HP (Hewlett-Packard) D2D Laptop Docking Station User Manual


 
Contents
1 Introduction...............................................................................................6
Replication Manager Environment...............................................................................................6
Minimum Requirements..............................................................................................................6
Compatibility...........................................................................................................................7
2 Getting Started..........................................................................................8
Installing Replication Manager...................................................................................................8
Upgrading Replication Manager................................................................................................9
Launching and logging in to Replication Manager......................................................................10
Identifying regions of the interface............................................................................................12
Understanding administrator- and user-level permissions...............................................................12
3 Configuring the Replication Manager..........................................................14
Adding a device.....................................................................................................................14
Adding new users or administrators..........................................................................................15
Local authentication mechanism: adding new users or administrators .......................................15
LDAP authentication mechanism: adding new users or administrators .......................................15
Creating a new group.............................................................................................................16
4 Managing devices....................................................................................21
Viewing a group summary.......................................................................................................21
Filtering devices to appear.......................................................................................................21
Customizing columns to appear................................................................................................22
Viewing topology...................................................................................................................23
Viewing device details.............................................................................................................24
Viewing current issues.........................................................................................................25
Viewing virtual libraries......................................................................................................26
Viewing NAS Shares..........................................................................................................28
Viewing device statistics......................................................................................................30
Viewing device disk usage.............................................................................................31
Viewing the device deduplication ratio.............................................................................33
Viewing replication jobs.................................................................................................36
Managing removed devices.....................................................................................................39
5 Performing Administration procedures.........................................................41
Managing the Authentication Mechanism .................................................................................41
Changing from local to LDAP authentication..........................................................................41
Configuring LDAP authentication..........................................................................................42
Adding a new LDAP server.............................................................................................42
Modifying an LDAP server..............................................................................................42
Removing an LDAP server...............................................................................................43
Changing from LDAP to local authentication..........................................................................43
Performing Device Management tasks.......................................................................................43
Modifying a device polling interval or IP address...................................................................44
Removing a device.............................................................................................................44
Performing User Management tasks..........................................................................................45
Modifying user details .......................................................................................................45
Local authentication mechanism: modifying details for users or administrators.......................45
Contents 3