Pinnacle Systems ISIS - 5.0 Administrator’s Guide

Avid® ISIS
Administration Guide
Version 5.0
®
Legal Notices
Product specifications are subject to change without notice and do not represent a commitment on the part of Avid Technology, Inc.
Part of the software embedded in this product is gSOAP software.
Portions created by gSOAP are Copyright (C) 2001-2004 Robert A. van Engelen, Genivia inc. All Rights Reserved.
THE SOFTWARE IN THIS PRODUCT WAS IN PART PROVIDED BY GENIVIA INC AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHOR BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
This document is protected under copyright law. An authorized licensee of Avid ISIS 7000 may reproduce this publication for the licensee’s own use in learning how to use the software. This document may not be reproduced or distributed, in whole or in part, for commercial purposes, such as selling copies of this document or providing support or educational services to others. This document is supplied as a guide for Avid ISIS 7000. Reasonable care has been taken in preparing the information it contains. However, this document may contain omissions, technical inaccuracies, or typographical errors. Avid Technology, Inc. does not accept responsibility of any kind for customers’ losses due to the use of this document. Product specifications are subject to change without notice.
Copyright © 2015 Avid Technology, Inc. and its licensors. All rights reserved.
The following disclaimer is required by Sam Leffler and Silicon Graphics, Inc. for the use of their TIFF library:
Copyright © 1988–1997 Sam Leffler Copyright © 1991–1997 Silicon Graphics, Inc.
Permission to use, copy, modify, distribute, and sell this software [i.e., the TIFF library] and its documentation for any purpose is hereby granted without fee, provided that (i) the above copyright notices and this permission notice appear in all copies of the software and related documentation, and (ii) the names of Sam Leffler and Silicon Graphics may not be used in any adver tising or publicity relating to the software without the specific, prior written permission of Sam Leffler and Silicon Graphics.
THE SOFTWARE IS PROVIDED “AS-IS” AND WITHOUT WARRANTY OF ANY KIND, EXPRESS, IMPLIED OR OTHERWISE, INCLUDING WITHOUT LIMITATION, ANY WARRANTY OF MERCHANTABILITY OR FITNESS FOR A PARTICULAR PURPOSE.
IN NO EVENT SHALL SAM LEFFLER OR SILICON GRAPHICS BE LIABLE FOR ANY SPECIAL, INCIDENTAL, INDIRECT OR CONSEQUENTIAL DAMAGES OF ANY KIND, OR ANY DAMAGES WHATSOEVER RESULTING FROM LOSS OF USE, DATA OR PROFITS, WHETHER OR NOT ADVISED OF THE POSSIBILITY OF DAMAGE, AND ON ANY THEORY OF LIABILITY, ARISING OUT OF OR IN CONNECTION WITH THE USE OR PERFORMANCE OF THIS SOFTWARE.
The following disclaimer is required by the Independent JPEG Group:
This software is based in part on the work of the Independent JPEG Group.
This Software may contain components licensed under the following conditions:
Copyright (c) 1989 The Regents of the University of California. All rights reserved.
Redistribution and use in source and binary forms are permitted provided that the above copyright notice and this paragraph are duplicated in all such forms and that any documentation, advertising materials, and other materials related to such distribution and use acknowledge that the software was developed by the University of California, Berkeley. The name of the University may not be used to endorse or promote products derived from this software without specific prior written permission. THIS SOFTWARE IS PROVIDED ``AS IS'' AND WITHOUT ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, WITHOUT LIMITATION, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE.
Copyright (C) 1989, 1991 by Jef Poskanzer.
Permission to use, copy, modify, and distribute this software and its documentation for any purpose and without fee is hereby granted, provided that the above copyright notice appear in all copies and that both that copyright notice and this permission notice appear in supporting documentation. This software is provided "as is" without express or implied warranty.
Copyright 1995, Trinity College Computing Center. Written by David Chappell.
Permission to use, copy, modify, and distribute this software and its documentation for any purpose and without fee is hereby granted, provided that the above copyright notice appear in all copies and that both that copyright notice and this permission notice appear in supporting documentation. This software is provided "as is" without express or implied warranty.
Copyright 1996 Daniel Dardailler.
Permission to use, copy, modify, distribute, and sell this software for any purpose is hereby granted without fee, provided that the above copyright notice appear in all copies and that both that copyright notice and this permission notice appear in supporting documentation, and that the name of Daniel Dardailler not be used in advertising or publicity pertaining to distribution of the software without specific, written prior permission. Daniel Dardailler makes no representations about the suitability of this software for any purpose. It is provided "as is" without express or implied warranty.
Modifications Copyright 1999 Matt Koss, under the same license as above.
Copyright (c) 1991 by AT&T.
Permission to use, copy, modify, and distribute this software for any purpose without fee is hereby granted, provided that this entire notice is included in all copies of any software which is or includes a copy or modification of this software and in all copies of the supporting documentation for such software.
2
THIS SOFTWARE IS BEING PROVIDED "AS IS", WITHOUT ANY EXPRESS OR IMPLIED WARRANTY. IN PARTICULAR, NEITHER THE AUTHOR NOR AT&T MAKES ANY REPRESENTATION OR WARRANTY OF ANY KIND CONCERNING THE MERCHANTABILITY OF THIS SOFTWARE OR ITS FITNESS FOR ANY PARTICULAR PURPOSE.
This product includes software developed by the University of California, Berkeley and its contributors.
The following disclaimer is required by Paradigm Matrix:
Portions of this software licensed from Paradigm Matrix.
The following disclaimer is required by Ray Sauers Associates, Inc.:
“Install-It” is licensed from Ray Sauers Associates, Inc. End-User is prohibited from taking any action to derive a source code equivalent of “Install-It,” including by reverse assembly or reverse compilation, Ray Sauers Associates, Inc. shall in no event be liable for any damages resulting from reseller’s failure to perform reseller’s obligation; or any damages arising from use or operation of reseller’s products or the software; or any other damages, including but not limited to, incidental, direct, indirect, special or consequential Damages including lost profits, or damages resulting from loss of use or inability to use reseller’s products or the software for any reason including copyright or patent infringement, or lost data, even if Ray Sauers Associates has been advised, knew or should have known of the possibility of such damages.
