ  
RQGVꢁDIWHUꢁWXUQLQJꢁRIIꢁWKHꢁV\VWHPꢁEHIRUHꢁUHPRYLQJꢁDꢁFRPSRQHQWꢁIURPꢁWKHꢁ  
V\VWHPꢁERDUGꢁRUꢁGLVFRQQHFWLQJꢁDꢁSHULSKHUDOꢁGHYLFHꢁIURPꢁWKHꢁFRPSXWHUꢃ  
1. Turn off your computer and any peripherals.  
2. Ground yourself by touching an unpainted metal surface on the chassis, such as  
the metal around the card-slot openings at the back of the computer, before  
touching anything inside your computer.  
While you work, periodically touch an unpainted metal surface on the computer  
chassis to dissipate any static electricity that might harm internal components.  
x
3. Disconnect your computer and peripherals from their power sources. Also, dis-  
connect any telephone or telecommunication lines from the computer.  
Doing so reduces the potential for personal injury or shock.  
In addition, take note of these safety guidelines when appropriate:  
When you disconnect a cable, pull on its connector or on its strain-relief loop, not  
on the cable itself. Some cables have a connector with locking tabs; if you are dis-  
connecting this type of cable, press in on the locking tabs before disconnecting  
the cable. As you pull connectors apart, keep them evenly aligned to avoid bend-  
ing any connector pins. Also, before you connect a cable, make sure that both  
connectors are correctly oriented and aligned.  
Handle components and cards with care. Don’t touch the components or con-  
tacts on a card. Hold a card by its edges or by its metal mounting bracket. Hold a  
component such as a microprocessor chip by its edges, not by its pins.  
:$51,1*ꢀꢁ7KHUHꢁLVꢁDꢁGDQJHUꢁRIꢁDꢁQHZꢁEDWWHU\ꢁH[SORGLQJꢁLIꢁLWꢁLVꢁLQFRUUHFWO\ꢁ  
LQVWDOOHGꢃꢁ5HSODFHꢁWKHꢁEDWWHU\ꢁRQO\ꢁZLWKꢁWKHꢁVDPHꢁRUꢁHTXLYDOHQWꢁW\SHꢁUHFRPꢄ  
PHQGHGꢁE\ꢁWKHꢁPDQXIDFWXUHUꢁ'LVFDUGꢁXVHGꢁEDWWHULHVꢁDFFRUGLQJꢁWRꢁWKHꢁ  
PDQXIDFWXUHU·VꢁLQVWUXFWLRQVꢃ  
3URWHFWLQJꢀ$JDLQVWꢀ(OHFWURVWDWLFꢀ'LVFKDUJH  
Static electricity can harm delicate components inside your computer. To prevent  
static damage, discharge static electricity from your body before you touch any of  
your computers electronic components, such as the microprocessor. You can do so  
by touching an unpainted metal surface on the computer chassis.  
As you continue to work inside the computer, periodically touch an unpainted metal  
surface to remove any static charge your body may have accumulated.  
You can also take the following steps to prevent damage from electrostatic discharge  
(ESD):  
When unpacking a static-sensitive component from its shipping carton, do not  
remove the component from the antistatic packing material until you are ready to  
install the component in your computer. Just before unwrapping the antistatic  
packaging, be sure to discharge static electricity from your body.  
When transporting a sensitive component, first place it in an antistatic container  
or packaging.  
Handle all sensitive components in a static-safe area. If possible, use antistatic  
floor pads and workbench pads.  
The following notice may appear throughout this document to remind you of these  
precautions:  
:$51,1*ꢀꢁ6HHꢁ´3URWHFWLQJꢁ$JDLQVWꢁ(OHFWURVWDWLFꢁ'LVFKDUJHµꢁLQꢁWKHꢁVDIHW\ꢁ  
LQVWUXFWLRQVꢁDWꢁWKHꢁIURQWꢁRIꢁWKLVꢁJXLGHꢃ  
xi  
 
(UJRQRPLFꢀ&RPSXWLQJꢀ+DELWV  
:$51,1*ꢀꢁ,PSURSHUꢁRUꢁSURORQJHGꢁNH\ERDUGꢁXVHꢁPD\ꢁUHVXOWꢁLQꢁLQMXU\ꢃ  
:$51,1*ꢀꢁ9LHZLQJꢁWKHꢁPRQLWRUꢁVFUHHQꢁIRUꢁH[WHQGHGꢁSHULRGVꢁRIꢁWLPHꢁPD\ꢁ  
UHVXOWꢁLQꢁH\HꢁVWUDLQꢃ  
For comfort and efficiency, observe the following ergonomic guidelines when you set  
up and use your computer system:  
Position your system so that the monitor and keyboard are directly in front of you  
as you work. Special shelves are available (from Dell and other sources) to help  
you correctly position your keyboard.  
Set the monitor at a comfortable viewing distance (usually 510 to 610 millimeters  
[20 to 24 inches] from your eyes).  
Make sure that the monitor screen is at eye level or slightly lower when you sit in  
front of the monitor.  
Adjust the tilt of the monitor, its contrast and brightness settings, and the lighting  
around you (such as overhead lights, desk lamps, and the curtains or blinds on  
nearby windows) to minimize reflections and glare on the monitor screen.  
Use a chair that provides good lower back support.  
Keep your forearms horizontal with your wrists in a neutral, comfortable position  
while you use the keyboard or mouse.  
Always leave space to rest your hands while you use the keyboard or mouse.  
Let your upper arms hang naturally at your sides.  
Sit erect, with your feet resting on the floor and your thighs level.  
When sitting, make sure the weight of your legs is on your feet and not on the  
front of your chair seat. Adjust your chairs height or use a footrest, if necessary,  
to maintain proper posture.  
Vary your work activities. Try to organize your work so that you do not have to  
type for extended periods of time. When you stop typing, try to do things that  
use both hands.  
xii  
 
monitor screen at or below eye level  
wrists relaxed and flat  
monitor and  
keyboard  
positioned  
directly  
in front of user  
arms at desk level  
feet flat on  
the floor  
xiii  
xiv  
3UHIDFH  
$ERXWꢀ7KLVꢀ*XLGH  
This guide is intended for anyone who configures and operates a new Dell  
PowerVault 720N, 740N, or 760N filer that runs Data ONTAP 5.3 software.  
It can be used by system administrators who are familiar with operating systems that  
x
run on the filer’s clients, such as UNIX, Windows 9 , and Windows NT and with how  
the Network File System (NFS), Common Internet File System (CIFS), and Hypertext  
Transfer Protocol (HTTP) protocols are used for file sharing or transfers. This guide  
doesn’t cover basic system or network administration topics, such as Internet Proto-  
col (IP) addressing, routing, and network topology.  
The guide provides information about configuring the filer using both the Setup  
Wizard and the setupcommand. It is organized in the following sections:  
Chapter 1 introduces the standard features of the filer and provides a  
description of the software media for the filer.  
Chapters 2 and 3 describe how to configure the software using the Setup  
Wizard.  
Chapter 4 describes how to configure the software using the setup  
command.  
Chapters 5 through 9 provide additional information for configuration for both  
Setup Wizard and setupcommand users.  
Chapter 10 provides information about installing SecureShare if you used the  
setupcommand; if you used the Setup Wizard, SecureShare was automati-  
cally installed.  
Appendix A, "Technical Specifications," summarizes the technical specifica-  
tions of the PowerVault 720N, 740N, and 760N storage systems.  
Appendix B, "Installing PowerVault Filer Software," provides instructions for  
installing the Data ONTAP 5.3 software.  
Appendix C, "Preparing for CIFS Configuration," provides information about  
deciding on a domain or workgroup configuration, choosing between  
PC-style or UNIX-style permissions, and adding the filer to a Windows NT  
domain.  
Appendix D, "Time Zones," provides the time zones needed for the setup  
prompt.  
xv  
 
Appendix E, "Regulatory Notices," is for users who are interested in which  
regulatory agencies have tested and approved the Dell PowerVault 720N,  
740N, and 760N filers.  
Appendix F, "Warranty, Return Policy, and Year 2000 Statement of  
Compliance," describes the warranty for your Dell system and the "Total Sat-  
isfaction" Return Policy.  
The glossary provides definitions of terms, acronyms, and abbreviations  
used in this guide.  
:DUUDQW\ꢀDQGꢀ5HWXUQꢀ3ROLF\ꢀ,QIRUPDWLRQ  
Dell Computer Corporation ("Dell") manufactures its hardware products from parts and  
components that are new or equivalent to new in accordance with industry-standard  
practices. For information about the Dell warranty for your system, see Appendix F,  
"Warranty, Return Policy, and Year 2000 Statement of Compliance."  
2WKHUꢀ'RFXPHQWVꢀ<RXꢀ0D\ꢀ1HHG  
Users Guide  
Besides this  
, the following documentation is included with your system:  
Getting Started  
The  
your computer system.  
document provides step-by-step instructions for setting up  
Quick Reference  
card provides the filer commands and command options.  
The  
Installation and Troubleshooting Guide  
The  
provides instructions for installing sys-  
tem hardware and includes troubleshooting and diagnostic procedures for testing  
your computer system.  
System Administrator and Command Reference Guide  
provides information  
The  
about how to configure, operate, and manage Dell PowerVault 720N, 740N, and  
760N filers that run Data ONTAP 5.3 software. It also contains the user  
commands.  
You may also have one or more of the following documents.  
NOTE: Documentation updates are sometimes included with your system to describe  
changes to your system or software. Always read these updates consulting  
before  
any other documentation because the updates often contain the latest information.  
Documentation is included with any options you purchase separately from your  
system. This documentation includes information that you need to configure and  
install these options. Installation instructions for the options are included in the  
Installation and Troubleshooting Guide  
.
Technical information files—sometimes called "readme" files—may be installed  
on your root volume to provide last-minute updates about technical changes to  
your system or advanced technical reference material intended for experienced  
users or technicians.  
xvi  
7HUPLQRORJ\ꢀ&RQYHQWLRQV  
This guide uses the following terms:  
Filer  
refers to a PowerVault 720N, 740N, or 760N storage system.  
System  
refers, at a minimum, to a filer and a connected PowerVault 700N Disk  
Array Enclosure (DAE) storage system. A tape backup device can also be a com-  
ponent of the system, but is not required.  
1RWDWLRQDOꢀ&RQYHQWLRQV  
You can enter filer commands on either the console or from any client computer that  
can access the filer through telnet.  
In examples that illustrate commands executed on a UNIX workstation, this guide  
x
uses the command syntax of SunOS 4.1. . The command syntax and output might  
differ, depending on your version of UNIX.  
This guide uses the term "type" to mean pressing one or more keys on the keyboard.  
It uses the term "enter" to mean pressing one or more keys and then pressing the  
Enter key.  
.H\ꢀ&RPELQDWLRQV  
When describing key combinations, this guide uses the hyphen (-) to separate individ-  
ual keys. For example, "Ctrl-D" means pressing the "Control" and "D" keys  
simultaneously. Also, this guide uses the term "Enter" to refer to the key that gener-  
ates a carriage return, although the key is named "Return" on some keyboards.  
7\SRJUDSKLFDOꢀ&RQYHQWLRQV  
Typographical conventions used in this guide are shown in the following table:  
&RQYHQWLRQ  
7\SHꢁRIꢁ,QIRUPDWLRQ  
Italic  
type  
Words or characters that require special attention.  
File names.  
Placeholders for information you must supply. For  
example, if the guide says to enter the arp -d  
hostnamecommand, you enter the characters  
"arp -d" followed by the actual name of the host.  
Man page names.  
Book titles in cross-references.  
xvii  
       
&RQYHQWLRQ  
7\SHꢁRIꢁ,QIRUPDWLRQ  
Monospaced font  
Command and daemon names.  
Information displayed on the system console or  
other computer monitors.  
The contents of files.  
Bold monospaced  
font  
Words or characters you type. What you type is  
always shown in lowercase letters, unless you  
must type it in uppercase letters.  
6SHFLDOꢀ0HVVDJHV  
This guide contains special messages that are described as follows:  
NOTE: A NOTE contains important information that helps you install or operate the  
system efficiently.  
&$87,21ꢀꢁ$ꢁ&$87,21ꢁFRQWDLQVꢁLQVWUXFWLRQVꢁWKDWꢁ\RXꢁPXVWꢁIROORZꢁWRꢁDYRLGꢁ  
GDPDJHꢁWRꢁWKHꢁHTXLSPHQWꢂꢁDꢁV\VWHPꢁFUDVKꢂꢁRUꢁORVVꢁRIꢁGDWDꢃ  
:$51,1*ꢀꢁ$ꢁ:$51,1*ꢁFRQWDLQVꢁLQVWUXFWLRQVꢁWKDWꢁ\RXꢁPXVWꢁIROORZꢁWRꢁDYRLGꢁ  
SHUVRQDOꢁLQMXU\ꢃ  
xviii  
     
&RQWHQWV  
&KDSWHUꢀꢃ  
Standard Features of the Filer. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1-1  
&KDSWHUꢀꢅ  
&KDSWHUꢀꢆ  
6HWXSꢀ:L]DUGꢀ³ꢀ,QWURGXFWLRQ ꢄꢀꢄꢀꢄꢀꢄꢀꢄꢀꢄꢀꢄꢀꢄꢀꢄꢀꢄꢀꢄꢀꢄꢀꢄꢀꢄꢀꢄꢀꢄꢀꢄꢀꢄꢀꢄꢀ ꢅꢁꢃ  
Prerequisites . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3-2  
Restrictions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3-2  
Steps . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3-3  
Results . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3-3  
Where to Go From Here. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3-3  
xix  
&KDSWHUꢀꢇ  
&KDSWHUꢀꢈ  
HTTP Configuration Information . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6-1  
Location of the passwd and group Files. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7-1  
How the Filer Uses the passwd and group Files . . . . . . . . . . . . . . . . . . . . . . . 7-1  
Default passwd File . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7-2  
Default group File. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7-3  
Adding Entries to the group File . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7-6  
&KDSWHUꢀꢉ  
Scope of Shares Access. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 8-1  
cifs Command Parameters. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 8-1  
Establishing Access to Shares. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 8-2  
Description. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 8-2  
Steps . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 8-2  
xxi  
&KDSWHUꢀꢊ  
Mounting File Systems on NFS Clients . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 9-4  
&KDSWHUꢀꢃꢋ  
Description. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 10-1  
Installing SecureShare Account Migrator . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 10-2  
Steps . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 10-2  
$SSHQGL[ꢀ$  
$SSHQGL[ꢀ%  
Booting From Bootable System Diskettes . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . B-1  
Booting From Diskette. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . B-1  
Installing Data ONTAP 5.3 Software. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . B-3  
Installation From a Windows Client. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . B-3  
Installation From a UNIX Client . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . B-4  
xxii  
Creating Bootable System Diskettes on a UNIX Client . . . . . . . . . . . . . . . . . . B-6  
$SSHQGL[ꢀ&  
Adding the Filer to a Windows NT Domain. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . C-4  
$SSHQGL[ꢀ'  
Africa . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .D-1  
America . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .D-1  
Antarctica . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .D-2  
Asia. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .D-2  
Atlantic . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .D-3  
xxiii  
Miscellaneous . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . D-5  
$SSHQGL[ꢀ(  
Wymagania Polskiego Centrum BadaÒ i Certyfikacji . . . . . . . . . . . . . . . . . . . . . . . E-8  
PozostaŠe instrukcje bezpieczeÒstwa . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . E-8  
NOM Information (Mexico Only). . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . E-9  
$SSHQGL[ꢀ)  
6WDWHPHQWꢀRIꢀ&RPSOLDQFH ꢀꢄꢀꢄꢀꢄꢀꢄꢀꢄꢀꢄꢀꢄꢀꢄꢀꢄꢀꢄꢀꢄꢀꢄꢀꢄꢀꢄꢀꢄꢀꢄꢀꢄꢀꢄꢀꢄꢀꢄꢀꢄꢀꢄꢀ )ꢁꢃ  
Limited Three-Year Warranty (U.S. Only) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . F-1  
Coverage During Year One . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . F-1  
Coverage During Years Two and Three. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . F-2  
General Provisions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . F-2  
xxiv  
“Total Satisfaction” Return Policy (U.S. and Canada Only). . . . . . . . . . . . . . . . . . . F-5  
Year 2000 Statement of Compliance for Dell-Branded Hardware Products . . . . . . F-6  
Previous Products . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . F-7  
Software. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . F-7  
Additional Information . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . F-7  
*ORVVDU\  
,QGH[  
)LJXUHV  
Figure 7-2. group File Default Entry. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7-3  
Figure E-1. VCCI Class A ITE Regulatory Mark . . . . . . . . . . . . . . . . . . . . . . . . . . E-6  
7DEOHV  
Table 1-1.  
Table 5-1.  
Table 7-1.  
Table 7-2.  
Table 8-1.  
Table 9-1.  
Table A-1.  
Table C-1.  
group File Field Entries . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7-3  
cifs Command Parameters . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 8-1  
CIFS Client Connection Methods. . . . . . . . . . . . . . . . . . . . . . . . . . . . 9-2  
Technical Specifications. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . A-1  
Domain and Workgroup Features . . . . . . . . . . . . . . . . . . . . . . . . . . . C-3  
xxv  
xxvi  
& + $ 3 7 ( 5 ꢁ ꢂ  
)LOHUꢀ)HDWXUHVꢀDQGꢀ6RIWZDUH  
6WDQGDUGꢀ)HDWXUHVꢀRIꢀWKHꢀ)LOHU  
Figure 1-1 shows the standard features that you can see from the front panel of the  
Dell PowerVault 720N, 740N, or 760N filer.  
)LJXUHꢀꢃꢁꢃꢄꢀꢀ)LOHUꢀ)HDWXUHV  
)LOHUꢀ6RIWZDUHꢀ'HVFULSWLRQ  
$ERXWꢀWKHꢀ6RIWZDUH  
The filer was shipped with a CD and system boot diskettes. Because system software  
has been installed at the factory, you don’t need the CD or system boot diskettes to  
install or configure a new filer.  
Store the filer software in a safe place so that you can use it to recover in case of a  
software problem in the future.  
Filer Features and Software 1-1  
             
&'ꢀDQGꢀ'LVNHWWHꢀ&RQWHQWV  
Table 1-1 describes the CD and system boot diskettes:  
7DEOHꢀꢃꢁꢃꢄꢀꢀ)LOHUꢀ&'ꢀDQGꢀ'LVNHWWHV  
3DFNDJHꢁ,WHP  
&RQWHQWV  
Data ONTAP 5.3  
CD  
This CD contains the system software and documentation.  
If you need to reinstall the system software for any reason,  
you need this CD; call Dell technical support for instruc-  
tions before reinstalling system software on the filer.  
The Data ONTAP 5.3 CD contains the system files and sys-  
tem boot software in two formats so that it can be read by  
®
both UNIX and PC workstations. For full information  
con-  
about the contents of the CD, read the file named  
tents.txt  
on the CD.  
System boot  
diskettes  
If the filer fails to boot from hard disk, or if you forget your  
password, you must boot the filer from the system boot  
diskettes.  
Custom MIB  
Use this Management Information Base (MIB) with SNMP  
to get detailed information about filer operation. For further  
System Administrator and Command  
information, see your  
Reference Guide  
.
6RIWZDUHꢀ8SGDWHV  
Dell regularly makes software updates available to customers who purchase software  
support agreements.  
You can find information about the latest software updates at Dells World Wide Web  
site at http://www.dell.com.  
1-2 Dell PowerVault 720N, 740N, and 760N User’s Guide  
           
& + $ 3 7 ( 5 ꢁ ꢃ  
6HWXSꢀ:L]DUGꢀ³ꢀ,QWURGXFWLRQ  
2YHUYLHZ  
The Setup Wizard provides an easy to use Web-based method of configuring the  
basic settings for a new filer.  
The configuration method using the setupcommand is different from the Setup  
Wizard configuration method in these ways:  
Uses command-line installation and configuration commands to install and con-  
figure the new filer  
Provides limited on-line help  
The Setup Wizard uses the network and a Web browser to perform the initial basic  
setup for filers, eliminating the need for the command-line setup. The Setup Wizard  
contains context-sensitive help for each field on each page.  
After you finish the basic configuration, you can use the Web-based FilerView™ tool  
to complete other types of configurations you might need on this filer. FilerView also  
uses the network and a Web browser to perform general management tasks.  
3UHUHTXLVLWHVꢀWRꢀ8VLQJꢀWKHꢀ6HWXSꢀ:L]DUG  
The Setup Wizard needs an IP address to begin the configuration process, which you  
can obtain using either of the following methods:  
An existing Dynamic Host Configuration Protocol (DHCP) server on your network  
during initial boot of the new filer.  
If the filer can’t find or obtain an IP address from the DHCP server, the normal  
setupscript, using a console connected to the filer, prompts you for several  
pieces of information, including an IP address, and then asks whether you want  
to use the Setup Wizard. This method works with any filer; however, you must  
have a console connected to the filer for the initial few pieces of setup  
information.  
Setup Wizard — Introduction 2-1  
             
5HVWULFWLRQꢀRQꢀ8VLQJꢀ6HWXSꢀ:L]DUG  
If you don’t want to switch from the console to the Web-based wizard to do the con-  
figuration (when you are not using a DHCP server), you should use thesetup  
command configuration that is discussed in Chapter 4, “setup Command —  
Introduction.”  
$ERXWꢀ%DVLFꢀ&RQILJXUDWLRQꢀ8VLQJꢀ6HWXSꢀ  
:L]DUG  
The Setup Wizard uses multiple Web pages with a limited number of questions per  
page to set up the filer. On-line context-sensitive help is available for each field that  
you need to respond to. The Setup Wizard covers protocol licensing, based on what  
you purchased; administration setup; DNS, NIS, and Windows NT setup; and routing  
and email gateway setup.  
2-2 Dell PowerVault 720N, 740N, and 760N User’s Guide  
     
& + $ 3 7 ( 5 ꢁ ꢄ  
6HWXSꢀ:L]DUGꢀ³ꢀ%DVLFꢀ  
&RQILJXUDWLRQꢀRIꢀWKHꢀ)LOHU  
%HJLQQLQJꢀWKHꢀ&RQILJXUDWLRQꢀ  
6WHSVꢀWRꢀ&RQILJXUDWLRQ  
There are several steps to performing the basic configuration of a new filer:  
Providing the filer with an IP address  
Using the Setup Wizard to do the configuration  
Verifying the configuration of the filer  
+RZꢀWRꢀ3URYLGHꢀDQꢀ,3ꢀ$GGUHVV  
There are two methods to providing the filer with an IP address:  
8VLQJꢀ'+&3ꢀWRꢀ2EWDLQꢀWKHꢀ,3ꢀ$GGUHVVꢀIRUꢀWKHꢀ1HZꢀ)LOHU  
To use the DHCP server to obtain an IP address for the filer, you need to ensure that  
the following DHCP configuration exists:  
e0  
interface before you turn on and  
You need the MAC address from the filers  
configure your filer. You need to manually allocate a static IP address on the  
DHCP server.  
e0  
The  
MAC address is printed on a label on the back of the filers PCB carrier, in  
the upper left-hand corner.  
e0  
Use the  
MAC address to manually allocate a static IP address on the DHCP  
server for your filer; or provide your DHCP administrator with the information to  
e0  
perform this task. The DHCP server uses the  
when it boots.  
MAC address to identify the filer  
To avoid IP address conflicts, use a static IP address on your DHCP server. If you  
use a dynamic IP address, the filer does not release that address when its lease  
expires. The lease is a predetermined expiration time set on the DHCP server.  
If you are using DHCP to obtain the IP address for the filer, see "Using Setup  
Wizard on a Filer With a DHCP Server."  
Setup Wizard — Basic Configuration of the Filer3-1  
                 
(QWHULQJꢀDꢀ6WDWLFꢀ,3ꢀ$GGUHVVꢀIRUꢀWKHꢀ1HZꢀ)LOHU  
If you are not using DHCP to obtain the IP address for the filer, see "Using Setup  
Wizard on a New Filer Without a DHCP Server."  
+RZꢀWRꢀ8VHꢀWKHꢀ6HWXSꢀ:L]DUG  
After you have the IP address for the new filer, you can point your browser to the URL  
address on the filer to start the Setup Wizard. You follow the pages of prompts to  
complete the configuration. Each prompt field has its own context-sensitive help  
screen if you need more information than the prompt gives.  
The last page of the wizard displays all the configuration settings you provided and  
enables you to make any changes you might want to make. You can click the field you  
want to change; the wizard takes you to that specific page.  
After you finish making any changes necessary, you click Finish and the Setup Wizard  
configures the filer. After the Setup Wizard finishes, the filer is ready for use.  
+RZꢀWRꢀ9HULI\ꢀWKHꢀ&RQILJXUDWLRQ  
You can verify that the configuration is successful by using pingto see that all net-  
work interfaces are up and working.  
8VLQJꢀ6HWXSꢀ:L]DUGꢀRQꢀDꢀ)LOHUꢀ:LWKꢀDꢀ  
'+&3ꢀ6HUYHU  
'HVFULSWLRQ  
This procedure configures a PowerVault 720N, 740N, or a 760N filer using the Setup  
Wizard. After you complete this procedure, the filer is running the protocols for which  
you purchased licenses, and is configured and ready for use.  
3UHUHTXLVLWHV  
You need the following requirements completed before you begin the procedure:  
A static IP address on your DHCP server set up before you begin the filer  
configuration  
The new filer attached to the network  
e0  
A client browser on the same network as the filers  
network  
5HVWULFWLRQV  
If your new filer will be using virtual interfaces, use the procedure documented in  
"Using Setup Wizard on a New Filer Without a DHCP Server."  
3-2 Dell PowerVault 720N, 740N, and 760N User’s Guide  
                     
