Pinnacle Systems NEXIS - 7.9 Administrator’s Guide

Avid® NEXIS
Administration Guide
Version 7.9
®
Legal Notices
Product specifications are subject to change without notice and do not represent a commitment on the part of Avid Technology, Inc.
This product may be protected by one or more U.S. and non-U.S patents. Details are available at www.avid.com/patents.
This guide is protected by copyright. This guide is for your personal use and may not be reproduced or distributed, in whole or in part, without permission of Avid. Reasonable care has been taken in preparing this guide; however, it may contain omissions, technical inaccuracies, or typographical errors. Avid Technology, Inc. disclaims liability for all losses incurred through the use of this document. Product specifications are subject to change without notice.
Part of the software embedded in this product is gSOAP software.
Portions created by gSOAP are Copyright (C) 2001-2004 Robert A. van Engelen, Genivia inc. All Rights Reserved.
THE SOFTWARE IN THIS PRODUCT WAS IN PART PROVIDED BY GENIVIA INC AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHOR BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
The following disclaimer is required by Sam Leffler and Silicon Graphics, Inc. for the use of their TIFF library:
Copyright © 1988–1997 Sam Leffler Copyright © 1991–1997 Silicon Graphics, Inc.
Permission to use, copy, modify, distribute, and sell this software [i.e., the TIFF library] and its documentation for any purpose is hereby granted without fee, provided that (i) the above copyright notices and this permission notice appear in all copies of the software and related documentation, and (ii) the names of Sam Leffler and Silicon Graphics may not be used in any advertising or publicity relating to the software without the specific, prior written permission of Sam Leffler and Silicon Graphics.
THE SOFTWARE IS PROVIDED “AS-IS” AND WITHOUT WARRANTY OF ANY KIND, EXPRESS, IMPLIED OR OTHERWISE, INCLUDING WITHOUT LIMITATION, ANY WARRANTY OF MERCHANTABILITY OR FITNESS FOR A PARTICULAR PURPOSE.
IN NO EVENT SHALL SAM LEFFLER OR SILICON GRAPHICS BE LIABLE FOR ANY SPECIAL, INCIDENTAL, INDIRECT OR CONSEQUENTIAL DAMAGES OF ANY KIND, OR ANY DAMAGES WHATSOEVER RESULTING FROM LOSS OF USE, DATA OR PROFITS, WHETHER OR NOT ADVISED OF THE POSSIBILITY OF DAMAGE, AND ON ANY THEORY OF LIABILITY, ARISING OUT OF OR IN CONNECTION WITH THE USE OR PERFORMANCE OF THIS SOFTWARE.
The following disclaimer is required by the Independent JPEG Group:
This software is based in part on the work of the Independent JPEG Group.
This Software may contain components licensed under the following conditions:
Copyright (c) 1989 The Regents of the University of California. All rights reserved.
Redistribution and use in source and binary forms are permitted provided that the above copyright notice and this paragraph are duplicated in all such forms and that any documentation, advertising materials, and other materials related to such distribution and use acknowledge that the software was developed by the University of California, Berkeley. The name of the University may not be used to endorse or promote products derived from this software without specific prior written permission. THIS SOFTWARE IS PROVIDED ``AS IS'' AND WITHOUT ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, WITHOUT LIMITATION, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE.
Copyright (C) 1989, 1991 by Jef Poskanzer.
Permission to use, copy, modify, and distribute this software and its documentation for any purpose and without fee is hereby granted, provided that the above copyright notice appear in all copies and that both that copyright notice and this permission notice appear in supporting documentation. This software is provided " as is" without express or implied warranty.
Copyright 1995, Trinity College Computing Center. Written by David Chappell.
Permission to use, copy, modify, and distribute this software and its documentation for any purpose and without fee is hereby granted, provided that the above copyright notice appear in all copies and that both that copyright notice and this permission notice appear in supporting documentation. This software is provided " as is" without express or implied warranty.
Copyright 1996 Daniel Dardailler.
Permission to use, copy, modify, distribute, and sell this software for any purpose is hereby granted without fee, provided that the above copyright notice appear in all copies and that both that copyright notice and this permission notice appear in supporting documentation, and that the name of Daniel Dardailler not be used in advertising or publicity pertaining to distribution of the software without specific, written prior permission. Daniel Dardailler makes no representations about the suitability of this software for any purpose. It is provided " as is" without express or implied warranty.
Modifications Copyright 1999 Matt Koss, under the same license as above.
Copyright (c) 1991 by AT&T.
