Avid ISIS 5000 3.1 User guide

Category
Software
Type
User guide
Avid
®
ISIS
®
5000
Administration Guide
2
Legal Notices
Product specifications are subject to change without notice and do not represent a commitment on the part of Avid Technology,
Inc.
This product is subject to the terms and conditions of a software license agreement provided with the software. The product
may only be used in accordance with the license agreement.
Avid ISIS products or portions thereof are protected by one or more of the following United States Patents: 6,374,336;
6,415,373; 6,449,688; 6,760,808; 6,785,768; 7,111,115; 7,487,309; 7,660,947. Other patents are pending.
Avid products or portions thereof are protected by one or more of the following European Patents: 1040419.
Other patents are pending.
This document is protected under copyright law. An authorized licensee of Avid ISIS 5000 may reproduce this publication for
the licensee’s own use in learning how to use the software. This document may not be reproduced or distributed, in whole or in
part, for commercial purposes, such as selling copies of this document or providing support or educational services to others.
This document is supplied as a guide for Avid ISIS 5000. Reasonable care has been taken in preparing the information it
contains. However, this document may contain omissions, technical inaccuracies, or typographical errors. Avid Technology,
Inc. does not accept responsibility of any kind for customers’ losses due to the use of this document. Product specifications
are subject to change without notice.
Copyright © 2010 Avid Technology, Inc. and its licensors. All rights reserved.
The following disclaimer is required by Apple Computer, Inc.:
APPLE COMPUTER, INC. MAKES NO WARRANTIES WHATSOEVER, EITHER EXPRESS OR IMPLIED, REGARDING
THIS PRODUCT, INCLUDING WARRANTIES WITH RESPECT TO ITS MERCHANTABILITY OR ITS FITNESS FOR ANY
PARTICULAR PURPOSE. THE EXCLUSION OF IMPLIED WARRANTIES IS NOT PERMITTED BY SOME STATES. THE
ABOVE EXCLUSION MAY NOT APPLY TO YOU. THIS WARRANTY PROVIDES YOU WITH SPECIFIC LEGAL RIGHTS.
THERE MAY BE OTHER RIGHTS THAT YOU MAY HAVE WHICH VARY FROM STATE TO STATE.
The following disclaimer is required by Sam Leffler and Silicon Graphics, Inc. for the use of their TIFF library:
Copyright © 1988–1997 Sam Leffler
Copyright © 1991–1997 Silicon Graphics, Inc.
Permission to use, copy, modify, distribute, and sell this software [i.e., the TIFF library] and its documentation for any purpose
is hereby granted without fee, provided that (i) the above copyright notices and this permission notice appear in all copies of
the software and related documentation, and (ii) the names of Sam Leffler and Silicon Graphics may not be used in any
advertising or publicity relating to the software without the specific, prior written permission of Sam Leffler and Silicon
Graphics.
THE SOFTWARE IS PROVIDED “AS-IS” AND WITHOUT WARRANTY OF ANY KIND, EXPRESS, IMPLIED OR
OTHERWISE, INCLUDING WITHOUT LIMITATION, ANY WARRANTY OF MERCHANTABILITY OR FITNESS FOR A
PARTICULAR PURPOSE.
IN NO EVENT SHALL SAM LEFFLER OR SILICON GRAPHICS BE LIABLE FOR ANY SPECIAL, INCIDENTAL, INDIRECT
OR CONSEQUENTIAL DAMAGES OF ANY KIND, OR ANY DAMAGES WHATSOEVER RESULTING FROM LOSS OF USE,
DATA OR PROFITS, WHETHER OR NOT ADVISED OF THE POSSIBILITY OF DAMAGE, AND ON ANY THEORY OF
LIABILITY, ARISING OUT OF OR IN CONNECTION WITH THE USE OR PERFORMANCE OF THIS SOFTWARE.
The following disclaimer is required by the Independent JPEG Group:
This software is based in part on the work of the Independent JPEG Group.
This Software may contain components licensed under the following conditions:
Copyright (c) 1989 The Regents of the University of California. All rights reserved.
Redistribution and use in source and binary forms are permitted provided that the above copyright notice and this paragraph
are duplicated in all such forms and that any documentation, advertising materials, and other materials related to such
distribution and use acknowledge that the software was developed by the University of California, Berkeley. The name of the
University may not be used to endorse or promote products derived from this software without specific prior written
permission. THIS SOFTWARE IS PROVIDED ``AS IS'' AND WITHOUT ANY EXPRESS OR IMPLIED WARRANTIES,
INCLUDING, WITHOUT LIMITATION, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A
PARTICULAR PURPOSE.
Copyright (C) 1989, 1991 by Jef Poskanzer.
3
Permission to use, copy, modify, and distribute this software and its documentation for any purpose and without fee is hereby
granted, provided that the above copyright notice appear in all copies and that both that copyright notice and this permission
notice appear in supporting documentation. This software is provided "as is" without express or implied warranty.
