{{ getBottomFeedbackTxt(displayPage) }}
{{ $t('bottomFeedback.selectTags') }}
{{ item.name }}
{{ $t('bottomFeedback.moreAdvice') }}
{{ $t('bottomFeedback.email') }}
{{ $t('bottomFeedback.agreeRecall') }}
{{ $t('bottomFeedback.submitAdvice') }}
{{ tipmsg }}
{{ getBottomFeedbackTxt(page) }}
{{ $t('rightFeedback.close') }}
{{ $t('rightFeedback.submitSuccess') }}
{{ getTitle() }} {{ $t('rightFeedback.feedback') }}
{{ $t('rightFeedback.warningTip') }}
{{ $t('rightFeedback.onlineServiceLink') }}
.
{{ getBottomFeedbackTxt(page) }}
{{ $t('bottomFeedback.selectTags') }}
{{ item.name }}
{{ $t('bottomFeedback.moreAdvice') }}
{{ $t('bottomFeedback.email') }}
{{ $t('bottomFeedback.agreeRecall') }}
{{ $t('bottomFeedback.submitAdvice') }}
{{ getTitle() }} {{ $t('rightFeedback.feedback')}}
{{ getTitle() }} {{ $t('rightFeedback.feedback')}}
{{ $t('rightFeedback.warningTip')}}
{{ $t('rightFeedback.onlineService')}}
.
{{ getBottomFeedbackTxt(page) }}
{{ $t('bottomFeedback.selectTags') }}
{{ item.name }}
{{ $t('bottomFeedback.moreAdvice') }}
{{ $t('bottomFeedback.markedContent')}}
{{ dialog_sign_txt }}
{{ $t('bottomFeedback.email') }}
{{ $t('bottomFeedback.agreeRecall') }}
{{ $t('bottomFeedback.submitAdvice') }}
{{ menuItem.name }}
{{ menuItem.name }}
{{subMenu.name}}
{{ menuItem.name }}
{{ secondMenu.name }}
{{thirdMenu.name}}
# {{ $t('index.trendingSearches') }} #
{{ $t('index.search.noSearchRecords')}}
{{ item }}
# {{ $t('index.search.searchHistory') }} #
{{ $t('index.search.deleteAll')}}
{{ $t('index.search.complete')}}
{{ $t('index.search.noSearchRecords')}}
{{ item }}
{{getProductJoinVersion(item.product,item.version)}}
{{ $t('index.search.viewMore')}}
{{language}}
{{ item.value}}
{{ $t('sangforUser.login') }}
{{ $t('sangforUser.mySangfor') }}
{{user.username}}
{{ $t('sangforUser.uid') }}{{user.uid}}
{{ $t('sangforUser.accountInfo') }}
{{ $t('sangforUser.identityTip') }}
{{ $t('sangforUser.goToAuth') }}
{{ $t('sangforUser.myFollowedProducts') }}
{{ $t('sangforUser.myCollection') }}
{{ $t('sangforUser.unreadMessages') }}
{{unreadMsg}}
{{ $t('sangforUser.logout') }}
搜索
{{getProductJoinVersion(item.product,item.version)}}
查看更多
{{item.name}}
{{subitem.name}}
{{msg}}
{{ $t('index.prodDialog.interestsProductLine') }}
{{item.name}}
{{ $t('index.prodDialog.notFollowProductLine') }},
{{ $t('index.prodDialog.clickToFocus') }}
{{ $t('index.prodDialog.allProductsAndServices') }}
{{ $t('index.prodDialog.notFoundWith') }}“
{{searchName}}
”{{ $t('index.prodDialog.productLinesReEnter') }}
{{item.name}}
{{subitem.name}}
{{ $t('index.prodDialog.noData') }}
{{ $t('index.qiyuProductLineDialog.hotProductLine') }}
{{item.name}}
{{ $t('index.qiyuProductLineDialog.noContent') }}
{{ $t('index.qiyuProductLineDialog.securityProducts') }}
{{item.name}}
{{item.name}}
{{subitem.name}}
{{ $t('snGuideDialog.question1') }}
{{ $t('snGuideDialog.question2') }}
{{ $t('versionGuideDialog.contactCustomerService') }}
{{ $t('versionGuideDialog.intelligentCustomerService') }}
{{ $t('versionGuideDialog.getVersionInfo') }}
{{ $t('addFollow.popover') }}
{{ $t('addFollow.setEmail') }}
{{ $t('addFollow.tipDailyLimit') }}
{{ $t('bindEmailModal.cannotSeeChange')}}
{{ $t('addFollow.getCode') }}
{{ timerSecond }}{{ $t('addFollow.secondsLater') }}
{{ $t('saveSetForm.problemTip1') }}
{{ $t('saveSetForm.problemTip2') }}
{{ $t('addFollow.successTip') }}
{{ $t('addFollow.confirm') }}
{{ $t('addFollow.cancel') }}
{{ $t('caseDetail.pageCatalog') }}
{{ $t('helpTip.prefix') }}
{{ $t('helpTip.onlineService') }}
{{ $t('helpTip.suffix') }}.
