Introduction .............................................................................................56
Deleting Volumes .....................................................................................74
Using RAID 0 .............................................................................................78
Backup Logs .............................................................................................87
Replication ..................................................................................... 90
Failover .......................................................................................... 95
Usage Restrictions ...................................................................................96
Configuring Failover ................................................................................97
3