The following disclaimer is required by Videomedia, Inc.:
“Videomedia, Inc. makes no warranties whatsoever, either express or implied, regarding this product, including warranties with respect to its merchantability or its fitness for any particular purpose.”
“This software contains V-LAN ver. 3.0 Command Protocols which communicate with V-LAN ver. 3.0 products developed by Videomedia, Inc. and V-LAN ver.
3.0 compatible products developed by third parties under license from Videomedia, Inc. Use of this software will allow “frame accurate” editing control of applicable videotape recorder decks, videodisc recorders/players and the like.”
The following disclaimer is required by Altura Software, Inc. for the use of its Mac2Win software and Sample Source Code:
©1993–1998 Altura Software, Inc.
The following disclaimer is required by Interplay Entertainment Corp.:
The “Interplay” name is used with the permission of Interplay Entertainment Corp., which bears no responsibility for Avid products.
This product includes portions of the Alloy Look & Feel software from Incors GmbH.
This product includes software developed by the Apache Software Foundation (http://www.apache.org/).
© De
velopMentor
This product may include the JCifs library, for which the following notice applies:
JCifs © Copyright 2004, The JCIFS Project, is licensed under LGPL (http://jcifs.samba.org/). See the LGPL.txt file in the Third Party Software directory on the installation CD.
Avid Interplay contains components licensed from LavanTech. These components may only be used as part of and in connection with Avid Interplay.
Attn. Government User(s). Restricted Rights Legend
U.S. GOVERNMENT RESTRICTED RIGHTS. This Software and its documentation are “commercial computer software” or “commercial computer software documentation.” In the event that such Software or documentation is acquired by or on behalf of a unit or agency of the U.S. Government, all rights with respect to this Software and documentation are subject to the terms of the License Agreement, pursuant to FAR §12.212(a) and/or DFARS §227.7202-1(a), as applicable.
Trademarks
003, 192 Digital I/O, 192 I/O, 96 I/O, 96i I/O, Adrenaline, AirSpeed, ALEX, Alienbrain, AME, AniMatte, Archive, Archive II, Assistant Station, AudioPages, AudioStation, AutoLoop, AutoSync, Avid, Avid Active, Avid Advanced Response, Avid DNA, Avid DNxcel, Avid DNxHD, Avid DS Assist Station, Avid Ignite, Avid Liquid, Avid Media Engine, Avid Media Processor, Avid MEDIArray, Avid Mojo, Avid Remote Response, Avid Unity, Avid Unity ISIS, Avid VideoRAID, AvidRAID, AvidShare, AVIDstripe, AVX, Beat Detective, Beauty Without The Bandwidth, Beyond Reality, BF Essentials, Bomb Factory, Bruno, C|24, CaptureManager, ChromaCurve, ChromaWheel, Cineractive Engine, Cineractive Player, Cineractive Viewer, Color Conductor, Command|24, Command|8, Control|24, Cosmonaut Voice, CountDown, d2, d3, DAE, D-Command, D-Control, Deko, DekoCast, D-Fi, D-fx, Digi 002, Digi 003, DigiBase, Digidesign, Digidesign Audio Engine, Digidesign Development Partners, Digidesign Intelligent Noise Reduction, Digidesign TDM Bus, DigiLink, DigiMeter, DigiPanner, DigiProNet, DigiRack, DigiSerial, DigiSnake, DigiSystem, Digital Choreography, Digital Nonlinear Accelerator, DigiTest, DigiTranslator, DigiWear, DINR, DNxchange, Do More, DPP-1, D-Show, DSP Manager, DS-StorageCalc, DV Toolkit, DVD Complete, D-Verb, Eleven, EM, Euphonix, EUCON, EveryPhase, Expander, ExpertRender, Fader Pack, Fairchild, FastBreak, Fast Track, Film Cutter, FilmScribe, Flexevent, FluidMotion, Frame Chase, FXDeko, HD Core, HD Process, HDpack, Home-to-Hollywood, HYBRID, HyperSPACE, HyperSPACE HDCAM, iKnowledge, Image Independence, Impact, Improv, iNEWS, iNEWS Assign, iNEWS ControlAir, InGame, Instantwrite, Instinct, Intelligent Content Management, Intelligent Digital Actor Technology, IntelliRender, Intelli-Sat, Intelli-sat Broadcasting Recording Manager, InterFX, Interplay, inTONE, Intraframe, iS Expander, iS9, iS18, iS23, iS36, ISIS, IsoSync, LaunchPad, LeaderPlus, LFX, Lightning, Link & Sync, ListSync, LKT-200, Lo-Fi, MachineControl, Magic Mask, Make Anything Hollywood, make manage move | media, Marquee, MassivePack, Massive Pack Pro, Maxim, Mbox, Media Composer, MediaFlow, MediaLog, MediaMix, Media Reader, Media Recorder, MEDIArray, MediaServer, MediaShare, MetaFuze, MetaSync, MIDI I/O, Mix Rack, Moviestar, MultiShell, NaturalMatch, NewsCutter, NewsView, NewsVision, Nitris, NL3D, NLP, NSDOS, NSWIN, OMF, OMF Interchange, OMM, OnDVD, Open Media Framework, Open Media Management, Painterly Effects, Palladium, Personal Q, PET, Podcast Factory, PowerSwap, PRE, ProControl, ProEncode, Profiler, Pro Tools, Pro Tools|HD, Pro Tools LE, Pro Tools M-Powered, Pro Transfer, QuickPunch, QuietDrive, Realtime Motion Synthesis, Recti-Fi, Reel Tape Delay, Reel Tape Flanger, Reel Tape Saturation, Reprise, Res Rocket Surfer, Reso, RetroLoop, Reverb One, ReVibe, Revolution, rS9, rS18, RTAS, Salesview, Sci-Fi, Scorch, ScriptSync, SecureProductionEnvironment, Serv|GT, Serv|LT, Shape-to-Shape, ShuttleCase, Sibelius, SimulPlay, SimulRecord, Slightly Rude Compressor, Smack!, Soft SampleCell, Soft-Clip Limiter, SoundReplacer, SPACE, SPACEShift, SpectraGraph, SpectraMatte, SteadyGlide, Streamfactory, Streamgenie, StreamRAID, SubCap, Sundance, Sundance Digital, SurroundScope, Symphony, SYNC HD, SYNC I/O, Synchronic, SynchroScope, Syntax, TDM FlexCable, TechFlix, Tel-Ray, Thunder, TimeLiner, Titansync, Titan, TL Aggro, TL AutoPan, TL Drum Rehab, TL Everyphase, TL Fauxlder, TL In Tune, TL MasterMeter, TL Metro, TL Space, TL Utilities, tools for storytellers, Transit, TransJammer, Trillium Lane Labs, TruTouch, UnityRAID, Vari-Fi, Video the Web Way, VideoRAID, VideoSPACE, VTEM, Work-N-Play, Xdeck, X-Form, Xmon and XPAND! are either registered trademarks or trademarks of Avid Technology, Inc. in the United States and/or other countries.
3
Apple, Macintosh, and Safari are either registered trademarks or trademarks of Apple Computer, Inc., registered in the U.S. and other countries. HP is a registered trademark of Hewlett-Packard Company. Intel is a registered trademark of Intel Corporation. Java is a trademark of Sun Microsystems in the United States and/or other countries. Kingston is a registered trademarks of Kingston Technology Corporation. All other marks may be the property of their respective titleholders. Windows is either a registered trademark or trademark of Microsoft Corporation in the United States and/or other countries. All other trademarks contained herein are the property of their respective owners.
Avid ISIS Administration Guide • Created 8/14/15 • This document is distributed by Avid in online (electronic) form only, and is not available for purchase in printed form.
4