Copyright 1995, Trinity College Computing Center. Written by David Chappell.
Permission to use, copy, modify, and distribute this software and its documentation for any purpose and without fee is hereby
granted, provided that the above copyright notice appear in all copies and that both that copyright notice and this permission
notice appear in supporting documentation. This software is provided "as is" without express or implied warranty.
Copyright 1996 Daniel Dardailler.
Permission to use, copy, modify, distribute, and sell this software for any purpose is hereby granted without fee, provided that
the above copyright notice appear in all copies and that both that copyright notice and this permission notice appear in
supporting documentation, and that the name of Daniel Dardailler not be used in advertising or publicity pertaining to
distribution of the software without specific, written prior permission. Daniel Dardailler makes no representations about the
suitability of this software for any purpose. It is provided "as is" without express or implied warranty.
Modifications Copyright 1999 Matt Koss, under the same license as above.
Copyright (c) 1991 by AT&T.
Permission to use, copy, modify, and distribute this software for any purpose without fee is hereby granted, provided that this
entire notice is included in all copies of any software which is or includes a copy or modification of this software and in all
copies of the supporting documentation for such software.
THIS SOFTWARE IS BEING PROVIDED "AS IS", WITHOUT ANY EXPRESS OR IMPLIED WARRANTY. IN PARTICULAR,
NEITHER THE AUTHOR NOR AT&T MAKES ANY REPRESENTATION OR WARRANTY OF ANY KIND CONCERNING THE
MERCHANTABILITY OF THIS SOFTWARE OR ITS FITNESS FOR ANY PARTICULAR PURPOSE.
This product includes software developed by the University of California, Berkeley and its contributors.
The following disclaimer is required by Paradigm Matrix:
Portions of this software licensed from Paradigm Matrix.
The following disclaimer is required by Ray Sauers Associates, Inc.:
“Install-It” is licensed from Ray Sauers Associates, Inc. End-User is prohibited from taking any action to derive a source code
equivalent of “Install-It,” including by reverse assembly or reverse compilation, Ray Sauers Associates, Inc. shall in no event be
liable for any damages resulting from reseller’s failure to perform reseller’s obligation; or any damages arising from use or
operation of reseller’s products or the software; or any other damages, including but not limited to, incidental, direct, indirect,
special or consequential Damages including lost profits, or damages resulting from loss of use or inability to use reseller’s
products or the software for any reason including copyright or patent infringement, or lost data, even if Ray Sauers Associates
has been advised, knew or should have known of the possibility of such damages.
The following disclaimer is required by Videomedia, Inc.:
“Videomedia, Inc. makes no warranties whatsoever, either express or implied, regarding this product, including warranties with
respect to its merchantability or its fitness for any particular purpose.
“This software contains V-LAN ver. 3.0 Command Protocols which communicate with V-LAN ver. 3.0 products developed by
Videomedia, Inc. and V-LAN ver. 3.0 compatible products developed by third parties under license from Videomedia, Inc. Use
of this software will allow “frame accurate” editing control of applicable videotape recorder decks, videodisc recorders/players
and the like.
The following disclaimer is required by Altura Software, Inc. for the use of its Mac2Win software and Sample
Source Code:
©1993–1998 Altura Software, Inc.
The following disclaimer is required by Interplay Entertainment Corp.:
The “Interplay” name is used with the permission of Interplay Entertainment Corp., which bears no responsibility for Avid
products.
This product includes portions of the Alloy Look & Feel software from Incors GmbH.
This product includes software developed by the Apache Software Foundation (http://www.apache.org/).
© DevelopMentor
4
This product may include the JCifs library, for which the following notice applies:
JCifs © Copyright 2004, The JCIFS Project, is licensed under LGPL (http://jcifs.samba.org/). See the LGPL.txt file in the Third
Party Software directory on the installation CD.
Avid Interplay contains components licensed from LavanTech. These components may only be used as part of and in
connection with Avid Interplay.
Attn. Government User(s). Restricted Rights Legend
U.S. GOVERNMENT RESTRICTED RIGHTS. This Software and its documentation are “commercial computer software” or
“commercial computer software documentation.” In the event that such Software or documentation is acquired by or on behalf
of a unit or agency of the U.S. Government, all rights with respect to this Software and documentation are subject to the terms
of the License Agreement, pursuant to FAR §12.212(a) and/or DFARS §227.7202-1(a), as applicable.