Permission to use, copy, modify, and distribute this software for any purpose without fee is hereby granted, provided that this entire notice is included in all copies of any software which is or includes a copy or modification of this software and in all copies of the supporting documentation for such software.
THIS SOFTWARE IS BEING PROVIDED " AS IS" , WITHOUT ANY EXPRESS OR IMPLIED WARRANTY. IN PARTICULAR, NEITHER THE AUTHOR NOR AT&T MAKES ANY REPRESENTATION OR WARRANTY OF ANY KIND CONCERNING THE MERCHANTABILITY OF THIS SOFTWARE OR ITS FITNESS FOR ANY PARTICULAR PURPOSE.
ii
This product includes software developed by the University of California, Berkeley and its contributors.
The following disclaimer is required by Paradigm Matrix:
Portions of this software licensed from Paradigm Matrix.
The following disclaimer is required by Ray Sauers Associates, Inc.:
“Install-It” is licensed from Ray Sauers Associates, Inc. End-User is prohibited from taking any action to derive a source code equivalent of “Install-It,” including by reverse assembly or reverse compilation, Ray Sauers Associates, Inc. shall in no event be liable for any damages resulting from reseller’s failure to perform reseller’s obligation; or any damages arising from use or operation of reseller’s products or the software; or any other damages, including but not limited to, incidental, direct, indirect, special or consequential Damages including lost profits, or damages resulting from loss of use or inability to use reseller’s products or the software for any reason including copyright or patent infringement, or lost data, even if Ray Sauers Associates has been advised, knew or should have known of the possibility of such damages.
The following disclaimer is required by Videomedia, Inc.:
“Videomedia, Inc. makes no warranties whatsoever, either express or implied, regarding this product, including warranties with respect to its merchantability or its fitness for any particular purpose.”
“This software contains V-LAN ver. 3.0 Command Protocols which communicate with V-LAN ver. 3.0 products developed by Videomedia, Inc. and V-LAN ver. 3.0 compatible products developed by third parties under license from Videomedia, Inc. Use of this software will allow “frame accurate” editing control of applicable videotape recorder decks, videodisc recorders/players and the like.”
The following disclaimer is required by Altura Software, Inc. for the use of its Mac2Win software and Sample Source Code:
©1993–1998 Altura Software, Inc.
The following disclaimer is required by Interplay Entertainment Corp.:
The “Interplay” name is used with the permission of Interplay Entertainment Corp., which bears no responsibility for Avid products.
This product includes portions of the Alloy Look & Feel software from Incors GmbH.
This product includes software developed by the Apache Software Foundation (http://www.apache.org/).
© DevelopMentor
This product may include the JCifs library, for which the following notice applies:
JCifs © Copyright 2004, The JCIFS Project, is licensed under LGPL (http://jcifs.samba.org/). See the LGPL.txt file in the Third Party Software directory on the installation CD.
Avid Interplay contains components licensed from LavanTech. These components may only be used as part of and in connection with Avid Interplay.
Attn. Government User(s). Restricted Rights Legend
U.S. GOVERNMENT RESTRICTED RIGHTS. This Software and its documentation are “commercial computer software” or “commercial computer software documentation.” In the event that such Software or documentation is acquired by or on behalf of a unit or agency of the U.S. Government, all rights with respect to this Software and documentation are subject to the terms of the License Agreement, pursuant to FAR §12.212(a) and/or DFARS §227.7202-1(a), as applicable.
Trademarks
Avid, the Avid Logo, Avid Everywhere, Avid DNXHD, Avid DNXHR, Avid Nexis, AirSpeed, Eleven, EUCON, Interplay, iNEWS, ISIS, Mbox, MediaCentral, Media Composer, NewsCutter, Pro Tools, ProSet and RealSet, Maestro, PlayMaker, Sibelius, Symphony, and all related product names and logos, are registered or unregistered trademarks of Avid Technology, Inc. in the United States and/or other countries. The Interplay name is used with the permission of the Interplay Entertainment Corp. which bears no responsibility for Avid products. All other trademarks are the property of their respective owners. For a full list of Avid trademarks, see: http://www.avid.com/US/about-avid/legal-notices/trademarks.
The following disclaimer is required by Apple Computer, Inc.:
APPLE COMPUTER, INC. MAKES NO WARRANTIES WHATSOEVER, EITHER EXPRESS OR IMPLIED, REGARDING THIS PRODUCT, INCLUDING WARRANTIES WITH RESPECT TO ITS MERCHANTABILITY OR ITS FITNESS FOR ANY PARTICULAR PURPOSE. THE EXCLUSION OF IMPLIED WARRANTIES IS NOT PERMITTED BY SOME STATES. THE ABOVE EXCLUSION MAY NOT APPLY TO YOU. THIS WARRANTY PROVIDES YOU WITH SPECIFIC LEGAL RIGHTS. THERE MAY BE OTHER RIGHTS THAT YOU MAY HAVE WHICH VARY FROM STATE TO STATE.
Avid NEXIS Administration Guide Version 7.9 • Created 9/14/17 • This document is distributed by Avid in online (electronic) form only, and is not available for purchase in printed form.
iii