Contents

Using This Guide. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 10
Who Should Use This Guide. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 10
Symbols and Conventions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 10
If You Need Help. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 11
Accessing the Online Documentation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 11
Avid Training Services . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 11
Chapter 1 Working with the Management Console . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 12
Opening the Management Console . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 12
Understanding the Management Console Interface . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 13
System Status Console . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 14
System Status Console Panels . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 14
Navigation Toolbar . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 16
Main Tools Panel . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 16
Accessing Help. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 18
Session Counter. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 18
Customizing the Management Console Display . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 18
Moving Columns. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 18
Showing and Hiding Columns . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 19
Sorting Information . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 19
Filtering the Display. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 20
Updating Information. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 20
Selecting Items . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 21
Using Context Menus to Perform Actions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 21
Entering Text. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 22
Management Console Preferences. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 23
Configuring Management Console Preferences . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 24
Chapter 2 Configuring the System . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 25
Creating the ISIS File System . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 25
Binding the Media Packs to the File System. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 26
Configuring External Authentication of Users . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 26
Receiving Notification of System Problems . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 27
Configuring the Notification Service . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 28
Filtering the Error Notification Parameters . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 29
Adding Contact and Email Address Information. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 29
5
Changing the Administrator Password . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 30
Securing an ISIS Infrastructure . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 31
Changing the BMC Password . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 31
Chapter 3 Managing Storage Groups and Workspaces . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 35
Managing Storage Groups . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 35
Storage Groups List . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 36
Creating a Storage Group . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 37
Removing Media Packs from Storage Groups . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 38
Displaying Storage Group and Media Packs Details . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 38
Deleting Storage Groups . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 38
Managing Workspaces . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 39
Workspaces List . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 40
Displaying Workspace Details . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 40
Workspace Considerations . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 41
Creating a Workspace . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 41
Duplicating a Workspace . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 42
Renaming a Workspace . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 43
Resizing a Workspace . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 43
Using the Workspace Size Graph . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 44
Setting Event Triggers for a Workspace. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 45
Deleting a Workspace . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 45
Managing User Access Privileges for Workspaces. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 46
Setting or Changing Workspace Access Privileges . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 47
Chapter 4 Managing Clients. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 48
Managing Users . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 48
Users List . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 49
User Details Panel . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 50
Creating Users . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 51
Duplicating Users . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 51
Changing User Details . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 52
Deleting Users . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 52
Disabling Users . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 53
Displaying User Details . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 53
Managing LDAP Accounts . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 53
Installing the LDAP Sync Tool . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 54
Opening the LDAP Sync Tool . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 54
Using the LDAP Sync Tool. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 55
Changing the Account Synchronizer Display . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 56
Synchronizing LDAP and ISIS Accounts. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 56
Importing LDAP Users with Incorrectly Formatted LDAP UIDs . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 59
6
Disconnecting and Reconnecting the LDAP Servers . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 59
Managing Groups . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 60
Adding User Groups. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 62
Modifying User Group Details . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 62
Deleting User Groups. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 63
Displaying User Group Details . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 63
Managing Bandwidth Limits . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 64
Bandwidth Limits Panel . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 64
Displaying Bandwidth Limits Details. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 65
Adding a Bandwidth Limit Entry . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 65
Changing a Bandwidth Limit Entry . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 65
Deleting a Bandwidth Limit Entry . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 66
Chapter 5 Managing Avid ISIS 1000 Hardware. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 67
Managing Engines . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 67
Engine List . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 67
Displaying Engine Details. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 67
Engine Status. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 68
Upgrading an Engine . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 68
Removing Engines from the Engine List . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 69
Managing Storage Controllers . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 70
Storage Controllers List . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 70
Storage Controller Details . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 70
Upgrading a Storage Controller . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 71
Managing Media Packs. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 71
Media Packs List . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 72
Displaying Media Pack Details . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 73
Media Pack Status . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 74
Disk Status . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 74
Unbinding Media Packs from the ISIS File System . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 75
Clearing Network Degraded Status Messages . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 75
Removing Orphaned Media Packs. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 76
Cleaning Up Files (Manually Rectifying Files) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 76
Management Console Error Messages. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 77
Foreign Disk Error . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 77
Chapter 6 Managing Connections. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 78
Monitoring Client Bandwidth . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 78
Client Bandwidth List . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 79
Scaling the Bandwidth List Graph Display . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 79
Monitoring System Connection Status . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 79
Connection Status Descriptions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 80
7
Displaying Client Bandwidth Reservations . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 81
Chapter 7 System Monitoring and Diagnostics . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 82
Hardware Monitoring Service . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 82
System Status History. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 83
Network Utilities . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 84
System Director Information . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 84
System Logs . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 84
Displaying or Clearing the System Logs Page. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 85
Administration Logs. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 85
Using the Administration Logs . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 85
ISIS Snapshots Page . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 86
Creating, Displaying, and Deleting Snapshots . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 86
Working with Snapshot Archives . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 87
Avid ISIS Toolbox . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 88
Installing the Avid ISIS Toolbox . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 88
Connection Analyzer Tool . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 88
Log Aggregator Tool. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 90
Using the Log Aggregator Tool . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 91
Creating Aggregate Logs. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 92
Displaying Aggregate Logs . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 93
Disk Analyzer Tool . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 93
Opening the Disk Analyzer Tool . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 93
Updating the Disk Analyzer Tool Display . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 94
Running Disk Analyzer Tool Tests . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 94
Saving Disk Analyzer Test Results . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 95
Media Pack Parameters Tool . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 95
Using the Media Pack Parameters . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 96
Retrieving Media Pack Flag Parameters . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 97
Media Pack Log Viewer . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 98
Creating a Metadata Dump File . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 99
Restoring the File System--SUPPORT USE ONLY . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 100
Agent Settings. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 101
Appendix A Avid ISIS Agent . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 102
Opening the ISIS Agent . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 102
Understanding the Agent Interface . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 102
System Tab . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 103
Statistics Tab . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 103
Tools Tab . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 104
Logging Tab . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 104
Advanced Tab . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 104
8
Changing the Storage System Name . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 104
Changing the Host Name . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 105
Changing the Enclosure ID . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 105
Configuring DNS Service . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 105
Setting the System Time . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 106
Changing the Agent Password . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 106
Shutting Down the System . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 107
Restarting the System. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 107
Index . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 108
9