6WHSV  
To begin the configuration, perform the following steps:  
1. Turn on the filers power switch to begin the configuration process.  
The first time the filer boots, it contacts the DHCP server and requests an IP  
address. The DHCP server supplies the static IP address you configured it with.  
2. From a client on the same network, point a web browser to  
http://filer-name/api  
or  
http://filer-ip-address/api  
filer-name  
-ip-address  
or filer  
Replace  
with either the name of the filer or the filers  
IP address that you set up in the DHCP server.  
The Setup Wizard loads.  
3. Enter the information as requested.  
5HVXOWV  
After you finish configuring the filer, it is on-line. The following directories exist on  
the filer:  
/vol/vol0  
/vol/vol0/home  
NOTE: /vol is not a directory—it is a special virtual root path under which the filer  
mounts its volumes. You cannot mount /vol to view all the volumes on the filer; you  
must mount each filer volume separately.  
/vol/vol0  
If you purchased a license for the NFS protocol,  
is exported to the administra-  
is exported to the administration host for root  
/etc/passwd  
/vol0/home  
tion host for root access;  
access and to all clients for general access. Paths such as  
/vol/vol0/etc/passwd  
are referenced  
as  
.
/vol/vol0  
If you purchased a license for the CIFS protocol,  
is shared as C$; only the  
system administrator with the root password has read and write access to the C$  
/vol/vol0/home  
share. The  
to anyone.  
directory is shared as HOME without access granted  
:KHUHꢀWRꢀ*Rꢀ)URPꢀ+HUH  
Verify the network connections of your new filer using the procedure in "Verifying  
Network Connections."  
Setup Wizard — Basic Configuration of the Filer3-3  
     
8VLQJꢀ6HWXSꢀ:L]DUGꢀRQꢀDꢀ1HZꢀ)LOHUꢀ  
:LWKRXWꢀDꢀ'+&3ꢀ6HUYHU  
'HVFULSWLRQ  
This procedure enables you to use the Setup Wizard on a new filer without using a  
DHCP server to obtain the new filers IP address. This procedure also enables you to  
set up virtual interfaces in your new filer.  
After you complete this procedure, the filer is running the protocols for which you pur-  
chased licenses, and is configured and ready for use.  
3UHUHTXLVLWHV  
You need the following requirements completed before you begin the procedure:  
Installed filer hardware and the serial console attached to the filer according to  
the instructions in your hardware guide  
The new filer attached to the network  
e0  
A client browser on the same network as the filers  
network  
6WHSV  
To give the filer an IP address and to use the Setup Wizard to configure the filer, per-  
form the following steps:  
1. Turn on the filers power switch to begin the configuration process.  
The first time the filer boots up, it runs setup.  
If setup does not run automatically, enter setup and press Enter.  
2. Enter the information as requested.  
The following prompt is displayed:  
:RXOGꢀ\RXꢀOLNHꢀWRꢀFRQWLQXHꢀVHWXSꢀWKURXJKꢀWKHꢀZHEꢀ  
LQWHUIDFH"ꢀ>Q@  
3. Enter yesto continue the setup using the Setup Wizard.  
The wizard displays the following message:  
3RLQWꢀDꢀZHEꢀEURZVHUꢀWRꢀ  
KWWSꢁꢂꢂILOHUꢀQDPHꢂDSLꢀ  
RUꢀ  
KWWSꢁꢂꢂILOHUꢀLSꢀDGGUHVVꢂDSLꢀ  
WRꢀFRPSOHWHꢀVHWXSꢃ  
3-4 Dell PowerVault 720N, 740N, and 760N User’s Guide  
         
4. From a client attached to the network, point your browser to the filer address  
given; the Setup Wizard loads.  
5. Enter the information as requested.  
:KHUHꢀWRꢀ*Rꢀ)URPꢀ+HUH  
Verify the network connections of your new filer using the procedure in "Verifying Net-  
work Connections."  
9HULI\LQJꢀ1HWZRUNꢀ&RQQHFWLRQV  
'HVFULSWLRQ  
After you configure the filer, you use the pingcommand from a client attached to the  
network to verify that the filer is set up correctly and can communicate with other  
computers on the network.  
6WHSV  
To verify filer communication, perform the following steps:  
1. At a client attached to the network, enter the following command:  
SLQJꢀꢀILOHUꢁLSDGGUHVV!  
2. Replace <filer ipaddress>with the Internet protocol (IP) address that you  
assigned the filer.  
3. Repeat the test for each interface that is installed in the filer.  
([DPSOHV  
The following examples test the network connections for a filer that has the host  
filer  
e0  
with two interfaces named  
f0  
and installed:  
name  
SLQJꢀILOHUꢁHꢂ  
SLQJꢀILOHUꢁIꢂ  
7URXEOHVKRRWLQJ  
If an interface does not respond to a pingcommand, make sure that:  
The interface is securely attached to the network.  
The media type is set up correctly if the interface is on an Ethernet card contain-  
ing different media connectors.  
The routers function properly with correct routing information if thepingcom-  
mand is issued from a network not directly attached to the interface.  
Setup Wizard — Basic Configuration of the Filer3-5  
             
:KHUHꢀWRꢀ*Rꢀ)URPꢀ+HUH  
You have completed the configuration using the Setup Wizard. Go to Chapter 5,  
"Using FilerView."  
3-6 Dell PowerVault 720N, 740N, and 760N User’s Guide  
 
& + $ 3 7 ( 5 ꢁ ꢅ  
VHWXSꢀ&RPPDQGꢀ³ꢀ,QWURGXFWLRQ  
2YHUYLHZ  
&RQILJXUDWLRQꢀ3URFHVV  
To configure a new filer for the first time, perform the following steps. Some of the  
procedures are optional, depending on the filer options that you purchased.  
1. Set up DHCP.  
If you want to use the Dynamic Host Configuration Protocol (DHCP) to configure  
e0  
the filers onboard interface ( ), follow the instructions in "Using DHCP With the  
Filer."  
Using DHCP to assign an IP address to a filer enables you to use a Telnet client to  
complete the first-time configuration, rather than having to attach a serial console  
to the filer to complete the configuration.  
2. Add the filer to a Windows NT domain.  
If you purchased a license for the CIFS protocol for your filer and you plan to add  
the filer to a Windows NT domain, see "Adding the Filer to a Windows NT  
Domain" in Appendix C.  
3. Configure the filer.  
Configure your filer according to the instructions in "Configuring the Filer."  
4. Verify the filers network connections.  
Verify that the filer is communicating on the network by following the instructions  
in "Verifying Network Connections."  
5. Configure HTTP service.  
If you purchased a license for the HTTP protocol for your filer, configure the HTTP  
options as described in Chapter 6, "Configuring HTTP on the Filer."  
6. Set up passwdand groupfiles.  
setup Command — Introduction 4-1  
           
If you purchased a license for the CIFS protocol for your filer and you are not  
using a Windows NT domain controller to authenticate users, configure passwd  
and groupfiles according to the instructions in Chapter 7, "Setting Up passwd  
and group Files."  
7. Configure CIFS shares.  
If you purchased a license for the CIFS protocol for your filer, configure CIFS  
shares so that users can access directories on the filer.  
8. Configure clients to access the filer.  
You must configure clients according to the instructions in Chapter 9, "Configur-  
ing Clients to Access the Filer," so that they can access information on the filer.  
9. Install the SecureShare program on CIFS clients.  
If you purchased a license for the CIFS protocol for your filer, you can install the  
SecureShare program on Windows clients according to the instructions in Chap-  
ter 10, "setup Command — Installing SecureShare," This enables users to view  
and modify the UNIX permissions and attributes on files stored on the filer.  
10. Learn about the Data ONTAP 5.3 software.  
Read Chapter 1, "Filer Features and Software."  
11. Learn about FilerView.  
Read Chapter 5, "Configuring the Filer Using FilerView," to learn how to adminis-  
ter your filer using the FilerView Web-based administration tool.  
8VLQJꢀ'+&3ꢀ:LWKꢀWKH )LOHU  
'HVFULSWLRQ  
Follow this procedure to use DHCP to assign a static IP address to the onboard inter-  
e0  
face ( ) on a filer during first-time configuration. This procedure enables you to use a  
Telnet client to access the filer and complete the first-time configuration, rather than  
having to attach a hard-wired console to the filer. When you use DHCP to assign an IP  
address to the onboard interface, the filer:  
Obtains the address from the DHCP server when the filer is turned on  
Configures the onboard interface with the IP address  
Becomes accessible to a Telnet client or the Setup Wizard  
3UHUHTXLVLWHV  
To use this procedure, you must have a DHCP server and the filer on the same net-  
work segment.  
4-2 Dell PowerVault 720N, 740N, and 760N User’s Guide  
       
6WHSV  
To use DHCP to assign an IP address to the onboard interface, perform the following  
steps:  
1. Locate the MAC address for the onboard interface by looking for a label on the  
back of the left side of the filers PCB carrier, if necessary.  
2. Configure the DHCP server to return a static IP address for the interface based  
on the MAC address for the onboard interface.  
&$87,21ꢀꢁ7KHꢁ'+&3ꢁVHUYHUꢁPXVWꢁUHWXUQꢁDꢁVWDWLFꢁ,3ꢁDGGUHVVꢁIRUꢁWKHꢁ  
LQWHUIDFHꢃꢁ,IꢁWKHꢁVHUYHUꢁUHWXUQVꢁDꢁG\QDPLFꢁ,3ꢁDGGUHVVꢂꢁWKHꢁILOHUꢁGLVSOD\Vꢁ  
DQꢁHUURUꢁPHVVDJHꢁDQGꢁFRQWLQXHVꢁWRꢁXVHꢁWKHꢁ,3ꢁDGGUHVVꢁSHUPDQHQWO\³  
ZKLFKꢁFDQꢁUHVXOWꢁLQꢁDQꢁ,3ꢁDGGUHVVꢁFRQIOLFWꢁLIꢁWKHꢁ'+&3ꢁVHUYHUꢁDVVLJQVꢁWKHꢁ  
,3ꢁDGGUHVVꢁG\QDPLFDOO\ꢁWRꢁRWKHUꢁFOLHQWVꢁIURPꢁWLPHꢁWRꢁWLPHꢃ  
&RQILJXULQJꢀWKHꢀ)LOHU  
'HVFULSWLRQ  
This procedure describes how to configure your filer whether or not you use DHCP.  
Complete this procedure after you install your new filer. After you configure your filer,  
it is visible on your network and available for access by users from their client  
computers.  
3UHUHTXLVLWHV  
Before you start this procedure, you must:  
Install the filer hardware and the serial console according to the instructions in  
your hardware guide if you are not using DHCP.  
Complete steps 1 through 3 of "Configuration Process."  
6WHSV  
To configure a filer, perform the following steps:  
1. Turn on the filers power switch to begin the configuration process.  
The first time the filer boots:  
If you followed the steps in "Using DHCP With the Filer," the filer obtains an  
IP address for the e0 interface.  
The filer runs the setupcommand.  
2. Enter the configuration information as prompted by the setupprogram.  
setup Command — Introduction 4-3  
           
5HVXOWV  
After you finish configuring the filer, it is on-line. The following directories exist on the  
filer:  
/vol/vol0  
/vol/vol0/home  
NOTE: /vol is not a directory—it is a special virtual root path under which the filer  
mounts its volumes. You cannot mount /vol to view all the volumes on the filer; you  
must mount each filer volume separately.  
/vol/vol0  
If you purchased a license for the NFS protocol,  
is exported to the administra-  
is exported to the administration host for root  
/vol0/home  
tion host for root access;  
access and to all clients for general access.  
/vol/vol0  
If you purchased a license for the CIFS protocol,  
is shared as C$; only the  
system administrator with the root password has read and write access to the C$  
/vol/vol0/home  
share. The  
anyone.  
directory is shared as HOME without access granted to  
9HULI\LQJꢀ1HWZRUNꢀ&RQQHFWLRQV  
8VLQJꢀWKHꢀSLQJꢀ&RPPDQG  
After you configure the filer, you use thepingcommand from a client attached to the  
network to verify that the filer can communicate with other computers on the  
network.  
3URFHGXUH  
To verify filer communication, perform the following steps:  
1. At a client attached to the network, enter the following command:  
ping hostname-interface  
hostname  
Replace the variable  
with the host name that you assigned to the filer  
interface  
when you ran setup; replace the variable  
with one of the interface  
names that the filer assigned when you ran setup.  
2. Repeat the test once for each interface that is installed in the filer.  
([DPSOHV  
The following examples test the network connections for a filer that has the host  
filer  
e0  
with two interfaces named  
f0  
and installed:  
name  
ping filer-e0  
ping filer-f0  
4-4 Dell PowerVault 720N, 740N, and 760N User’s Guide  
             
+RZꢀWRꢀ7URXEOHVKRRWꢀ3UREOHPV  
If an interface does not respond to a pingcommand, make sure that:  
The interface is securely attached to the network.  
The media type is set up correctly if the interface is using a multi-port Ethernet  
card with different port speeds.  
The routers function properly with correct routing information if thepingcom-  
mand is issued from a network not directly attached to the interface.  
setup Command — Introduction 4-5  
 
4-6 Dell PowerVault 720N, 740N, and 760N User’s Guide  
& + $ 3 7 ( 5 ꢁ ꢆ  
8VLQJꢀ)LOHU9LHZ  
$GPLQLVWHULQJꢀ<RXUꢀ)LOHUꢀ)URPꢀ)LOHU9LHZ  
8VLQJꢀ)LOHU9LHZ  
This chapter introduces FilerView, the Web-based administration tool for Data  
ONTAP™ 5.3.  
FilerView enables you to perform most administration tasks from any client on your  
network that has a compatible Web browser. FilerView is a GUI-based administration  
tool, using Java applets, that performs tasks that would otherwise require you to  
enter commands at the filer console or edit configuration files.  
You can use FilerView even if you did not purchase a license for the HTTP protocol.  
If you prefer to manage the filer by using a command-line interface and editing config-  
System Administrator and Command Reference Guide  
uration files, see your  
.
3UHUHTXLVLWHV  
You need Netscape Navigator 4 or later or Microsoft Internet Explorer 4 or later to  
access FilerView. FilerView has not been tested with other Web browsers.  
$FFHVVLQJꢀ)LOHU9LHZ  
system  
If you used the Setup Wizard, you can access FilerView by clicking the  
management tools  
link on the Setup Wizard’s Finished page.  
If you used the setupcommand, you can access FilerView by pointing your browser  
http://hostname/na_admin  
to the filer home page ( ), substituting the filer’s name for  
hostname  
.
([DPSOH  
If your host’s name is filer, enter the following URL:  
KWWSꢃꢄꢄILOHUꢄQDBDGPLQ  
Using FilerView 5-1  
                     
When your browser connects to the filer, the filer home page is loaded. The initial  
page contains the choices shown in Table 5-1.  
7DEOHꢀꢌꢁꢃꢄꢀꢀ)LOHU9LHZꢀ+RPHꢀ3DJHꢀ&KRLFHV  
&KRLFH  
'HVFULSWLRQ  
Manual Pages  
Links to UNIX-style man pages for  
the Data ONTAP 5.3 console com-  
mands.  
FilerView  
Links to the FilerView opening screen  
with management options.  
Filer-At-A-Glance  
Displays a tool that monitors the per-  
formance of the filer.  
8VLQJꢀWKHꢀ)LOHU9LHZꢀ,QWHUIDFH  
The FilerView interface consists of two frames: a left frame and a right frame.  
/HIWꢀ)UDPH  
The left frame contains an expandable list of categories:  
The Real-time Displays category contains choices that launch separate tools that  
monitor filer performance.  
The other categories represent management functions.  
To view the Real-time Displays or the functions in a category, double-click the  
Real-time Displays or a category name. To select a Real-time Display or a function,  
double-click the display or function name.  
NOTE: The first time you select a function, FilerView prompts you to enter the filers  
administration password. After you enter the correct password, FilerView does not  
prompt you for the password again.  
5LJKWꢀ)UDPH  
The right frame contains a logo initially.  
As you select functions from the left frame, the right frame changes to display forms  
that provide information about the filer configuration and enable you to change the  
filer’s configuration.  
To alter the filer configuration, you change information that is displayed in forms and  
then save the information.  
+HOSꢀ%XWWRQ  
The top of the window contains a Help button that you can click to view Help for the  
form that is currently displayed in the right frame.  
5-2 Dell PowerVault 720N, 740N, and 760N User’s Guide  
           
& + $ 3 7 ( 5 ꢁ ꢇ  
&RQILJXULQJꢀ+773ꢀRQꢀWKHꢀ)LOHU  
+773ꢀ&RQILJXUDWLRQꢀ,QIRUPDWLRQ  
$ERXWꢀ7KLVꢀ&KDSWHU  
This chapter contains instructions for configuring the filer to provide HTTP service. If  
you purchased a license for the HTTP protocol, follow the instructions in this chapter  
to configure the HTTP service; otherwise, continue with Chapter 7, "Setting Up  
passwd and group Files."  
3UHUHTXLVLWHV  
Before configuring the filer to provide HTTP service, you must decide which directory  
path that the filer uses as the home directory for files to be accessed by HTTP clients.  
The path name for the directory uses the following format:  
/vol/volume_name/directory_name  
/home/html_files  
vol0  
volume, you use  
For example, to use the  
the following path:  
directory path on the  
/vol/vol0/home/html_files  
3URFHGXUH  
NOTE: All lines within filer configuration files must end with a carriage return.  
To configure HTTP service, perform the following steps:  
1. At the filer console, enter the following command to enable the HTTP daemon:  
options httpd.enable on  
2. Use the following command syntax to specify the root of the path that HTTP  
requests can use:  
pathname  
options httpd.rootdir  
Configuring HTTP on the Filer 6-1  
             
For example, if you want HTTP clients to gain access to files or subdirectories  
/vol0/home/html_files  
under  
, enter  
options httpd.rootdir /vol/vol0/home/html_files  
When Web browsers request files using HTTP, the filer delivers the files using the  
http://filer/demo/  
root directory. For example, if a browser requests the URL  
index.htm /vol0/home/html_files/demo/index.htm  
, the filer sends the file  
.
3. If you want the HTTP service started whenever the filer is booted, use an editor  
®
®
from an NFS or Microsoft Windows operating system client to enter the fol-  
/etc/rc  
lowing lines to the filers  
file:  
options httpd.enable on  
options httpd.rootdir pathname  
5HVXOWV  
The filer is configured to respond to requests from Web browsers.  
6-2 Dell PowerVault 720N, 740N, and 760N User’s Guide  
 
& + $ 3 7 ( 5 ꢁ ꢈ  
6HWWLQJꢀ8SꢀSDVVZGꢀDQGꢀJURXSꢀ  
)LOHV  
SDVVZGꢀDQGꢀJURXSꢀ,QIRUPDWLRQ  
$ERXWꢀ7KLVꢀ&KDSWHU  
passwd  
group  
files on the filer so that  
This chapter describes how to set up the  
the filer can authenticate users.  
and  
:KRꢀ6KRXOGꢀ8VHꢀ7KLVꢀ&KDSWHU  
You should use the information in this chapter if your filer is licensed for the CIFS pro-  
tocol and does not use a Windows NT domain controller to authenticate users.  
If your filer does use a Windows NT domain controller, skip this chapter and continue  
with Chapter 8, "Configuring Access to CIFS Shares."  
/RFDWLRQꢀRIꢀWKHꢀSDVVZGꢀDQGꢀJURXSꢀ)LOHV  
passwd  
group  
/etc  
files in the directory of the  
The setupprogram created default  
and  
filer default volume.  
+RZꢀWKHꢀ)LOHUꢀ8VHVꢀWKHꢀSDVVZGꢀDQGꢀJURXSꢀ)LOHV  
group  
files for the following reasons:  
passwd  
The filer uses  
and  
To authenticate users for CIFS access and to translate user and group names in  
/etc/quotas  
the  
file to UIDs and GIDs  
If the filer uses a Windows NT domain controller to authenticate CIFS users, the  
domain controller verifies the users login name and password, and the filer veri-  
passwd  
fies that the user has an entry in the  
file.  
passwd  
If the filer uses the  
file to authenticate NFS or CIFS users, the filer uses  
passwd  
the encrypted password in the  
password.  
file to verify the users login name and  
Setting Up passwd and group Files 7-1  
                   
To determine CIFS guest access  
System Administrator  
For additional information about guest access, see your  
and Command Reference Guide  
.
To determine users’ rights to access files  
For information about how the filer uses the files to determine access rights in an  
System Administrator and  
environment with both NFS and CIFS users, see your  
Command Reference Guide  
.
'HIDXOWꢀSDVVZGꢀ)LOH  
passwd  
Figure 7-1 shows the default entry in the  
file.  
)LJXUHꢀꢈꢁꢃꢄꢀꢀSDVVZUGꢀ)LOHꢀ'HIDXOWꢀ(QWU\  
Table 7-1 describes the fields in an entry.  
7DEOHꢀꢈꢁꢃꢄꢀꢀSDVVZUGꢀ)LOHꢀ)LHOGꢀ(QWULHV  
)LHOG  
'HVFULSWLRQ  
User name  
Contains a user name for the user.  
Encrypted  
password  
Contains a password for the user. The filer disregards this  
®
field if NIS or a Microsoft Windows NT operating system  
domain controller is used to authenticate user names and  
passwords.  
UID  
GID  
Contains a unique integer that is the UID (user ID).  
Contains a unique integer that is the users primary GID  
(group ID).  
Users full name Contains the users full name. The filer ignores this field.  
UNIX home  
directory  
Contains the path of the users home directory. The filer  
ignores this field.  
Default shell  
Contains the path of the users default shell. The filer  
ignores this field.  
7-2 Dell PowerVault 720N, 740N, and 760N User’s Guide  
       
6WHSV  
x
To access the files from a Windows NT or Windows 9 workstation, perform the fol-  
lowing steps:  
1. Map a drive to the root of the default filer volume using the following Universal  
filername  
Naming Convention (UNC) path; replace  
with the name of your filer:  
??ILOHUQDPH?&ꢄ  
When prompted, enter a password based on one of the following scenarios:  
If Windows displays a dialog box asking for a user name and a password,  
use Administrator as the user name.  
If you set up the filer to use a Windows NT domain controller to authenticate  
users, use the domains administrator password.  
passwd  
file to authenticate users, use the  
administrator password that you entered during setup.  
If you set up the filer to use the  
etc  
2. Change to the /  
directory.  
$FFHVVLQJꢀSDVVZGꢀDQGꢀJURXSꢀ)LOHVꢀ)URPꢀ  
81,;ꢍ1)6ꢀ&OLHQWV  
'HVFULSWLRQ  
passwd  
group  
files from a UNIX/NFS  
This procedure enables you to access the  
client.  
and  
6WHSV  
To access the files from a UNIX/NFS client, perform the following steps:  
1. Mount the root of the default filer volume to the clients file system using the fol-  
filername  
lowing path; replace  
with the name of your filer:  
filername  
:/vol/vol0  
/etc  
2. Change to the  
directory.  
$GGLQJꢀ(QWULHVꢀWRꢀWKHꢀSDVVZGꢀ)LOH  
/etc/passwd  
The procedure you use to add entries to the  
file depends on whether you  
file or either a Windows NT domain controller or NIS to  
/etc/passwd  
are using the  
authenticate users.  
/etc/passwd  
If you are using the  
file to authenticate users, see "Adding Entries to the  
passwd File From a UNIX Client."  
If you are using either a Windows NT domain controller or NIS to authenticate users,  
see "Adding Entries to the passwd File From a Windows/NFS Client."  
7-4 Dell PowerVault 720N, 740N, and 760N User’s Guide  
             
$GGLQJꢀ(QWULHVꢀWRꢀWKHꢀSDVVZGꢀ)LOHꢀ)URPꢀDꢀ  
81,;ꢀ&OLHQW  
'HVFULSWLRQ  
passwd  
In this procedure, you add entries to a  
then transfer the file to the filer. You add entries to the  
because each entry in the file requires an encrypted password and the filer does not  
file on a UNIX client using a text editor,  
passwd  
file on a UNIX client  
passwd  
have a command for creating passwords. The format for entries in the  
as follows:  
file is  
XVHUQDPHꢁSDVVZRUGꢁXLGꢁJLGꢁIXOOꢀQDPHꢁꢂꢁGHIDXOWꢀVKHOO  
6WHSV  
passwd  
To add entries to a  
1. Log in to a UNIX client as the root user.  
etc  
file, perform the following steps:  
2. Change to the /  
3. Make a copy of the existing  
passwd  
directory.  
passwd  
passwd.old  
file under a new name, such as  
file in a text editor.  
5. Add an entry for each user who needs access to files.  
.
4. Open the existing  
Leave the password and default shell fields empty. You set passwords in step 8.  
The filer does not use the default shell field.  
6. If you did not purchase a license for the NFS protocol, delete any entries from the  
passwd  
file that are for non-CIFS users.  
7. Save the file and exit the editor.  
8. Set a password for each user by entering the following command:  
SDVVZGꢀXVHUQDPH  
The passwdprogram prompts you to enter the new password twice.  
passwd  
/etc  
9. Copy the  
file from the UNIX client to the  
directory on the filer.  
file from the UNIX client and rename the saved file to  
passwd  
10. Delete the  
passwd  
.
11. Continue with "Adding Entries to the group File."  
Setting Up passwd and group Files 7-5  
       
$GGLQJꢀ(QWULHVꢀWRꢀWKHꢀSDVVZGꢀ)LOHꢀ)URPꢀDꢀ  
:LQGRZVꢍ1)6ꢀ&OLHQW  
'HVFULSWLRQ  
In this procedure, you edit the  
passwd  
x
file from a Windows NT or Windows 9 work-  
passwd  
station or a UNIX/NFS client using a text editor. The format for entries in the  
file is as follows:  
XVHUQDPHꢁSDVVZRUGꢁJLGꢁXLGꢁIXOOꢀQDPHꢁGHIDXOWꢀVKHOO  
6WHSV  
To add entries to the  
passwd  
file, perform the following steps:  
passwd  
/etc  
directory of the default filer  
1. In a text editor, open the  
volume.  
file from the  
2. Add an entry for each user who needs to access files.  
Leave the password and default shell fields empty. The filer does not use them  
when users are authenticated by a Windows NT domain controller or NIS.  
3. Save the file and exit the text editor.  
4. Continue with "Adding Entries to the group File."  
$GGLQJꢀ(QWULHVꢀWRꢀWKHꢀJURXSꢀ)LOH  
'HVFULSWLRQ  
In this procedure, you edit the  
group  
x
file from either a Windows NT or Windows 9  
workstation or a UNIX/NFS client using a text editor. This enables you to add users to  
a specific group that has rights to access the filer.  
The format for entries in the group file is as follows:  
JURXSQDPHꢁꢁJLGꢁXVHUQDPHꢅꢃꢃꢃꢅXVHUQDPH  
3UHUHTXLVLWHV  
This procedure assumes that you already connected to the root filer volume using the  
instructions in one of the following sections:  
x
"Accessing passwd and group Files From Windows NT and Windows 9  
Workstations"  
"Accessing passwd and group Files From UNIX/NFS Clients"  
7-6 Dell PowerVault 720N, 740N, and 760N User’s Guide  
             
