Quantum scalar i500 User Manual page 7

Hide thumbs Also See for scalar i500:
Table of Contents

Advertisement

Scalar i500 User's Guide
Configuring and Viewing the Media Security Log................................... 143
Viewing the Media Usage Log..................................................................... 144
About the Storage Networking License...................................................... 150
Configuring Control Path Failover.............................................................. 151
Basic Control Path Failover (BPF) ........................................................ 152
Multi-Control Path Failover (MCPF) ................................................... 152
Advance Control Path Failover (ACPF) .............................................. 153
Forcing Control Path Failover............................................................... 153
Configuring Data Path Failover................................................................... 156
Basic Data Path Failover ........................................................................ 157
Multi-Data Path Failover ....................................................................... 157
Advanced Data Path Failover (ADPF)................................................. 158
Enabling Data Path Failover ................................................................. 159
Forcing Data Path Failover.................................................................... 160
Configuring Host Access .............................................................................. 163
Registering a Host for Host Access ...................................................... 164
Enabling Tape Drives for Host Access ................................................ 165
Mapping a Host to Tape Drives and Partitions.................................. 166
Modifying a Host.................................................................................... 166
Deleting a Host........................................................................................ 167
KMIP-compliant Encryption Key Management........................................ 171
General Notes About Encryption on the Library............................... 171
About the EKM License ......................................................................... 172
Using EKM Path Diagnostics ................................................................ 187
188
Using Manual EKM Path Diagnostics ................................................. 189
Using Automatic EKM Path Diagnostics ............................................ 190
147
149
168
vii

Hide quick links:

Advertisement

Table of Contents
loading

Table of Contents