Using This Guide

The Avid® ISIS® media network provides a high-performance distributed file system that contains high-capacity shared media storage for workgroups of connected Avid editing workstations. This user’s guide describes how to connect your client system to the media network, mount workspaces, and configure your system for best performance.
Unless noted otherwise, the material in this document applies to the Windows systems.The majority of screen shots in this document were captured on a Windows system, but the information applies to all operating systems. Where differences exist, information on the differences is provided.
The documentation describes the features and hardware of all models. Your system might not contain certain features and hardware that are covered in this guide.

Who Should Use This Guide

This guide is intended for users who need to manage the Avid ISIS media network. You should have a basic understanding of how to use and manage the Windows operating system or the Mac OS X systems, and you should be familiar with basic workgroup and network concepts.
®
, Mac OS® X, and Linux operating

Symbols and Conventions

Avid documentation uses the following symbols and conventions:
Symbol or Convention Meaning or Action
n
c
w
> This symbol indicates menu commands (and subcommands) in the order you select them. For
(Windows), (Macintosh), or (Linux)
Bold font Bold font is primarily used in task instructions to identify user interface items and keyboard
A note provides important related information, reminders, recommendations, and strong suggestions.
A caution means that a specific action you take could cause harm to your computer or cause you to lose data.
A warning describes an action that could cause you physical harm. Follow the guidelines in this document or on the unit itself when handling electrical equipment.
example, File > Import means to open the File menu and then select the Import command.
This symbol indicates a single-step procedure. Multiple arrows in a list indicate that you perform one of the actions listed.
This text indicates that the information applies only to the specified operating system, either Windows Macintosh OS X or Linux.
sequences.
Italic font Italic font is used to emphasize certain words and to indicate variables.
10
Symbol or Convention Meaning or Action

If You Need Help

Courier Bold font
Ctrl+key or mouse action Press and hold the first key while you press the last key or perform the mouse action. For
If You Need Help
If you are having trouble using your Avid product:
1. Retry the action, carefully following the instructions given for that task in this guide. It is especially important to check each step of your workflow.
2. Check the latest information that might have become available after the documentation was published.
New information is available in the ReadMe file supplied in your Avid software kit. Documentation is available as a PDF in the software kit and through the user interface.
Always check online for the most up-to-date release notes or ReadMe because the online version is updated whenever new information becomes available. To view the online versions, visit the Knowledge
Base at www.avid.com/support.
. Check the documentation that came with your Avid application or your hardware for maintenance or
3
hardware-related issues.
4. Visit the online Knowledge Base at www.avid.com/support. Online services are available 24 hours per day, 7
per week. Search this online Knowledge Base to find answers, to view error messages, to access
days troubleshooting tips, to download updates, and to read or join online message-board discussions.
Courier Bold font identifies text that you type.
example, Command+Option+C or Ctrl+drag.

Accessing the Online Documentation

The Avid online documentation contains all the product documentation in PDF format. You can access the documentation in the AvidISISDocumentation folder in the Avid installer kit. Download and install Acrobat Reader before you access the PDF documentation.

Avid Training Services

Avid makes lifelong learning, career advancement, and personal development easy and convenient. Avid understands that the knowledge you need to differentiate yourself is always changing, and Avid continually updates course content and offers new training delivery methods that accommodate your pressured and competitive work environment.
For information on courses/schedules, training centers, certifications, courseware, and books, please visit
.avid.com/support and follow the Training links, or call Avid Sales at 800-949-AVID (800-949-2843).
www
11

1 Working with the Management Console

The Management Console is the primary interface to the Avid ISIS system and allows you to perform administration functions.
When you access the Management Console, the Login page opens, and the site prompts you to supply a user name and password to log in. If you type the wrong password, an error message appears and the Login dialog box reappears.
When you first install the Avid ISIS 1000 software, the Administrator password is blank by default. To set an
n
administrator password, see “Changing the Administrator Password” on page 30.
Standard Avid ISIS 1000 client users can log in to the M Management Console interface. They can also see certain information about the network through the Client
Manager. For more information about the Client Manager, see the Avid ISIS 1000 Client Help. The Avid ISIS 1000 Client Manager Installation and User’s Guide is included in the Avid ISIS Documentation folder in the software kit.
anagement Console, but they will have limited access to the