6WHSV  
To add entries to the  
group  
file, perform the following steps:  
/etc/group  
1. Use a text editor to open the  
file.  
2. Add entries to the file for each group.  
3. Save the file and exit the text editor.  
5HVXOWV  
passwd  
group  
files on the filer now contain entries for users and groups. The  
The  
and  
filer can verify users’ rights to access the filer.  
Setting Up passwd and group Files 7-7  
   
7-8 Dell PowerVault 720N, 740N, and 760N User’s Guide  
& + $ 3 7 ( 5 ꢁ ꢉ  
&RQILJXULQJꢀ$FFHVVꢀWRꢀ&,)6ꢀ6KDUHV  
$VVLJQLQJꢀ$FFHVVꢀ5LJKWVꢀ  
$ERXWꢀ7KLVꢀ&KDSWHU  
This chapter describes how to assign users and groups access rights to CIFS shares  
System Administrator and Command Reference  
(directories) using FilerView; see your  
Guide  
for instructions about using Windows NT Server Manager to assign access  
rights.  
If you did not purchase a license for the CIFS protocol, continue on to Chapter 9, "Con-  
figuring Clients to Access the Filer."  
6FRSHꢀRIꢀ6KDUHVꢀ$FFHVV  
The rights you assign to a share apply to the entire share; for example, if you assign a  
user rights to a share named HOME, the user gains rights to the directory specified  
by the HOME share and to all subdirectories under the directory. When you assign  
rights, they are recorded in the share ACL.  
FLIVꢀ&RPPDQGꢀ3DUDPHWHUV  
FilerView enables you to grant users and groups access to CIFS shares, using the fol-  
lowing form of the cifscommand:  
FLIVꢀDFFHVVꢀVKDUHꢀ>ꢆJ@ꢀ^XVHU_JURXS`ꢀULJKWV  
The cifscommand parameters are described in Table 8-1.  
7DEOHꢀꢉꢁꢃꢄꢀꢀFLIVꢀ&RPPDQGꢀ3DUDPHWHUV  
3DUDPHWHU  
access  
share  
'HVFULSWLRQ  
Specifies that an access entry is to be created.  
Specifies the name of the share.  
user | group Specifies the name of the user or group for which access  
to the share is granted. When prefixed with the -goption,  
this field specifies a UNIX group.  
Configuring Access to CIFS Shares 8-1  
                     
rights  
Specifies which rights the user or group have to the share.  
In UNIX-style permissions, rights are specified by three  
rwx  
, which stand for read, write, and execute. A  
characters,  
dash (-) in any position denies the user the right specified by  
the character it replaces.  
Examples:  
rwx  
r--  
grants read, write, and execute rights.  
(VWDEOLVKLQJꢀ$FFHVVꢀWRꢀ6KDUHV  
'HVFULSWLRQ  
The following procedure creates the access rights to the current CIFS shares.  
6WHSV  
To establish access to shares, perform the following steps:  
1. From FilerView, select the CIFS option.  
2. From the CIFS option, select Share/Access Editor.  
3. Select the specific share you want to provide access to and click New Access.  
4. Choose either Access by Group or Access by User.  
5. Enter the name of the user or group for whom you want to specify access rights  
to the share.  
6. In the Rights field, select the type of permissions you want to set for this share.  
7. Click OK to create the new access.  
8-2 Dell PowerVault 720N, 740N, and 760N User’s Guide  
     
& + $ 3 7 ( 5 ꢁ ꢊ  
&RQILJXULQJꢀ&OLHQWVꢀWRꢀ$FFHVVꢀWKHꢀ  
)LOHU  
&,)6ꢀDQGꢀ1)6ꢀ&OLHQWꢀ&RQILJXUDWLRQ  
This chapter describes how to configure CIFS and NFS clients to access directories  
and files on the filer.  
&RQILJXULQJꢀ&,)6ꢀ&OLHQWV  
$ERXWꢀ7KLVꢀ6HFWLRQ  
Follow the instructions in this section to configure CIFS clients to access information  
on the filer.  
)LOHUꢀ,Vꢀ9LVLEOHꢀWRꢀ&,)6ꢀ&OLHQWVꢀ$IWHUꢀ6HWXS  
After setup finishes, the filer becomes visible to CIFS clients by automatically regis-  
tering with the master browser on its local network.  
If cross-subnet browsing is configured correctly, the filer is now visible to all CIFS cli-  
ents. For more information about cross-subnet browsing, refer to the Microsoft  
networking documentation.  
&,)6ꢀ&OLHQWꢀ&RQQHFWLRQꢀ0HWKRGV  
Table 9-1 describes the various methods by which CIFS clients can connect to the  
filer. For more information about the following commands and windows, refer to the  
System Administrator and Command Reference Guide  
.
Configuring Clients to Access the Filer 9-1  
                   
7DEOHꢀꢊꢁꢃꢄꢀꢀ&,)6ꢀ&OLHQWꢀ&RQQHFWLRQꢀ0HWKRGV  
&OLHQWꢁRSHUDWLQJꢁ  
0HWKRG  
V\VWHP  
&RPPDQGꢁRUꢁZLQGRZ  
'HVFULSWLRQ  
x
1
Windows 9 ,  
Map Network Drive  
window (from  
Connect to the filer as a  
network drive.  
Windows NT 4.0  
Windows Explorer)  
x
2
3
4
Windows 9 ,  
Network Neighbor-  
hood  
Click the filer icon in the  
Network Neighborhood  
window.  
Windows NT 4.0  
Windows NT  
3.51, Windows  
for Workgroups  
Connect Network  
Drive window (from  
the File Manager)  
Connect to the filer as a  
network drive.  
Any operating  
system that sup-  
ports the  
Map a share to a drive  
letter on the command  
line. For example:  
net use  
net use command  
®
MS-DOS com-  
mand-line inter-  
face and  
f:\\filer\home  
supports the  
net use  
command  
6WHSV  
To inform users about how to access the filer, perform the following steps:  
1. Determine the connection methods that are correct for your CIFS clients.  
2. If your CIFS clients can use methods 1, 3, and 4 to connect to the filer, inform  
your users of the filers UNC path.  
The UNC path consists of a computer name and a share name in the following  
format:  
??FRPSXWHUBQDPH?VKDUHBQDPH  
If the filer is named filer and the directory that contains users’ directories is  
\\filer\home  
shared with the name "home," the UNC path is  
.
3. If your CIFS clients can use method 2 to connect to the filer, inform your users of  
the filer name so that they can locate the filer in Network Neighborhood.  
5HVXOWV  
After you provide users with information about how to access the filer, they can con-  
nect to the filer, view directories, and read and write files.  
9-2 Dell PowerVault 720N, 740N, and 760N User’s Guide  
       
&RQILJXULQJꢀ1)6ꢀ&OLHQWV  
$ERXWꢀ7KLVꢀ6HFWLRQ  
If you purchased a license for the NFS protocol, follow the instructions in this section  
to prepare NFS clients to mount file systems from the filer.  
+RVWꢀDQGꢀ,QWHUIDFHꢀ1DPHV  
When you ran the Setup Wizard or the setupcommand, the filer generated a host  
name for each interface by appending the number of the interface to the filer host  
name.  
For example, the interface name for the first interface on a filer named filer might be  
filer-e0  
; the second interface might be  
filer-e1  
.
&RQILJXULQJꢀ1)6ꢀ&OLHQWVꢀ8VLQJꢀ7ZRꢀ7\SHVꢀRIꢀ1DPHꢀ  
5HVROXWLRQ  
To configure NFS clients, choose one of the following methods for name resolution:  
DNS or NIS  
/etc/hosts file  
&RQILJXULQJꢀ1)6ꢀ&OLHQWVꢀ8VLQJꢀ'16ꢀRUꢀ1,6ꢀ  
IRUꢀ1DPHꢀ5HVROXWLRQ  
If you use DNS or NIS for name resolution, add an entry in your DNS or NIS databases  
for each of the filer interfaces.  
The following example shows how the entries might look for a filer with these  
interfaces:  
255.255.255.145  
255.255.255.155  
filer-e0 filer  
filer-e1  
In the first line of the preceding example, the filer host name itself is used as an alias  
for the first network interface.  
&RQILJXULQJꢀ1)6ꢀ&OLHQWVꢀ8VLQJꢀ  
ꢍHWFꢍKRVWVꢀ)LOHꢀIRUꢀ1DPHꢀ5HVROXWLRQ  
/etc/hosts  
/etc/hosts  
file  
If you use  
file for name resolution, add an entry in each hosts  
for each of the filer interfaces.  
Configuring Clients to Access the Filer 9-3  
                   
The following example shows how the entries might look for a filer with these  
interfaces:  
255.255.255.145  
255.255.255.155  
filer-e0 filer  
filer-e1  
In the first line of the preceding example, the filer host name itself is used as an alias  
for the first network interface.  
([SRUWLQJꢀ)LOHUꢀ'LUHFWRULHVꢀIRUꢀ1)6ꢀ&OLHQWV  
You must export the filers file systems before clients can mount them.  
/etc/exports  
Use an editor from an NFS or CIFS client to edit the  
directories.  
file to export filer  
0RXQWLQJꢀ)LOHꢀ6\VWHPVꢀRQꢀ1)6ꢀ&OLHQWV  
'HVFULSWLRQ  
For clients to mount file systems from the filer, you must create entries for the direc-  
/etc/fstab /etc/vfstab  
or  
tories exported from the filer in each clients  
file.  
/etc/fstab /etc/vfstab  
or  
After you edit the clients’  
file, the clients mount the file sys-  
tems automatically when they boot.  
6WHSV  
To prepare clients to mount the filers file systems, perform the following steps:  
NOTE: The /vol/vol0/home directory is used as a sample filer directory in this proce-  
dure. You should use a path that exists on the filer.  
/n/filer/  
1. Create a directory on the client to act as a mount point. For example,  
home  
.
/vol/vol0/home  
/n/filer/home  
, add the following  
2. To mount the filers  
directory to  
/etc/fstab /etc/vfstab  
line to the clients  
or  
file:  
filername:/vol/vol0/home /n/filer/home nfs rw 0 0  
filername  
Replace  
The file system is mounted when the client reboots.  
/vol/vol0/home  
with the name of your file.  
3. To mount the  
command at the client:  
directory without a client reboot, enter the following  
mount filername:/vol/vol0/home /n/filer/home  
9-4 Dell PowerVault 720N, 740N, and 760N User’s Guide  
           
5HVXOW  
After the  
/vol/vol0/home  
directory on the filer is mounted, the user on the client sys-  
/n/filer/home  
tem can create, modify, or remove files in  
.
:KHUHꢀWRꢀ*Rꢀ)URPꢀ+HUH  
If you configured the filer using the setupcommand, continue on to Chapter 10,  
"setup Command — Installing SecureShare.”  
If you configured the filer using the Setup Wizard, your configuration is complete.  
SecureShare was automatically installed by the Setup Wizard.  
Configuring Clients to Access the Filer 9-5  
   
9-6 Dell PowerVault 720N, 740N, and 760N User’s Guide  
& + $ 3 7 ( 5 ꢁ ꢂ ꢋ  
VHWXSꢀ&RPPDQGꢀ³ꢀ,QVWDOOLQJꢀ  
6HFXUH6KDUHꢀ  
$ERXWꢀ6HFXUH6KDUH  
)HDWXUHVꢀLQꢀ6HFXUH6KDUH  
For multiprotocol environments, Data ONTAP 5.3 provides two SecureShare features:  
SecureShare Access, which makes it easy for Windows users to change UNIX  
file permissions on the filer.  
SecureShare Access appears as a tab in the Properties dialog box of a set of files  
you select if at least one of the files is a UNIX file. To use SecureShare Access,  
System Administrator and Command Reference Guide  
see your  
.
SecureShare Account Migrator, which makes it easy to convert users and groups  
/etc/  
from a Windows NT domain into the format necessary to populate the  
passwd  
/etc/group  
files on your filer. It enables you to perform the following  
and  
tasks:  
Create the commands necessary to build CIFS shares for each user and  
apply appropriate rights to these shares.  
/etc  
/etc  
files, so you can keep your  
Synchronize a Windows NT domain with  
files current by running the program daily.  
You can run SecureShare Account Migrator only from Windows NT, and only if  
you have administrative access to the filer.  
,QVWDOOLQJꢀ6HFXUH6KDUHꢀ$FFHVV  
'HVFULSWLRQ  
This procedure installs SecureShare Access from the CD onto the filer.  
setup Command — Installing SecureShare10-1  
                 
6WHSV  
To install SecureShare Access from the CD, perform the following steps:  
1. Make sure that the Data ONTAP 5.3 CD is in the CD-ROM drive.  
2. Click the CD-ROM drive icon.  
3. Click UTILS.  
4. Click SSACCESS.  
5. Click SSACCESS.EXE.  
6. Follow the prompts in the SecureShare Access installer program.  
,QVWDOOLQJꢀ6HFXUH6KDUHꢀ$FFRXQWꢀ0LJUDWRU  
'HVFULSWLRQ  
The following procedure installs the SecureShare Account Migrator from the  
CD onto the filer.  
6WHSV  
To install SecureShare Account Migrator from the CD, perform the following steps:  
1. Make sure that the Data ONTAP 5.3 CD is in the CD-ROM drive.  
2. Click the CD-ROM drive icon.  
3. Click UTILS.  
4. Click SSAM.  
5. Open the README file.  
6. Click SSACMIGR.EXE.  
7. Follow the prompts in the SecureShare Account Migrator installer program.  
10-2 Dell PowerVault 720N, 740N, and 760N User’s Guide  
         
$ 3 3 ( 1 ' , ; ꢁ $  
7HFKQLFDOꢀ6SHFLILFDWLRQV  
7DEOHꢀ$ꢁꢃꢄꢀꢀ7HFKQLFDOꢀ6SHFLILFDWLRQV  
0LFURSURFHVVRUꢁ  
Microprocessor type . . . . . . . . . . . . . . . . 21164A Alpha 400MHz on the PowerVault  
720N and 740N filers; Alpha 600MHz on  
the PowerVault 760N filer  
Internal cache . . . . . . . . . . . . . . . . . . . . . No cache on the PowerVault 720N filer;  
1-MB onboard cache on the PowerVault  
740N filer; 2-MB onboard cache on the  
PowerVault 760N filer  
Math coprocessor . . . . . . . . . . . . . . . . . . internal to microprocessor  
([SDQVLRQꢁ%XV  
Bus types . . . . . . . . . . . . . . . . . . . . . . . . PCI  
Bus speed: PCI . . . . . . . . . . . . . . . . . . . . 33 MHz  
PCI expansion-card connectors. . . . . . . . Four in PowerVault 720N filer; two 32-bit  
and two 64-bit  
Seven in PowerVault 740N filer; two 32-bit  
and five 64-bit  
Nine in the PowerVault 760N filer; three  
32-bit and six 64-bit  
PCI expansion-card connector data  
width (maximum). . . . . . . . . . . . . . . . . . . 64 bits  
NOTE: For the full name of an abbreviation or acronym used in this table, see the Glossary.  
Technical Specifications A-1  
           
7DEOHꢀ$ꢁꢃꢄꢀꢀ7HFKQLFDOꢀ6SHFLILFDWLRQVꢀꢁFRQWLQXHGꢂ  
0HPRU\  
Architecture. . . . . . . . . . . . . . . . . . . . . . . . 3.3-V DIMM, unbuffered SDRAM (ECC)  
DIMM sockets. . . . . . . . . . . . . . . . . . . . . . four; gold contacts  
DIMM capacities. . . . . . . . . . . . . . . . . . . . 256 MB on the PowerVault 720N; 512 MB  
on the PowerVault 740N; and 1 GB on the  
PowerVault 760N, unbuffered SDRAM  
Maximum RAM. . . . . . . . . . . . . . . . . . . . . 256 MB on the PowerVault 720N; 512 MB  
on the PowerVault 740N; and 1 GB on the  
PowerVault 760N  
'ULYHV  
Externally accessible bays. . . . . . . . . . . . . one 3.5-inch bay for a diskette drive  
3RUWVꢁDQGꢁ&RQQHFWRUV  
Externally accessible: Serial . . . . . . . . . . . one 9-pin console connector; one 9-pin  
diagnostics connector  
&RQWUROVꢁDQGꢁ,QGLFDWRUV  
Reset control. . . . . . . . . . . . . . . . . . . . . . . push button  
Power control . . . . . . . . . . . . . . . . . . . . . . power switch on the back  
Status indicator . . . . . . . . . . . . . . . . . . . . . green LED  
Hard-disk drive activity indicator . . . . . . . . green LED  
Power indicator . . . . . . . . . . . . . . . . . . . . . green LED  
Activity indicator (on NIC connector). . . . . yellow LED  
3RZHUꢁ  
DC power supply:  
Wattage . . . . . . . . . . . . . . . . . . . . . . . 240 W  
Heat dissipation . . . . . . . . . . . . . . . . . 1025 BTUs  
Voltage. . . . . . . . . . . . . . . . . . . . . . . . 90 to 250 V AC single phase  
Current. . . . . . . . . . . . . . . . . . . . . . . . 4 A at 90 V AC (rated)  
Frequency . . . . . . . . . . . . . . . . . . . . . 47 to 63 Hz  
NOTE: For the full name of an abbreviation or acronym used in this table, see the Glossary.  
A-2 Dell PowerVault 720N, 740N, and 760N User’s Guide  
         
7DEOHꢀ$ꢁꢃꢄꢀꢀ7HFKQLFDOꢀ6SHFLILFDWLRQVꢀꢁFRQWLQXHGꢂ  
3K\VLFDO  
Height . . . . . . . . . . . . . . . . . . . . . . . . . . . 22.23 cm (8.75 inches)  
Width. . . . . . . . . . . . . . . . . . . . . . . . . . . . 43.18 cm (17.0 inches)  
Depth. . . . . . . . . . . . . . . . . . . . . . . . . . . . 64.14 cm (25.25 inches)  
Weight . . . . . . . . . . . . . . . . . . . . . . . . . . 28.8 kg (64.0 lb)  
(QYLURQPHQWDO  
Temperature:  
Operating . . . . . . . . . . . . . . . . . . . . . 10° to 40°C (50° to 95°F)  
Storage. . . . . . . . . . . . . . . . . . . . . . . -20° to 65°C (–4° to 149°F)  
Relative humidity:  
Operating . . . . . . . . . . . . . . . . . . . . . 10% to 90% (noncondensing)  
Storage. . . . . . . . . . . . . . . . . . . . . . . 10% to 90% (noncondensing) in original  
shipping container; 50% otherwise  
Altitude:  
Operating . . . . . . . . . . . . . . . . . . . . . –16 to 3077 m (–50 to 10,000 ft) at 37° C  
Storage. . . . . . . . . . . . . . . . . . . . . . . 16 to 7625 m (–50 to 25,000 ft)  
NOTE: For the full name of an abbreviation or acronym used in this table, see the Glossary.  
Technical Specifications A-3  
   
A-4 Dell PowerVault 720N, 740N, and 760N User’s Guide  
$ 3 3 ( 1 ' , ; ꢁ %  
,QVWDOOLQJꢀ3RZHU9DXOWꢀ)LOHUꢀ  
6RIWZDUH  
3RZHU9DXOWꢀ)LOHUꢀ6RIWZDUHꢀ,QVWDOODWLRQ  
:KDWꢀ7KLVꢀ$SSHQGL[ꢀ&RQWDLQV  
This appendix contains information for:  
Booting from bootable system diskettes  
Installing Data ONTAP™ 5.3 software  
Changing to CIFS-compatible security styles  
Creating bootable system diskettes  
Creating a Diagnostics diskette  
,QVWDOOLQJꢀWKHꢀ2SHUDWLQJꢀ6\VWHP  
To perform the installation, you must have access to either of the following clients,  
which must have write permission to the filers root directory:  
x
a system running a Microsoft Windows 9 or Windows NT 4.0, and a CD-ROM  
drive  
a UNIX workstation running NFS Client version 2 or 3, and a CD-ROM drive  
You must be able to log into the filer as Administrator and have access to the filers  
system console.  
%RRWLQJꢀ)URPꢀ%RRWDEOHꢀ6\VWHPꢀ'LVNHWWHV  
%RRWLQJꢀ)URPꢀ'LVNHWWH  
To boot the filer, complete the following steps:  
System Boot Diskette 1  
1. Insert the diskette labeled  
into the filers diskette drive.  
Installing PowerVault Filer Software B-1  
                 
2. Ensure the filer is running.  
3. At the system console, enter:  
reboot  
The filer displays the following boot menu:  
ꢇꢈꢀ1RUPDOꢀ%RRW  
ꢉꢈꢀ%RRWꢀZLWKRXWꢀꢂHWFꢂUF  
ꢊꢈꢀ&KDQJHꢀ3DVVZRUG  
ꢋꢈꢀ,QLWLDOL]HꢀDOOꢀGLVNV  
ꢌꢈꢀ0DLQWHQDQFHꢀPRGHꢀERRW  
6HOHFWLRQꢀꢍꢇꢆꢌꢈ"  
4. Choose one of the boot types shown below by entering the corresponding  
number:  
Normal Boot (1) — Use Normal Boot to run the filer normally, but  
from a diskette.  
Boot without /etc/rc (2) — Use Boot without /etc/rc to troubleshoot  
and repair configuration problems.  
NOTE: Booting without  
causes the filer to use only default options  
, and disabling  
/etc/rc  
/etc/rc  
settings, disregarding all the options settings you put in  
some services, such as  
.
syslog  
Change Password (3) — Use Change Password to reset your filers adminis-  
trative password.  
Initialize all disks (4) — Use Initialize all disks to zero all disks attached to the  
filer.  
NOTE: This action will result in a loss of all data on the disks.  
Maintenance mode boot (5) — Use Maintenance mode boot to go into  
Maintenance mode and perform some volume and disk operations and get  
detailed volume and disk information. Maintenance mode is special for the  
following reasons:  
Most normal functions, including file/system operations, are disabled.  
A limited set of commands is available for diagnosing and repairing disk  
and volume problems.  
You exit Maintenance mode with the haltcommand.  
5. Remove the system boot diskette and store it.  
B-2 Dell PowerVault 720N, 740N, and 760N User’s Guide  
,QVWDOOLQJꢀ'DWDꢀ217$3ꢀꢌꢄꢆꢀ6RIWZDUH  
,QVWDOODWLRQꢀ)URPꢀDꢀ:LQGRZVꢀ&OLHQW  
From a Windows NT or Windows 9x client, you must install the files from the CD to  
the filer by performing the following steps.  
NOTE: CIFS must be licensed and configured on the filer. To register the CIFS license,  
enter the following commands from the filer console:  
filer>license cifs=<license number>  
where <license number>is the provided CIFS license.  
filer>cifs setup  
To access the system files from the CD and install them on the filer, perform the fol-  
lowing steps:  
1. As the Domain Administrator from a Windows client, right-click My Computer  
and click Map Network Drive.  
2. In the Map Drive dialog box that appears, select an unused drive letter.  
Installing PowerVault Filer Software B-3  
     
,QVWDOODWLRQꢀ)URPꢀDꢀ81,;ꢀ&OLHQW  
From a UNIX client running NFS Client version 2 or 3, you must install the files from  
the CD to the filer by performing the following steps.  
NOTE: An NFS license must be purchased and registered on the filer to proceed. To  
register the NFS license, enter the following command from the filer console:  
filer>license nfs=<license number>  
where <license number>is the provided NFS license.  
To access the system files from the CD and install them on the filer, perform the fol-  
lowing steps:  
1. Mount the filers root file system to a directory on the client. For example, enter:  
mount filer:/ /mnt  
/mnt  
where  
file system.  
is the directory on the client where you want to mount the filers root  
2. Change the directory to a local temporary directory on the client system. For  
example, enter:  
FGꢀ/tmp  
/tmp  
where  
is a local temporary directory on the client.  
3. Insert the CD into the CD-ROM drive and extract the files, specifying the input  
file, output file, and block size. For example, enter:  
tar xvf /CD-ROM_MNT_PT/ontap/5_3/alpha/sysfiles.tar  
CD-ROM_MNT_PT  
where  
is the name of your CD mount point.  
Result: The tarcommand reports the names of the files that are copied  
tar_image.Z  
(
dell_filer_install  
and  
).  
dell_filer_install  
4. Run the  
script with an argument that tells the script where to  
install the files; this is the mount point for the filers root directory. You can keep  
or delete the tarfiles.  
To delete the tarfiles, enter:  
./dell_filer_install /mnt  
To keep the tarfiles, enter:  
./dell_filer_install -k /mnt  
/mnt  
where  
is the directory on the client where you mounted the filers root file  
system.  
Result: The install script decompresses and extracts files.  
5. From the client system, unmount the filers root file system (/) by entering the fol-  
lowing commands:  
B-4 Dell PowerVault 720N, 740N, and 760N User’s Guide  
   
cd /  
umount /mnt  
/mnt  
where  
is the directory on the client where you mounted the filers root file  
system.  
6. At the filer console, enter download to complete the installation.  
&KDQJLQJꢀWRꢀ&,)6ꢁ&RPSDWLEOHꢀ6HFXULW\ꢀ  
6W\OHV  
Every volume and qtree has a default security style of UNIX, which permits only  
UNIX-style permissions.  
6HFXULW\ꢀ6W\OHV  
To enable NTFS-style file security on one or more volumes, you can change the  
security style of the volumes you want to one of the following styles:  
Mixed — allows both UNIX-style and Windows NT-style permissions.  
NTFS — allows only Windows NT-style permissions.  
NOTE: If you have only one volume, that volume is also the root volume.  
&KDQJLQJꢀWKHꢀ5RRWꢀ9ROXPHꢀ6HFXULW\ꢀ6W\OH  
To change the security style of the root volume to mixed, use the following command:  
qtree security /vol/vol0/ mixed  
/vol/vol0  
, and you must put a slash after the  
The default name of the root volume is  
name of the root volume.  
For additional information about security styles, volumes, and qtrees, refer to your  
System Administrator and Command Reference Guide  
.
&UHDWLQJꢀ%RRWDEOHꢀ6\VWHPꢀ'LVNHWWHV  
2YHUYLHZꢀRIꢀ&UHDWLQJꢀ%RRWDEOHꢀ6\VWHPꢀ'LVNHWWHV  
You can create the bootable system diskettes from the CD. Refer to the appropriate  
procedure that follows depending on whether you are working from a Windows client  
or a UNIX client to administer your filer.  
Installing PowerVault Filer Software B-5  
           
