To update a server definition, first complete the following fields and then click Finish, or click Cancel to end the task. If you do not specify a field, the original value is unchanged.
Attention: If this is a source server for a virtual volume operation, changing any of these values can impact the ability of the source server to access and manage the data it has stored on the corresponding target server. Changing the server name may have additional implications varying by platform. Some examples to be aware of are:
Enter the server description. The maximum length of the field is 30 characters. This field is optional.
Enter the password used to identify this server to other servers.
Enter the IP address of the target server for the TCP/IP communication method. Use dotted decimal format. This parameter is optional.
Enter the port number of the server for the TCP/IP communication method. Generally, this address is the same as that in the TCPPORT option in the server option file of the target server. This parameter is optional.
Enter the URL address that you use to access this server from a web browser-based interface. This parameter is optional.
Select whether a server definition that was defined by a managed server can be replaced with a definition from the configuration manager. This parameter is optional.
Yes | Specifies that the definition from a managed server can be replaced by a definition from the configuration manager. |
No | Specifies that the definition from a managed server cannot be replaced by a definition from the configuration manager. |
Enter a 1-64 character node name to be used by the server to connect to the target server. This parameter is optional. If a node name is not specified, the name of the source server is used.
Enter the password used to sign on to the target server. This parameter is optional. It is used for virtual volume support.
Enter a number of days that an object remains on the target server after it has been marked for deletion. This parameter is optional.
Select whether to reset the security token. A security token allows a source server to insert new objects onto the target server, manage the grace deletion period value, and update the password, provided the current password is known and the security token matches.
Yes | When the source server next signs on to the target server, a new security token will be sent to the target server and accepted if a valid password is received. |
No | The source server does not send a security token to the target server. |
Select whether a cyclic redundancy check should be performed to validate the data sent between the storage agent and the server. The default is No.
No | Specifies that data validation will not be performed on any data sent between the storage agent and the server. |
All | Specifies that data validation will be performed on all client file data, client file metadata, and server metadata that is sent between the storage agent and the server. This mode of operation affects performance. Additional overhead is required to compare CRC values between the storage agent and the server. |