Contents

Using This Guide . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1
Who Should Use This Guide . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1
Symbols and Conventions. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1
If You Need Help . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2
Accessing the Online Documentation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2
Avid Training Services. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2
Chapter 1 Configuring the System . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1
Creating the Avid NEXIS File System . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1
Binding the Media Packs to the File System . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3
Configuring External Authentication of Users . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4
Receiving Notification of System Problems. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5
Configuring the Notification Service . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5
Filtering the Error Notification Parameters . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6
Adding Contact and Email Address Information. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7
Enabling Link Aggregation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 8
Changing the Administrator Password . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 8
Securing an Avid NEXIS Infrastructure . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 9
Securing Access to the Management Console. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 9
Changing the BMC Password . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 10
Chapter 2 Working with the Management Console . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 13
Opening the Management Console. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 13
Understanding the Management Console Interface . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 14
System Status Console . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 15
System Status Console Panels . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 16
Navigation Toolbar . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 17
Main Tools Panel . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 17
Accessing Help. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 19
Session Counter. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 19
Customizing the Management Console Display . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 20
Moving Columns. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 20
Showing and Hiding Columns . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 20
Sorting Information . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 21
Filtering the Display. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 21
Updating the Display . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 22
Selecting Items . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 23
Using Context Menus to Perform Actions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 23
Guidelines for Names and Passwords . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 23
Management Console Preferences. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 24
Configuring Management Console Preferences. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 25
Configuring the Agent Settings. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 25
Chapter 3 Managing Storage Groups and Workspaces . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 27
Storage Group Considerations . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 27
Managing Storage Groups . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 31
Creating a Storage Group . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 31
Renaming a Storage Group . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 32
Adding Unassigned Media Packs to Storage Groups . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 32
About Removing Media Packs from Storage Groups. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 33
Removing Media Packs from a Storage Group . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 33
Removing All Media Packs in an Engine from All Storage Groups . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 34
Displaying Storage Group and Media Pack Details . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 34
Storage Groups List. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 36
Deleting Storage Groups . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 36
Managing Workspaces . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 37
Workspace Considerations. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 37
Workspace Protection Methods . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 37
Creating a Workspace . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 38
Displaying Workspace Details . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 39
Workspaces List . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 41
Resizing a Workspace . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 42
Using the Workspace Size Graph . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 42
Duplicating a Workspace . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 43
Deleting a Workspace . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 44
Renaming a Workspace . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 44
Setting Event Triggers for a Workspace. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 45
Managing User Access Privileges for Workspaces . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 45
Setting or Changing Workspace Access Privileges. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 46
Workspace Redistribution. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 47
About Configuration Changes . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 47
Redistribution Reference Information and Restrictions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 47
Performing a Full Redistribution . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 48
Suspending Redistribution. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 49
Resuming Redistribution . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 49
Verifying Redistribution . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 50
Monitoring Redistributions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 50
Redistribution Status Definitions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 51
v
Chapter 4 Managing Clients. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 53
Managing Users . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 53
Users List . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 54
User Details Panel . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 55
Creating Users . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 56
Duplicating Users . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 56
Changing User Details . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 57
Deleting Users . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 57
Disabling Users . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 58
Displaying User Details . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 58
Managing LDAP Accounts . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 58
Installing the LDAP Sync Tool . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 59
Opening the LDAP Sync Tool. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 59
Using the LDAP Sync Tool . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 60
Changing the Account Synchronizer Display. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 62
Synchronizing LDAP and Avid NEXIS Accounts . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 62
Importing LDAP Users with Incorrectly Formatted LDAP UIDs . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 64
Disconnecting and Reconnecting the LDAP Servers . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 65
Managing User Groups . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 66
Adding User Groups . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 67
Modifying User Group Details. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 67
Deleting User Groups . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 68
Displaying User Group Details . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 68
Managing Bandwidth Limits . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 69
Bandwidth Limits Panel . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 69
Displaying Bandwidth Limits Details. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 70
Adding a Bandwidth Limit Entry . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 70
Changing a Bandwidth Limit Entry . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 70
Deleting a Bandwidth Limit Entry . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 71
Chapter 5 Managing Avid NEXIS Hardware . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 72
Managing Engines. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 72
Engine List . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 72
Displaying Engine Details. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 73
Engine and Storage Controller Status . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 73
Upgrading an Engine . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 74
Upgrading a Single Engine ISIS | 1000 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 75
Upgrading a Multi-Engine ISIS | 1000 System . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 75
Upgrading an Avid NEXIS System . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 76
Removing an Engine from the Engine List . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 78
Managing Controllers . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 78
vi
Storage Controllers List . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 78
Displaying Storage Controller Details. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 79
Managing Media Packs . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 79
Media Packs List . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 80
Displaying Media Pack Details . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 81
Media Pack Status . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 82
Displaying Drive Details . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 82
SSD Health. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 83
Disk Status . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 84
Identifying the Slot Number for a Failing or Failed Drive . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 85
Clearing a Foreign Disk Error . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 85
Unbinding Media Packs from the Avid NEXIS File System . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 86
Clearing Network Degraded Status Messages. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 87
Removing Orphaned Media Packs. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 87
Cleaning Up Files (Manually Rectifying Files) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 87
Chapter 6 Managing Connections. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 89
Monitoring System Connection Status . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 89
Connection Status Descriptions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 90
Monitoring Client Bandwidth . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 90
Client Bandwidth List . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 91
Scaling the Bandwidth List Graph Display . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 92
Displaying Client Bandwidth Reservations . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 92
Chapter 7 System Monitoring and Diagnostics . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 94
Hardware Monitoring Service . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 95
Displaying System Status History . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 95
Testing the Network . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 96
Displaying System Director Information . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 96
Displaying System Logs . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 96
Displaying or Clearing the System Logs Page . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 97
Displaying Administration Logs . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 97
Using the Administration Logs . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 97
Capturing System Information (Avid NEXIS Snapshots). . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 98
Creating, Displaying, and Deleting Snapshots . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 98
Working with Snapshot Archives . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 99
Avid NEXIS Toolbox . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 100
Installing the Avid NEXIS Toolbox . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 100
Opening the Avid NEXIS Toolbox . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 100
Connection Analyzer Tool . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 101
Log Aggregator Tool. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 102
Using the Log Aggregator Tool . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 103
vii
Displaying Aggregate Logs . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 103
Disk Analyzer Tool . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 104
Running Tests with the Disk Analyzer Tool . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 104
Updating the Disk Analyzer Tool Display. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 105
Saving Disk Analyzer Test Results . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 105
Media Pack Parameters Tool . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 105
Using the Media Pack Parameters Tool . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 106
Retrieving Media Pack Flag Parameters . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 107
Media Pack Log Viewer . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 107
Creating a Metadata Dump File . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 108
Restoring the File System (Support Use Only) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 108
Using the Client Profiler. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 110
Understanding the Profile Results. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 110
Chapter 8 Avid NEXIS Agent . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 112
Opening the Avid NEXIS Agent. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 112
Understanding the Agent Interface . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 112
STATUS Tab . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 114
CONFIGURE Tab. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 115
STATISTICS Tab . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 115
TOOLS Tab . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 116
LOGGING Tab . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 116
ADVANCED Tab . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 116
VERSIONS Tab . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 116
Changing the Storage System Name . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 116
Changing the Engine and Storage Controller Names . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 117
Changing the Enclosure ID . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 118
Configuring DNS Service . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 118
Setting the System Time . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 118
Changing the Agent Password . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 119
Shutting Down the System . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 119
Restarting the System . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 120
Rerunning the Setup Wizard . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 120
Index . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 121
viii

Using This Guide

The Avid® NEXIS™ software-defined storage system provides a high-performance distributed file system that contains high-capacity shared media storage for workgroups of connected devices. This user’s guide describes how to connect your client system to the storage system, mount Workspaces, and configure your system for best performance.
Unless noted otherwise, the material in this document applies to the Windows systems.The majority of screen shots in this document were captured on a Windows system, but the information applies to all operating systems. Where differences exist, information on the differences is provided.
The documentation describes the features and hardware of all models. Your system might not contain certain features and hardware that are covered in this guide.