&UHDWLQJꢀ%RRWDEOHꢀ6\VWHPꢀ'LVNHWWHVꢀRQꢀDꢀ:LQGRZVꢀ&OLHQW  
To create the boot diskette from a Windows client system, perform the following  
steps:  
1. Use the RaWrite utility to extract the system boot diskette software and copy it  
to the diskette.  
If you do not already have this utility on your system, it is on the CD in the  
drive>:\utils\Rawrite  
drive  
is the CD-ROM drive.  
<
directory where  
2. Insert a blank, write-enabled diskette into the diskette drive. Label the diskette  
"System Boot Diskette 1, Data ONTAP 5.3."  
Rawrite.exe  
3. Open the RaWrite folder and double-click the  
file.  
The RaWrite utility starts and prompts you for an image source file.  
4. Enter the name used for the image file (for example, boot1 for boot diskette 1 or  
boot2 for boot diskette 2).  
The utility prompts you for a target diskette drive.  
5. Enter the drive letter for the formatted diskette that will be the system boot  
diskette.  
The status of the operation is displayed in messages. When the operation is  
done, continue to the next step.  
6. Remove the diskette from the drive and write-protect the diskette.  
7. Repeat this procedure for the second system boot diskette and label it "System  
Boot Diskette 2, Data ONTAP 5.3."  
&UHDWLQJꢀ%RRWDEOHꢀ6\VWHPꢀ'LVNHWWHVꢀRQꢀDꢀ81,;ꢀ&OLHQW  
To create the boot diskette from a UNIX client, perform the following steps:  
/mnt/ontap/5_3/alpha/  
/mnt/ontap/5_3/alpha/boot2  
in the CD, where /mntis the directory on the  
Replace the variable filename with the name of the image to be  
boot1  
and  
client where you mounted the CD-ROM drive.  
If the diskette drive in your administration client is not named /dev/fd0, replace  
/dev/fd0with the name of your diskette drive by performing the following steps:  
1. Insert a blank, write-enabled diskette into the diskette drive on the administration  
client system. Label the diskette "System Boot Diskette 1, Data ONTAP 5.3."  
2. Copy the boot diskette 1 image to the diskette using the ddcommand. For  
example,  
dd if=filename of=/dev/fd0 bs=512  
3. Remove the diskette from the drive and write-protect the diskette.  
4. Repeat this procedure for the second system boot diskette and label it "System  
Boot Diskette 2, Data ONTAP 5.3."  
B-6 Dell PowerVault 720N, 740N, and 760N User’s Guide  
       
&UHDWLQJꢀDꢀ'LDJQRVWLFVꢀ'LVNHWWH  
&UHDWLQJꢀ'LVNHWWHVꢀ)URPꢀ'LVNHWWHꢀ,PDJHꢀ)LOHV  
This section describes how to make a Diagnostics boot diskette from a diskette image  
file supplied on the CD for a Windows client system or a DOS shell window or a UNIX  
client.  
&UHDWLQJꢀDꢀ'LDJQRVWLFVꢀ'LVNHWWHꢀRQꢀDꢀ:LQGRZVꢀ&OLHQWꢀ  
6\VWHP  
To create the diagnostics diskette from a Windows client system or a DOS shell win-  
dow, perform the following steps:  
1. Use the RaWrite utility to extract the diagnostics boot diskette software and copy  
it to the diskette.  
If you do not already have this utility on your system, it is on the CD in the  
drive>:\utils\Rawrite  
<
drive  
is the CD-ROM drive.  
directory where  
2. Insert the CD in the Windows client system CD-ROM drive.  
3. Insert a blank, write-enabled diskette into the Windows client diskette drive.  
Label the diskette "System Diagnostics Diskette".  
Rawrite.exe  
4. Open the RaWrite folder and double-click the  
file.  
The RaWrite utility starts and prompts you for an image source file.  
5. Enter the name used for the image file (for example, boot1 for boot diskette 1 or  
boot2 for boot diskette 2).  
The utility prompts you for a target diskette drive.  
6. Enter the drive letter for the formatted diskette that will be the system diagnos-  
tics diskette.  
The status of the operation is displayed. When the operation is done, continue to  
the next step.  
7. Remove the diskette from the drive and write-protect the diskette.  
&UHDWLQJꢀDꢀ'LDJQRVWLFVꢀ'LVNHWWHꢀRQꢀDꢀ81,;ꢀ&OLHQW  
To create the diagnostics diskette from a UNIX client, perform the following steps:  
1. Insert the CD in the UNIX client CD-ROM drive.  
2. Mount the CD (some UNIX clients do this automatically when the CD is inserted  
into the drive; others require that you use the mountcommand).  
3. Insert a blank, write-enabled diskette into the UNIX client diskette drive (in this  
cdrom  
procedure, it is assumed that the CD is mounted at / ). Label the diskette  
"System Diagnostics Diskette" and include the filer name and model on this label.  
4. Copy the boot diskette 1 image to the diskette using the GG command. For  
example,  
Installing PowerVault Filer Software B-7  
       
dd if=cdrom/ontap/5_3/alpha/diag_1_6 of=/dev/fd0 bs=512  
/dev/fd0 /dev/fd0  
.
Replace  
with the device name of your diskette drive if it is not  
5. Remove the diskette from the drive and write-protect the diskette.  
B-8 Dell PowerVault 720N, 740N, and 760N User’s Guide  
'HILQLWLRQꢀRIꢀDꢀ:RUNJURXS  
A workgroup:  
Is a collection of Windows NT computers  
Has a unique workgroup name  
Is grouped for viewing purposes  
Does not provide access to centralized user and group accounts  
Does not enable centralized administration of user and group accounts  
:KHQꢀWRꢀ,QVWDOOꢀ,QWRꢀDꢀ:LQGRZVꢀ17ꢀ'RPDLQ  
Install the filer into a Windows NT domain:  
If you want centralized administration using a Windows NT domain  
If you want to integrate the filer into the Windows NT domain topology  
If you want user authentication to be handled by Windows NT domain controllers  
&$87,21ꢀꢁ<RXUꢁQHWZRUNꢁPXVWꢁKDYHꢁDWꢁOHDVWꢁRQHꢁ:LQGRZVꢁ17ꢁGRPDLQꢁFRQꢄ  
WUROOHUꢁWRꢁLQVWDOOꢁWKHꢁILOHUꢁLQWRꢁDꢁ:LQGRZVꢁ17ꢁGRPDLQꢃ  
:KHQꢀWRꢀ,QVWDOOꢀ,QWRꢀDꢀ:LQGRZVꢀ:RUNJURXS  
Install the filer into a Windows workgroup:  
If you do not want centralized administration through a Windows NT domain  
/etc/passwd  
If you want UNIX-style authentication using an  
file or NIS  
&$87,21ꢀꢁ,Iꢁ\RXꢁLQVWDOOꢁWKHꢁILOHUꢁLQWRꢁDꢁ:LQGRZVꢁZRUNJURXSꢂꢁLWꢁLVꢁQRWꢁFRPꢄ  
SDWLEOHꢁZLWKꢁFOLHQWVꢁWKDWꢁKDYHꢁ:LQGRZVꢁ17ꢁꢇꢃꢈꢁ6HUYLFHꢁ3DFNꢁꢉꢁRUꢁKLJKHUꢁRUꢁ  
:LQGRZV ꢊ[ꢁFOLHQWVꢁZLWKꢁ0LFURVRIWꢁ'LVWULEXWHGꢁ)LOHꢁ6\VWHPꢁꢋ')6ꢌꢁꢇꢃꢍꢁ  
LQVWDOOHGꢃꢁ&OLHQWVꢁFDQꢁEHꢁPDGHꢁFRPSDWLEOHꢁE\ꢁDGGLQJꢁDꢁUHJLVWU\ꢁHQWU\ꢁWRꢁ  
UHHQDEOHꢁSODLQꢄWH[WꢁSDVVZRUGVꢃ  
7RꢁUHHQDEOHꢁSODLQꢄWH[WꢁSDVVZRUGVꢁRQꢁDꢁ:LQGRZVꢁ17ꢁFOLHQWꢂꢁFRQVXOWꢁWKHꢁ  
0LFURVRIWꢁ.QRZOHGJHꢁ%DVHꢁRQꢁWKHꢁ:HEꢁDWꢁKWWSꢎꢍꢍZZZꢄPLFURVRIWꢄFRPꢍNEꢍ  
GHIDXOWꢄDVSꢎꢁUHIHUꢁWRꢁDUWLFOHꢁ4ꢍꢏꢏꢐꢉꢈꢂꢁꢑ:LWKꢁ8QHQFU\SWHGꢁ3DVVZRUGꢁ63ꢉꢁ  
)DLOVꢁWRꢁ&RQQHFWꢁWRꢁ60%ꢁ6HUYHUꢑ  
7RꢁUHHQDEOHꢁSODLQꢄWH[WꢁSDVVZRUGVꢁRQꢁDꢁ:LQGRZVꢁꢊ[ꢁFOLHQWꢂꢁFRQVXOWꢁWKHꢁIROꢄ  
ORZLQJꢁILOHꢁLQꢁWKHꢁ0LFURVRIWꢁ.QRZOHGJHꢁ%DVHꢁRQꢁWKHꢁ:HEꢀ  
KWWSꢎꢍꢍZZZꢄPLFURVRIWꢄFRPꢍQWVHUYHUꢍGIVꢍUHDGPHꢄDVSꢃ  
6XPPDU\ꢀRIꢀ'RPDLQꢀDQGꢀ:RUNJURXSꢀ)HDWXUHV  
Table C-1 shows which authentication features are available to domains and which are  
available to workgroups.  
C-2 Dell PowerVault 720N, 740N, and 760N User’s Guide  
           
7DEOHꢀ&ꢁꢃꢄꢀꢀ'RPDLQꢀDQGꢀ:RUNJURXSꢀ)HDWXUHV  
)HDWXUH  
'RPDLQ  
:RUNJURXS  
Compatible with Windows NT 4.0 Service  
Pack 3 or higher (encryption).  
Y
N
Compatible with Windows NT 4.0 Service  
Pack 3 or higher (message signing).  
N
N
Support for Windows NT-only users.  
Encrypted password sent to filer.  
Y
Y
Y
N
N
Y
/etc/passwd  
/etc/group  
files on the filer  
and  
determine User Identification numbers  
(UIDs) and Group Identification numbers  
(GIDs) for multiprotocol.  
/etc/passwd  
passwords.  
file on the filer contains users’  
N
Y
Single login.  
Y
Y
N
Change password remotely.  
Y (only with  
NIS)  
Multiple net segments.  
Y
N
&KRRVLQJꢀ%HWZHHQꢀ3&ꢁ6W\OHꢀRUꢀ81,;ꢁ6W\OHꢀ  
3HUPLVVLRQV  
$ERXWꢀ7KLVꢀ6HFWLRQ  
When you configure the CIFS protocol, you must choose whether the filer uses PC-  
style or UNIX-style permissions.  
NOTE: If you are setting up a filer in a Windows NT-only environment, you can skip  
this section.  
This section provides a brief overview of PC-style and UNIX-style permissions and  
provides guidelines for choosing which style to use. PC-style permissions are similar  
to FAT (File Allocation Table); they maintain security with share level ACLs (Access  
Control Lists).  
In addition, PC-style permissions also allow you to further restrict file security using  
file permissions. UNIX-style permissions do not use share level ACLs. Therefore,  
using PC-style permissions only affects PC access to files with UNIX security.  
Preparing for CIFS Configuration C-3  
       
+RZꢀ3&ꢁ6W\OHꢀ3HUPLVVLRQVꢀ:RUN  
PC-style permissions are determined by the rights assigned in a shares ACL and are  
limited by the UNIX permissions assigned to a file. To write to a file when PC-style  
permissions are in effect, a user must meet the following criteria:  
The user must have write permission for the file in the ACL.  
The user must have write permission for the file according to the UNIX-style per-  
missions associated with the file.  
If the user is the owner of the file, the filer uses the UNIX-style permissions set  
for the owner of the file. If the user is not the owner of the file, the filer uses the  
UNIX-style permissions set for the UNIX group associated with the file. Note that  
the UNIX "other" permissions are not used.  
:KHQꢀWRꢀ&KRRVHꢀ3&ꢁ6W\OHꢀ3HUPLVVLRQV  
Choose PC-style permissions if you need file access to be controlled by ACLs.  
+RZꢀ81,;ꢁ6W\OHꢀ3HUPLVVLRQVꢀ:RUN  
UNIX-style permissions are determined by the rights associated with the UNIX UID  
and GID and are limited by the ACL permissions assigned to a file. To write to a file  
when UNIX-style permissions are in effect, a user must meet the following criteria:  
If the user is the owner of the file, the write permission for the users UID must  
be set.  
If the user is not the owner of the file, he or she must be a member of the group  
(GID) associated with the file and the write permission for the groups GID must  
be set.  
The user must have write permission for the file in the ACL.  
:KHQꢀWRꢀ&KRRVHꢀ81,;ꢁ6W\OHꢀ3HUPLVVLRQV  
Choose UNIX-style permissions if you want to implement simple security and need  
access to be controlled using exact UNIX rules.  
NOTE: If you choose UNIX-style permissions, set the share ACL permission to  
rwx  
for . With this setting, the UNIX rights work just as they do on a UNIX  
everyone  
system.  
$GGLQJꢀWKHꢀ)LOHUꢀWRꢀDꢀ:LQGRZVꢀ17ꢀ'RPDLQ  
$ERXWꢀ7KLVꢀ6HFWLRQ  
Use the information in this section to add the filer to a Windows NT domain before  
you configure the filer.  
C-4 Dell PowerVault 720N, 740N, and 760N User’s Guide  
             
NOTE: This section presents one method of adding the filer to a Windows NT domain.  
For alternative ways of adding the filer to a Windows NT domain, consult the  
Microsoft Knowledge Base on the Web at  
http://www.microsoft.com/kb/  
and refer to article Q140387, "Batch File Adds/Removes Machine  
default.asp  
Accounts in Server Manager."  
3UHUHTXLVLWHV  
&$87,21ꢀꢁ,WꢁLVꢁGLIILFXOWꢁWRꢁFKDQJHꢁWKHꢁGHFLVLRQꢁWRꢁDGGꢁWKHꢁILOHUꢁWRꢁDꢁ:LQGRZVꢁ  
17ꢁGRPDLQꢁDIWHUꢁ\RXꢁKDYHꢁUXQꢁsetupꢃ  
To add the filer to a Windows NT domain, you must meet the following prerequisites:  
You must have a permanent Windows NT domain.  
You must have the "add workstation to domain" privilege.  
You must be able to connect to the Primary Domain Controller (PDC).  
3URFHGXUH  
To add the filer to a Windows NT domain, perform the following steps:  
1. Log in as Administrator at a Windows NT server that is a member of the Win-  
dows NT domain into which you are adding the filer.  
2. Run Server Manager.  
3. From the Computer menu, select Add to Domain.  
The Add Computer To Domain window appears.  
4. Click the Windows NT Workstation or Server option button.  
5. Enter the name of the filer.  
The filer name can have up to 15 of the following characters:  
letters (A–Z), numerals (0–9), !, #, $, @, %, , (, ), -, ^, _, {, }, and ~  
6. Click Add.  
5HVXOWV  
The filer was added to the Windows NT domain.  
&$87,21ꢀꢁ'RꢁQRWꢁXVHꢁWKLVꢁDFFRXQWꢁXQWLOꢁ\RXꢁILQLVKꢁFRQILJXULQJꢁWKHꢁILOHUꢃ  
Preparing for CIFS Configuration C-5  
     
C-6 Dell PowerVault 720N, 740N, and 760N User’s Guide  
$ 3 3 ( 1 ' , ; ꢁ '  
7LPHꢀ=RQHV  
7LPHꢀ=RQHꢀ6HOHFWLRQ  
$ERXWꢀ7KLVꢀ6HFWLRQ  
You must enter one of the following time zones when setupprompts for a time  
zone.  
$IULFD  
Africa/Abidjan  
Africa/Algiers  
Africa/Bangui  
Africa/Blantyre  
Africa/Cairo  
Africa/Accra  
Africa/Asmera  
Africa/Banjul  
Africa/Addis_Ababa  
Africa/Bamako  
Africa/Bissau  
Africa/Bujumbura  
Africa/Conakry  
Africa/Djibouti  
Africa/Gaborone  
Africa/Kampala  
Africa/Kinshasa  
Africa/Lome  
Africa/Brazzaville  
Africa/Casablanca  
Africa/Dar_es_Salaam  
Africa/Freetown  
Africa/Johannesburg  
Africa/Kigali  
Africa/Libreville  
Africa/Lumumbashi  
Africa/Maputo  
Africa/Mogadishu  
Africa/Ndjamena  
Africa/Ouagadougou  
Africa/Timbuktu  
Africa/Windhoek  
Africa/Dakar  
Africa/Douala  
Africa/Harare  
Africa/Khartoum  
Africa/Lagos  
Africa/Luanda  
Africa/Malabo  
Africa/Mbabane  
Africa/Nairobi  
Africa/Nouakchott  
Africa/Sao_Tome  
Africa/Tunis  
Africa/Lusaka  
Africa/Maseru  
Africa/Monrovia  
Africa/Niamey  
Africa/Porto-Novo  
Africa/Tripoli  
$PHULFD  
America/Adak  
America/Antigua  
America/Atka  
America/Bogota  
America/Caracas  
America/Cayman  
America/Costa_Rica  
America/Anchorage  
America/Aruba  
America/Barbados  
America/Boise  
America/Catamarca  
America/Chicago  
America/Cuiaba  
America/Anguilla  
America/Asuncion  
America/Belize  
America/Buenos_Aires  
America/Cayenne  
America/Cordoba  
America/Curacao  
Time Zones D-1  
               
America/Dawson  
America/Detroit  
America/El_Salvador  
America/Dawson_Creek America/Denver  
America/Dominica  
America/Ensenada  
America/Edmonton  
America/Fort_Wayne  
$QWDUFWLFD  
$VLD  
D-2 Dell PowerVault 720N, 740N, and 760N User’s Guide  
       
Asia/Muscat  
Asia/Omsk  
Asia/Qatar  
Asia/Saigon  
Asia/Singapore  
Asia/Tbilisi  
Asia/Thimbu  
Asia/Ulan_Bator  
Asia/Vladivostok  
Asia/Yerevan  
Asia/Nicosia  
Asia/Phnom_Penh  
Asia/Rangoon  
Asia/Seoul  
Asia/Taipei  
Asia/Tehran  
Asia/Tokyo  
Asia/Novosibirsk  
Asia/Pyongyang  
Asia/Riyadh  
Asia/Shanghai  
Asia/Tashkent  
Asia/Tel_Aviv  
Asia/Ujung_Pandang  
Asia/Vientiane  
Asia/Yekaterinburg  
Asia/Urumqi  
Asia/Yakutsk  
$WODQWLF  
Atlantic/Azores  
Atlantic/Bermuda  
Atlantic/Faeroe  
Atlantic/Reykjavik  
Atlantic/Stanley  
Atlantic/Canary  
Atlantic/Jan_Mayen  
Atlantic/South_Georgia  
Atlantic/Cape_Verde  
Atlantic/Madeira  
Atlantic/St_Helena  
$XVWUDOLDꢀ  
Australia/ACT  
Australia/Adelaide  
Australia/Canberra  
Australia/LHI  
Australia/Melbourne  
Australia/Perth  
Australia/Brisbane  
Australia/Darwin  
Australia/Lindeman  
Australia/NSW  
Australia/Queensland  
Australia/Tasmania  
Australia/Yancowinna  
Australia/Broken_Hill  
Australia/Hobart  
Australia/Lord Howe  
Australia/North  
Australia/South  
Australia/Victoria  
Australia/Sydney  
Australia/West  
%UD]LO  
Brazil/Acre  
Brazil/West  
Brazil/DeNoronha  
Brazil/East  
&DQDGD  
Canada/Atlantic  
Canada/Central  
Canada/East-  
Saskatchewan  
Canada/Eastern  
Canada/Pacific  
Canada/Mountain  
Canada/Saskatchewan  
Canada/Newfoundland  
Canada/Yukon  
&KLOH  
Chile/Continental  
Chile/EasterIsland  
Time Zones D-3  
                   
(WF  
Etc/GMT  
Etc/GMT+0  
Etc/GMT+3  
Etc/GMT+6  
Etc/GMT+9  
Etc/GMT+12  
Etc/GMT-1  
Etc/GMT-4  
Etc/GMT-7  
Etc/GMT-10  
Etc/GMT-13  
Etc/UCT  
Etc/GMT+1  
Etc/GMT+4  
Etc/GMT+7  
Etc/GMT+10  
Etc/GMT0  
Etc/GMT-2  
Etc/GMT-5  
Etc/GMT-8  
Etc/GMT-11  
Etc/GMT-14  
Etc/Universal  
Etc/GMT+2  
Etc/GMT+5  
Etc/GMT+8  
Etc/GMT+11  
Etc/GMT-0  
Etc/GMT-3  
Etc/GMT-6  
Etc/GMT-9  
Etc/GMT-12  
Etc/Greenwich  
Etc/UTC  
Etc/Zulu  
(XURSH  
Europe/Amsterdam  
Europe/Belfast  
Europe/Bratislava  
Europe/Budapest  
Europe/Dublin  
Europe/Istanbul  
Europe/Lisbon  
Europe/Luxembourg  
Europe/Minsk  
Europe/Oslo  
Europe/Riga  
Europe/Sarajevo  
Europe/Sofia  
Europe/Tirane  
Europe/Vienna  
Europe/Zagreb  
Europe/Andorra  
Europe/Belgrade  
Europe/Brussels  
Europe/Chisinau  
Europe/Gibraltar  
Europe/Kiev  
Europe/Ljubljana  
Europe/Madrid  
Europe/Monaco  
Europe/Paris  
Europe/Athens  
Europe/Berlin  
Europe/Bucharest  
Europe/Copenhagen  
Europe/Helsinki  
Europe/Kuybyshev  
Europe/London  
Europe/Malta  
Europe/Moscow  
Europe/Prague  
Europe/San_Marino  
Europe/Skopje  
Europe/Rome  
Europe/Simferopol  
Europe/Stockholm  
Europe/Vaduz  
Europe/Vilnius  
Europe/Zurich  
Europe/Tallinn  
Europe/Vatican  
Europe/Warsaw  
*07  
GMT  
GMT+1  
GMT+4  
GMT+7  
GMT+10  
GMT+13  
GMT-3  
GMT-6  
GMT-9  
GMT-12  
GMT+2  
GMT+5  
GMT+8  
GMT+11  
GMT-1  
GMT-4  
GMT-7  
GMT-10  
GMT+3  
GMT+6  
GMT+9  
GMT+12  
GMT-2  
GMT-5  
GMT-8  
GMT-11  
D-4 Dell PowerVault 720N, 740N, and 760N User’s Guide  
           
,QGLDQꢀꢏ,QGLDQꢀ2FHDQꢐ  
Indian/Antananarivo  
Indian/Cocos  
Indian/Mahe  
Indian/Chagos  
Indian/Christmas  
Indian/Kerguelen  
Indian/Mauritius  
Indian/Comoro  
Indian/Maldives  
Indian/Reunion  
Indian/Mayotte  
0H[LFR  
Mexico/BajaNorte  
Mexico/BajaSur  
Mexico/General  
0LVFHOODQHRXV  
Arctic/Longyearbyen  
Cuba  
Eire  
Factory  
Greenwich  
Iceland  
Jamaica  
Libya  
CET  
EET  
EST  
GB  
Hongkong  
Iran  
Japan  
MET  
CST6CDT  
Egypt  
EST5EDT  
GB-Eire  
HST  
Israel  
Kwajalein  
MST  
MST7MDT  
NZ-CHAT  
PRC  
ROK  
UCT  
Navajo  
Poland  
PST8PDT  
Singapore  
Universal  
W-SU  
NZ  
Portugal  
ROC  
Turkey  
UTC  
Zulu  
WET  
3DFLILF  
Pacific/Apia  
Pacific/Auckland  
Pacific/Efate  
Pacific/Fiji  
Pacific/Chatham  
Pacific/Enderbury  
Pacific/Funafuti  
Pacific/Guadalcanal  
Pacific/Johnston  
Pacific/Kwajalein  
Pacific/Midway  
Pacific/Norfolk  
Pacific/Palau  
Pacific/Port_Moresby  
Pacific/Samoa  
Pacific/Tongatapu  
Pacific/Wallis  
Pacific/Easter  
Pacific/Fakaofo  
Pacific/Galapagos  
Pacific/Guam  
Pacific/Kiritimati  
Pacific/Majuro  
Pacific/Nauru  
Pacific/Noumea  
Pacific/Pitcairn  
Pacific/Rarotonga  
Pacific/Tahiti  
Pacific/Gambier  
Pacific/Honolulu  
Pacific/Kosrae  
Pacific/Marquesas  
Pacific/Niue  
Pacific/Pago_Pago  
Pacific/Ponape  
Pacific/Saipan  
Pacific/Tarawa  
Pacific/Wake  
Pacific/Truk  
Pacific/Yap  
Time Zones D-5  
             