Opening the Management Console

The Management Console runs within one of the following qualified web browsers:
Windows — Microsoft Internet Explorer, Mozilla Firefox
OS X — Safari, Mozilla Firefox, Google Chrome
To open the Management Console as Administrator:
1. Open your web browser and in the address bar enter either:
t the Storage System Name (if DNS is configured; see “Configuring DNS Service” on page 105)
e IP address of the System Director. (This is the IP address of the Storage Controller running the System
t th
Director; whether in a single- or multi-Engine configuration.)
The Login dialog box for the Management Console opens. The “Username” field is automatically populated with the Administrator user name.
2. Type your password.
For information on changing the administrator password, see “Changing the Administrator Password” on
30.
page
®
, Google® Chrome
Click Login (arrow icon), or press Enter.
3.
The Management Console Home page opens.
To log out of the Management Console:
t Click Logout in the upper right corner of the screen.
12

Understanding the Management Console Interface

Understanding the Management Console Interface
The Management Console, which you can access on the Engine or on any Ethernet-attached client, has a user interface where controls are grouped by function and are displayed by clicking the appropriate icons or text.
®
To use the Management Console, you must have Adobe
Flash® Player installed on your system.
Callout Description
1 System Status Console — Provides a snapshot view of several aspects of the Avid ISIS 1000 system. See “System
Status Console” on page 14.
2
3
4
5
6 System Identification — Displays the system model information, Storage System name, and version.
7 Session Counter — Displays how long the current session has been active. Counts down from 2 hours (2:00:00).
Navigation toolbar — Access Management Console tools and navigation. See “Navigation Toolbar” on page 16.
Main tools panel — Click to go to the respective tool pages. See “Main Tools Panel” on page 16.
Help link — provides links to various Avid ISIS 1000 online documents. See “Accessing Help” on page 18.
Logout link — Ends the Management Console session and logs you out of the system.
See “Session Counter” on page 18
13

System Status Console

The System Status Console, located on the left side of the Management Console, contains several components that give you a snapshot view of the system. These allow you to access additional information about your system and to perform certain administrative tasks, such as monitoring and logging.
Administrators can configure whether or not the System Status Console is visible on the login screen of the
n
Management Console. However, even if it is visible, you must log in to follow links from the tool bar screens (such as the log files).
In the following figure, the panels of the System Status Console are separated slightly for clarity.
Understanding the Management Console Interface
Callout Description
1 Current system status panel — LEDs for errors, warnings, info, and upgrade statuses will be lit to indicate the
presence of system events. Click a color to open the Status panel. See “System Status Console Panels” on page 14.
2
3 System Status History panel — Displays the system events that have occurred since the System Director was
4
5 System Status Console panels — Click the panel headings to display the system information panel. For more
Status retrieval panel — The Management Console periodically retrieves system status information. The panel displays the results and the time stamp of the retrieval operation.
started, along with the date and time of the first logged event. Clicking this panel opens the System Status History tool. For more information, see “System Status History” on page 83.
Storage capacity panel — Displays the total capacity of all bound Media Packs, capacity allocated to Workspaces, and the amount of capacity used by data.
information, see “System Status Console Panels” on page 14.

System Status Console Panels

The System Status Console contains several panels that provide information about different areas of Avid ISIS 1000 operation. Click a panel title to expand and collapse the panel.
14
Panel Name Description
Status Console Panel—Provides a quick summary of the System Director status. If an event in the
system log triggers a status to appear, a link is provided to the System Logs tool. For more information, see “Displaying or Clearing the System Logs Page” on page 85
Understanding the Management Console Interface
System Console Panel
Provides a summary of hardware, software, and networking information.
Performance Console Panel—Provides a summary of the number of messages per second,
number of open files, and the names of clients connected to the system.
Bandwidth Console Panel—Displays “Megabytes per second,” information on total and
per-client bandwidth.
15

Navigation Toolbar

The navigation toolbar provides several items to help you navigate through the Management Console interface.
Callout Description
1 Home link—You can click this link from any page to return to the Management Console Home screen
2 Current tool heading—Indicates the tool you are currently using
3 Related links section—Displays links to other Management Console tools relevant to the one you are currently
using

Main Tools Panel

Understanding the Management Console Interface
The Management Console main panel is divided into the following sections:
The System section, which contains the following tools:
Name Description
Workspaces Create, delete, duplicate, or change capacity of any Workspace and see all Workspace details;
see “Managing Workspaces” on page 39.
Users
Groups
Ba
ndwidth Limits Display and modify bandwidth for clients that are allowed to connect to the ISIS system; see
nstallers Download installers for ISIS Clients, ISIS software for the Engine, ISIS Tools, and Adobe
I
gines Display details for Engines, reported serial number, status, uptime and more information; see
En
Create, delete, duplicate, or change Workspace access for any User and see all User details; see “Managing Users” on page 48.
Create, duplicate, or change Workspace access for any User Group; modify User Group members; and display all User Group details; see “Managing Groups” on page 60.
“Managing Bandwidth Limits” on page 64 for more information.
Flash Player. For information on installing the ISIS Client software, see the Avid ISIS Client Manager
Installation and User’ s Guide. For information on the ISIS Tools, see “Avid ISIS Toolbox” on
p
age 88.
“Managing Engines” on page 67.
S
torage Controllers Display details, upgrade, and clear status for Storage Controllers in the Engine; see
“Managing Storage Controllers” on page 70.
Me
dia Packs Bind, unbind and see details for Media Packs; see “Managing Media Packs” on page 71.
torage Groups Create, delete, or modify Media Pack Media Packs of any Storage Group, and display Storage
S
Group details; see “Managing Storage Groups” on page 35.
16
Understanding the Management Console Interface
The Connect section, which contains the following tools:
Name Description
Connection Status Display any connected client; see “Monitoring System Connection Status” on page 79.
Client Bandwidth Display read and write bandwidth of any connected client; see “Monitoring Client
idth” on page 78.
Bandw
Re
servations Display any current bandwidth reservation; see “Displaying Client Bandwidth Reservations”
ge 81.
on pa
The Tools section, which contains the following tools:
Name Description
System Status History Display historical system status information; see “System Status History” on page 83.
Network Utilities Allows you to retrieve a detailed look at the connected network, or run a ping or traceroute;
see “Network Utilities” on page 84.
The Logging section, which contains the following tools:
Name Description
System Director Information
Syste
m Logs Display all system messages, info, warnings, and errors at the application, system, and
Administra
IS Snapshots Create a snapshot of the ISIS system for displaying or downloading; see “ISIS Snapshots
IS
tion Logs Display current and archived Management Console logs; see “Administration Logs” on
Displays System Director information: status and ISIS version, metadata, running processes, and Agent information, all on one screen; see “System Director Information” on page 84.
security levels; see “Displaying or Clearing the System Logs Page” on page 85.
85.
page
on page 86.
Page”
The Advanced section, which contains the following tools:
Name Description
Preferences Change and save bandwidth, LCT threshold, device creation, disk error threshold, and other
preferences; see “Configuring Management Console Preferences” on page 24.
ternal Authentication Configure external authentication servers; see “Configuring External Authentication of
Ex
ers” on page 26.
Us
Notification
Service Configure email notification on specific system events; see “Filtering the Error Notification
rameters” on page 29.
Pa
Agent Settings
System Setting
Administra
tor Password Change the Management Console Administrator password; see “Changing the Administrator
Modify agent configuration options and trace settings; see “Agent Settings” on page 101.
s Manage the Avid ISIS 1000 file system; see “Creating the ISIS File System” on page 25.
ssword” on page 30.
Pa
17