Who Should Use This Guide

This guide is intended for users who need to manage the Avid NEXIS media network. You should have a basic understanding of how to use and manage the Windows operating system or the Mac OS X systems, and you should be familiar with basic workgroup and network concepts.
®
, Mac OS® X, and Linux operating

Symbols and Conventions

Avid documentation uses the following symbols and conventions:
Symbol or Convention Meaning or Action
n
c
w
A note provides important related information, reminders, recommendations, and strong suggestions.
A caution means that a specific action you take could cause harm to your computer or cause you to lose data.
A warning describes an action that could cause you physical harm. Follow the guidelines in this document or on the unit itself when handling electrical equipment.
A user tip provides a helpful hint that can aid users in getting the most from their system.
n n
A shortcut shows the user keyboard or mouse shortcuts for a procedure or command.
> This symbol indicates menu commands (and subcommands) in the order you select them. For
example, File > Import means to open the File menu and then select the Import command.
This symbol indicates a single-step procedure. Multiple arrows in a list indicate that you perform one of the actions listed.
(Windows), (Windows only), (Macintosh), or (Macintosh only)
This text indicates that the information applies only to the specified operating system, either Windows or Macintosh OS X.
Bold font Bold font is primarily used in task instructions to identify user interface items and keyboard
sequences.
Symbol or Convention Meaning or Action
Italic font Italic font is used to emphasize certain words and to indicate variables.
Courier Bold font
Ctrl+key or mouse action Press and hold the first key while you press the last key or perform the mouse action. For
| (pipe character) The pipe character is used in some Avid product names, such as Interplay | Production. In this

If You Need Help

If you are having trouble using your Avid product:
1. Retry the action, carefully following the instructions given for that task in this guide. It is especially important to check each step of your workflow.
2. Check the latest information that might have become available after the documentation was published.
Always check online for the most up-to-date release notes or ReadMe because the online version is updated whenever new information becomes available. To view the online versions, visit the Knowledge
Base at www.avid.com/support.
3. Check the documentation that came with your Avid application or your hardware for maintenance or hardware-related issues.
4. Visit the online Knowledge Base at www.avid.com/support. Online services are available 24 hours per day, 7 days per week. Search this online Knowledge Base to find answers, to view error messages, to access troubleshooting tips, to download upgrades, and to read or join online message-board discussions.
Courier Bold font identifies text that you type.
example, Command+Option+C or Ctrl+drag.
document, the pipe is used in product names when they are in headings or at their first use in text.

Accessing the Online Documentation

The Avid online documentation contains all the product documentation in PDF format. You can access the documentation from the Knowledge Base site specific to your release. Download and install Acrobat Reader before you access the PDF documentation.

Avid Training Services

Avid makes lifelong learning, career advancement, and personal development easy and convenient. Avid understands that the knowledge you need to differentiate yourself is always changing, and Avid continually updates course content and offers new training delivery methods that accommodate your pressured and competitive work environment.
For information on courses/schedules, training centers, certifications, courseware, and books, please visit
www.avid.com/support and follow the Training links, or call Avid Sales at 800-949-AVID (800-949-2843).
2

1 Configuring the System

This chapter describes how to complete the setup of a new Avid NEXIS system after physically installing (rack-
mounting) it and installing the software, as described in the Avid NEXIS Setup and Maintenance Guide.
To make the system fully usable to clients, do the following:
1. Create the Avid NEXIS file system.
2. Bind Media Packs to the file system. See “Binding the Media Packs to the File System” on page 3.
3. Create one or more Storage Groups from the Media Packs, depending on your available hardware and what kind of Workspace protections you want to use. See “Managing Storage Groups” on page 31.
4. Create Workspaces within the Storage Groups (see “Managing Storage Groups and Workspaces” on page 27)
5. Create user or device accounts to allow clients to connect to the Workspaces on the Avid NEXIS. You can create user accounts on the Avid NEXIS itself, or configure an LDAP server to authenticate users.
6. Set up the notification service to send email to one or more accounts when a problem occurs.

Creating the Avid NEXIS File System

Creating a new file system is the first step to making the storage space usable after you install the Avid NEXIS software on a new Engine.
If a file system already exists, creating a new one permanently deletes it and all users, groups, Workspaces,
n
Storage Groups and other objects. All Media Packs are unbound; and all other settings, such as External Authentication and Notification Service, are cleared and must be reconfigured after the new file system is cr eated.
In addition, the Administrator password (if changed) reverts to the default (no password).
To create a new file system:
1. Open a browser and enter either the hostname (if DNS is configured) or the IP address of the System Director.
The Management Console login window opens.
2. In the password field, do one of the following:
t If you changed the password, enter that password now. The Management Console uses the same
password as the Agent until you create the Avid NEXIS file system.
t Otherwise, enter the default password (
3. In the Management Console main window, click System Settings under the Advanced heading.
se-admin
).
The System Settings screen is displayed.
4. Click Create File System, then click Apply.
A confirmation screen appears, asking you to confirm the operation, which will destroy all existing data (if any) on the Avid NEXIS system, and create a new file system.
2
Confirmation Message to Create New File System
5. Click OK to continue.
The Results panel displays progress messages. When the file system is created, you can bind the Media Packs, create Storage Groups and Workspaces, create users, and configure external authentication and Event Notification as required.