6\VWHPꢀ9  
SystemV/AST4  
SystemV/AST4ADT  
SystemV/EST5  
SystemV/MST7  
SystemV/CST6  
SystemV/CST6CDT  
SystemV/HST10  
SystemV/PST8  
SystemV/EST5EDT  
SystemV/MST7MDT  
SystemV/YST9  
SystemV/PST8PDT  
SystemV/YST9YDT  
86ꢀꢏ8QLWHGꢀ6WDWHVꢐ  
US/Alaska  
US/Central  
US/Hawaii  
US/Mountain  
US/Samoa  
US/Aleutian  
US/Arizona  
US/Eastern  
US/Michigan  
US/Pacific-New  
US/East-Indiana  
US/Indiana-Starke  
US/Pacific  
$OLDVHV  
GMT=Greenwich, UCT, UTC, Universal, Zulu  
CET=MET (Middle European Time)  
US/Eastern=Jamaica  
US/Mountain=Navajo  
D-6 Dell PowerVault 720N, 740N, and 760N User’s Guide  
           
$ 3 3 ( 1 ' , ; ꢁ (  
5HJXODWRU\ꢀ1RWLFHV  
Electromagnetic Interference (EMI) is any signal or emission, radiated in free space or  
conducted along power or signal leads, that endangers the functioning of a radio navi-  
gation or other safety service or seriously degrades, obstructs, or repeatedly  
interrupts a licensed radio communications service. Radio communications services  
include but are not limited to AM/FM commercial broadcast, television, cellular ser-  
vices, radar, air-traffic control, pager, and Personal Communication Services (PCS).  
These licensed services, along with unintentional radiators such as digital devices,  
including computer systems, contribute to the electromagnetic environment.  
Electromagnetic Compatibility (EMC) is the ability of items of electronic equipment to  
function properly together in the electronic environment. While this computer system  
has been designed and determined to be compliant with regulatory agency limits for  
EMI, there is no guarantee that interference will not occur in a particular installation. If  
this equipment does cause interference with radio communications services, which  
can be determined by turning the equipment off and on, you are encouraged to try to  
correct the interference by one or more of the following measures:  
Reorient the receiving antenna.  
Relocate the computer with respect to the receiver.  
Move the computer away from the receiver.  
Plug the computer into a different outlet so that the computer and the receiver  
are on different branch circuits.  
If necessary, consult a Technical Support representative of Dell Computer Corporation  
or an experienced radio/television technician for additional suggestions. You may find  
FCC Interference Handbook, 1986  
, to be helpful. It is available from the U.S. Gov-  
the  
ernment Printing Office, Washington, DC 20402, Stock No. 004-000-00450-7 or on  
the World Wide Web at http://www.fcc.gov/Bureaus/Compliance/WWW/  
tvibook.html.  
Dell computer systems are designed, tested, and classified for their intended electro-  
magnetic environment. These electromagnetic environment classifications generally  
refer to the following harmonized definitions:  
Class A is typically for business or industrial environments.  
Class B is typically for residential environments.  
Regulatory Notices E-1  
     
Information Technology Equipment (ITE), including peripherals, expansion cards, print-  
ers, input/output (I/O) devices, monitors, and so on, that are integrated into or  
connected to the system should match the electromagnetic environment classifica-  
tion of the computer system.  
$ꢁ1RWLFHꢁ$ERXWꢁ6KLHOGHGꢁ6LJQDOꢁ&DEOHVꢀꢁ8VHꢁRQO\ꢁVKLHOGHGꢁFDEOHVꢁIRUꢁFRQꢄ  
QHFWLQJꢁSHULSKHUDOVꢁWRꢁDQ\ꢁ'HOOꢁGHYLFHꢁWRꢁUHGXFHꢁWKHꢁSRVVLELOLW\ꢁRIꢁ  
LQWHUIHUHQFHꢁZLWKꢁUDGLRꢁFRPPXQLFDWLRQVꢁVHUYLFHVꢃꢁ8VLQJꢁVKLHOGHGꢁFDEOHVꢁ  
HQVXUHVꢁWKDWꢁ\RXꢁPDLQWDLQꢁWKHꢁDSSURSULDWHꢁ(0&ꢁFODVVLILFDWLRQꢁIRUꢁWKHꢁ  
LQWHQGHGꢁHQYLURQPHQWꢃꢁ)RUꢁSDUDOOHOꢁSULQWHUVꢂꢁDꢁFDEOHꢁLVꢁDYDLODEOHꢁIURPꢁ'HOOꢁ  
&RPSXWHUꢁ&RUSRUDWLRQꢃꢁ,Iꢁ\RXꢁSUHIHUꢁ\RXꢁFDQꢁRUGHUꢁDꢁFDEOHꢁIURPꢁ'HOOꢁ&RPꢄ  
SXWHUꢁ&RUSRUDWLRQꢁRQꢁWKHꢁ:RUOGꢁ:LGHꢁ:HEꢁDWꢁKWWSꢀꢒꢒZZZꢃGHOOꢃFRPꢒ  
SURGXFWVꢒGHOOZDUHꢒLQGH[ꢃKWPꢃꢁ  
$ꢁ1RWLFHꢁ$ERXWꢁ1HWZRUNHGꢁ&RPSXWHUꢁ6\VWHPVꢀꢁ6RPHꢁ'HOOꢁFRPSXWHUꢁV\VWHPVꢁ  
WKDWꢁDUHꢁFODVVLILHGꢁIRUꢁ&ODVVꢁ%ꢁHQYLURQPHQWVꢁPD\ꢁLQFOXGHꢁDQꢁRQꢄERDUGꢁQHWꢄ  
ZRUNꢁLQWHUIDFHꢁFRQWUROOHUꢁꢋ1,&ꢌꢃꢁ,Iꢁ\RXUꢁ&ODVVꢁ%ꢁV\VWHPꢁFRQWDLQVꢁDꢁ1,&ꢂꢁLWꢁPD\ꢁ  
EHꢁFRQVLGHUHGꢁWRꢁEHꢁDꢁ&ODVVꢁ$ꢁV\VWHPꢁDWꢁWKHꢁWLPHꢁWKDWꢁWKHꢁ1,&ꢁLVꢁFRQQHFWHGꢁ  
WRꢁDꢁQHWZRUNꢃꢁ:KHQꢁWKHꢁ1,&ꢁLVꢁQRWꢁFRQQHFWHGꢁWRꢁDꢁQHWZRUNꢂꢁ\RXUꢁV\VWHPꢁLVꢁ  
FRQVLGHUHGꢁWRꢁEHꢁDꢁ&ODVVꢁ%ꢁGLJLWDOꢁGHYLFHꢃ  
Most Dell computer systems are classified for Class B environments. To determine  
the electromagnetic classification for your system or device, refer to the following  
sections specific for each regulatory agency. Each section provides country-specific  
EMC/EMI or product safety information.  
)&&ꢀ1RWLFHVꢀꢏ8ꢄ6ꢄꢀ2QO\ꢐ  
Most Dell computer systems are classified by the Federal Communications Commis-  
sion (FCC) as Class B digital devices. However, the inclusion of certain optionscan  
change the rating of some configurations to Class A. To determine which classification  
applies to your computer system, examine all FCC registration labels located on the  
bottom or back panel of your computer, on card-mounting brackets, and on the cards  
themselves. If any one of the labels carries a Class A rating, your entire system is con-  
all  
sidered to be a Class A digital device. If labels carry an FCC Class B rating as  
distinguished by either an FCC ID number or the FCC logo, (  
sidered to be a Class B digital device.  
), your system is con-  
Once you have determined your systems FCC classification, read the appropriate  
FCC notice. Note that FCC regulations provide that changes or modifications not  
expressly approved by Dell Computer Corporation could void your authority to operate  
this equipment.  
This device complies with Part 15 of the FCC Rules. Operation is subject to the follow-  
ing two conditions:  
This device may not cause harmful interference.  
This device must accept any interference received, including interference that  
may cause undesired operation.  
E-2 Dell PowerVault 720N, 740N, and 760N User’s Guide  
   
&ODVVꢀ$  
This equipment has been tested and found to comply with the limits for a Class A dig-  
ital device pursuant to Part 15 of the FCC Rules. These limits are designed to provide  
reasonable protection against harmful interference when the equipment is operated  
in a commercial environment. This equipment generates, uses, and can radiate radio  
frequency energy and, if not installed and used in accordance with the manufacturers  
instruction manual, may cause harmful interference with radio communications.Oper-  
ation of this equipment in a residential area is likely to cause harmful interference, in  
which case you will be required to correct the interference at your own expense.  
&ODVVꢀ%  
This equipment has been tested and found to comply with the limits for a Class B dig-  
ital device pursuant to Part 15 of the FCC Rules. These limits are designed to provide  
reasonable protection against harmful interference in a residential installation. This  
equipment generates, uses, and can radiate radio frequency energy and, if not  
installed and used in accordance with the manufacturers instruction manual, may  
cause interference with radio communications. However, there is no guarantee that  
interference will not occur in a particular installation. If this equipment does cause  
harmful interference to radio or television reception, which can be determined by turn-  
ing the equipment off and on, you are encouraged to try to correct the interference by  
one or more of the following measures:  
Reorient or relocate the receiving antenna.  
Increase the separation between the equipment and the receiver.  
Connect the equipment into an outlet on a circuit different from that to which the  
receiver is connected.  
Consult the dealer or an experienced radio/television technician for help.  
The following information is provided on the device or devices covered in this docu-  
ment in compliance with FCC regulations:  
Product name: Dell PowerVault 720N, 740N, and 760N  
Model number: LMM  
Company name: Dell Computer Corporation  
EMC Engineering Department  
One Dell Way  
Round Rock, Texas 78682 USA  
512-338-4400  
,&ꢀ1RWLFHꢀꢏ&DQDGDꢀ2QO\ꢐ  
Most Dell computer systems (and other Dell digital apparatus) are classified by the  
Industry Canada (IC) Interference-Causing Equipment Standard #3 (ICES-003) as  
Class B digital devices. To determine which classification (Class A or B) applies to your  
computer system (or other Dell digital apparatus), examine all registration labels  
located on the bottom or the back panel of your computer (or other digital apparatus).  
Regulatory Notices E-3  
       
A statement in the form of “IC Class A ICES-3” or “IC Class B ICES-3” will be located  
on one of these labels. Note that Industry Canada regulations provide that changes or  
modifications not expressly approved by Dell Computer Corporation could void your  
authority to operate this equipment.  
This Class B (or Class A, if so indicated on the registration label) digital apparatus  
meets the requirements of the Canadian Interference-Causing Equipment  
Regulations.  
Cet appareil numérique de la Classe B (ou Classe A, si ainsi indiqué sur l’étiquette  
d’enregistration) respecte toutes les exigences du Reglement sur le Materiel  
Brouilleur du Canada.  
&(ꢀ1RWLFHꢀꢏ(XURSHDQꢀ8QLRQꢐꢀ  
Marking by the symbol  
indicates compliance of this Dell system to the EMC  
Directive and the Low Voltage Directive of the European Union. Such marking is indic-  
ative that this Dell system meets the following technical standards:  
EN 55022 — “Limits and Methods of Measurement of Radio Interference Char-  
acteristics of Information Technology Equipment.”  
EN 50082-1: 1992 — “Electromagnetic compatibility—Generic immunity stan-  
dard Part 1: Residential, commercial, and light industry.”  
EN 60950 — “Safety of Information Technology Equipment.”  
NOTE: EN 55022 emissions requirements provide for two classifications:  
Class A is for typical commercial areas.  
Class B is for typical domestic areas.  
5)ꢁ,17(5)(5(1&(ꢁ:$51,1*ꢀꢁ7KLVꢁLVꢁDꢁ&ODVVꢁ$ꢁSURGXFWꢃꢁ,QꢁDꢁGRPHVWLFꢁHQYLꢄ  
URQPHQWꢁWKLVꢁSURGXFWꢁPD\ꢁFDXVHꢁUDGLRꢁIUHTXHQF\ꢁꢋ5)ꢌꢁLQWHUIHUHQFHꢂꢁLQꢁZKLFKꢁ  
FDVHꢁWKHꢁXVHUꢁPD\ꢁEHꢁUHTXLUHGꢁWRꢁWDNHꢁDGHTXDWHꢁPHDVXUHVꢃ  
A “Declaration of Conformity” in accordance with the preceding directives and stan-  
dards has been made and is on file at Dell Products Europe BV, Limerick, Ireland.  
%DWWHU\ꢀ'LVSRVDO  
Your computer system uses a lithium-ion battery. The lithium-ion battery is a long-life  
battery, and it is very possible that you will never need to replace it. However, should  
you need to replace it, refer to your service manual for instructions.  
Do not dispose of the battery along with household waste. Contact your local waste  
disposal agency for the address of the nearest battery deposit site.  
NOTE: Your system may also include circuit cards or other components that contain  
batteries. These batteries must also be disposed of in a battery deposit site. For infor-  
mation about such batteries, refer to the documentation for the specific card or  
component.  
E-4 Dell PowerVault 720N, 740N, and 760N User’s Guide  
       
(1ꢀꢌꢌꢋꢅꢅꢀ&RPSOLDQFHꢀꢏ&]HFKꢀ5HSXEOLFꢀ  
2QO\ꢐ  
This device belongs to Class B devices as described in EN 55022, unless it is spe-  
cifically stated that it is a Class A device on the specification label. The following  
applies to devices in Class A of EN 55022 (radius of protection up to 30 meters).  
The user of the device is obliged to take all steps necessary to remove sources of  
interference to telecommunication or other devices.  
1PLVEꢀ OFOÇꢀ OBꢀ UZQPWÃNꢀ tUJULVꢀ QPÂÇUBÂFꢀ VWFEFOPꢁꢀ xFꢀ TQBE»ꢀ EPꢀ UÒÇEZꢀ "ꢀ QPEMF  
&/ ꢂꢂꢃꢄꢄꢁꢀTQBE»ꢀBVUPNBUJDLZꢀEPꢀUÒÇEZꢀ#ꢀQPEMFꢀ&/ꢀꢂꢂꢃꢄꢄꢅꢀꢀ1SPꢀ[BÒÇ[FOÇꢀ[BÒB[FO»  
EPUÒÇEZ"ꢀ PDISBOOÃQ»TNPꢃNꢇQPEMF&/ꢂꢃꢄꢄQMBUÇO»TMFEVKÇDÇꢅ%PKEFMJL  
SVtFOÇꢀUFMFLPNVOJLBÂOÇDIꢀOFCPꢀKJOZDIꢀ[BÒÇ[FOÇꢁꢀKFꢀVxJWBUFMꢀQPWJOFOꢀQSPWÃTUꢀUBLPW»  
PQBUÒFOÇꢁꢀBCZꢀSVtFOÇꢀPETUSBOJMꢅ  
9&&,ꢀ1RWLFHꢀꢏ-DSDQꢀ2QO\ꢐ  
Most Dell computer systems are classified by the Voluntary Control Council for Inter-  
ference (VCCI) as Class B information technology equipment (ITE). However, the  
inclusion of certain options can change the rating of some configurations to Class A.  
ITE, including peripherals, expansion cards, printers, input/output (I/O) devices, moni-  
tors, and so on, integrated into or connected to the system, should match the  
electromagnetic environment classification (Class A or B) of the computer system.  
To determine which classification applies to your computer system, examine theregu-  
latory labels/markings (see Figures E-1 and E-2) located on the bottom or back panel  
of your computer. Once you have determined your system’s VCCI classification, read  
the appropriate VCCI notice.  
&ODVVꢀ$ꢀ,7(  
This is a Class A product based on the standard of the Voluntary Control Council for  
Interference (VCCI) for information technology equipment. If this equipment is used in  
a domestic environment, radio disturbance may arise. When such trouble occurs, the  
user may be required to take corrective actions.  
Regulatory Notices E-5  
         
9&&,ꢀ$  
)LJXUHꢀ(ꢁꢃꢄꢀꢀ9&&,ꢀ&ODVVꢀ$ꢀ,7(ꢀ5HJXODWRU\ꢀ0DUNꢀ  
&ODVVꢀ%ꢀ,7(  
This is a Class B product based on the standard of the Voluntary Control Council for  
Interference (VCCI) for information technology equipment. If this equipment is used  
near a radio or television receiver in a domestic environment, it may cause radio inter-  
ference. Install and use the equipment according to the instruction manual.  
)LJXUHꢀ(ꢁꢅꢄꢀꢀ9&&,ꢀ&ODVVꢀ%ꢀ,7(ꢀ5HJXODWRU\ꢀ0DUN  
02&ꢀ1RWLFHꢀꢏ6RXWKꢀ.RUHDꢀ2QO\ꢐ  
To determine which classification (Class A or B) applies to your computer system (or  
other Dell digital device), examine the South Korean Ministry of Communications  
(MOC) registration labels located on your computer (or other Dell digital device). The  
MOC label may be located separately from the other regulatory marking applied to  
your product. The English text, “EMI (A),” for Class A products, or “EMI (B)” for Class  
B products, appears in the center of the MOC label (see Figures E-3 and E-4).  
NOTE: MOC emissions requirements provide for two classifications:  
Class A devices are for business purposes.  
Class B devices are for nonbusiness purposes.  
E-6 Dell PowerVault 720N, 740N, and 760N User’s Guide  
         
&ODVVꢀ$ꢀ'HYLFHꢀ  
Note that this device has been approved for business purposes with regard to electro-  
magnetic interference. If you find that this device is not suitable for your use, you may  
exchange it for a nonbusiness device.  
(0,ꢁꢂꢁ$ꢁꢃ  
)LJXUHꢀ(ꢁꢆꢄꢀꢀ02&ꢀ&ODVVꢀ$ꢀ5HJXODWRU\ꢀ0DUN  
&ODVVꢀ%ꢀ'HYLFH  
Note that this device has been approved for nonbusiness purposes and may be used  
in any environment, including residential areas.  
(0,ꢁꢂꢁ%ꢁꢃ  
)LJXUHꢀ(ꢁꢑꢄꢀꢀ02&ꢀ&ODVVꢀ%ꢀ5HJXODWRU\ꢀ0DUN  
3ROLVKꢀ&HQWHUꢀIRUꢀ7HVWLQJꢀDQGꢀ&HUWLILFDWLRQꢀ  
1RWLFHꢀ  
The equipment should draw power from a socket with an attached protection circuit (a  
three-prong socket). All equipment that works together (computer, monitor, printer,  
and so on) should have the same power supply source.  
Regulatory Notices E-7  
           
The phasing conductor of the rooms electrical installation should have a reserve  
short-circuit protection device in the form of a fuse with a nominal value no larger than  
16 amperes (A).  
To completely switch off the equipment, the power supply cable must be removed  
from the power supply socket, which should be located near the equipment and easily  
accessible.  
A protection mark “B” confirms that the equipment is in compliance with the protec-  
tion usage requirements of standards PN-93/T-42107 and PN-89/E-06251.  
8ZNBHBOJBꢀ1PMTLJFHPꢀ$FOUSVNꢀ#BEBËꢀJꢀ  
$FSUZGJLBDKJ  
6S[“E[FOJFꢀQPXJOOPꢀCZÀꢀ[BTJMBOFꢀ[ꢀHOJB[EBꢀ[ꢀQS[Z“D[POZNꢀPCXPEFNꢀPDISPOOZNꢀ  
HOJB[EPꢀ[ꢀLPLJFNꢇꢅꢀ8TQ͍QSBDVK“DFꢀ[FꢀTPC“ꢀVS[“E[FOJBꢀ LPNQVUFSꢁꢀNPOJUPSꢁꢀ  
ESVLBSLBꢇꢀQPXJOOZꢀCZÀꢀ[BTJMBOFꢀ[ꢀUFHPꢀTBNFHPꢀySÍEBꢅ  
*OTUBMBDKBꢀFMFLUSZD[OBꢀQPNJFT[D[FOJBꢀQPXJOOBꢀ[BXJFSBÀꢀXꢀQS[FXPE[JFꢀGB[PXZNꢀ  
SF[FSXPX“ꢀPDISPOÄꢀQS[FEꢀ[XBSDJBNJꢁꢀXꢀQPTUBDJꢀCF[QJFD[OJLBꢀPꢀXBSUPvDJꢀ[OBNJPOPXFKꢀ  
OJFꢀXJÄLT[FKꢀOJ™ꢀꢈꢉ"ꢀ BNQFSÍXꢇꢅꢀ  
8ꢀDFMVꢀDBLPXJUFHPꢀXZ“D[FOJBꢀVS[“E[FOJBꢀ[ꢀTJFDJꢀ[BTJMBOJBꢁꢀOBMF™ZꢀXZK“ÀꢀXUZD[LÄꢀ  
LBCMBꢀ[BTJMBK“DFHPꢀ[ꢀHOJB[ELBꢁꢀLUÍSFꢀQPXJOOPꢀ[OBKEPXBÀꢀTJÄꢀXꢀQPCMJ™VꢀVS[“E[FOJBꢀJꢀ  
CZÀꢀBUXPꢀEPTUÄQOFꢅꢀ  
;OBLꢀCF[QJFD[FËTUXBꢀꢊ#ꢊꢀQPUXJFSE[Bꢀ[HPEOPvÀꢀVS[“E[FOJBꢀ[ꢀXZNBHBOJBNJꢀ  
CF[QJFD[FËTUXBꢀV™ZULPXBOJBꢀ[BXBSUZNJꢀXꢀ1/ꢋꢆꢌ5ꢍꢄꢈꢃꢎꢀJꢀ1/ꢏꢋꢌ&ꢃꢉꢄꢂꢈꢅ  
1P[PTUBFꢀJOTUSVLDKFꢀCF[QJFD[FËTUXB  
/JFꢀOBMF™ZꢀV™ZXBÀꢀXUZD[FLꢀBEBQUFSPXZDIꢀMVCꢀVTVXBÀꢀLPLBꢀPCXPEVꢀPDISPOOFHPꢀ  
[ꢀXUZD[LJꢅꢀ+F™FMJꢀLPOJFD[OFꢀKFTUꢀV™ZDJFꢀQS[FEV™BD[BꢀUPꢀOBMF™ZꢀV™ZÀꢀQS[FEV™BD[Bꢀ  
™ZPXFHPꢀ[ꢀQSBXJEPXPꢀQP“D[POZNꢀQS[FXPEFNꢀPDISPOOZNꢅ  
4ZTUFNꢀLPNQVUFSPXZꢀOBMF™Zꢀ[BCF[QJFD[ZÀꢀQS[FEꢀOBHZNJꢁꢀDIXJMPXZNJꢀ  
X[SPTUBNJꢀMVCꢀTQBELBNJꢀOBQJÄDJBꢁꢀV™ZXBK“DꢀFMJNJOBUPSBꢀQS[FQJÄÀꢁꢀVS[“E[FOJBꢀ  
EPQBTPXVK“DFHPꢀMVCꢀCF[[BLÍDFOJPXFHPꢀySÍEBꢀ[BTJMBOJBꢅ  
/BMF™ZꢀVQFXOJÀꢀTJÄꢁꢀBCZꢀOJDꢀOJFꢀMF™BPꢀOBꢀLBCMBDIꢀTZTUFNVꢀLPNQVUFSPXFHPꢁꢀ  
PSB[ꢀBCZꢀLBCMFꢀOJFꢀCZZꢀVNJFT[D[POFꢀXꢀNJFKTDVꢁꢀHE[JFꢀNP™OBꢀCZPCZꢀOBꢀOJFꢀ  
OBEFQUZXBÀꢀMVCꢀQPUZLBÀꢀTJÄꢀPꢀOJFꢅ  
/JFꢀOBMF™ZꢀSP[MFXBÀꢀOBQPKÍXꢀBOJꢀJOOZDIꢀQZOÍXꢀOBꢀTZTUFNꢀLPNQVUFSPXZꢅ  
/JFꢀOBMF™ZꢀXQZDIBÀꢀ™BEOZDIꢀQS[FENJPUÍXꢀEPꢀPUXPSÍXꢀTZTUFNVꢀLPNQVUFSPXFHPꢁꢀ  
HEZ™ꢀNP™FꢀUPꢀTQPXPEPXBÀꢀQP™BSꢀMVCꢀQPSB™FOJFꢀQS“EFNꢁꢀQPQS[F[ꢀ[XBSDJFꢀ  
FMFNFOUÍXꢀXFXOÄUS[OZDIꢅ  
4ZTUFNꢀLPNQVUFSPXZꢀQPXJOJFOꢀ[OBKEPXBÀꢀTJÄꢀ[ꢀEBMBꢀPEꢀHS[FKOJLÍXꢀJꢀySÍEFꢀ  
DJFQBꢅꢀ1POBEUPꢁꢀOJFꢀOBMF™ZꢀCMPLPXBÀꢀPUXPSÍXꢀXFOUZMBDZKOZDIꢅꢀ/BMF™ZꢀVOJLBÀꢀ  
LBE[FOJBꢀMVyOZDIꢀQBQJFSÍXꢀQPEꢀLPNQVUFSꢀPSB[ꢀVNJFT[D[BOJBꢀLPNQVUFSBꢀXꢀ  
DJBTOZNꢀNJFKTDVꢀCF[ꢀNP™MJXPvDJꢀDZSLVMBDKJꢀQPXJFUS[BꢀXPL͍ꢀOJFHPꢅ  
E-8 Dell PowerVault 720N, 740N, and 760N User’s Guide  
   