Trademarks
003, 192 Digital I/O, 192XD I/O, 888 I/O, AirPlay, AirSPACE, AirSPACE HD, AirSpeed, ALEX, Alienbrain, AniMatte,
AudioMarket, AudioPages, AudioSuite, AudioVision, AutoSync, Avid, Avid Advanced Response, Avid DNA, Avid DNxcel,
Avid DNxHD, AVIDdrive, Avid DS Assist Station, Avid EditStar, Avid Learning Excellerator, Avid Liquid,
Avid Liquid Chrome Xe, Avid MEDIArray, Avid Mojo, AvidNet, AvidNetwork, Avid NewStar, Avid Remote Response,
AVIDstripe, Avid Unity, Avid Unity ISIS, Avid VideoRAID, Avid Xpress, AVoption, AVX, Beauty Without The Bandwidth, Boom,
C|24, CaptureManager, ChromaCurve, ChromaWheel, Command|24, Conectiv, CountDown, DAE, Dazzle,
Dazzle Digital Video Creator, Deko, DekoCast, D-Fi, D-fx, DigiDelivery, Digidesign, Digidesign Audio Engine,
Digidesign Intelligent Noise Reduction, DigiDrive, DigiLink, DigiMeter, DigiSerial, DigiStudio, DigiStudio Control,
Digital Nonlinear Accelerator, DigiTranslator, DINR, DNxchange, do more, DVD Complete, D-Verb, Eleven, Equinox,
EveryPhase, ExpertRender, Fastbreak, Fast Track, FieldPak, Film Composer, FilmScribe, Flexevent, FluidMotion, FXDeko,
G7, G-Rack, HD Core, HD Process, HDPack, HYBRID, HyperControl, HyperSPACE, HyperSPACE HDCAM, IllusionFX,
Image Independence, iNEWS, iNEWS Assign, iNEWS ControlAir, Instantwrite, Instinct,
Intelli-sat Broadcasting Recording Manager, Intelli-Sat, InterFX, Interplay, inTONE, Intraframe, iS9, iS18, iS23, iS36, ISIS,
IsoSync, KeyRig, KeyStudio, LaunchPad, LeaderPlus, Lightning, ListSync, Lo-Fi, Magic Mask, Make Anything Hollywood,
make manage move | media, Marquee, M-Audio, M-Audio Micro, Maxim, Mbox, MCXpress, Media Browse, Media Composer,
MediaDock, MediaDock Shuttle, Media Fusion, Media Illusion, MediaLog, Media Reader, Media Recorder, MEDIArray,
MediaShare, MediaStream, Media Suite, Meridien, MetaFuze, MetaSync, MicroTrack, Midiman, MissionControl, Mix Rack,
MixLab, Moviebox, Moviestar, NaturalMatch, Nearchive, NetReview, NewsCutter, Nitris, NRV-10 interFX, Octane, OMF,
OMF Interchange, OMM, OnDVD, Open Media Framework, Open Media Management, Palladium, Pinnacle,
Pinnacle DistanTV, Pinnacle Geniebox, Pinnacle HomeMusic, Pinnacle MediaSuite, Pinnacle Mobile Media, Pinnacle Studio,
Pinnacle Studio MovieBoard, Pinnacle Systems, ProEncode, ProServices, ProSessions, Pro Tools, QuietDrive, Recti-Fi,
Reel Tape Delay, Reel Tape Flanger, Reel Tape Saturation, RetroLoop, rS9, rS18, Salesview, Sci-Fi, Scorch, Scorefitter,
ScriptSync, SecureProductionEnvironment, Session, Show Center, Sibelius, SIDON, Soft SampleCell, Soft-Clip Limiter,
Sound Designer II, SPACE, SPACEShift, SpectraGraph, SpectraMatte, Sputnik, Starplay, SteadyGlide, Streamfactory,
Streamgenie, StreamRAID, Strike, Structure, Studiophile, SubCap, Sundance Digital, Sundance, Symphony, SYNC HD,
SynchroScience, SynchroScope, Syntax, TDM FlexCable, Thunder, Titan, Titansync, TL Aggro, TL AutoPan, TL Drum Rehab,
TL Everyphase, TL Fauxlder, TL In Tune, TL MasterMeter, TL Metro, TL Space, TL Utilities, Torq, Torq Xponent, Transfuser,
Trigger Finger, Trillium Lane Labs, TruTouch, UnityRAID, Vari-Fi, Velvet, Venom, VideoRAID, Video Slave Driver, VideoSPACE,
VideoSpin, Vortx, Xdeck, X-Form, Xmon, Xponent, and X-Session are either registered trademarks or trademarks of Avid
Technology, Inc. in the United States and/or other countries.
Avid ISIS 5000 Administration Guide • 0130-30340-01Rev. B • December 2010 • This document is distributed
by Avid in online (electronic) form only, and is not available for purchase in printed form.
