Replication and Folders....................................................................................................................................................................................................141
Replication Seeding..............................................................................................................................................................................................................................142
Replica Details ........................................................................................................................................................................................................................................143
Replication Bandwidth Limits.........................................................................................................................................................................................................143
Set Overall Bandwidth Limits for Replication......................................................................................................................................................144
Remove Overall Bandwidth Limits for Replication...........................................................................................................................................144
Configure Bandwidth Limitations for a Replication Partner.......................................................................................................................144
Modify Per-Partner Replication Bandwidth Limits...........................................................................................................................................144
Security..........................................................................................................................................146
Role-Based Access Control..............................................................................................................................................................................................................146
View User Information.......................................................................................................................................................................................................146
Add a User Account............................................................................................................................................................................................................146
Edit a User Account............................................................................................................................................................................................................147
Change Your Account Information............................................................................................................................................................................148
Change Your Account Password.................................................................................................................................................................................148
Reset a User Account Password..................................................................................................................................................................................149
Enable a User Account......................................................................................................................................................................................................149
Disable a User Account.....................................................................................................................................................................................................149
Remove a User Account...................................................................................................................................................................................................150
Permission Levels................................................................................................................................................................................................................150
Access Control with Active Directory........................................................................................................................................................................................156
View Information about the Active Directory Domain...................................................................................................................................157
Guidelines for Working with Arrays and Active Directory ..........................................................................................................................157
Join an Active Directory Domain.................................................................................................................................................................................158
Leave an Active Directory Domain............................................................................................................................................................................158
User Authentication and Logon..................................................................................................................................................................................158
Enable Active Directory Domain Authentication...............................................................................................................................................159
Disable Active Directory Domain Authentication.............................................................................................................................................159
Active Directory Groups...................................................................................................................................................................................................159
Troubleshooting the Active Directory.....................................................................................................................................................................161
CHAP Authentication..........................................................................................................................................................................................................................161
Create a CHAP Account...................................................................................................................................................................................................162
Assign a CHAP User to a Volume...............................................................................................................................................................................162
Modify a CHAP User...........................................................................................................................................................................................................162
Delete a CHAP User............................................................................................................................................................................................................162
Login Banner............................................................................................................................................................................................................................................162
Edit the Login Banner........................................................................................................................................................................................................163
Show the Login Banner.....................................................................................................................................................................................................163
Reset the Login Banner....................................................................................................................................................................................................164
Encryption of Data at Rest...............................................................................................................................................................................................................164
Enable Encryption................................................................................................................................................................................................................165
Secure Sockets Layer Certificates................................................................................................................................................................................................166
Create and Import a Custom Certificate or Certificate Signing Request.............................................................................................166
Contents 9