120ꢀ,QIRUPDWLRQꢀꢏ0H[LFRꢀ2QO\ꢐ  
The following information is provided on the device(s) described in this document in  
compliance with the requirements of the official Mexican standards (NOM):  
Exporter:  
Importer:  
Dell Computer Corporation  
One Dell Way  
Round Rock, TX 78682  
Dell Computer de México,  
S.A. de C.V.  
Rio Lerma No. 302 - 4° Piso  
Col. Cuauhtemoc  
16500 México, D.F.  
Ship to:  
Dell Computer de México,  
S.A. de C.V. al Cuidado  
de Kuehne & Nagel de  
México S. de R.I.  
Avenida Soles No. 55  
Col. Peñon de los Baños  
15520 México, D.F.  
Supply voltage:  
Frequency:  
100-240 VAC  
60/50 Hz  
Input current  
rating:  
Input current rating: 5.0 A  
,QIRUPDFLyQꢀSDUDꢀ120ꢀꢏ~QLFDPHQWHꢀSDUDꢀ  
0p[LFRꢐ  
La información siguiente se proporciona en el dispositivo o en los dispositivos descri-  
tos en este documento, en cumplimiento con los requisitos de la Norma Oficial  
Mexicana (NOM):  
Exportador:  
Importador:  
Dell Computer Corporation  
One Dell Way  
Round Rock, TX 78682  
Dell Computer de México,  
S.A. de C.V.  
Rio Lerma No. 302 - 4° Piso  
Col. Cuauhtemoc  
16500 México, D.F.  
Regulatory Notices E-9  
     
Exportador:  
Embarcar a:  
Dell Computer Corporation  
One Dell Way  
Round Rock, TX 78682  
Dell Computer de México,  
S.A. de C.V. al Cuidado  
de Kuehne & Nagel de  
México S. de R.I.  
Avenida Soles No. 55  
Col. Peñon de los Baños  
15520 México, D.F.  
Tensión  
alimentación:  
100-240 VAC  
60/50 Hz  
Frecuencia:  
Consumo de  
corriente:  
5.0 A  
%60,ꢀ1RWLFHꢀꢏ7DLZDQꢀ2QO\ꢐ  
E-10 Dell PowerVault 720N, 740N, and 760N User’s Guide  
   
$ 3 3 ( 1 ' , ; ꢁ )  
:DUUDQW\ꢂꢀ5HWXUQꢀ3ROLF\ꢂꢀDQGꢀ<HDUꢀ  
ꢅꢋꢋꢋꢀ6WDWHPHQWꢀRIꢀ&RPSOLDQFH  
/LPLWHGꢀ7KUHHꢁ<HDUꢀ:DUUDQW\ꢀꢏ8ꢄ6ꢄꢀ2QO\ꢐ  
Dell Computer Corporation (“Dell”) manufactures its hardware products from parts  
and components that are new or equivalent to new in accordance with industry-  
standard practices. Dell warrants that the hardware products it manufactures will be  
free from defects in materials and workmanship. The warranty term is three years  
beginning on the date of invoice, as described in the following text.  
Damage due to shipping the products to you is covered under this warranty. Other-  
wise, this warranty does not cover damage due to external causes, including  
accident, abuse, misuse, problems with electrical power, servicing not authorized by  
Dell, usage not in accordance with product instructions, failure to perform required  
preventive maintenance, and problems caused by use of parts and components not  
supplied by Dell.  
This warranty does not cover any items that are in one or more of the following cate-  
gories: software; external devices (except as specifically noted); accessories or parts  
added to a Dell system after the system is shipped from Dell; accessories or parts  
added to a Dell system through Dells system integration department; accessories or  
parts that are not installed in the Dell factory; or DellWareSM products. Monitors, key-  
boards, and mice that are Dell-branded or that are included on Dells standard price list  
are covered under this warranty; all other monitors, keyboards, and mice (including  
those sold through the DellWare program) are not covered. Batteries for portable  
computers are covered only during the initial one-year period of this warranty.  
&RYHUDJHꢀ'XULQJꢀ<HDUꢀ2QH  
During the one-year period beginning on the invoice date, Dell will repair or replace  
products covered under this limited warranty that are returned to Dells facility. To  
request warranty service, you must call Dells Customer Technical Support within the  
warranty period. Refer to the chapter titled “Getting Help” in your systems trouble-  
shooting documentation to find the appropriate telephone number for obtaining  
customer assistance. If warranty service is required, Dell will issue a Return Material  
Authorization Number. You must ship the products back to Dell in their original or  
equivalent packaging, prepay shipping charges, and insure the shipment or accept the  
risk of loss or damage during shipment. Dell will ship the repaired or replacement  
Warranty, Return Policy, and Year 2000 Statement of Compliance F-1  
         
products to you freight prepaid if you use an address in the continental U.S., where  
applicable. Shipments to other locations will be made freight collect.  
NOTE: Before you ship the product(s) to Dell, back up the data on the hard-disk  
drive(s) and any other storage device(s) in the product(s). Remove any removable  
media, such as diskettes, CDs, or PC Cards. Dell does not accept liability for lost data  
or software.  
Dell owns all parts removed from repaired products. Dell uses new and reconditioned  
parts made by various manufacturers in performing warranty repairs and building  
replacement products. If Dell repairs or replaces a product, its warranty term is not  
extended.  
&RYHUDJHꢀ'XULQJꢀ<HDUVꢀ7ZRꢀDQGꢀ7KUHH  
During the second and third years of this limited warranty, Dell will provide, on an  
exchange basis and subject to Dells Exchange Policy in effect on the date of the  
exchange, replacement parts for the Dell hardware product(s) covered under this lim-  
ited warranty when a part requires replacement. You must report each instance of  
hardware failure to Dells Customer Technical Support in advance to obtain Dells con-  
currence that a part should be replaced and to have Dell ship the replacement part.  
Dell will ship parts (freight prepaid) if you use an address in the continental U.S. or  
Canada, where applicable. Shipments to other locations will be made freight collect.  
Dell will include a prepaid shipping container with each replacement part for your use  
in returning the replaced part to Dell. Replacement parts are new or reconditioned.  
Dell may provide replacement parts made by various manufacturers when supplying  
parts to you. The warranty term for a replacement part is the remainder of the limited  
warranty term.  
You will pay Dell for replacement parts if the replaced part is not returned to Dell. The  
process for returning replaced parts, and your obligation to pay for replacement parts  
if you do not return the replaced parts to Dell, will be in accordance with Dells  
Exchange Policy in effect on the date of the exchange.  
You accept full responsibility for your software and data. Dell is not required to advise  
or remind you of appropriate backup and other procedures.  
*HQHUDOꢀ3URYLVLRQV  
THIS WARRANTY GIVES YOU SPECIFIC LEGAL RIGHTS WHICH VARY FROM STATE  
TO STATE (OR JURISDICTION TO JURISDICTION). DELL'S RESPONSIBILITY FOR  
MALFUNCTIONS AND DEFECTS IN HARDWARE IS LIMITED TO REPAIR AND  
REPLACEMENT AS SET FORTH IN THIS WARRANTY STATEMENT. ALL EXPRESS  
AND IMPLIED WARRANTIES FOR THE PRODUCT, INCLUDING BUT NOT LIMITED  
TO ANY IMPLIED WARRANTIES OF AND CONDITIONS OF MERCHANTIBILITY AND  
FITNESS FOR A PARTICULAR PURPOSE, ARE LIMITED IN DURATION TO THE WAR-  
RANTY PERIOD SET FORTH ABOVE AND NO WARRANTIES, WHETHER EXPRESS  
OR IMPLIED, WILL APPLY AFTER SUCH PERIOD.  
SOME STATES (OR JURISDICTIONS) DO NOT ALLOW LIMITATIONS ON HOW  
LONG AN IMPLIED WARRANTY LASTS, SO THE PRECEDING LIMITATION MAY NOT  
APPLY TO YOU.  
F-2 Dell PowerVault 720N, 740N, and 760N User’s Guide  
   
DELL DOES NOT ACCEPT LIABILITY BEYOND THE REMEDIES SET FORTH IN THIS  
WARRANTY STATEMENT OR LIABILITY FOR INCIDENTAL OR CONSEQUENTIAL  
DAMAGES, INCLUDING WITHOUT LIMITATION ANY LIABILITY FOR PRODUCTS  
NOT BEING AVAILABLE FOR USE OR FOR LOST DATA OR SOFTWARE.  
SOME STATES (OR JURISDICTIONS) DO NOT ALLOW THE EXCLUSION OR LIMITA-  
TION OF INCIDENTAL OR CONSEQUENTIAL DAMAGES, SO THE PRECEDING  
EXCLUSION OR LIMITATION MAY NOT APPLY TO YOU.  
These provisions apply to Dells limited three-year warranty only. For provisions of any  
service contract covering your system, refer to your invoice or the separate service  
contract that you will receive.  
If Dell elects to exchange a system or component, the exchange will be made in  
accordance with Dells Exchange Policy in effect on the date of the exchange.In any  
instance in which Dell issues a Return Material Authorization Number, Dell must  
receive the product(s) for repair prior to the expiration of the warranty period in order  
for the repair(s) to be covered by the warranty.  
NOTE: If you chose one of the available warranty and service options in place of the  
standard limited three-year warranty described in the preceding text, the option you  
chose will be listed on your invoice.  
/LPLWHGꢀ7KUHHꢁ<HDUꢀ:DUUDQW\ꢀꢏ&DQDGDꢀ  
2QO\ꢐ  
Dell Computer Corporation (“Dell”) manufactures its hardware products from parts  
and components that are new or equivalent to new in accordance with industry-  
standard practices. Dell warrants that the hardware products it manufactures will be  
free from defects in materials and workmanship. The warranty term is three years  
beginning on the date of invoice, as described in the following text.  
Damage due to shipping the products to you is covered under this warranty. Other-  
wise, this warranty does not cover damage due to external causes, including  
accident, abuse, misuse, problems with electrical power, servicing not authorized by  
Dell, usage not in accordance with product instructions, failure to perform required  
preventive maintenance, and problems caused by use of parts and components not  
supplied by Dell.  
This warranty does not cover any items that are in one or more of the following cate-  
gories: software; external devices (except as specifically noted); accessories or parts  
added to a Dell system after the system is shipped from Dell; accessories or parts  
added to a Dell system through Dells system integration department; accessories or  
parts that are not installed in the Dell factory; or DellWareSM products. Monitors, key-  
boards, and mice that are Dell-branded or that are included on Dells standard price list  
are covered under this warranty; all other monitors, keyboards, and mice (including  
those sold through the DellWare program) are not covered. Batteries for portable  
computers are covered only during the initial one-year period of this warranty.  
Warranty, Return Policy, and Year 2000 Statement of Compliance F-3  
   
&RYHUDJHꢀ'XULQJꢀ<HDUꢀ2QH  
During the one-year period beginning on the invoice date, Dell will repair or replace  
products covered under this limited warranty that are returned to Dells facility. To  
request warranty service, you must call Dells Customer Technical Support within the  
warranty period. Refer to the chapter titled “Getting Help” in your systemstrouble-  
shooting documentation to find the appropriate telephone number for obtaining  
customer assistance. If warranty service is required, Dell will issue a Return Material  
Authorization Number. You must ship the products back to Dell in their original or  
equivalent packaging, prepay shipping charges, and insure the shipment or accept the  
risk of loss or damage during shipment. Dell will ship the repaired or replacement  
products to you freight prepaid if you use an address in Canada, where applicable.  
Shipments to other locations will be made freight collect.  
NOTE: Before you ship the product(s) to Dell, back up the data on the hard-disk  
drive(s) and any other storage device(s) in the product(s). Remove any removable  
media, such as diskettes, CDs, or PC Cards. Dell does not accept liability for lost data  
or software.  
Dell owns all parts removed from repaired products. Dell uses new and reconditioned  
parts made by various manufacturers in performing warranty repairs and building  
replacement products. If Dell repairs or replaces a product, its warranty term is not  
extended.  
&RYHUDJHꢀ'XULQJꢀ<HDUVꢀ7ZRꢀDQGꢀ7KUHH  
During the second and third years of this limited warranty, Dell will provide, on an  
exchange basis and subject to Dells Exchange Policy in effect on the date of the  
exchange, replacement parts for the Dell hardware product(s) covered under this lim-  
ited warranty when a part requires replacement. You must report each instance of  
hardware failure to Dells Customer Technical Support in advance to obtain Dells con-  
currence that a part should be replaced and to have Dell ship the replacement part.  
Dell will ship parts (freight prepaid) if you use an address in the continental U.S. or  
Canada, where applicable. Shipments to other locations will be made freight collect.  
Dell will include a prepaid shipping container with each replacement part for your use  
in returning the replaced part to Dell. Replacement parts are new or reconditioned.  
Dell may provide replacement parts made by various manufacturers when supplying  
parts to you. The warranty term for a replacement part is the remainder of the limited  
warranty term.  
You will pay Dell for replacement parts if the replaced part is not returned to Dell. The  
process for returning replaced parts, and your obligation to pay for replacement parts  
if you do not return the replaced parts to Dell, will be in accordance with Dells  
Exchange Policy in effect on the date of the exchange.  
You accept full responsibility for your software and data. Dell is not required to advise  
or remind you of appropriate backup and other procedures.  
F-4 Dell PowerVault 720N, 740N, and 760N User’s Guide  
   
*HQHUDOꢀ3URYLVLRQV  
DELL MAKES NO EXPRESS WARRANTIES OR CONDITIONS BEYOND THOSE  
STATED IN THIS WARRANTY STATEMENT. DELL DISCLAIMS ALL OTHER WARRAN-  
TIES AND CONDITIONS, EXPRESS OR IMPLIED, INCLUDING WITHOUT  
LIMITATION IMPLIED WARRANTIES AND CONDITIONS OF MERCHANTABILITY  
AND FITNESS FOR A PARTICULAR PURPOSE. SOME STATES (OR JURISDICTIONS)  
DO NOT ALLOW LIMITATIONS ON IMPLIED WARRANTIES OR CONDITIONS, SO  
THIS LIMITATION MAY NOT APPLY TO YOU.  
DELLS RESPONSIBILITY FOR MALFUNCTIONS AND DEFECTS IN HARDWARE IS  
LIMITED TO REPAIR AND REPLACEMENT AS SET FORTH IN THIS WARRANTY  
STATEMENT. THESE WARRANTIES GIVE YOU SPECIFIC LEGAL RIGHTS, AND YOU  
MAY ALSO HAVE OTHER RIGHTS, WHICH VARY FROM STATE TO STATE (OR JURIS-  
DICTION TO JURISDICTION).  
DELL DOES NOT ACCEPT LIABILITY BEYOND THE REMEDIES SET FORTH IN THIS  
WARRANTY STATEMENT OR LIABILITY FOR INCIDENTAL OR CONSEQUENTIAL  
DAMAGES, INCLUDING WITHOUT LIMITATION ANY LIABILITY FOR PRODUCTS  
NOT BEING AVAILABLE FOR USE OR FOR LOST DATA OR SOFTWARE.  
SOME STATES (OR JURISDICTIONS) DO NOT ALLOW THE EXCLUSION OR LIMITA-  
TION OF INCIDENTAL OR CONSEQUENTIAL DAMAGES, SO THE PRECEDING  
EXCLUSION OR LIMITATION MAY NOT APPLY TO YOU.  
These provisions apply to Dells limited three-year warranty only. For provisions of any  
service contract covering your system, refer to your invoice or the separate service  
contract that you will receive.  
If Dell elects to exchange a system or component, the exchange will be made in  
accordance with Dells Exchange Policy in effect on the date of the exchange. In any  
instance in which Dell issues a Return Material Authorization Number, Dell must  
receive the product(s) for repair prior to the expiration of the warranty period in order  
for the repair(s) to be covered by the warranty.  
NOTE: If you chose one of the available warranty and service options in place of the  
standard limited three-year warranty described in the preceding text, the option you  
chose will be listed on your invoice.  
´7RWDOꢀ6DWLVIDFWLRQµꢀ5HWXUQꢀ3ROLF\ꢀꢏ8ꢄ6ꢄꢀDQGꢀ  
&DQDGDꢀ2QO\ꢐ  
If you are an end-user customer who bought new products directly from a Dell com-  
pany, you may return them to Dell within 30 days of the date of invoice for a refund or  
credit of the product purchase price. If you are an end-user customer who bought  
reconditioned or refurbished products from a Dell company, you may return them to  
Dell within 14 days of the date of invoice for a refund or credit of the product purchase  
price. In either case, the refund or credit will not include any shipping and handling  
charges shown on your invoice. If you are an organization that bought the products  
under a written agreement with Dell, the agreement may contain different terms for  
the return of products than specified by this policy.  
Warranty, Return Policy, and Year 2000 Statement of Compliance F-5  
     
To return products, you must call Dell Customer Service to receive a Credit Return  
Authorization Number. Refer to the chapter titled “Getting Help” in your system's  
troubleshooting documentation or, for some systems, the section titled “Contacting  
Dell” in your system's online guide to find the appropriate telephone number for  
obtaining customer assistance. To expedite the processing of your refund or credit,  
Dell expects you to return the products to Dell in their original packaging within five  
days of the date that Dell issues the Credit Return Authorization Number. You must  
also prepay shipping charges and insure the shipment or accept the risk of loss or  
damage during shipment. You may return software for refund or credit only if the  
sealed package containing the diskette(s) or CD(s) is unopened. Returned products  
must be in as-new condition, and all of the manuals, diskette(s), CD(s), power cables,  
and other items included with a product must be returned with it. For customers who  
want to return, for refund or credit only, either applications software or an operating  
system that has been installed by Dell, the whole system must be returned, along  
with any media and documentation that may have been included in the original  
shipment.  
This “Total Satisfaction” Return Policy does not apply to DellWare products, which  
may be returned under DellWare's then-current return policy. In addition, recondi-  
tioned parts purchased through Dell Spare Parts Sales in Canada are nonreturnable.  
<HDUꢀꢅꢋꢋꢋꢀ6WDWHPHQWꢀRIꢀ&RPSOLDQFHꢀIRUꢀ  
'HOOꢁ%UDQGHGꢀ+DUGZDUHꢀ3URGXFWV  
Dell-branded hardware products shipped on or after January 1, 1997, are eligible to  
carry the “NSTL Hardware Tested Year 2000 Compliant” logo by virtue of formal test-  
ing with, and successful completion of, the National Software Testing Laboratories  
(NSTL) YMARK2000 test.* Dell will treat a failure to pass the YMARK2000 test as a  
covered event under Dell's warranty for the product, subject to the normal warranty  
limitations.** For a complete copy of Dell's warranty, see the product's documenta-  
tion. Dell-branded hardware products will also recognize the year 2000 as a leap year.  
*The YMARK2000 standard tests the ability of system hardware and firmware to support the  
transition to the year 2000 (and to recognize leap years, when appropriate, for years 2000  
through 2009 inclusive) and not that of options, operating systems, or applications software.  
Dell-branded hardware products that pass the YMARK2000 test conform to BSI-DISC  
PD 2000-1.  
** Except for this clarification of Dell's warranty for NSTL logo hardware, all other warranties,  
conditions and remedies, express or implied, relating to year 2000 readiness or compliance are  
disclaimed. To make a claim under this warranty for NSTL logo hardware, customers must con-  
tact Dell prior to January 1, 2001.  
To make a claim, write to:  
Dell Computer Corporation  
P.O. Box 149258  
Austin, Texas 78714-9258  
Attention: Year 2000  
F-6 Dell PowerVault 720N, 740N, and 760N User’s Guide  
   
Despite a system's ability to pass the YMARK2000 test, actual rollover results in specific operat-  
ing environments may vary depending on other factors including, but not limited to, other  
hardware, operating systems, and applications software.  
3UHYLRXVꢀ3URGXFWV  
For Dell-branded hardware products shipped prior to January 1, 1997, that have an  
upgradable basic input/output system (BIOS), Dell makes available a BIOS upgrade.  
Although these products may not have been tested under the YMARK2000 test, Dell  
believes that the hardware would pass the YMARK2000 test, provided the appropri-  
ate BIOS upgrade is properly loaded.  
For Dell-branded hardware products that do not have an upgradable BIOS, Dell has  
made available, as a convenience to customers, the Dell Program Patch, a software  
utility designed to assist customers in managing the year 2000 rollover.  
6RIWZDUH  
Dell specifically excludes all non-Dell-developed software from this compliance state-  
ment. All software run on Dell-branded hardware products should be independently  
verified by customers to be year 2000-compliant.  
$GGLWLRQDOꢀ,QIRUPDWLRQ  
For additional information on year 2000 compliance of Dell-branded hardware prod-  
ucts, refer to Dell's Year 2000 Web site at http://www.dell.com/year2000 or  
contact a Dell customer service representative in your area.  
Warranty, Return Policy, and Year 2000 Statement of Compliance F-7  
     
F-8 Dell PowerVault 720N, 740N, and 760N User’s Guide  
*ORVVDU\  
The following list defines or identifies  
technical terms, abbreviations, and acro-  
nyms used in Dell™ user documents.  
directories, and to use this client as the  
mailhost for sending autosupport email  
messages. At any time after you run the  
setupprogram, you can configure the  
filer to work with other clients in the  
same way as it does with the administra-  
tion host.  
$
Abbreviation for ampere(s).  
$&  
Abbreviation for alternating current.  
$,  
Abbreviation for artificial intelligence.  
$&/  
Access control list. A list that contains the  
users’ or groups’ access rights to each  
share.  
$16,  
AcronymforAmericanNationalStandards  
Institute.  
DGDSWHUꢀFDUG  
$3&  
Abbreviation for American Power  
Conversion.  
An expansion card that plugs into an  
expansion-card connector on the comput-  
er’s system board. An adapter card adds  
some specialized function to the comput-  
er by providing an interface between the  
expansionbusandaperipheraldevice. Ex-  
amples of adapter cards include network  
cards, sound boards, and SCSI adapters.  
DSSOLFDWLRQꢀSURJUDP  
Software designed to help you perform a  
specific task, such as a spreadsheet or  
wordprocessor.Applicationprogramsare  
distinct from operating system and utility  
software.  
$'&  
Abbreviation for analog-to-digital  
converter.  
$6&,,  
Acronym for American Standard Code for  
Information Interchange. A text file con-  
taining only characters from the ASCII  
character set (usually created with a text  
$',  
Abbreviation for Autodesk Device  
Interface.  
®
editor, such as MS-DOS Editor or Note-  
pad in Windows), is called an ASCII file.  
DGPLQLVWUDWLRQꢀKRVW  
$6,&  
Acronym for application-specific integrat-  
ed circuit.  
The client you specify during filer setup  
for managing the filer. The setuppro-  
gram automatically configures the filer to  
accept telnetand rshconnections  
from this client, to give permission to  
$63,  
Advanced SCSI programming interface.  
/
/home  
this client for mounting the and  
Glossary  
1
 