Binding the Media Packs to the File System

After you have created an active file system, bind the Media Packs to it. Media Packs for all Engines in the shared-storage system are shown on the Media Packs page.
Binding a Media Pack formats it to a specific performance capability:
High performance Media Packs are intended specifically for higher overall bandwidth media playback, such as UHD/4K finish and color correction workflows. Choose the strip size of 1024KB.
Scale-Out performance Media Packs are suitable for a broad variety of workflows up to the supported client count for your Avid NEXIS model. Choose the default strip size of 512KB.
SSD performance Media Packs are available only on an Avid NEXIS | E2 SSD Engine and are intended for playback of ultra high bandwidth media. Media Packs in this Engine type are bound automatically at a strip size optimized for the best performance.
All Storage Groups and Workspaces can be increased and decreased using add/remove redistribution (adding or removing Media Packs bound with the same strip size) and the Workspace resizing tools.
To bind the Media Packs:
1. Click Media Packs in the Management Console.
2. Select one or more Media Packs in the list.
Before a Media Pack is bound, it has the same name as the Controller, as shown in the following figure. After the
n
Media Pack is bound, its name changes to MPnnn, wh ere nnn is a sequential number, starting with 000, assigned by the file system.
3. Click Bind.
4. In the Media Pack Bind Settings dialog box, choose the bind setting for the Media Pack:
t 1024KB Disk Strip Size - High Performance
3
t 512KB Disk Strip Size - Scale-Out Performance
5. Click OK to confirm the request.
6. Click Refresh.
When the Media Packs are bound, the system gives them a name, their icons turn green, and the state changes to Bound. Refresh the display to see the change, as shown in the following figure.
You can now add the Media Packs to a new or existing Storage Group. See “Managing Storage Groups and
Workspaces” on page 27.

Configuring External Authentication of Users

External authentication lets you add users to the Avid NEXIS system who are already configured as LDAP accounts in your environment. When a remote LDAP user logs into the Avid NEXIS system, Avid NEXIS checks with an external LDAP server instead of the local user database to authenticate the user. To enable LDAP users to access the Avid NEXIS system, configure the Avid NEXIS to use one to three external LDAP servers for authentication.
Configuring external authentication is optional, but recommended for large numbers of users. Otherwise you must create each user account individually; see “Managing Clients” on page 53. You can use both external authentication and accounts you create on the Avid NEXIS. The system supports up to 5640 user accounts.
To use external authentication using LDAP, enable DNS. See “Configuring DNS Service” on page 118.
For more information on working with LDAP users and groups, see “Managing LDAP Accounts” on page 58.
To configure external authentication:
1. From the Management Console home page, click External Authentication.
The External Authentication tool opens.
2. Click the Enable check box to select it.
The Domain Name text box becomes active.
3. In the Domain Name text box, enter the domain name of the network to which the LDAP server belongs, including subdomain, if applicable.
A domain name has several parts, separated by a period or dot: for example, avid.com. The company name
n
“avid” is the assigned domain, and “com” is the top level domain, or TLD. A subdomain is a smaller unit within the company assigned domain, such as americas.avid.com.
Contact your IT administrator for the Legacy Domain Name (also known as the NETBIOS Domain Name) to enter into this field.
4. Click the check box to select Server 0.
The Address text box becomes active.
5. In the Address text box, enter the fully-qualified domain name (FQDN) of the LDAP server.
4
Use the format servername.subdomain.domain.tld; for example:
server1.americas.example.com
6. In the Port text box, enter the port number of the LDAP service; usually 389.
The Avid NEXIS system works with LDAP serve rs tha t u s e e ith er LDAP over TLS or SASL DIGEST-MD5, but not
n
with LDAPS protocol using port 636 (secure socket).
7. (Optional) Repeat steps 3 – 5 (using the “Server 1” and “Server 2” check boxes) to configure additional backup LDAP servers, if applicable.
8. When finished, click Submit.
The domain and LDAP server information is added to the Avid NEXIS database, and a confirmation message is displayed in the Results area.

Receiving Notification of System Problems

The Notification Service tool lets you configure the Avid NEXIS system to notify you through email when problems occur. A service watches the system log and sends a concise summary of configured events to one or more email accounts. Configuring notification is optional but strongly recommended.
The Notification Service tool window is divided into the following sections:
Configuration — Start and stop the Notification Service, and configure the Notification Service settings, described in the following table.
Option Type Description
SMTP Server text The IP address or host name of your SMTP server. SMTP Port text (numeric) The port number of your SMTP server. The default value (25) is appropriate
Poll Frequency (seconds) text (numeric) The frequency (in seconds) with which the notification service checks for
Email Address text The email address of the Avid NEXIS administrator or other primary contact
Filters — Set and change the parameters that define when email notifications are sent to email recipients.
Contacts — Add and change email recipients.

Configuring the Notification Service

To configure the Notification Service:
1. From the Management Console home page, click Notification Service, in the Advanced section.
The Notification Service tool opens.
in most instances.
reportable events.
for the error notification service.
5
2. Enter the IP address for your network’s SMTP (email) server.
3. Enter at least one email address that will receive the notifications.
4. (Optional) To test the configuration settings, click Te st .
The results of the service test are displayed in the Results area.
5. Click Save.
- A confirmation message is displayed in the Results area.
- If you started or stopped the Notification Service, the Service State will change to reflect the new service
state.
6. (Optional) Click Reset.
The changes for the configuration will be reset to the previously saved values.

