Chapter 5 Operation Procedures
III-12
5
5
5
.
.
.
4
4
4
.
.
.
7
7
7
S
S
S
t
t
t
a
a
a
r
r
r
t
t
t
i
i
i
n
n
n
g
g
g
t
t
t
h
h
h
e
e
e
A
A
A
c
c
c
c
c
c
e
e
e
s
s
s
s
s
s
C
C
C
o
o
o
n
n
n
t
t
t
r
r
r
o
o
o
l
l
l
Start the Access Control. Starting the Access Control activates its setting from the business server to the logical disk.
For specific procedures, refer to 10.4 "Starting the Access Control".
5
5
5
.
.
.
4
4
4
.
.
.
8
8
8
S
S
S
t
t
t
a
a
a
r
r
r
t
t
t
i
i
i
n
n
n
g
g
g
t
t
t
h
h
h
e
e
e
S
S
S
e
e
e
r
r
r
v
v
v
e
e
e
r
r
r
Start the business server connected to the disk array.