5
Contents
Using This Guide . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 11
Who Should Use This Guide. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 11
Chapter Overview . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 11
Symbols and Conventions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 12
If You Need Help. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 13
Accessing the Online Documentation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 14
Avid Training Services . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 14
Chapter 1 Working with the Avid ISIS 5000 Management Console . . . . . . . . . . . . 15
Before Performing Administrative Functions. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 16
Opening the Management Console . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 16
Using the Management Console Interface . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 17
Navigation Toolbar . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 19
System Status Console . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 19
System Status Console Panels . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 21
Accessing Help. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 23
Session Counter. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 23
Main Tools Panel . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 24
Organizing Display Information. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 26
Moving Columns. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 26
Showing and Hiding Columns . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 27
Sorting Information. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 27
Filtering the Display. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 28
Updating Information. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 29
Selecting Items . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 29
Using Context Menus to Perform Actions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 30
Entering Text. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 31
Chapter 2 Configuring the Management Console . . . . . . . . . . . . . . . . . . . . . . . . . . 33
Configuring Management Console Preferences . . . . . . . . . . . . . . . . . . . . . . . . . . . . 33
Changing the Administrator Password . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 34
6
Configuring External Authorization. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 35
Configuring the Notification Service . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 36
Starting, Stopping, and Configuring the Notification Service. . . . . . . . . . . . . . . 36
Configuring Error Notification Parameters. . . . . . . . . . . . . . . . . . . . . . . . . . . . . 37
Configuring Contact Information . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 38
Chapter 3 Managing Avid ISIS 5000 Hardware . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 39
Managing Storage Managers. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 39
Storage Manager List . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 41
Viewing Storage Manager Details . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 42
Storage Manager Status . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 43
Adding (Binding) Storage Managers to the ISIS File System . . . . . . . . . . . . . . 45
Removing (Unbinding) Storage Managers from the ISIS File System . . . . . . . 45
Clearing Network Degraded Status Messages . . . . . . . . . . . . . . . . . . . . . . . . . 45
Managing Orphaned Managers. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 46
Orphaned Managers List . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 47
Removing Orphaned Storage Managers . . . . . . . . . . . . . . . . . . . . . . . . . . 47
Managing Storage Elements . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 48
Storage Element List . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 50
Viewing Storage Element Details . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 51
Storage Element Status . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 52
Adding Storage Elements to the File System . . . . . . . . . . . . . . . . . . . . . . . . . . 53
Rectifying Files . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 54
Chapter 4 Managing Storage Groups and Workspaces. . . . . . . . . . . . . . . . . . . . . . 55
Managing Storage Groups . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 55
Storage Group Usage Guidelines . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 57
Storage Group Protection. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 57
Storage Groups List . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 57
Viewing Storage Group Details . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 58
Adding New Storage Groups. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 60
Adding Storage Elements to Storage Groups . . . . . . . . . . . . . . . . . . . . . . . . . . 61
Deleting Storage Groups. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 62
Managing Workspaces. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 63
Allocating Workspaces . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 65
7
Workspaces List. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 65
Using the Workspace Size Graph . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 66
Viewing Workspace Details . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 67
Adding New Workspaces . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 69
Duplicating Workspaces. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 71
Renaming Workspaces . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 71
Resizing Workspaces. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 72
Setting Event Triggers . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 73
Deleting Workspaces . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 74
Managing Workspace Access Privileges . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 75
Setting Workspace Access Privileges . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 76
Redistributing Data . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 77
Redistribution Guidelines . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 78
Using Advanced Redistribution Commands. . . . . . . . . . . . . . . . . . . . . . . . . . . . 78
Chapter 5 Managing Clients . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 81
Managing User Groups. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 82
Viewing User Group Details . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 83
Adding User Groups. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 84
Modifying User Groups. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 85
Deleting User Groups. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 86
Managing Users . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 86
User List . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 88
Viewing User Details . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 88
Adding Users . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 90
Duplicating Users . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 91
Modifying Users . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 92
Deleting Users . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 93
Disabling Users . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 93
Managing LDAP Accounts . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 94
Opening LDAP Sync Tool . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 95
Using LDAP Sync Tool. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 97
Modifying the Account Synchronizer Display . . . . . . . . . . . . . . . . . . . . . . . 98
Synchronizing LDAP and ISIS Accounts. . . . . . . . . . . . . . . . . . . . . . . . . . . 98
8
Importing LDAP Users with Incorrectly Formatted LDAP UIDs . . . . . . . . 102
Connecting and Disconnecting from the ISIS and LDAP servers. . . . . . . 102
Managing Devices . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 103
Devices List . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 105
Viewing Device Details . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 105
Adding Devices . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 106
Modifying Devices . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 106
Deleting Devices . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 107
Chapter 6 Managing Connections . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 109