Filtering the Error Notification Parameters

The Filters area of the Notification Service tool allows you to specify the type of error message that triggers an email notification and to set parameters for each type of error message—Error, Warning, and Information messages.
You can configure the Avid NEXIS to send notification emails for one or more of the following subsystem categories and the severity level that will trigger notification:
Server Control — Reports messages about internal operations, including problems saving metadata to disk
System Director — Reports messages about the Avid NEXIS file system, metadata, memory, system drives, and the System Director IP address and networking
Avid NEXIS General — Reports messages about Workspaces (such as changing its size), password changes, Media Packs, and network communication errors detected by an Avid NEXIS component
Storage Manager General — Reports messages about general Media Pack operations, such as initialization and status changes
To configure error notification parameters:
1. From the Management Console home page, click Notification Service, in the Advanced section.
The Notification Service tool opens.
6
2. Click Filters.
3. Click the check boxes corresponding to the error notifications you want to include or exclude. (A checked box includes that category, and a blank box excludes the category.)
4. Click Save.
The settings are saved, and a confirmation message is displayed in the Results area.

Adding Contact and Email Address Information

Enter contact information for all the people you want to receive notification emails. There is no enforced limit to the number of contacts you can add.
To add contacts:
1. From the Management Console home page, click Notification Service, in the Advanced section.
The Notification Service tool opens.
2. Click Contacts.
3. Click New.
The Contact/Email field is displayed.
4. Type a user name into the first text box.
This can be any name you want to assign to the user; it does not have to be the same as the email account name.
5. Type a valid email address into the second text box.
6. (Optional) Click New to add more email contacts.
7. Click Save.
To remove a contact:
1. Click Delete next to the email contact entry.
The contact is removed from the list.
7
2. Click Save.

Enabling Link Aggregation

If your environment supports and requires it, you can configure link aggregation (also called redundant networking, NIC teaming, link bundling, or port trunking) on the network ports on each controller, which provides redundancy in case one network port fails. The Avid NEXIS implementation follows the Link Aggregation Control Protocol (LACP) standard.
You can use link aggregation regardless of the number of controllers in each Avid NEXIS Engine or System Director Appliance (however, the Avid NEXIS | PRO does not support this feature).
c
n
Before enabling link aggregation, connect appropriate cables from both ports to a supported switch. If you enable LACP before the ports are connected or before enabling LACP on the switch, you can lose access to
the system. See the Avid NEXIS Setup and Maintenance Guide for more information.
Enabling or disabling link aggregation requires the system to reboot.
To enable link aggregation:
1. Open the Agent page. (For more information, see “Avid NEXIS Agent” on page 112).
2. Click the CONFIGURE tab.
3. In the Data Interfaces section, check the box for Link Aggregation.
4. A dialog box opens, reminding you to make sure Link Aggregation is already configured on all the connected switches and that all the Ethernet ports are connected to the switch or switches. If everything is ready, click Yes to continue.
5. Click Submit.
6. In the confirmation dialog box indication this action might reboot the system, click OK.
When the system restarts, link aggregation is enabled on the network ports on all installed controllers.
If an error occurs with the LACP configuration, a status message is displayed in the Agent; see “STATUS
Tab” on page 114.
To disable link aggregation:
1. Open the Agent page. (For more information, see “Avid NEXIS Agent” on page 112).
2. Click the CONFIGURE tab.
3. In the Data Interfaces section, uncheck the box for Link Aggregation.
4. Click Submit.
5. In the confirmation dialog box indication this action might reboot the system, click OK.
When the system restarts, link aggregation is disabled on the network ports on all installed controllers.
To verify or monitor the status of link aggregation on the controllers, see “Storage Controllers List” on
page 78.

Changing the Administrator Password

The Management Console Administrator password is blank by default. Avid highly recommends that you set an Administrator password when you configure the Management Console for the first time.
8
See “Guidelines for Names and Passwords” on page 23 for valid password characters and the maximum length.
To change the Administrator password when you are already logged in:
1. From the Management Console home page, click Administrator Password, located in the Advanced section.
The Administrator Password tool opens.
2. Type the current Administrator password in the Current Password field (blank by default).
3. Type the new Administrator password in the New Password field.
4. Type the new Administrator password again in the Verify Password field.
5. Click Change.
- The Administrator Password is changed to the new value.
- A confirmation message appears in the Results area.
To change the Administrator password if you have forgotten it:
1. Open a browser and enter the IP address of the Avid NEXIS system.
The Management Console login page opens.
2. Log in using the user name Administrator and the Agent password (either password you changed it to).
3. Follow the steps in the previous procedure (changing the password when you are already logged in).

Securing an Avid NEXIS Infrastructure

If your environment requires tight security, you can restrict access to the Management Console using TLS (Transport Layer Security, often referred to as SSL) encryption, and you can change the BMC password.

Securing Access to the Management Console

By default, the Management Console uses unencrypted HTTP. However, you can enable TLS so that the Management Console uses HTTPS instead. When TLS is enabled, the Avid NEXIS generates a self-signed certificate that prompts a browser warning.
To enable TLS for the Management Console:
1. In the Management Console, click Agent Settings.
2. In the field for the
3. Check the box to Make changes persistent, then click Update.
4. Open the Agent and click the ADVANCED tab.
5. Under System Tools, click Reboot.
ssl.disabled
value, change the 1 to a 0 (zero).
se-admin
by default or the
6. Enter the Agent password in the Confirm reboot request field.
The Engine reboots and the Agent and Management Console are temporarily unavailable.
7. When the system reboots, to log into the Management Console, use the secure version of the URL (for example, https://198.51.100.24).
This change also affects logging in to the Management Console from the Client Manager.
9