Accessing Help

The Help menu, located in the upper right-hand corner of the Management Console window, provides links to the complete set of Avid ISIS 1000 online PDF documents. PDF documents can open in an external application or browser, depending on your configuration.
To access the Help menu:
1. Move the mouse cursor over the Help menu text.
The Help pop-up menu opens.
2. (Option) Click the name of a document to open it.

Session Counter

The user session will time out automatically after two hours of inactivity, after which you must log in again to continue working. The session counter, located in the lower right corner of the Management Console, displays the time remaining in the user session.

Customizing the Management Console Display

The counter is automatically reset to two hours when you click a link or perform an action such as adding or deleting a Workspace. You can also reset the counter manually by clicking it.
If you enable Auto refresh on a tool screen you will not automatically be logged out after two hours, as long as you stay on the page where Auto refresh is enabled, or navigate between tools as described in “Updating Information”
n page 20. Clicking Home disables A
o
To manually reset the session counter:
t Click the session counter display.
The session timer is reset to two hours.
uto refresh, and the session counter functionality (automatic logout) resumes.
Customizing the Management Console Display
You can customize the Main display panel for any option by moving and hiding columns, and by sorting and filtering information.

Moving Columns

To move a column in the Main display panel:
t Click and drag any column to the position you want, and release the mouse button.
18
The column appears in the new position, and columns to the right are moved to make room.

Showing and Hiding Columns

When you open a Management Console tool (for example, the Storage Controllers tool), the Main display panel lists items in default columns. Depending on the option selected, there might be other headings available to see. You can select individual or multiple column headings to be displayed or hidden.
To show or hide columns:
t Select one of the options, right-click in the column heading row and select a heading you want to show or hide.
Displayed column headings are marked by a bullet symbol (•). You cannot hide the first column on the left of the Main display panel (usually the Name column).
Customizing the Management Console Display

Sorting Information

The ISIS Management Console interface allows you to sort information listed in the Main display panel, or in the Details panel. Sorting the information in columns arranges items in either numerical or alphabetical order. You can also perform a multilevel sort of the displayed information.
To sort information:
t Click the column heading for the column you want to sort.
The information is sorted in ascending order. To reverse the sort order, click the column heading again.
To perform a multilevel sort:
1. Click the column heading for the first column you want to sort.
The items in the column are sorted in ascending order.
2. Click an additional column.
The items in the second column are sorted in ascending order. The items in the first column maintain their sort order, but with a lower priority than the second sort.
3. (Option) Click multiple columns to add levels to the sort. To cancel a multilevel sort, click a column heading that has already been sorted.
19

Filtering the Display

You can limit the items listed in the Main display panel by setting Filter parameters at the bottom of the Management Console window. Filtering the display allows you to focus on only those items that you want to monitor. You can restore all items to the display by clearing the Filter parameters.
Callout Description
1 Category menu—Select the category to filter
2 “not” operator—Select to exclude items matching the filter rules from the search results
3 Condition menu—Select the filter condition
4 Search term field—Type the text or value to filter
Filtering the Display
5 Filter button—Perform the filter operation
6 Clear button—Clear the filter settings
7 Filter results counter—Displays the number of filtered results on the page, and in total
You cannot filter the display for Bandwidth, Connection Status, and Reservations (under the Connect heading).
To filter the display:
1. Select a category from the Category menu.
The Category menu lists all of the column headings available for the selected Command menu option.
2. (Option) Select “not” to exclude the items matching the filter rules from the search results.
3. Click the Condition menu and select the filter condition you want to use.
4. In the Filter text box, type the text or value you want to use to filter the display.
5. Click Filter.
The Main display panel updates to display the filtered results. The Filter panel displays the number of filtered items displayed and the total number of items available for display.
To restore all items to the display:
t Click Clear.
The Main display panel updates to display all items.

Updating Information

You can update onscreen information to reflect recent system changes by clicking Refresh. You can also use Auto
refresh to automatically refresh information at timed intervals, and prevent your session from timing out.
20
This setting persists between tools when you navigate between them using the Related Links. However, the
n
Auto-refresh setting reverts to the default (disabled) between browser sessions (if you close then reopen the management Console) and if you click Home and then back into the tools.
To enable Auto refresh:
t Select the check box next to the Refresh.
Auto refresh mode is enabled, and a message is displayed.
While Auto refresh mode is enabled, other functions such as add, delete, and details are not available.
n
To disable Auto refresh:
t Deselect the check box next to the Refresh.
Auto refresh mode is disabled, and the confirmation message closes.

Selecting Items

Selecting Items
You can select multiple items in most Management Console tool windows. The methods for selecting more than one item in a list are similar to those used in Windows Explorer or the Macintosh Finder.
The following table summarizes the methods for selecting items and performing actions.
To Select This Do This
One item Click the item.
Multiple, non-contiguous items Ctrl+click each item you want to select.
Multiple, contiguous items Click the first item, then Shift+click on the last item.