Monitoring Client Bandwidth. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 109
Opening the Bandwidth Tool . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 110
Bandwidth List . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 111
Scaling the Bandwidth List Graph Display. . . . . . . . . . . . . . . . . . . . . . . . . . . . 111
Monitoring System Connection Status . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 112
Opening the Connection Status Tool . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 112
Connection Status Descriptions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 113
Disconnecting Clients from the Shared Storage Network . . . . . . . . . . . . . . . . 113
Monitoring Reservations. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 114
Reservations Descriptions. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 115
Revoking Reservations . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 115
Chapter 7 System Monitoring and Diagnostics . . . . . . . . . . . . . . . . . . . . . . . . . . . 117
Logging. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 117
Using the Administration Logs. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 118
Using the System Logs Tool . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 119
Viewing System Logs . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 119
Clearing System Logs . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 119
Using The ISIS Snapshots Tool . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 120
Creating, Viewing, and Deleting Snapshots . . . . . . . . . . . . . . . . . . . . . . . . . . 121
Working with Snapshot Archives. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 122
Using the Profiler Tool . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 123
Viewing System Information. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 124
Network Utilities . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 125
System Status History Tool . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 126
9
ISIS Toolbox . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 127
Connection Analyzer Tool . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 127
Log Aggregator Tool. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 129
Using the Log Aggregator Tool . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 130
Creating Aggregate Logs. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 131
Viewing Aggregate Logs . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 132
Disk Analyzer Tool . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 133
Opening the Disk Analyzer Tool . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 134
Updating the Disk Analyzer Tool Display . . . . . . . . . . . . . . . . . . . . . . . . . 134
Running Disk Analyzer Tool Tests . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 134
Saving Disk Analyzer Test Results . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 136
Monitoring Avid ISIS 5000 with SNMP . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 136
Agent Configuration Tools. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 138
Chapter 8 Avid ISIS 5000 Control Panels . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 139
ISIS Launch Pad . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 139
Opening ISIS Launch Pad . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 140
Collapsing ISIS Launch Pad. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 140
Using Storage Manager Viewer . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 141
Avid ISIS System Director Control Panel . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 141
Starting the System Director Control Panel . . . . . . . . . . . . . . . . . . . . . . . . . . . 143
Starting and Stopping the System Director Service . . . . . . . . . . . . . . . . . . . . . 143
Changing System Director Virtual Name . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 144
Using the ISIS System Director Viewer . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 145
Monitoring System Director Status. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 145
System Director Performance Indicators. . . . . . . . . . . . . . . . . . . . . . . . . . 146
System Director Status Indicators . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 146
Resetting the System Director Event Log . . . . . . . . . . . . . . . . . . . . . . . . . 147
Working with File System Operations . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 147
Reconfiguring the File System. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 147
Creating or Re-creating a New File System . . . . . . . . . . . . . . . . . . . . . . . 148
Monitoring Metadata Status . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 148
Creating a Metadata Dump File. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 149
Resetting the Administrator Password . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 150
Managing Active Clients. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 151
10
Chapter 9 Avid ISIS 5000 Storage Manager Agent . . . . . . . . . . . . . . . . . . . . . . . . . 153
Opening the Avid ISIS 5000 Storage Manager Agent . . . . . . . . . . . . . . . . . . . . . . 153
Understanding the Agent Interface. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 154
System Tab . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 156
Managing Storage Manager Agent Profiles. . . . . . . . . . . . . . . . . . . . . . . . . . . 157
Creating New Storage Manager Agent Profiles . . . . . . . . . . . . . . . . . . . . 157
Viewing Storage Manager Agent Profiles. . . . . . . . . . . . . . . . . . . . . . . . . 157
Deleting Agent Profiles . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 157
Changing the Agent Administrator Password . . . . . . . . . . . . . . . . . . . . . . . . . 158
Statistics Tab. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 158
Tools Tab . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 160
Logging Tab . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 160
Advanced Tab . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 161
Storage Manager Logging . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 162
Using Storage Manager Agent Logging . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 162
Viewing Agent Event Logs . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 163
Clearing Agent Event Logs . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 163
Enabling and Disabling Storage Manager Logging . . . . . . . . . . . . . . . . . . . . . 163
Saving Logs. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 164
Viewing and Deleting Saved Logs. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 164
Using the Log Viewer Tool . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 165
Appendix A Avid ISIS 5000 SNMP MIB Reference . . . . . . . . . . . . . . . . . . . . . . . . . . . 167
Appendix B Avid ISIS 5000 E-mail Notification List. . . . . . . . . . . . . . . . . . . . . . . . . . 169
Index . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 177
Who Should Use This Guide
11
Using This Guide
The Avid ISIS 5000 shared storage network provides a high-performance distributed file
system that contains high-capacity shared media storage for workgroups of connected Avid
®
editing workstations.
Unless noted otherwise, the material in this document applies to the Windows
®
and
Mac OS
®
X operating systems.The majority of screen shots in this document were captured
on a Windows system, but the information applies to both Windows and Mac OS X systems.
Where differences exist, both Windows and Mac OS X screen shots are shown.
n
The documentation describes the features and hardware of all models. Therefore, your
system might not contain certain features and hardware that are covered in the
documentation.
Who Should Use This Guide
This administration guide is intended for system administrators responsible for the setup and
day-to-day management of an Avid ISIS 5000 shared storage network, as well as for users
who need to access Workspaces on the network. You should have a basic understanding of
how to use and manage the Windows
®
operating system and Mac OS
®
X systems, and you
should be familiar with basic workgroup and network concepts.
Chapter Overview
This guide contains the following chapters:
“Working with the Avid ISIS 5000 Management Console” on page 15 is an introduction
to the Avid ISIS 5000 Management Console, and contains information to help
familiarize you with using the interface and tools.