Changing the BMC Password

The Avid NEXIS system has several passwords:
The Administrator password, used when you log into the Management Console (by default, there is no password). You can change this at any time in the Management Console.
The Agent password (by default,
se-admin
). This is also the password you use for initial system setup. You
can change this at any time in the Agent.
For convenience, you can log in to either the Management Console or the Agent using the password for the other, in case you forget one.
The password for the BMC (Baseboard Management Controller), which is a low-level process on the Storage Controller that manages the BIOS, MAC addresses, and other internal functions.
By default, the BMC password has been set at the factory to be the same as the default Agent password (
admin
), but this could be a security concern in some environments.
se-
If your lab environment or company requires it, you can change the BMC password to prevent unauthorized access to the hardware.
To change the BMC password:
1. Connect a computer or laptop to the Management Port on the Storage Controller, as shown:
2. Open a browser window and go to the address:
169.254.10.250
controller.
root
3. Log in using the user name
and the password
4. In the BMC interface, click the Configuration tab.
se-admin
, which is the default IP address of the BMC
.
10
5. Select Users from the pull-down menu.
6. Click Modify User.
11
7. Click the Change Password checkbox, enter a new password in the Password and Confirm Password fields, then click Modify.
8. Click OK.
9. Log out of the BMC interface.
12

2 Working with the Management Console

The Management Console is the primary interface to the Avid NEXIS system and allows you to perform administration functions.
When you access the Management Console, the Login page opens. Enter a user name and password to log in. If you type the wrong password, an error message appears and the Login dialog box reappears.
Initially, the Administrator password is blank by default. To set an administrator password, see “Changing the
n
Administrator Password” on page 8.
Standard Avid NEXIS client users can log in to the Management Console, but will have limited access to the Management Console interface. They can see certain information about the network through the Client Manager. For more information about the Client Manager, see the Avid NEXIS Client Help.

Opening the Management Console

The Management Console runs within one of the following qualified web browsers:
Windows — Microsoft Internet Explorer, Mozilla Firefox
OS X — Safari, Mozilla Firefox, Google Chrome
®
, Google® Chrome
c
RedHat Linux and CentOS — Mozilla Firefox
Performing administrative functions in more than one instance of the Management Console at the same time can cause unexpected results.
To open the Management Console as Administrator:
1. Open your web browser and in the address bar enter either the:
t System Director Name (if DNS is configured; see “Configuring DNS Service” on page 118)
t IP address of the System Director. (This is the IP address of the Storage Controller running the System
Director; whether in a single- or multi-Engine configuration or in a System Director Appliance.)
The Login dialog box for the Management Console opens. The “Username” field is automatically populated with the Administrator user name.
2. Type your password.
For information on changing the administrator password, see “Changing the Administrator Password” on
page 8.
3. Click Login (arrow icon), or press Enter.
The Management Console Home page opens.
To log out of the Management Console:
t Click Logout in the upper right corner of the screen.

Understanding the Management Console Interface

The Management Console, which you can access on the Engine or on any Ethernet-attached client, has a user interface where controls are grouped by function and are displayed by clicking the appropriate icons or text.
®
The Management Console requir es Adobe kit, or download and install a newer version if available.
Flash® Player. Use the version included with the A vid NEXIS softwa r e
Callout Description
1 System Status Console — Provides a snapshot view of several aspects of the Avid NEXIS system. See “System
Status Console” on page 15.
2 Navigation toolbar — Access Management Console tools and navigation. See “Navigation Toolbar” on page 17.
3 Main tools panel — Click to go to the respective tool pages. See “Main Tools Panel” on page 17.
4 Help link — Provides pointers to the Avid NEXIS online documents. See “Accessing Help” on page 19.
5 Logout link — Ends the Management Console session and logs you out of the system.
6 System Identification — Displays the system model information, Storage System name, and version.
7 Session Counter — Displays how long the current session has been active. Counts down from 2 hours (2:00:00).
See “Session Counter” on page 19.
14

System Status Console

The System Status Console, located on the left side of the Management Console, contains several components that give you a snapshot view of the system. These allow you to access additional information about your system and to perform certain administrative tasks, such as monitoring and logging.
Administrators can configure whether or not the System Status Console is visible on the login screen of the
n
Management Console, but you must log in to follow links from the tool bar screens (such as the log files).
The following figure shows the panels of the System Status Console separated slightly for clarity.
Callout Description
1 Current system status panel — LEDs for errors, warnings, info, and upgrade statuses will be lit to indicate the
presence of system events. Click a color to open the Status panel.
Red indicates an error, yellow is for a warning, light blue (or aqua) is for informational messages, and dark blue indicates an upgrade is in progress.
See “System Status Console Panels” on page 16.
For explanations of the hardware statuses shown in the status panel, see “Managing Avid NEXIS Hardware” on
page 72.
2 Status retrieval panel — The Management Console periodically retrieves system status information. The panel
displays the results and the time stamp of the retrieval operation.
3 System Status History panel — Displays the system events that have occurred since the System Director was
started, along with the date and time of the first logged event. Clicking this panel opens the System Status History tool. For more information, see “Displaying System Status History” on page 95.
4 Storage capacity panel — Displays the total capacity of all bound Media Packs, capacity allocated to
Workspaces, and the amount of capacity used by data.
5 System Status Console panels — Click the panel headings to display the system information panel. For more
information, see “System Status Console Panels” on page 16.
15

System Status Console Panels

The System Status Console contains several panels that provide information about different areas of the system operation. Click a panel title to expand and collapse the panel.
Panel Name Description
Status Console Panel—Provides a quick summary of the System Director status. If an event in the system log triggers a status to appear, a link is provided to the System Logs tool. For more information, see “Displaying or Clearing the System Logs Page” on page 97 and “Managing Avid
NEXIS Hardware” on page 72.
System Console Panel—Provides a summary of hardware, software, and networking information.
Performance Console Panel—Provides a summary of the number of messages per second,
number of open files, and the names of clients connected to the system. For more information, see
“Monitoring System Connection Status” on page 89.
16
Panel Name Description