DXWKHQWLFDWLRQ  
A security step performed by a domain  
controller for the filers domain, or by the  
TechConnect BBS contains the latest ver-  
sion of softwaresuch asvideo drivers and  
the  
modem, you can access the BBS and  
download the most recent version of this  
software.  
Dell Directory  
. If your system has a  
/etc/passwd  
filer itself, using its  
file.  
DXWRH[HFꢃEDWꢀILOH  
When you boot your computer, MS-DOS  
runs any commands contained in the text  
file, autoexec.bat (after running any com-  
mands in the config.sys file). An  
autoexec.bat file is not required to boot  
MS-DOS, butprovidesaconvenientplace  
to run commands that are essential for  
setting up a consistent computing envi-  
ronment—such as loading mouse or  
network software.  
EHHSꢀFRGH  
A diagnostic system message in the form  
of a seriesofbeeps from your computer’s  
Diagnostics and  
for a complete dis-  
speaker. Refer to your  
Troubleshooting Guide  
cussion of system beep codes.  
%,26  
Acronym for basic input/output system.  
Yourcomputer’sBIOScontainsprograms  
stored on a ROM chip. The BIOS controls  
the following:  
EDFNXS  
A copy of a program or data file. As a  
precaution, you should back up your  
computer’s hard-disk drive on a regular  
basis. Before making a change to the con-  
figuration of your computer, you should  
back up important start-up files, such as  
autoexec.bat and config.sys for  
MS-DOS or win.ini and system.ini for  
Windows.  
Communications between the  
microprocessor and peripheral  
devices, such as the keyboard and  
the video adapter  
Miscellaneous functions, such as  
system messages  
ELW  
The smallest unit of information interpret-  
ed by your computer.  
EDVHꢀPHPRU\  
Synonym for conventional memory. See  
also conventional memory.  
EORFNꢀVL]H  
The size of a block. See also block and  
striping.  
%$6,&  
Acronym for Beginner’s All-Purpose Sym-  
bolic Instruction Code, a programming  
language. MS-DOS includes a version of  
BASIC.  
ERRWꢀURXWLQH  
When you start your computer, it clears  
all memory, initializes devices, and loads  
the operating system. Unless the operat-  
ing system fails to respond, you can  
reboot (also called warm boot) your com-  
puter by pressing <Ctrl><Alt><Del>;  
otherwise, you must perform a cold boot  
by pressing the reset button (if your com-  
puter has one) or by turning the computer  
off, then back on.  
EDWFKꢀILOH  
An ASCII text file containing a list of com-  
mands that run in sequence. Batch files  
must have a filename extension of bat.  
EDXGꢀUDWH  
Data transmission speed. For example,  
modems are designed to transmit data at  
one or more specified baud rate(s)  
through the COM (serial) port of a  
computer.  
ERRWDEOHꢀGLVNHWWH  
You can start your computer from a dis-  
kette in drive A. To make a bootable  
diskette, insert a diskette in drive A, type  
sys a:at the command line prompt, then  
press <Enter>. Use this bootable diskette  
%%6  
Abbreviation for bulletin board service. A  
computer system that serves as a central  
location for accessing data or relaying  
messagesbymodem.Forexample,Dell’s  
2
Dell PowerVault 720N, 740N, and 760N User’s Guide  
if your computer will not boot from the hard-  
disk drive.  
&%7  
Abbreviation for computer-based training.  
ESL  
Abbreviation for bits per inch.  
&&)7  
Abbreviation for cold cathode fluorescent  
tube.  
ESV  
Abbreviation for bits per second.  
&'ꢁ520  
Abbreviation for compact disc read-only  
memory. CD-ROM drives use optical  
technology to read data from compact  
discs. Compact discs are read-only stor-  
age devices; you cannot write new data  
to a compact disc with standard CD-ROM  
drives.  
%78  
Abbreviation for British thermal unit.  
EXV  
A bus forms an information pathway be-  
tween the components of a computer.  
Yourcomputercontainsanexpansionbus  
that allows the microprocessor to com-  
municate with controllers for all the  
various peripheral devices connected to  
the computer. Your computer also con-  
tains an address bus and a data bus for  
communications between the micro-  
processor and RAM.  
&*$  
Abbreviation for color graphics adapter.  
&,)6  
Common Internet File System. A protocol  
for networking PCs.  
FOLHQW  
A computer that shares files on a filer.  
E\WH  
Eight contiguous bits of information, the  
basic data unit used by your computer.  
&,2  
Abbreviation for comprehensive input/  
output.  
%=7  
Bundesamt fur Zulassun-  
Abbreviation for  
gen in der Telekommunikation  
.
FP  
Abbreviation for centimeter(s).  
&
Abbreviation for Celsius.  
&026  
Acronym for complementary metal-oxide  
semiconductor. In computers, CMOS  
memory chips are often used for NVRAM  
storage.  
FDFKH  
To facilitate quicker data retrieval, a stor-  
age area for keeping a copy of data or  
instructions. For example, your comput-  
er’s BIOS may cache ROM code in faster  
RAM. Or, a disk-cache utility may reserve  
RAM in which to store frequently access-  
ed information from your computer’s disk  
drives; when a program makes a request  
to a disk drive for data that is in the cache,  
the disk-cache utility can retrieve the data  
from RAM faster than from the disk drive.  
&20Q  
The MS-DOS device names for the first  
through fourth serial ports on your com-  
puter are COM1, COM2, COM3, and  
COM4.MS-DOSsupportsuptofourserial  
ports. However, the default interrupt for  
COM1andCOM3isIRQ4, andthedefault  
interrupt for COM2 and COM4 is IRQ3.  
Therefore, you must be careful when con-  
figuring software that runs a serial device  
so that you don’t create an interrupt  
conflict.  
FDUGꢁHGJHꢀFRQQHFWRU  
On the bottom of an expansion card, the  
metal-contact section that plugs into an  
expansion-card connector.  
Glossary  
3
&21  
FXUVRU  
The MS-DOS device name for the con-  
sole, which includes your computer’s  
keyboard and text displayed on the  
screen.  
In character-based MS-DOS programs,  
the cursor is usually a block or an under-  
score (possibly blinking) that represents  
the position at which the next character  
typedwillappear.Windowsprogramscan  
design their own cursors—common cur-  
sorsymbolsincludethepointerarrowand  
the text-insertion I-beam.  
FRQILJꢃV\VꢀILOH  
When you boot your computer, MS-DOS  
runs any commands contained in the text  
file, config.sys (before running any com-  
mands in the autoexec.bat file). A  
config.sys file is not required to boot  
MS-DOS, but provides a convenient place  
to run commands that are essential for  
setting up a consistent computing environ-  
ment—such as loading device drivers with  
a device= statement.  
'$&  
Acronym for digital-to-analog converter.  
'$7  
Acronym for digital audio tape.  
G%  
Abbreviation for decibel(s).  
FRQVROH  
A terminal that is attached to a filers serial  
port and is used to monitor and manage  
filer operation.  
G%$  
Abbreviation for adjusted decibel(s).  
'&  
Abbreviation for direct current.  
FRQWUROOHU  
A chip or expansion card that controls the  
transfer of data between the micro-  
processor and a peripheral, such as a disk  
drive or the keyboard.  
''&  
Acronym for display data channel. A  
®
VESA standard mechanism that allows  
the system to communicate with the  
monitor and retrieve information about its  
capabilities.  
FRQYHQWLRQDOꢀPHPRU\  
The first 640 KB of RAM. Unless they are  
specially designed, MS-DOS programs  
are limited to running in conventional  
memory. SeealsoEMM,expandedmem-  
ory, extended memory, HMA, memory  
manager, uppermemoryarea, andXMM.  
'HOOꢀ2SHQ0DQDJHꢀ&OLHQWꢀDQGꢀ  
&OLHQWꢀ$GPLQLVWUDWRU  
The Dell OpenManage program is a DMI  
browser that allows you to view informa-  
tion about various components of your  
system.  
FRSURFHVVRU  
A coprocessor relieves the computer’s  
microprocessor of specific processing  
tasks. A math coprocessor, for example,  
handles numeric processing. A graphics  
coprocessorhandlesvideorendering.The  
GHYLFHꢀGULYHU  
A device driver allows the operating sys-  
tem or a program to interface correctly  
with a peripheral, such as a printer or net-  
work card. Some device drivers—such as  
network drivers—must be loaded from  
the config.sys file (with a device= state-  
ment) or as memory-resident programs  
(usually, from the autoexec.bat file). Oth-  
ers—such as video drivers—must load  
when you start the program for which they  
were designed.  
®
®
Intel Pentium microprocessor includes a  
built-in math coprocessor.  
FSL  
Abbreviation for characters per inch.  
&38  
Abbreviation for central processing unit.  
See also microprocessor.  
4
Dell PowerVault 720N, 740N, and 760N User’s Guide  
'HVNWRSꢀ0DQDJHU  
Desktop Manager, a component of the  
root directory  
Fꢁ\  
®
Intel LANDesk Configuration Manager  
systemmanagementsoftware, isusedto  
manage clients after installing an operat-  
ing system, management agents, and  
applications.  
Fꢁ?ZLQGRZV  
Fꢁ?GRV  
subdirectorie  
Fꢁ?GHOO  
'+&3  
Acronym for Dynamic Host Configuration  
Protocol.  
Fꢁ?ZLQGRZV?V\VWHP  
GLVNHWWHꢁEDVHGꢀGLDJQRVWLFV  
GLDJQRVWLFV  
See diskette-based diagnostics.  
A comprehensive set of diagnostic tests  
for your Dell computer. To use the  
diskette-based diagnostics, you must  
',00  
DellDiagnos-  
boot your computer from the  
Acronym for dual in-line memory  
module.  
tics Installation and  
for a complete  
diskette. Refer to your  
Troubleshooting Guide  
discussion about how to use the diskette-  
based diagnostics.  
',1  
Acronym for  
Deutsche Industrie Norm  
.
GLVSOD\ꢀDGDSWHU  
See video adapter.  
',3  
Acronym for dualin-line package. A circuit  
board, such as a system board or expan-  
sion card, may contain DIP switches for  
configuring the circuit board. DIP switch-  
es are always toggle switches, with an  
ON position and an OFF position.  
'0$  
Abbreviation for direct memory access. A  
DMA channel allows certain types of data  
transfer between RAM and a device to  
bypass the microprocessor.  
'0,  
Abbreviation for Desktop Management  
Interface. DMI enables the management  
of your computer system’s software and  
hardware. DMI defines the software, in-  
terfaces, and data files that enable your  
system to determine and report informa-  
tion about its components.  
DIP switches  
GLUHFWRU\  
Directories help keep related files orga-  
nized on a disk in a hierarchical, “inverted  
tree” structure. Each disk has a “root”  
directory; for example, a C:\>prompt nor-  
mally indicates that you are at the root  
directory of hard-disk drive C. Additional di-  
rectoriesthatbranchoffoftherootdirectory  
IfDMIisinstalledonyoursystem,youcan  
enable DMI support as you complete the  
setup of your system by double-clicking  
the DMI icon in the Windows Control Pan-  
el. For further instructions on enabling  
DMI support or for more information  
about DMI, refer to the DMI online help.  
subdirectories  
. Subdirectories  
are called  
maycontainadditionaldirectoriesbranching  
off of them.  
'07)  
Acronym for Desktop Management Task  
Force, a consortium of companies repre-  
sentinghardwareandsoftwareproviders,  
of which Dell Computer Corporation is a  
steering committee member.  
Glossary  
5
'2&  
Abbreviation for Department of Commu-  
nications (in Canada).  
'7(  
Abbreviationfordataterminalequipment.  
Any device (such as a computer system)  
that can send data in digital form by  
means of a cable or communications line.  
The DTE is connected to the cable or  
communications line through a data com-  
munications equipment (DCE) device,  
such as a modem.  
GSL  
Abbreviation for dots per inch.  
'306  
Abbreviation for Display Power Manage-  
ment Signaling. A standard developed by  
the Video Electronics Standards Associa-  
tion that defines the hardware signals  
sent by a video controller to activate pow-  
er management states in a video display  
or monitor. A monitor is said to be DPMS-  
compliant when it is designed to enter a  
power management state after receiving  
the appropriate signal from a computer’s  
video controller.  
(&&  
Abbreviation for error checking and  
correction.  
(&3  
Abbreviation for Extended Capabilities  
Port.  
('2  
Abbreviation for extended-data output. A  
type of RAM chip that holds data on the  
chip’s output data lines for a longer period  
of time than fast-page mode RAM chips.  
The EDO RAM chips are also faster than  
fast-page mode RAM chips.  
'5$&  
Acronym for Dell Remote Assistant Card.  
'5$0  
Abbreviation for dynamic random-access  
memory. A computer’s RAM is usually  
made up entirely of DRAM chips. Be-  
cause DRAM chips cannot store an  
electrical charge indefinitely, your com-  
puter continually refreshes each DRAM  
chip in the computer.  
((3520  
Acronym for electrically erasable pro-  
grammable read-only memory.  
(*$  
Abbreviation for enhanced graphics  
adapter.  
GULYHꢁW\SHꢀQXPEHU  
Yourcomputercanrecognizeanumberof  
specifichard-diskdrives. Eachisassigned  
a drive-type number that is stored in  
NVRAM. The hard-disk drive(s) specified  
in your computer’s System Setup pro-  
gram must match the actual drive(s)  
installed in the computer. The System  
Setup program also allows you to specify  
physical parameters (cylinders, heads,  
write precomp, landing zone, and capaci-  
ty) for drives not included in the table of  
drive types stored in NVRAM.  
(,6$  
Acronym for Extended Industry-Standard  
Architecture, a 32-bit expansion-bus de-  
sign.Theexpansion-cardconnectorsinan  
EISA computer are also compatible with  
8- or 16-bit ISA expansion cards.  
To avoid a configuration conflict when in-  
stalling an EISA expansion card, you must  
use the EISA Configuration Utility. This  
utility allows you to specify which expan-  
sion slot contains the card and obtains  
information about the card’s required sys-  
temresourcesfromacorrespondingEISA  
configuration file.  
'6ꢍ''  
Abbreviation for double-sided/double-  
density.  
(0&  
Abbreviation for Electromagnetic  
Compatibility.  
'6ꢍ+'  
Abbreviation for double-sided/high-  
density.  
6
Dell PowerVault 720N, 740N, and 760N User’s Guide  
(0,  
Abbreviation for electromagnetic  
interference.  
H[SDQVLRQꢀEXV  
Yourcomputercontainsanexpansionbus  
that allows the microprocessor to com-  
municate with controllers for peripheral  
devices, such as a network card or an in-  
ternal modem.  
(00  
Abbreviation for expanded memory  
manager. A software utility that uses ex-  
tended memory to emulate expanded  
H[SDQVLRQꢀFDUG  
memory on computers with an Intel386  
A SCSI card, NVRAM card, network card,  
hot swap card, or console card that plugs  
into a filer expansion slot.  
or higher microprocessor. See alsoconven-  
tional memory, expanded memory,  
extended memory, memory manager,  
and XMM.  
H[SDQVLRQꢁFDUGꢀFRQQHFWRU  
A connector on the computer’s system  
board for plugging in an expansion card.  
(06  
Abbreviation for Expanded Memory Spec-  
ification. See also expanded memory,  
memory manager, and XMS.  
H[WHQGHGꢀPHPRU\  
RAMabove1MB. Mostsoftwarethatcan  
use it, such as Windows, requires that ex-  
tended memory be under the control of  
anXMM.Seealsoconventionalmemory,  
expanded memory, memory manager,  
and XMM.  
HQWHUSULVH  
A systems-management software product  
that is either a source or a receiver of SNMP  
traps.  
(3520  
Acronym for erasable programmable  
read-only memory.  
H[WHUQDOꢀFDFKHꢀPHPRU\  
A RAM cache using SRAM chips. Be-  
cause SRAM chips operate at several  
times the speed of DRAM chips, the  
microprocessor can retrieve data and in-  
structions faster from external cache  
memory than from RAM.  
(6'  
Abbreviation for electrostatic discharge.  
Refer to “Safety Instructions” at the front  
User’s Guide  
of your  
for a complete discus-  
)
sion of ESD.  
Abbreviation for Fahrenheit.  
(60  
Abbreviation for embedded server  
management.  
)$7  
Acronym for file allocation table. The file  
system structure used by MS-DOS to or-  
ganize and keep track of file storage. The  
(6',  
Acronym for enhanced small-device  
interface.  
®
®
Microsoft Windows NT operating sys-  
tem can optionally use a FAT file system  
structure.  
H[SDQGHGꢀPHPRU\  
)&&  
AbbreviationforFederalCommunications  
Commission.  
A technique for accessing RAM above  
1 MB. To enable expanded memory on  
your computer, you must use an EMM.  
You should configure your system to sup-  
port expanded memory only if you run  
application programs that can use (or  
require) expanded memory. See also  
conventional memory, EMM, extended  
memory, and memory manager.  
ILOHU  
A filer is a dedicated, special-purpose  
networkdataserverthatprovidesfastand  
reliable file service to network clients  
connected to Ethernet networks.  
Glossary  
7
IODVKꢀPHPRU\  
in systems with a very high storage capac-  
ity. However, guarded configurations are  
significantly slower for applications that  
frequently write to the array, because  
eachattempttowritetothearrayrequires  
multiple read and write commands to  
maintain the parity information. If this is a  
problem, mirroringorduplexingisabetter  
choice. See also mirroring, RAID 4, and  
RAID 5.  
A type of EEPROM chip that can be re-  
programmed from a utility on diskette  
while still installed in a computer; most  
EEPROMchipscanonlyberewrittenwith  
special programming equipment.  
IRUPDW  
Toprepareahard-diskdriveordiskettefor  
storing files. An unconditional format de-  
letes all data stored on the disk. The  
format command in MS-DOS 5.0 or higher  
includes an option that allows you to unfor-  
mat a disk, if you have not yet used the disk  
for file storage.  
*8,  
Acronym for graphical user interface.  
K
Abbreviation for hexadecimal. A base-16  
numbering system, often used in pro-  
gramming to identify addresses in the  
computer’s RAM and I/O memory ad-  
dresses for devices. The sequence of  
decimal numbers from 0 through 16, for  
example, is expressed in hexadecimal no-  
tation as: 0, 1, 2, 3, 4, 5, 6, 7, 8, 9, A, B,  
C, D, E, F, 10. In text, hexadecimal num-  
IW  
Abbreviation for feet.  
)73  
Abbreviation for file transport protocol.  
J
Abbreviation for gram(s).  
h
bers are often followed by or preceded  
0x  
by . MS-DOS conventionalmemory—the  
*
first 640 KB of memory addresses—is from  
00000h to 9FFFFh; the MS-DOS upper  
memory area—memory addresses be-  
tween 640 KB and 1 MB—is from A0000h  
to FFFFFh.  
Abbreviation for gravities.  
*%  
Abbreviation for gigabyte(s). A gigabyte  
equals 1,024 megabytes or  
1,073,741,824 bytes.  
KHDWꢀVLQN  
A metal plate with metal pegs or ribs  
that help dissipate heat. Some micro-  
processors include a heat sink.  
*,'  
Group identification number.  
JURXS  
A group of users defined in the filers  
+0$  
Abbreviation for high memory area. The  
first 64 KB of extended memory above  
1 MB. A memory manager that conforms  
to the XMS can make the HMA a direct  
extension of conventional memory. See  
also conventional memory, memory  
manager, uppermemoryarea, andXMM.  
/etc/group  
file.  
JUDSKLFVꢀFRSURFHVVRU  
See coprocessor.  
JUDSKLFVꢀPRGH  
See video mode.  
+,3  
JXDUGLQJ  
Acronym for the Dell OpenManage Hard-  
ware Instrumentation Package. HIP  
provides seamless integration with the In-  
tel LANDesk Server Manager. Together,  
HIP and LANDesk Server Manager allow  
you to monitor your Dell servers and track  
status information about Dell server  
components.  
A type of data redundancythat uses a set  
of physical drives to store data and a sin-  
gle, additional drive to store parity data.  
Using guarding, the user’s data is protect-  
ed from the loss of a single drive.  
Guarding is sometimes preferred over  
mirroringbecauseitismorecosteffective  
8
Dell PowerVault 720N, 740N, and 760N User’s Guide  
KRVWꢀDGDSWHU  
LQWHUQDOꢀPLFURSURFHVVRUꢀFDFKH  
An instruction and data cache built in to  
the microprocessor. The Pentium micro-  
processor, for example, includes a 16-KB  
internal cache, which is set up as an 8-KB  
read-only instruction cache and an 8-KB  
read/write data cache.  
A host adapter implements communica-  
tion between the computer’s bus and the  
controllerforaperipheral. (Hard-diskdrive  
controller subsystems include integrated  
host adapter circuitry.) To add a SCSI ex-  
pansion bus to your system, you must  
install the appropriate host adapter.  
,3  
Acronym for Internet Protocol.  
+3)6  
Abbreviation for the High Performance  
File System option in the Windows NT  
operating system.  
,3;  
Acronym for internetwork packet  
exchange.  
+773  
Hypertext Transfer Protocol. An object-ori-  
ented protocol that can be used for many  
tasks, such as name servers and distrib-  
uted object management systems,  
through extension of its request methods  
(commands).  
,54  
Abbreviation for interrupt request. A sig-  
nal that data is about to be sent to or  
received by a peripheral travels by an IRQ  
line to the microprocessor. Each peripher-  
al connection must be assigned an IRQ  
number. For example, the first serial port  
in your computer (COM1) is assigned to  
IRQ4 by default. Two devices can share  
thesameIRQassignment,butyoucannot  
operate both devices simultaneously.  
+]  
Abbreviation for hertz.  
,ꢍ2  
Abbreviation for input/output. The key-  
board and a printer, for example, are I/O  
devices. In general, I/O activity can be dif-  
ferentiated from computational activity.  
For example, when a program sends a  
document to the printer, it is engaging in  
I/O activity; when the program sorts a list  
of terms, it is engaging in computational  
activity.  
,6$  
Acronym for Industry-Standard Architec-  
ture. A 16-bit expansion bus design. The  
expansion-card connectors in an ISA com-  
puter are also compatible with 8-bit ISA  
expansion cards.  
,60  
Abbreviation for Internet Service  
Manager.  
,'  
Abbreviation for identification.  
,7(  
Abbreviation for information technology  
equipment.  
,+9  
Abbreviation for independent hardware  
vendor.  
-(,'$  
AcronymforJapaneseElectronicIndustry  
Development Association.  
LQꢁEDQG  
Communication across the network be-  
tween the console and server.  
.
LQWHUODFLQJ  
Abbreviation for kilo-, indicating 1,000.  
A technique for increasing video resolu-  
tion by only updating alternate horizontal  
lines on the screen. Because interlacing  
can result in noticeable screen flicker,  
most users prefer noninterlaced video  
adapter resolutions.  
.%  
Abbreviation for kilobyte(s), 1,024 bytes.  
.%ꢍVHF  
Abbreviation for kilobyte(s) per second.  
Glossary  
9
.ELWꢏVꢐ  
Abbreviation for kilobit(s), 1,024 bits.  
microprocessor chip to be installed or re-  
moved with minimal stress to the device.  
/,0  
Acronym for Lotus/Intel/Microsoft. LIM  
usually refers to version 4.0 of the EMS.  
.ELWꢏVꢐꢍVHF  
Abbreviation for kilobit(s) per second.  
NH\ꢀFRPELQDWLRQ  
/1  
Abbreviation for load number.  
A command requiring that you press mul-  
tiple keys at the same time. For example,  
youcanrebootyourcomputerbypressing  
the <Ctrl><Alt><Del> key combination.  
ORFDOꢀEXV  
On a computer with local-bus expansion  
capability, certain peripheral devices  
(such as the video adapter circuitry) can  
be designed to run much faster than they  
would with a traditional expansion bus.  
Some local-bus designs allow peripherals  
to run at the same speed and with the  
same width data path as the computer’s  
microprocessor.  
NJ  
Abbreviation for kilogram(s), 1,000 grams.  
N+]  
Abbreviation for kilohertz, 1,000 hertz.  
/$1  
Acronym for local area network. A LAN  
system is usually confined to the same  
building or a few nearby buildings, with all  
equipment linked by wiring dedicated  
specifically to the LAN.  
/37Q  
The MS-DOS device names for the first  
through third parallel printer ports on your  
computer are LPT1, LPT2, and LPT3.  
OE  
Abbreviation for pound(s).  
/81  
Acronym for logical unit number.  
/&'  
P
Abbreviation for liquid crystal display. A  
low-power display often used for note-  
book computers. An LCD consists of a  
liquid crystal solution between two  
sheets of polarizing material. An electric  
current causes each crystal to act like a  
shutter that can open to allow light past  
or close to block the light.  
Abbreviation for meter(s).  
P$  
Abbreviation for milliampere(s).  
P$K  
Abbreviation for milliampere-hour(s).  
/'60  
Abbreviation for LANDesk Server  
Manager.  
PDWKꢀFRSURFHVVRU  
See coprocessor.  
0%  
Abbreviation for megabyte(s). The term  
megabyte  
means 1,048,576 bytes; how-  
/('  
ever, when referring to hard-disk drive  
storage, the term is often rounded to mean  
1,000,000 bytes.  
Abbreviation for light-emitting diode. An  
electronic device that lights up when a  
current is passed through it.  
0%5  
Abbreviation for master boot record.  
/,)  
Acronym for low insertion force. Some  
computers use LIF sockets and connec-  
tors to allow devices such as the  
0'$  
Abbreviation for monochrome display  
adapter.  
10  
Dell PowerVault 720N, 740N, and 760N User’s Guide  
PHPRU\  
PLUURULQJ  
A computer can contain several different  
forms of memory, such as RAM, ROM,  
and video memory. Frequently, the word  
A type of data redundancythat uses a set  
of physical drivesto store data and one or  
more sets of additional drives to store du-  
plicate copies of the data. Mirroring is the  
preferred data redundancy technique in  
lower-capacity systems and in systems  
where performance is extremely impor-  
tant. See also guarding, RAID 1, and RAID  
10.  
memory  
is used as a synonym for RAM; for  
example, an unqualified statement such as  
a computer with 8 MB of memory” re-  
fers to a computer with 8 MB of RAM.  
PHPRU\ꢀDGGUHVV  
A specific location, usually expressed as  
a hexadecimal number, in the computer’s  
RAM.  
PP  
Abbreviation for millimeter(s).  
PHPRU\ꢀPDQDJHU  
PRXVH  
A utility that controls the implementation  
of memory in addition to conventional  
memory, such as extended or expanded  
memory.Seealsoconventionalmemory,  
EMM, expanded memory, extended  
memory, HMA, upper memory area, and  
XMM.  
A pointing device that controls the  
movement of the cursor on a screen.  
Mouse-aware software allows you to ac-  
tivate commands by clicking a mouse  
button while pointing at objects displayed  
on the screen.  
PV  
Abbreviation for millisecond(s).  
0*$  
Abbreviation for monochrome graphics  
adapter.  
06ꢁ'26  
AbbreviationforMicrosoftDiskOperating  
System.  
0+]  
Abbreviation for megahertz.  
07%)  
Abbreviation for mean time between  
failures.  
0,%  
Acronym for management information  
base.  
PXOWLIUHTXHQF\ꢀPRQLWRU  
0,)  
Abbreviation for management informa-  
tion format.  
A monitor that supports several video  
standards. A multifrequency monitor can  
adjusttothefrequencyrangeofthesignal  
from a variety of video adapters.  
PLFURSURFHVVRU  
P9  
Abbreviation for millivolt(s).  
Because it is the primary computational  
chip inside the computer, it is customary  
to refer to the microprocessor as “the  
computer’s brain.” The microprocessor  
containsanarithmeticprocessingunitand  
a control unit. Software written for one  
microprocessor must usually be revised  
1)6  
Network File System. A protocol for  
networking PCs.  
CPU  
to run on another microprocessor.  
a synonym for microprocessor.  
is  
1,&  
Acronym for network interface card.  
PLQ  
Abbreviation for minute(s).  
1L&DG  
Acronym for nickel cadmium.  
1L0+  
Abbreviation for nickel-metal hydride.  
Glossary  
11  
1/0  
SDUDPHWHU  
A value or option that you specify to a pro-  
gram. A parameter is sometimes called a  
®
®
Acronym forNovell NetWare Loadable  
Module.  
switch  
argument  
.
or an  
10,  
SDUWLWLRQ  
You can divide a hard-disk drive into mul-  
partitions  
with the fdisk command. Each partition can  
contain multiple logical drives. For example,  
you could partition a 200-MB hard-disk drive  
into two physically separate partitions with  
threelogicaldriveassignments,asshownin  
the following table.  
Abbreviationfornonmaskableinterrupt.A  
device sends an NMI to signal the micro-  
processor about hardware errors, such as  
a parity error.  
tiple physical sections called  
QRQLQWHUODFHG  
A technique for decreasing screen flicker  
by sequentially refreshing each horizontal  
line on the screen.  
ꢀꢀ3DUWLWLRQLQJꢀWKHꢀ+DUGꢁ'LVNꢀ'ULYH  
QV  
Abbreviation for nanosecond(s), one bil-  
lionth of a second.  
3K\VLFDOꢁ3DUWLWLRQVꢁDQGꢁ6L]HV  
Partition 1 120 MB  
Partition 2 80 MB  
17)6  
Abbreviation for the NT File System op-  
tion in the Windows NT operating system.  
/RJLFDOꢁ'ULYHꢁ$VVLJQPHQWVꢁDQGꢁ6L]HV  
Drive C 120 MB  
Drive D 50 MB  
Drive E 30 MB  
195$0  
Abbreviation for nonvolatile random-  
access memory. Memory that does not  
lose its contents when you turn off your  
computer. NVRAM is used for maintain-  
ing the date, time, and system setup  
options.  
After partitioning the hard-disk drive, you  
must format each logical drive with the  
format command.  
26ꢍꢅ  
Abbreviation for Operating System/2.  
3&ꢀ&DUG  
Slightlylargerthanacreditcard, aPCCard  
is a removable I/O card—such as a mo-  
dem, LAN, SRAM, or flash memory  
card—that adheres to the PCMCIA stan-  
dards. See also PCMCIA.  
RXWꢁRIꢁEDQG  
Communications that do not use the net-  
work but are passed via modem. The out-  
of-band path is used for remote manage-  
ment of a server or for accessing server  
information when the server or network  
is down.  
3&,  
Abbreviation for Peripheral Component  
Interconnect. A standard for local-bus  
implementation developed by Intel  
Corporation.  
273  
Abbreviation for one-time programmable.  
3&0&,$  
SDUDOOHOꢀSRUW  
Abbreviation for Personal Computer  
Memory Card International Association.  
See also PC Card.  
An I/O port used most often to connect a  
parallel printer to your computer. You can  
usuallyidentifyaparallelportonyourcom-  
puter by its 25-hole connector.  
3'&  
Primary Domain Controller. The domain  
controllerthathasnegotiatedtobe, orhas  
been assigned as, the primary authentica-  
tion server for the domain.  
12  
Dell PowerVault 720N, 740N, and 760N User’s Guide  
SHULSKHUDOꢀGHYLFH  
Virtual memory, a method for  
increasing addressable memory by  
using the hard-disk drive  
An internal or external device—such as a  
printer, a disk drive, or a keyboard—con-  
nected to a computer.  
The Windows NT 32-bit operating system  
runs in protected mode. MS-DOS cannot  
run in protected mode; however, some  
programs that you can start from  
MS-DOS—such as Windows—are able to  
put the computer into protected mode.  
3*$  
Abbreviation for pin grid array, a type of  
microprocessor socket that allows you to  
remove the microprocessor chip.  
SL[HO  
36ꢍꢅ  
Abbreviation for Personal System/2.  
Arranged in rows and columns, a pixel is  
a single point on a video display. Video  
resolution—640 x 480, for example—is  
expressed as the number of pixels across  
by the number of pixels up and down.  
363%  
Abbreviation for power-supply paralleling  
board.  
3267  
39&  
Abbreviation for polyvinyl chloride.  
Acronym for power-on self-test. Before  
theoperatingsystemloadswhenyouturn  
onyourcomputer, thePOSTtestsvarious  
system components such as RAM, the  
disk drives, and the keyboard.  
4,&  
Abbreviation for quarter-inch cartridge.  
5$,'  
SSP  
Abbreviation for pages per minute.  
Acronym for redundant arrays of indepen-  
dentdisks. Thisphrasewasintroducedby  
DavidPatterson,GarthGibson,andRandy  
Katz at the University of California at Ber-  
keley in 1987. The goal of RAID is to use  
multiple small, inexpensive disk drives to  
provide high storage capacity and perfor-  
mancewhilemaintainingorimprovingthe  
reliability of the disk subsystem.  
34)3  
Abbreviation for plastic quad flat pack, a  
type of microprocessor socket in which  
the microprocessor chip is permanently  
mounted.  
351  
A synonym for the MS-DOS device name  
LPT1.  
Patterson, Gibson, and Katz described  
five different methods, which are known  
as RAID levels 1 through 5. Each level  
uses one or more extra drives to provide  
a means of recovering data lost when a  
disk fails, so that the effective failure rate  
of the whole disk subsystem becomes  
very low.  
SURJUDPꢀGLVNHWWHꢀVHW  
The set of diskettes from which you can  
perform a complete installation of an ap-  
plication program. When you reconfigure  
aprogram, youoftenneeditsprogramdis-  
kette set.  
Recently, Katz has defined a sixth meth-  
od, RAID 6, which improves reliability  
even further, and a configuration that pro-  
vides no data recovery has popularly  
become known as RAID 0.  
SURWHFWHGꢀPRGH  
An operating mode supported by 80286  
or higher microprocessors, protected  
mode allows operating systems to  
implement:  
5$,'ꢀꢋ  
RAID 0 is commonly called  
was not originally defined as a RAID level  
but has since come into popular use. In  
this array configuration, data is written  
A memory address space of 16 MB  
(80286 microprocessor) to 4 GB  
(Intel386 or higher microprocessor)  
striping  
. This  
Multitasking  
Glossary  
13  
sequentiallyacrosstheavailabledisksand  
no redundancy is provided. RAID 0 config-  
urations provide very high performance  
but relatively low reliability. RAID 0 is the  
best choice when DSA controller cards  
are duplexed. See also striping.  
5$0  
Acronym for random-access memory.  
The computer’s primary temporary stor-  
age area for program instructions and  
data. Each location in RAM is identified by  
memory address  
. Any  
a number called a  
information stored in RAM is lost when you  
turn off your computer.  
5$,'ꢀꢃ  
RAID 1 is commonly called  
mirroring  
.
RAID 1 also uses striping, so RAID 1 may  
be regarded as the mirroring of RAID 0  
configurations. RAID 1 is the best choice  
inhigh-availabilityapplicationsthatrequire  
highperformanceorrelativelylowdataca-  
pacity. See also mirroring, RAID 10,  
striping.  
5$0'$&  
Acronym for random-access memory  
digital-to-analog converter.  
UHDGꢁRQO\ꢀILOH  
A read-only file is one that you are prohib-  
ited from editing or deleting. A file can  
have read-only status if:  
5$,'ꢀꢑ  
Its read-only attribute is enabled.  
guarding  
. It  
RAID 4 is commonly called  
uses data striping, like RAID 0, but adds a  
single, dedicated parity drive. The parity  
data stored on this drive can be used to  
recoverdatalostfromasinglefaileddrive.  
RAID 4 configurations write data slowly  
because parity data has to be generated  
and written to the parity drive, and the  
generation of the parity data frequently re-  
quires reading data frommultiple physical  
drives. See also guarding and striping.  
It resides on a physically write-  
protected diskette.  
It is located on a network in a  
directory to which the system  
administrator has assigned read-  
only rights to you.  
UHDOꢀPRGH  
An operating mode supported by 80286  
or higher microprocessors, real mode  
imitates the architecture of an 8086  
microprocessor. Designed to run in real  
mode, MS-DOS (unassisted by additional  
software techniques) can address only  
640 KB of conventional memory.  
5$,'ꢀꢌ  
RAID 5, like RAID 4, is commonly called  
guarding  
. RAID 5 is identical to RAID 4,  
except that the parity data is distributed  
evenly across all physical drives instead  
of a parity drive. In configurations using a  
large number of physical drives in which  
a large number of simultaneous small  
write operations are being performed,  
RAID 5 offers potentially higher perfor-  
mance than RAID 4. RAID 4 and RAID 5  
configurations are appropriate in high-  
availability applications where perfor-  
mance is less critical or where high data  
capacity is required. See also guarding.  
UHIUHVKꢀUDWH  
The frequency, measured in Hz, at which  
the screen’s horizontal lines are re-  
charged. A monitor’s refresh rate is also  
vertical frequency  
referred to as its  
.
5(1  
Abbreviation for ringer equivalence  
number.  
5$,'ꢀꢃꢋ  
5),  
Abbreviation for radio frequency  
interference.  
RAID 10 is a mirroring technique in which  
data is duplicated across two identical  
RAID 0 arrays or hard-disk drives. All data  
on a physical drive in one array is duplicat-  
5*%  
Abbreviation for red/green/blue.  
mirrored  
, on a drive in the second  
ed, or  
array. Mirroring offers complete redun-  
dancy of data for greater data security.  
See also mirroring, RAID 1, and striping.  
14  
Dell PowerVault 720N, 740N, and 760N User’s Guide  
520  
VHULDOꢀSRUW  
Acronym for read-only memory. Your  
computer contains some programs es-  
sential to its operation in ROM code.  
Unlike RAM, a ROM chip retains its  
contents even after you turn off your com-  
puter. Examples of code in ROM include  
theprogramthatinitiatesyourcomputer’s  
boot routine and the POST.  
An I/O port used most often to connect a  
modemoramousetoyourcomputer.You  
can usually identify a serial port on your  
computer by its 9-pin connector.  
VKDGRZLQJ  
A computer’s system and video BIOS  
code is usually stored on ROM chips.  
Shadowing refers to the performance-  
enhancementtechniquethatcopiesBIOS  
code to faster RAM chips in the upper  
memory area (above 640 KB) during the  
boot routine.  
USP  
Abbreviation for revolutions per minute.  
57&  
Abbreviation for real-time clock. Battery-  
powered clock circuitry inside the com-  
puter that keeps the date and time after  
you turn off the computer.  
VKDUH  
A directory or directory structure on the  
filer that has been made available to net-  
work users and can be mapped to a drive  
letter on a CIFS client.  
6&6,  
Acronym for small computer system in-  
terface. An I/O bus interface with faster  
data transmission rates than standard  
ports. You can connect up to seven devic-  
es to one SCSI interface.  
60$57  
Acronym for Self-Monitoring Analysis Re-  
porting Technology. A technology that  
allows hard-disk drives to report errors  
and failures to the system BIOS, which  
then displays an error message on the  
screen. To take advantage of this technol-  
ogy, you must have a SMART-compliant  
hard-disk drive and the proper support in  
the system BIOS.  
6'06  
Abbreviation for SCSIdevice management  
system.  
6'5$0  
Abbreviation for Synchronous Dynamic  
Random Access Memory.  
60%  
Acronym for system management bus.  
6'6  
Abbreviation for scalable disk system.  
600  
Abbreviation for server monitor module.  
An ISAexpansion card that provides a mo-  
dem interface for out-of-band monitoring  
and control of a server.  
6(&  
Abbreviation for single-edge connector  
cartridge.  
603  
Abbreviation for symmetric  
mutiprocessing.  
VHF  
Abbreviation for second(s).  
VHFWRU  
606  
Abbreviation for Systems Management  
Server.  
The fundamental unit of data access for a  
hard-disk drive. For PC-compatible sys-  
tems, a sector is usually 512 bytes. See  
also block and block size.  
6103  
Abbreviation for Simple Network Man-  
agement Protocol.  
VHULDOꢀFRQVROH  
An ASCII or ANSI terminal attached to a  
filer’s serial port. Used to monitor and  
manage filer operations.  
Glossary  
15  
64/  
Abbreviation for Structured Query  
Language.  
V\VWHPꢀGLVNHWWH  
Systemdisketteisasynonymfor  
bootable  
diskette  
.
VWULSLQJ  
V\VWHPꢀPHPRU\  
System memory is a synonym for  
RAM  
.
In composite drivers with two or more  
physicaldrives, thedrivearraysubsystem  
uses a method of data storage called strip-  
ing. With this method, data is divided into  
a series of pieces called blocks and each  
data block is stored on a different physical  
drive. When each drive contains a block  
of data, the process starts over with the  
first physical drive. By carefully selecting  
the size of the data block, the chance that  
the information needed can be read from  
or written to multiple physical drives at  
once is increased, greatly increasing the  
performance of the composite drive. See  
also block, block size, and RAID.  
6\VWHPꢀ6HWXSꢀSURJUDP  
System Setup program options allow you  
to configure your computer’s hardware.  
Some options in the System Setup  
program require that you reboot the  
computer in order to make a hardware-  
configuration change. Because the Sys-  
tem Setup program is stored in NVRAM,  
any options that you set remain in effect  
until you change them again.  
V\VWHPꢃLQLꢀILOH  
When you start Windows, it consults the  
system.ini file to determine a variety of  
options for the Windows operating  
environment. Among other things, the  
system.inifilerecordswhichvideo,mouse,  
and keyboard drivers are installed for  
Windows.  
65$0  
Abbreviation for static random-access  
memory. Because SRAM chips do not  
require continual refreshing, they are sub-  
stantially faster than DRAM chips. SRAM  
is used mostly for external cache  
memory.  
Running the Control Panel or Windows  
Setupprogrammaychange options in the  
system.ini file. On other occasions, you  
may need to change or add options to the  
system.ini file manually with a text editor,  
such as Notepad.  
69*$  
Abbreviation for super video graphics  
array. See also VGA.  
VZLWFK  
See parameter.  
7&3ꢍ,3  
Abbreviation for Transmission Control  
Protocol/Internet Protocol.  
V\QFꢀQHJRWLDWLRQ  
Sync negotiation is a SCSI feature that  
allows the host adapter and its attached  
SCSI devices to transfer data in synchro-  
nous mode. Synchronous data transfer is  
faster than asynchronous data transfer.  
7,5&3  
Abbreviation for Transport Independent  
Remote Procedure Call.  
WHUPLQDWRU  
Some devices, especially disk drives, con-  
tain a terminator to absorb and dissipate  
excess current. When more than one  
such device is connected in a series, you  
may need to remove the terminator—or  
change a jumper setting to disable it—un-  
less it is the last device in the series.  
However,somedeviceshaveterminators  
that should never be removed or disabled.  
V\QWD[  
The rules that dictate how you must type  
a command or instruction so thatthe com-  
puter will understand it.  
V\VWHPꢀERDUG  
As the main circuit board, the system  
board usually contains most of your filer’s  
integral components, such as the micro-  
processor, RAM, and expansion-card  
connectors.  
16  
Dell PowerVault 720N, 740N, and 760N User’s Guide  
WH[WꢀHGLWRU  
8,'  
An application program for editing text  
files consisting exclusively of ASCII  
characters. MS-DOS Editor and Notepad  
(in Windows) are text editors, for exam-  
ple. Most word processors use  
proprietary file formats containing binary  
characters, although some can read and  
write text files.  
User identification number.  
8/  
Abbreviation for Underwriters  
Laboratories.  
80%  
Abbreviation for upper memory blocks.  
See also conventional memory, HMA,  
memory manager, and upper memory  
area.  
WH[WꢀPRGH  
See video mode.  
7)7  
Abbreviation for thin film transistor. A flat-  
panel display for notebook computers  
where each pixel is controlled by one to  
four transistors.  
XSSHUꢀPHPRU\ꢀDUHD  
The 384 KB of RAM located between  
640 KB and 1 MB. If the computer has an  
Intel386 or higher microprocessor, a soft-  
memory manager  
ware utility called a  
can  
WSL  
Abbreviation for tracks per inch.  
create UMBs in the upper memory area, in  
which you can load device drivers and  
memory-resident programs. See also  
conventional memory, HMA, and memo-  
ry manager.  
WUDS  
An alert, error, or system message from  
a server reporting an exception (for exam-  
ple, a device failure or a threshold  
violation) in a server.  
836  
Abbreviation for uninterruptible power  
supply. A battery-powered unit that  
automatically supplies power to your  
computer in the event of an electrical  
failure.  
765  
Abbreviation for terminate-and-stay-  
resident. A TSR program runs “in the  
background.” Most TSR programs imple-  
ment a predefined key combination  
(sometimes referred to as a “hot key”)  
that allows you to activate the TSR pro-  
gram’s interface while running another  
MS-DOS program. When you finish using  
the TSR program, you can return to the  
other application program and leave the  
TSR program resident in memory for later  
use.  
862&  
Abbreviation for Universal Service Order-  
ing Code.  
XWLOLW\  
A program used to manage system re-  
sources— memory, disk drives, or  
printers, for example. The diskcopy com-  
mand for duplicating diskettes and the  
himem.sys device driver for managing ex-  
tended memory are utilities included in  
MS-DOS.  
Because MS-DOS is not designed to  
support multiple programs running simul-  
taneously, TSR programs can sometimes  
cause memory conflicts. When trouble-  
shooting, rule out the possibility of such a  
conflict by rebooting your computer with-  
out starting any TSR programs.  
9
Abbreviation for volt(s).  
9$&  
Abbreviation for volt(s) alternating  
current.  
8'$  
Acronym for user-defined attribute.  
8'3  
Abbreviation for User Datagram Protocol.  
Glossary  
17  
9&&,  
AbbreviationforVoluntaryControlCouncil  
for Interference.  
application programs and operating envi-  
ronments in a variety of video modes.  
On most current Dell computers, a video  
adapter is integrated into the system  
board. Also available are many video  
adapter cards that plug into an expansion-  
card connector.  
9'&  
Abbreviation for volt(s) direct current.  
9'(  
Abbreviation for  
Elektrotechniker  
Verband Deutscher  
Video adapters can include memory sep-  
aratefromRAMonthesystemboard. The  
amount of video memory, along with the  
adapter’s video drivers, may affect the  
number of colors that can be simulta-  
neously displayed. Video adapters can  
also include their own coprocessor chip  
for faster graphics rendering.  
.
9'6  
Abbreviation for Virtual Direct Memory  
Access Services.  
9(6$  
Acronym for Video Electronics Standards  
Association.  
YLGHRꢀGULYHU  
Graphics-mode application programs and  
operating environments, such as Win-  
dows, often require video drivers in order  
to display at a chosen resolution with the  
desired number of colors. A program may  
include some “generic” video drivers.  
Any additional video drivers may need to  
match the video adapter; you can find  
these drivers on a separate diskette with  
your computer or video adapter.  
9*$  
Abbreviationforvideographicsarray.VGA  
and SVGA are video standards for video  
adapters with greater resolution and color  
display capabilities than EGA and CGA,  
the previous standards.  
To display a program at a specific resolu-  
tion, you must install the appropriate  
video drivers and your monitor must sup-  
port the resolution. Similarly, the number  
of colors that a program can display de-  
pends on the capabilities of the monitor,  
the video driver, and the amount of mem-  
ory installed for the video adapter.  
YLGHRꢀPHPRU\  
Most VGA and SVGA video adapters in-  
clude VRAM or DRAM memory chips in  
addition to your computer’s RAM. The  
amount of video memory installed prima-  
rily influences the number of colors that a  
program can display (with the appropriate  
video drivers and monitor capability).  
9*$ꢀIHDWXUHꢀFRQQHFWRU  
On some systems with a built-in VGA  
video adapter, a VGA feature connector  
allows you to add an enhancement adapt-  
er, such as a video accelerator, to your  
computer. A VGA feature connector can  
YLGHRꢀPRGH  
Video adapters normally support multiple  
text and graphics display modes. Charac-  
ter-based software (such as MS-DOS)  
displaysintextmodesthatcanbedefined  
VGA pass-through  
also be called a  
connector  
.
x
y
as columnsby rowsofcharacters.Graph-  
ics-based software (such as Windows)  
displays in graphics modes that can be de-  
YLGHRꢀDGDSWHU  
The logical circuitry that provides—in  
combination with the monitor or display—  
your computer’s video capabilities. A  
video adapter may support more or fewer  
features than a specific monitor offers.  
Typically, a video adapter comes with  
video drivers for displaying popular  
x
y
z
fined as horizontal by vertical pixels by  
colors.  
YLGHRꢀUHVROXWLRQ  
Video resolution—640 x 480, for exam-  
ple—isexpressedasthenumberofpixels  
across by the number of pixels up and  
down. To display a program at a specific  
18  
Dell PowerVault 720N, 740N, and 760N User’s Guide  
graphics resolution, you must install the  
appropriate video drivers and your moni-  
tor must support the resolution.  
9/ꢁ%XVŒ  
An abbreviation for VESA local bus. A  
standard for local bus implementation de-  
veloped by the Video Electronics  
Standards Association.  
YLHZHU  
A system running the remote control  
viewer window, usually the console.  
9/6,  
Abbreviation for very-large-scale  
integration.  
YLUWXDOꢀꢉꢋꢉꢇꢀPRGH  
An operatingmodesupported by Intel386  
or higher microprocessors, virtual 8086  
mode allows operating environments—  
such as Windows—to run multiple pro-  
grams in separate 1-MB sections of  
memory. Each 1-MB section is called a  
9SS  
Abbreviation for peak-point voltage.  
95$0  
Abbreviation for video random-access  
memory.SomevideoadaptersuseVRAM  
chips (or a combination of VRAM and  
DRAM) to improve video performance.  
VRAM is dual-ported, allowing the video  
adapter to update the screen and receive  
new image data at the same time.  
virtual machine  
.
YLUWXDOꢀPHPRU\  
A method for increasing addressable  
RAM by using the hard-disk drive.  
(MS-DOS does not support true virtual  
memory, which must be implemented at  
the operating system level.) For example,  
in a computer with 8 MB of RAM and  
16 MB of virtual memory set up on the  
hard-disk drive, the operating system  
would manage the system as though it  
had 24 MB of physical RAM.  
:
Abbreviation for watt(s).  
ZLQꢃLQLꢀILOH  
When you start Windows, it consults the  
win.ini file to determine a variety of options  
for the Windows operating environment.  
Among otherthings, thewin.ini file records  
what printer(s) and fonts are installed for  
Windows. The win.ini file also usually  
includes sections that contain optional set-  
tingsforWindowsapplicationprogramsthat  
are installed on the hard-disk drive.  
YLUXV  
A self-starting program designed to incon-  
venience you. Virus programs have been  
known to corrupt the files stored on a  
hard-disk drive or to replicate themselves  
until a system or network runs out of  
memory.  
Running the Control Panel or Windows  
Setup program may change optionsinthe  
win.ini file. On other occasions, you may  
needtochangeoraddoptionstothewin.ini  
file manually with a text editor, such as  
Notepad.  
The most common way that virus pro-  
grams move from one system to another  
is via “infected” diskettes, from which  
they copy themselves to the hard-disk  
drive. To guard against virus programs,  
you should do the following:  
ZRUNJURXS  
Periodically run a virus-checking util-  
ity on your computers hard-disk  
drive  
A collection of computers running Mi-  
crosoft Windows NT or Windows for  
Workgroups™ operating systems that is  
grouped for browsing and sharing.  
Always run a virus-checking utility on  
any diskettes (including commer-  
cially sold software) before using  
them  
ZULWHꢁSURWHFWHG  
Read-only files are said to be  
write-  
protected  
. You can write-protect a 3.5-inch  
diskettebyslidingitswrite-protecttabtothe  
open position and a 5.25-inch diskette by  
Glossary  
19  
placing an adhesive label over its write-  
protect notch.  
;06  
Abbreviation for eXtended Memory Spec-  
ification. See also EMS, extended  
memory, and memory manager.  
:::  
Abbreviation for World Wide Web.  
=,)  
;00  
Acronym for zero insertion force. Some  
computers use ZIF sockets and connec-  
tors to allow devices such as the  
microprocessor chip to be installed or  
removed with no stress applied to  
the device.  
Abbreviation for extended memory man-  
ager, a utility that allows application  
programs and operating environments to  
useextendedmemoryinaccordancewith  
theXMS.Seealsoconventionalmemory,  
EMM, expanded memory, extended  
memory, and memory manager.  
20  
Dell PowerVault 720N, 740N, and 760N User’s Guide  
,QGH[  
$
Antartica, time zone names for, D-2  
Asia, time zone names for, D-2  
Atlantic, time zone names for, D-3  
Canada, time zone names for, D-3  
caution message, xviii  
CE notice for European Union, E-4  
CIFS client configuration  
authenticating users  
using passwd and group files, 7-1  
with Windows NT domain controller,  
7-1  
CIFS shares  
access  
assigning rights, 8-1  
without Windows NT domain  
%
Setup Wizard, 2-1  
booting from, B-1  
creating on a UNIX client, B-6  
creating on a Windows client, B-6  
configuring clients to access filer  
CIFS, 9-1  
NFS, 9-1  
Brazil, time zones for, D-3  
BSMI notice for Taiwan, E-10  
Index  
1
 