“Configuring the Management Console” on page 33 provides information about
configuring Management Console options.
“Managing Avid ISIS 5000 Hardware” on page 39 provides information about
configuring Storage Managers and Storage Elements.
“Managing Storage Groups and Workspaces” on page 55 provides information about
setting up and working with Storage Groups and Workspaces.
“Managing Clients” on page 81 provides information about working with client
accounts, including Users, Groups, and connected Devices.
12
“Managing Connections” on page 109 provides information about monitoring and
managing client connections.
“System Monitoring and Diagnostics” on page 117 provides information about using
Management Console tools to monitor and troubleshoot Avid ISIS 5000 hardware,
software, and network issues.
Avid ISIS 5000 Control Panels” on page 139 provides information on using the control
panels available from the Avid ISIS 5000 system desktop.
Avid ISIS 5000 Storage Manager Agent” on page 153 provides information about
accessing and using the Avid ISIS 5000 Storage Manager Agent.
The following appendices are also included:
Avid ISIS 5000 E-mail Notification List” on page 169 lists the messages that appear in
Avid ISIS 5000 email notifications.
Avid ISIS 5000 SNMP MIB Reference” on page 167 provides detailed information
about the Avid ISIS 5000 SNMP MIB.
Symbols and Conventions
Avid documentation uses the following symbols and conventions:
Symbol or Convention Meaning or Action
n
A note provides important related information, reminders,
recommendations, and strong suggestions.
c
A caution means that a specific action you take could cause harm to
your computer or cause you to lose data.
w
A warning describes an action that could cause you physical harm.
Follow the guidelines in this document or on the unit itself when
handling electrical equipment.
> This symbol indicates menu commands (and subcommands) in the
order you select them. For example, File > Import means to open the
File menu and then select the Import command.
This symbol indicates a single-step procedure. Multiple arrows in a list
indicate that you perform one of the actions listed.
(Windows), (Windows
only), (Macintosh), or
(Macintosh only)
This text indicates that the information applies only to the specified
operating system, either Windows or Macintosh OS X.
If You Need Help
13
If You Need Help
If you are having trouble using your Avid product:
1. Retry the action, carefully following the instructions given for that task in this guide. It
is especially important to check each step of your workflow.
2. Check the latest information that might have become available after the documentation
was published.
New information would be found in the ReadMe file supplied on your Avid installation
DVD as a PDF document and is also available online.
You should always check online for the most up-to-date release notes or ReadMe
because the online version is updated whenever new information becomes
available. To view the online versions, visit the Knowledge Base at
www.avid.com/US/support.
3. Check the documentation that came with your Avid application or your hardware for
maintenance or hardware-related issues.
4. Visit the online Knowledge Base at www.avid.com/US/support. Online services are
available 24 hours per day, 7 days per week. Search this online Knowledge Base to find
answers, to view error messages, to access troubleshooting tips, to download updates,
and to read or join online message-board discussions.
Bold font Bold font is primarily used in task instructions to identify user interface
items and keyboard sequences.
Italic font Italic font is used to emphasize certain words and to indicate variables.
Courier Bold font
Courier Bold font identifies text that you type.
Ctrl+key or mouse action Press and hold the first key while you press the last key or perform the
mouse action. For example, Command+Option+C or Ctrl+drag.
Symbol or Convention Meaning or Action
14
Accessing the Online Documentation
The Avid ISIS 5000 online documentation contains all the product documentation in PDF
format. You can access the documentation in the top-level AvidISISDocumentation folder
on the Avid ISIS 5000 installer DVD.
n
The documentation describes the features and hardware of all models. Therefore, your
system might not contain certain features and hardware that are covered in the
documentation.
To access the online documentation from the installer USB flash drive:
1. Insert the Avid ISIS 5000 USB flash drive into the USB port.
2. Navigate to the [USB flash drive]:\.AvidISISDocumentation folder, and double-click
the PDF file for the document you want to view.
Avid Training Services
Avid makes lifelong learning, career advancement, and personal development easy and
convenient. Avid understands that the knowledge you need to differentiate yourself is always
changing, and Avid continually updates course content and offers new training delivery
methods that accommodate your pressured and competitive work environment.
To learn about Avid's new online learning environment, Avid Learning Excellerator™
(ALEX), visit http://learn.avid.com.
For information on courses/schedules, training centers, certifications, courseware, and
books, please visit www.avid.com/training or call Avid Sales at 800-949-AVID
(800-949-2843).
1 Working with the Avid ISIS 5000
Management Console
This chapter contains the following topics:
Before Performing Administrative Functions
Opening the Management Console
Using the Management Console Interface
Organizing Display Information
Filtering the Display
Updating Information
Selecting Items
Entering Text
The Avid ISIS 5000 Management Console allows you to access administration functions
from any system that has an Ethernet connection to the System Director, as well as from the
System Director itself.
c
Performing administrative functions on more than one Administration site at the same
time can cause unexpected results.