Using Context Menus to Perform Actions

Most Management Console tool windows offer context menus you can use to perform commands on selected items.
To access context menus within the Management Console:
t Right-click (Windows) or Ctrl+click (Macintosh) selected items.
21

Entering Text

Follow these guidelines when entering text in Management Console tool text fields:
Names can be a maximum of 31 ASCII characters in length.
Workspace names must use Unicode characters and cannot include a space.
Entering Text
Passwords can be a maximum of 15 ASCII characters in length.
Do not include a space in the name fields.
Do not use a period (.) as either the first or last character in the names you create.
Do not use the following characters in any name fields:
Character Name Character Name
^ Circumflex accent | Vertical line \ Backslash [ Left square bracket / Forward slash ] Right square bracket : Colon + Plus sign * Asterisk = Equals sign ? Question mark % Percent sign " Double quotation mark ; Semicolon < Less-than sign , Comma > Greater-than sign @ Commercial At symbol
The System Director does not support displaying regional language characters in the Management Console.
n
22

Management Console Preferences

The Preferences tool allows you to set parameters that customize the basic functionality of the ISIS system:
General Preferences—These control general system behaviors and are described in the following table.
Logging Preferences—These control what types of logs are collected and the severity and verbosity of the event being logged. These are not described here; do not change these unless instructed to do so by Avid Support.
General Preferences
Option Type Default Description
Management Console Preferences
Total System Bandwidth (MB/sec)
Default Bandwidth for Auto Cr (MB/sec)
Force Manual Device Creation
Default LCT Threshold (ms)*
Default Hard Disk Error Threshold*
eated Devices
text (numeric)
text (numeric)
check box Disabled If enabled, clients without an entry in the Bandwidth Limits list
text (numeric)
text (numeric)
1000 MB/sec Total reservation bandwidth allowed by the system, in MB/sec.
When this value has been reached, ISIS will no longer accept bandwidth reservations from clients.
This value does not represent the actual bandwidth
n
capabilities of the ISIS system. For more information about ISIS bandwidth capabilities, see the Avid ISIS v5.0 Documentation Knowledge Base..
0 (zero; unlimited bandwidth)
0 (zero; uses internal system default of 750ms)
0 (zero; uses internal system default of 25 errors)
Reservation bandwidth allowed for devices that are automatically created at connection time. Using the default value results in auto-created devices being granted unlimited bandwidth.
are not allowed to connect. You must manually create an entry for every client computer that is expected to connect to the ISIS system.
Defines the upper limit of the Long Command Time (LCT) value, above which the Storage Manager will report a Disk Degraded condition to the System Director. Using the value of zero sets the LCT threshold to the internal system default of 750ms.
Defines the upper limit for number of hard disk errors before the Storage Manager reports a Disk Failure condition to the System Director.
History Data Collection check box Enabled When enabled (default), collects system history data every hour,
which is displayed in the System Status History panel (see
“System Status History” on page 83. If disabled (for support use
only), the system stop retained.
Auto-Rectify check box Disabled Automatically reconciles the actual amount of used space and the
reported amount of used space on a system.Default value is disabled. Takes effect immediately with no restart required.
Show status prior to login check box Disabled When enabled, prevents anyone from seeing the Status Console
panel on the left side before they log in. Only administrators can change this setting. By default users can see the Status Console before logging in.
23
s collecting new data, but existing data is

Configuring Management Console Preferences

To configure Management Console Preferences:
1. From the Management Console home page, click Preferences, located in the Advanced section.
The Preferences tool opens.
2. Select your preferences.
3. (Option) To revert all options to the previously saved values, click Refresh.
4. Click Save Preferences to save your changes.
Management Console Preferences
24

2 Configuring the System

After you set up your ISIS 1000 system, you must create the ISIS file system, bind Media Packs to the file system, then create Storage Groups from the Media Packs. Within a Storage Group, you then create Workspaces that clients mount on their local systems to work on files (see “Managing Storage Groups and Workspaces” on page 35).
addition, you must create user accounts to allow clients to connect to the ISIS. You can create user accounts on
In the ISIS itself, or configure an LDAP server to authenticate users.
Finally, Avid strongly recommends setting up the notification service to send email to one or more accounts when a problem occurs.

Creating the ISIS File System

Creating the ISIS file system is the first step to making the storage space usable. You create the ISIS file system after installing the ISIS software on a new Engine, or to create a fresh file system for a new customer; for example, you run a rental shop and are reconfiguring the ISIS system between customers.
Creating a new file system permanently deletes the existing file system. All users, groups, Workspaces, Storage Groups and other objects are permanently deleted; all Media Packs are unbound; and all other settings, such as External Authentication and Notification Service, are undone and must be reconfigured after the new file system is created.
In addition, the Administrator password (if changed) reverts to the default (no password).
To create a new file system:
1. In the Management Console, click System Settings.
By default, the System Settings panel opens on the File System page.
2. Click Create Active File System.
3. Click Apply.
A confirmation screen appears, asking you to confirm the operation, which will destroy all existing data (if any) on the ISIS 1000 system, and create a new file system.
Confirmation Message to Create New File System
4. Click OK to continue.
25

Binding the Media Packs to the File System

The Results panel displays the message Working... Creating new file system, followed by the message Success... File System Created.
5. The system is now ready for you to bind the Media Packs, create Storage Groups and Workspaces, create users, and configure external authentication and Event Notification as required.
Binding the Media Packs to the File System
After you have created an active file system, bind the Media Packs to it. If you have more than one Engine in your configuration, the Media Packs for all Engines are listed on the Media Packs page.
To bind the Media Packs:
1. Click Media Packs in the Management Console.
2. Select one or more Media Packs in the list.
3. Click Bind.
4. Click Yes to confirm the request.
5. Click Refresh to see the status circle next to the Media Pack name change to green when complete. When the
Media Packs are bound, you can create Storage Groups. See “Managing Storage Groups and Workspaces” on
35.
page