FilerView  
accessing, 5-1  
'
Data ONTAP  
administering the filer, 5-1  
overview, 5-1  
prerequisites, 5-1  
installing, overview, B-1  
Setup Wizard, 3-2  
GMT, time zone names for, D-4  
domain  
features, C-2  
Windows NT or Windows Workgroup,  
C-1  
accessing from  
adding entries  
from UNIX/NFS, 7-6  
Windows 9x, 7-6  
drives  
(
See  
electrostatic discharge.  
ESD  
EN 55022 compliance for Czech  
ESD, xi  
HTTP  
Etc, time zone names for, D-4  
Europe, time zone names for, D-4  
)
DHCP, 3-1  
filer  
filer software  
CD and diskettes, 1-2  
installing Data ONTAP, B-1  
updates, 1-2  
.
filer, features, 1-1  
key combinations, xvii  
2
Dell PowerVault 720N, 740N, and 760N User’s Guide  
setting up, 7-1  
0
permissions  
Mexico, time zone names for, D-5  
MIB, Dell custom, 1-2  
PC-style, C-3  
ping command, 4-4  
microprocessor specifications, A-1  
MOC notice for South Korea, E-6  
Polish notice, E-7  
ports and connectors specifications, A-2  
1
network connections  
regulatory notices, E-1  
return policy  
U.S. and Canada, F-5  
filer directories, 9-4  
name resolution, DNS or NIS, 9-3  
overview, 9-3  
safety instructions  
NOM information for Mexico, E-9  
notational conventions, xvii  
SecureShare Access, 10-1  
SecureShare Account Migrator, 10-2  
3
Pacific, time zone names for, D-5  
passwd file  
setup command, 4-4  
overview, 4-1  
SecureShare, installing, 10-1  
adding entries from a UNIX client, 7-5  
adding entries from a Windows/NFS  
client, 7-6  
Setup Wizard  
basic configuration, 3-1  
DHCP server  
adding entries, overview, 7-4  
default, 7-2  
filer with, 3-2  
location, 7-1  
filer without, 3-4  
Index  
3
different from setup command, 2-1  
how to use, 3-2  
IP address, 3-1  
static, 3-2  
overview, 2-1  
verifying network connections, 3-5, 4-4  
Canada, F-3  
software  
configuring clients to access, 9-1  
specifications, of the filer, A-1  
CIFS configuration, C-1  
Windows Workgroup  
CIFS configuration, C-1  
definition, C-2  
7
technical specifications, A-1  
terminology conventions, xvii  
year 2000 compliance, F-6  
8
United States, time zone names for, D-6  
4
Dell PowerVault 720N, 740N, and 760N User’s Guide  

Mr Coffee ECM9 User Manual
Motorola V191 User Manual
Motorola MOTORAZR2 V9m User Manual
Motorola FLIPOUT 68004121004 User Manual
Kenwood eXcelon KDC X889 User Manual
IBM POWERPC 750GL User Manual
Fetco Home Decor Coffeemaker CBS 2032E User Manual
Bunn IMIX 5S+ User Manual
Black &amp; Decker UCM200WG User Manual
AMCC 3WARE 9550SX User Manual