When you access the Avid ISIS 5000 Management Console, the Login dialog opens, and the
site prompts you to supply a user name and password to log in. If you type the wrong
password, an error message appears and the Login dialog box reappears.
n
When you first install the Avid ISIS 5000 software, the login password is blank by default. To
set a password for the administrator, follow the procedure described in “Changing the
Administrator Password” on page 34.
Regular users can log in to the Management Console, but they will have limited access to the
Management Console interface. They can also view certain information about the network
through the Client Manager. For more information about the Client Manager, see the
Avid ISIS 5000 Client Manager Help or the Avid ISIS 5000 Quick Start Card. The
Avid ISIS 5000 Client Manager User’s Guide is also included in the Avid ISIS 5000 Online
Library as a separate document.
1 Working with the Avid ISIS 5000 Management Console
16
Before Performing Administrative Functions
It is critical that clients unmount Workspaces when you do the following:
Stopping and restarting the System Director (unmount all Workspaces)
Restarting the System Director (unmount all Workspaces)
Changing users’ or user groups’ access (unmount only the affected Workspaces)
Renaming or deleting Workspaces (unmount only the affected Workspaces)
c
If a client is using a Workspace when the ISIS system is taken offline, the connection to
the Workspace is broken and data might be lost.
Opening the Management Console
The Avid ISIS 5000 Management Console runs within a web browser window. The
following web browsers have been qualified for use with the Management Console:
Microsoft Windows
Microsoft Internet Explorer, v7.x and newer
Apple Macintosh OS X
Safari, v3.2 and newer
To open the Management Console as Administrator:
1. Open your web browser.
2. In the address bar of your browser, type the address of the active System Director:
http://[
System Director host name
]
The active System Director host name is one of the following:
- The System Director Windows host name.
- A host name which has been assigned to the active System Director on your
network DNS server(s).
Check with your network administrator if you are unsure of which System Director
name to use.
When you enter the System Director address, if any site certification warnings open,
click Yes to accept the certificate. If you are not sure about the security requirements of
your shared storage network, see your network administrator.
The Login dialog box for the ISIS Management Console opens. The “Username” field is
automatically populated with the Administrator username.
Using the Management Console Interface
17
3. Type your password.
For information on changing the administrative password, see “Changing the
Administrator Password” on page 34.
4. Click the Login button (arrow icon), or press Enter.
The Avid ISIS 5000 Home page opens.
To log out of the ISIS Management Console:
t Click the Logout link, located in the upper right corner of the screen.
Using the Management Console Interface
This section contains the following topics:
Navigation Toolbar
System Status Console
Accessing Help
Session Counter
Main Tools Panel
The ISIS Management Console, which you can run on the System Director or on any
Ethernet-attached client, has a user interface where controls are grouped by function and are
displayed by clicking the appropriate icons.
To use the ISIS Management Console, you need to have Adobe
®
Flash
®
Player installed on
your system.
n
Non-Administrator users will see a subset of the tools available to Administrators,
depending on access privileges.
1 Working with the Avid ISIS 5000 Management Console
18
rewq t y
1 System Status panel—Provides a snap shot view of several aspects of the Avid ISIS 5000
system. See “System Status Console” on page 19
2 Navigation toolbar—Access Management Console tools and bread crumb navigation. See
“Navigation Toolbar” on page 19
3 Tools panel links—Click to go to the respective tool pages. See “Main Tools Panel” on page 24
4 Help link—provides links to various ISIS help resources
5 Session counter—Displays the time remaining in the current Management Console session. See
“Session Counter” on page 23
6 Logout link—Ends the Management Console session and logs the user out of the system. See
“Opening the Management Console” on page 16
Using the Management Console Interface
19
Navigation Toolbar
The navigation toolbar provides several items to help you navigate through the
Management Console interface.
System Status Console
The System Status Console, located on the left side of the Avid ISIS 5000
Management Console, contains several components that give you a snapshot view of the
Avid ISIS 5000 system. These allow you to access additional information about your system
and to perform certain administrative tasks, such as monitoring and logging.
n
The System Status Console is available from the Login window, even if you are not logged in
to the Management Console, but you have to log in to follow links from the tool bar screens,
such as the log files.
