Setup and Install
System and environment requirements ............................................................................. 44
Software requirements ...................................................................................... 44
Hardware requirements ..................................................................................... 45
Device firmware requirements .......................................................... 45
Port requirements .............................................................................................. 47
Ports used ........................................................................................ 47
DSS Address Book access for latest generation devices ................. 48
Hostname resolution ......................................................................... 48
Backup and restore strategy .............................................................................................. 48
Understand DSS data structures ...................................................................... 48
Software capabilities for backup and restore .................................................... 49
Scaling the DSS server ..................................................................................... 50
Limitations ........................................................................................ 50
Features and factors that limit scalability .......................................... 50
Recommendations ............................................................................ 50
Licensing ............................................................................................................................ 51
Activating licenses ............................................................................................. 51
Install licenses ................................................................................................... 52
Trial or demo license ......................................................................................... 52
Upgrading from previous products .................................................................... 52
Node locking ..................................................................................................... 53
Device differences ............................................................................................................. 53
Installation .......................................................................................................................................... 54
Pre-installation checklist .................................................................................................... 54
Installer screens and options ............................................................................................. 54
Configuration ...................................................................................................................................... 57
Configuration Utility ............................................................................................................ 57
Licensing ............................................................................................................................ 58
Add licenses ...................................................................................................... 59
Remove licenses ............................................................................................... 60
Auto-generated licenses ................................................................................... 60
Device management .......................................................................................................... 61
Add and remove devices ................................................................................... 63
Device configuration .......................................................................................... 65
Understanding the Device List .......................................................................... 66
Device grouping ................................................................................................ 66
Authentication .................................................................................................................... 67
Configure DSS .................................................................................................. 67
Authentication methods .................................................................... 67
LDAP bind ........................................................................................ 75
How to .............................................................................................. 76
ENWW v