Configuring External Authentication of Users

External authentication lets you add users to the ISIS system who are already configured as LDAP accounts in your environment. Users added to the ISIS system through the LDAP Sync Tool are automatically configured as remote LDAP users. When a remote LDAP user logs into the ISIS system, ISIS checks with an external LDAP server instead of the local ISIS user database to authenticate the user. Before remote LDAP users can access the ISIS system, you must configure the ISIS to use at least one, and up to three, external LDAP servers for authentication.
Configuring external authentication is optional, but recommended if you plan to have a large number of users. Otherwise you must create each user account individually; see “Managing Clients” on page 48. You can use external
uthentication in addition to creating user accounts on the ISIS. The system supports up to 5640 user accounts.
a
To use external authentication using LDAP, you must enable DNS. Specifically, the ISIS must be able to look up the LDAP server name and do a reverse lookup (resolving the IP address to a name, and vice versa). To enable DNS, see
“Configuring DNS Service” on page 105.
For more information on wor
king with LDAP users and groups, see “Managing LDAP Accounts” on page 53.
26

Receiving Notification of System Problems

To configure external authentication:
1. From the Management Console home page, click External Authentication.
The External Authentication tool opens.
2. Click the Enable check box to select it.
The Domain Name text box becomes active.
3. In the Domain Name text box, enter the domain name of the network to which the LDAP server belongs, including subdomain, if applicable.
A domain name has two parts, separated by a period or dot: for example, avid.com. The company name “avid” is
n
the assigned domain, and “com” is the top level domai n, or TLD. A subdomain is a smaller unit withi n the company assigned domain, such as americas.avid.com.
Use the format s
4. Click the check box to select Server 0.
The Address text box becomes active.
5. In the Address text box, enter the fully-qualified domain name of the LDAP server.
A fully qualified domain name (FQDN) consists of the hostname, subdomain name (if applicable), and the domain
n
name.
Use the format s
server1.americas.example.com
6. (Option) Repeat steps 3 – 5 (using the “Server 1” and “Server 2” check boxes) to configure additional backup LDAP servers, if applicable.
All of the LDAP servers must be mirrors, and reside on the same subdomain/domain.
n
7. When finished, click Submit.
The doma displayed in the Results area.
ubdomain.domain.tld; for example: americas.example.com
ervername.subdomain.domain.tld; for example:
in and LDAP server information is added to the ISIS database, and a confirmation message is
Receiving Notification of System Problems
The Notification Service tool lets you configure the ISIS system to notify you through email when problems occur. An error notification service regularly polls the System Event log and, if any errors are logged, sends a concise summary of those errors to one or more email accounts. Configuring notification is optional but strongly recommended.
The Notification Service tool window is divided into the following sections:
Configuration — Start and stop the Notification Service, and configure the Notification Service settings, described in the following table.
Option Type Description
SMTP Server text The IP address or host name of your SMTP server. SMTP Port text (numeric) The port number of your SMTP server. The default value (25) is appropriate
in most instances.
27
Option Type Description (Continued)
Poll Frequency (seconds) text (numeric) The frequency (in seconds) with which the error notification service checks
Email Address text The email address of the Avid ISIS administrator or other primary contact
Filters — Set and change the parameters that define when email notifications are sent to email recipients.
Contacts — Add and change email recipients.

Configuring the Notification Service

To configure the Notification Service:
1. From the Management Console home page, click Notification Service, in the Advanced section.
The Notification Service tool opens.
Receiving Notification of System Problems
for problems.
for the error notification service.
2. Click the Enable Service check box. (If the Notification Service is already running, the box will be checked.)
3. Enter the IP address for your network’s SMTP (email) server.
4. Enter at least one email address that will receive the notifications.
5. (Option) To test the configuration settings, click Test.
The results of the service test are displayed in the Results area.
6. Click Save.
- A confirmation message is displayed in the Results area.
- If you started or stopped the Notification Service, the Service State will change to reflect the new service
state.
7. (Option) Click Reset.
The changes for the configuration will be reset to the previously saved values.
28

Filtering the Error Notification Parameters

The Filters area of the Notification Service tool allows you to specify the type of error message that triggers an email notification and to set parameters for each type of error message—Error, Warning, and Information messages.
You can configure the ISIS 1000 to send notification emails for one or more of the following subsystem categories and the severity level that will trigger notification:
Server Control — Reports messages about internal operations, including problems saving metadata to disk
System Director — Reports messages about the ISIS file system, metadata, memory, system disks, and the System Director IP address and networking
ISIS General — Reports messages about Workspaces (such as changing its size), password changes, Media Packs, and network communication errors detected by an ISIS component
Storage Manager General — Reports messages about general Media Pack operations, such as initialization and status changes
To configure error notification parameters:
1. From the Management Console home page, click Notification Service, in the Advanced section.
The Notification Service tool opens.
2. Click Filters.
Receiving Notification of System Problems
3. Click the check boxes corresponding to the error notifications you want to include or exclude. (A checked box includes that category, and a blank box excludes the category.)
4. Click Save.
The settings are saved, and a confirmation message is displayed in the Results area.

Adding Contact and Email Address Information

You must enter contact information for all the people you want to receive notification emails. There is no enforced limit to the number of contacts you can add.
29

Changing the Administrator Password

To add contacts:
1. From the Management Console home page, click Notification Service, in the Advanced section.
The Notification Service tool opens.
2. Click Contacts.
3. Click New.
The Contact/Email field is displayed.
4. Type a user name into the first text box.
This can be any name you want to assign to the user; it does not have to be the same as the email account name.
5. Type a valid email address into the second text box.
6. (Optional) Click New to add more email contacts.
7. Click Save.
To remove a contact:
1. Click Delete next to the email contact entry.
The contact is removed from the list.
2. Click Save.
Changing the Administrator Password
The Management Console Administrator password is blank by default. Avid highly recommends that you set an Administrator password when you configure the Management Console for the first time.
To change the Administrator password when you are already logged in:
1. From the Management Console home page, click Administrator Password, located in the Advanced section.
The Administrator Password tool opens.
2. Type the current Administrator password in the Current Password field (blank by default).
3. Type the new Administrator password in the New Password field.
4. Type the new Administrator password again in the Verify Password field.
5. Click Change.
- The Administrator Password is changed to the new value.
- A confirmation message appears in the Results area.
To change the Administrator password if you have forgotten it:
1. Open a browser and enter the IP address of the ISIS system.
The Management Console login page opens.
2. Log in using the user name Administrator and the Agent password (either changed it to).
se-admin
or whatever you have
3. Follow the steps in the previous procedure (changing the password when you are already logged in).
30
Loading...
+ 86 hidden pages