Navigation Toolbar

The navigation toolbar provides several items to help you navigate through the Management Console interface.
Bandwidth Console Panel—Displays “Megabytes per second,” information on total and per­client bandwidth. For more information, see “Monitoring Client Bandwidth” on page 90.
Callout Description
1 Home link—You can click this link from any page to return to the Management Console Home screen
2 Current tool heading—Indicates the tool you are currently using
3 Related links section—Displays links to other Management Console tools relevant to the one you are currently
using

Main Tools Panel

The Management Console main panel is divided into the following sections, each containing Action links:
17
Section Name Action Link Description
SYSTEM Workspaces Create, delete, duplicate, or change capacity of any Workspace and see all
Workspace details; see “Managing Workspaces” on page 37.
Users Create, delete, duplicate, or change Workspace access for any User and see all User
details; see “Managing Users” on page 53.
Groups Create, duplicate, or change Workspace access for any User Group; modify User
Group members; and display all User Group details; see “Managing User Groups”
on page 66.
Bandwidth Limits Display and modify bandwidth for clients that are allowed to connect to the Avid
NEXIS system; see “Managing Bandwidth Limits” on page 69 for more information.
Installers Download installers for Avid NEXIS Clients, Avid NEXIS software for the Engine,
Avid NEXIS Tools, and Adobe Flash Player. For information on installing the Avid NEXIS Client software, see the Avid NEXIS
Client Manager Installation and User’s Guide. For information on the Avid NEXIS Tools, see “Avid NEXIS Toolbox” on page 100.
Engines Display details for Engines, reported serial number, status, uptime and more
information; see “Managing Engines” on page 72.
Storage Controllers Display details, upgrade, and clear status for Storage Controllers in the Engine; see
“Managing Controllers” on page 78.
Media Packs Bind, unbind and see details for Media Packs; see “Managing Media Packs” on
page 79.
Storage Groups Create, delete, or modify Media Pack Media Packs of any Storage Group, and
display Storage Group details; see “Managing Storage Groups” on page 31.
CONNECT Connection Status Display any connected client; see “Monitoring System Connection Status” on
page 89.
Client Bandwidth Display read and write bandwidth of any connected client; see “Monitoring Client
Bandwidth” on page 90.
Reservations Display any current bandwidth reservation; see “Displaying Client Bandwidth
Reservations” on page 92.
TOOLS System Status History Display historical system status information; see “Displaying System Status History”
on page 95.
Network Utilities Allows you to retrieve a detailed look at the connected network, or run a ping or
traceroute; see “Testing the Network” on page 96.
Redistribution Monitor Allows you to see details about redistribution; see “Workspace Redistribution” on
page 47.
18
Section Name Action Link Description(Continued)
LOGGING System Director
Information
System Logs Display all system messages, info, warnings, and errors at the application, system,
Administration Logs Display current and archived Management Console logs; see “Displaying
Avid NEXIS Snapshots Create a snapshot of the Avid NEXIS system for displaying or downloading; see
ADVANCED Preferences Change and save bandwidth, LCT threshold, device creation, disk error threshold,
External Authentication Configure external authentication servers; see “Configuring External Authentication
Notification Service Configure email notification on specific system events; see “Filtering the Error
Agent Settings Modify agent configuration options and trace settings; see “Configuring the Agent
System Settings Manage the Avid NEXIS file system and upgrade all the Engines and System
Displays System Director information: System Director status and Avid NEXIS version, metadata, running processes, and Agent information, all on one screen; see
“Displaying System Director Information” on page 96.
and security levels; see “Displaying or Clearing the System Logs Page” on page 97.
Administration Logs” on page 97.
“Capturing System Information (Avid NEXIS Snapshots)” on page 98.
and other preferences; see “Configuring Management Console Preferences” on
page 25.
of Users” on page 4.
Notification Parameters” on page 6.
Settings” on page 25.
Director Appliance in the shared-storage system at the same time; see “Creating the
Avid NEXIS File System” on page 1 and “Upgrading an Avid NEXIS System” on page 76.
Administrator Password Change the Management Console Administrator password; see “Changing the

Accessing Help

The Help menu, located in the upper right-hand corner of the Management Console window, provides a link to the Avid NEXIS ReadMe, which contains a link to the Knowledge Base page for your release. The Knowledge Base page contains PDFs for all the relevant documentation.

Session Counter

The user session will time out automatically after two hours of inactivity, after which you must log in again to continue working. The session counter, located in the lower right corner of the Management Console, displays the time remaining in the user session.
The counter is automatically reset to two hours when you click a link or perform an action such as adding or deleting a Workspace. You can also reset the counter manually by clicking it.
Administrator Password” on page 8.
19
If you enable Auto refresh on a tool screen you will not automatically be logged out after two hours, as long as you stay on the page where Auto refresh is enabled, or navigate between tools as described in “Updating the
Display” on page 22. Clicking Home disables Auto refresh, and the session counter functionality (automatic
logout) resumes.
To manually reset the session counter:
t Click the session counter display.
The session timer is reset to two hours.

Customizing the Management Console Display

You can customize the Main display panel for any option by moving and hiding columns, and by sorting and filtering information.

Moving Columns

To move a column in the Main display panel:
t Click and drag any column to the position you want, and release the mouse button.
The column appears in the new position, and columns to the right are moved to make room.

Showing and Hiding Columns

When you open a Management Console tool (for example, the Storage Controllers tool), the Main display panel lists items in default columns. Depending on the option selected, there might be other headings available to see. You can select individual or multiple column headings to be displayed or hidden.
To show or hide columns:
t Select one of the options, right-click in the column heading row and select a heading you want to show or
hide.
Displayed column headings are marked by a bullet symbol (•). You cannot hide the first column on the left of the Main display panel (usually the Name column).
20
Loading...
+ 111 hidden pages