r
ewq
t
1 Home link—You can click this link from any page to return to the Management Console Home
screen. Additionally, a pop-up navigation menu appears when you hover the mouse cursor over
this link
2 Current tool heading—Indicates the tool you are currently using and its associated icon
3 Related links section—Management Console tools that are related to the one you are currently
using are provided when relevant
4 Pop-up navigation menu headings—Click to expand the section sub-menu, click again to
collapse it
5 Pop-up navigation sub-menu—quick navigation directly to any of the links provided on the
Management Console home page
1 Working with the Avid ISIS 5000 Management Console
20
t
r
e
w
q
1 Current system status panel—error/warning/info status LEDs will be lit to indicate the
presence of system events, along with a counter indicating the current number of each type of
event
2 Status event history panel—displays which type of system events have occurred since the
System Director was started, along with the date and time of the first logged event. Clicking
this panel will open the System Status History tool. For more information, see “System Status
History Tool” on page 126
3 Storage capacity panel—displays the total Storage Group capacity, capacity allocated to
Workspaces, and the amount of capacity used by data
4 System Status Console panels—click the panel headings to display the system information
panel. For more information, see “System Status Console Panels” on page 21
5 Status retrieval panel—Management Console will periodically retrieve system status
information. The panel displays the results and the time stamp of the retrieval operation
  • Page 1 1
  • Page 2 2
  • Page 3 3
  • Page 4 4
  • Page 5 5
  • Page 6 6
  • Page 7 7
  • Page 8 8
  • Page 9 9
  • Page 10 10
  • Page 11 11
  • Page 12 12
  • Page 13 13
  • Page 14 14
  • Page 15 15
  • Page 16 16
  • Page 17 17
  • Page 18 18
  • Page 19 19
  • Page 20 20
  • Page 21 21
  • Page 22 22
  • Page 23 23
  • Page 24 24
  • Page 25 25
  • Page 26 26
  • Page 27 27
  • Page 28 28
  • Page 29 29
  • Page 30 30
  • Page 31 31
  • Page 32 32
  • Page 33 33
  • Page 34 34
  • Page 35 35
  • Page 36 36
  • Page 37 37
  • Page 38 38
  • Page 39 39
  • Page 40 40
  • Page 41 41
  • Page 42 42
  • Page 43 43
  • Page 44 44
  • Page 45 45
  • Page 46 46
  • Page 47 47
  • Page 48 48
  • Page 49 49
  • Page 50 50
  • Page 51 51
  • Page 52 52
  • Page 53 53
  • Page 54 54
  • Page 55 55
  • Page 56 56
  • Page 57 57
  • Page 58 58
  • Page 59 59
  • Page 60 60
  • Page 61 61
  • Page 62 62
  • Page 63 63
  • Page 64 64
  • Page 65 65
  • Page 66 66
  • Page 67 67
  • Page 68 68
  • Page 69 69
  • Page 70 70
  • Page 71 71
  • Page 72 72
  • Page 73 73
  • Page 74 74
  • Page 75 75
  • Page 76 76
  • Page 77 77
  • Page 78 78
  • Page 79 79
  • Page 80 80
  • Page 81 81
  • Page 82 82
  • Page 83 83
  • Page 84 84
  • Page 85 85
  • Page 86 86
  • Page 87 87
  • Page 88 88
  • Page 89 89
  • Page 90 90
  • Page 91 91
  • Page 92 92
  • Page 93 93
  • Page 94 94
  • Page 95 95
  • Page 96 96
  • Page 97 97
  • Page 98 98
  • Page 99 99
  • Page 100 100
  • Page 101 101
  • Page 102 102
  • Page 103 103
  • Page 104 104
  • Page 105 105
  • Page 106 106
  • Page 107 107
  • Page 108 108
  • Page 109 109
  • Page 110 110
  • Page 111 111
  • Page 112 112
  • Page 113 113
  • Page 114 114
  • Page 115 115
  • Page 116 116
  • Page 117 117
  • Page 118 118
  • Page 119 119
  • Page 120 120
  • Page 121 121
  • Page 122 122
  • Page 123 123
  • Page 124 124
  • Page 125 125
  • Page 126 126
  • Page 127 127
  • Page 128 128
  • Page 129 129
  • Page 130 130
  • Page 131 131
  • Page 132 132
  • Page 133 133
  • Page 134 134
  • Page 135 135
  • Page 136 136
  • Page 137 137
  • Page 138 138
  • Page 139 139
  • Page 140 140
  • Page 141 141
  • Page 142 142
  • Page 143 143
  • Page 144 144
  • Page 145 145
  • Page 146 146
  • Page 147 147
  • Page 148 148
  • Page 149 149
  • Page 150 150
  • Page 151 151
  • Page 152 152
  • Page 153 153
  • Page 154 154
  • Page 155 155
  • Page 156 156
  • Page 157 157
  • Page 158 158
  • Page 159 159
  • Page 160 160
  • Page 161 161
  • Page 162 162
  • Page 163 163
  • Page 164 164
  • Page 165 165
  • Page 166 166
  • Page 167 167
  • Page 168 168
  • Page 169 169
  • Page 170 170
  • Page 171 171
  • Page 172 172
  • Page 173 173
  • Page 174 174
  • Page 175 175
  • Page 176 176
  • Page 177 177
  • Page 178 178
  • Page 179 179
  • Page 180 180
  • Page 181 181
  • Page 182 182
  • Page 183 183
  • Page 184 184
  • Page 185 185
  • Page 186 186
  • Page 187 187
  • Page 188 188
  • Page 189 189

Avid ISIS 5000 3.1 User guide

Category
Software
Type
User guide

Ask a question and I''ll find the answer in the document

Finding information in a document is now easier with AI