{{ $t('downloadWarnModal.contentOnlyFor') }} {{powertip}}
{{ $t('downloadWarnModal.pleaseAuthFirst') }}
{{ $t('downloadWarnModal.authAsCustomer') }}
{{ $t('downloadWarnModal.authAsPartner') }}
{{ $t('downloadWarnModal.authAsEmployee') }}
{{ $t('downloadWarnModal.goToAuth') }}
{{ $t('downloadWarnModal.onlineService') }}
{{authTips}}
{{authTips}}
{{ $t('downloadWarnModal.clickToLearnAuth') }}
{{ showPowerText +' '+ $t('toolList.permission') + getPowerName }}
{{ $t('common.buttons.selectAll') }}
{{ node.label }}
{{ $t('common.buttons.cancel') }}
{{ $t('common.buttons.confirm') }}
{{ $t('toolList.download') }}
{{ $t('toolList.downloadPdf') }}
{{ $t('toolList.download') }}
{{ $t('toolList.shareContent') }}
{{ $t('toolList.copyLinkSuccess') }}
{{ $t('toolList.copyLink') }}
{{ $t('toolList.share') }}
{{isCurCollection ? $t('toolList.cancelCollect') : $t('toolList.collectContent')}}
{{isCurCollection ? $t('toolList.cancelCollect') : $t('toolList.collect')}}
{{ $t('index.defaultHeader.chromeBrowserTip') }}
{{ $t('index.defaultHeader.logo') }}
Sangfor Cloud Platform (SCP)
Enterprise Cloud Computing Platform Built on Business-Centric HCI.
{{ $t('productSubHeader.tabs.document') }}
{{ $t('productSubHeader.tabs.bestPractice') }}
{{ $t('productSubHeader.tabs.case') }}
{{ $t('productSubHeader.tabs.tool') }}
{{ $t('productSubHeader.tabs.bbs') }}
{{ $t('productSubHeader.searchLabel') }}
{{ $t('productDocDetail.guideClickSwitch') }}
{{ $t('productDocDetail.know') }}
{{ $t('productDocDetail.dontRemind') }}
6.11.3
{{item.code}}
Release Notes
Overview
SCP New Features
Upgrade Path
Sangfor Cloud Platform (SCP)
NFV Components Upgrade
Upgrade Impacts
Upgrade Instructions for Customers
Implementation Procedure
Upgrade Tools
Post Upgrade Check
Rollback
Policy Migration(New)
Memory Tiering(New)
Introduction
Operation Guide
Customization Specifications(New)
HotAdd(New)
Agentless Backup Development Guide
Introduction
Agentless Backup
Transport Mode
NBDSSL Transport
HotAdd Transport
SFVDDK
OpenAPI
Agentless Backup Deployment
Platform Configuration
Backup Proxy VM Deployment
Image Creation
Bulk VM Deployment
Network Deployment
NBDSSL Transport
HotAdd Transport
Backup Account Creation
Backup Account Creation on SCP
Backup Account Creation on HCI
Agentless Backup Instructions
SFVDDK Installation and Development
SFVDDK Installation
SFVDDK Development Introduction
OpenAPI Instructions
CBT Instructions
Backup Process
Recovery Process
Standard Recovery
Quick Recovery
Sample Code
Advanced Features
File Upload and Download
Backup and Recovery of VM with Custom BIOS
Custom BIOS File Backup
Custom BIOS File Recovery
Backup and Recovery of VMs with TPM Enabled
TPM File Backup
TPM File Recovery
Encrypted VM Backup And Recovery
Encrypted VM Backup
Encrypted VM Recovery
Linked VM Backup And Recovery
Backup and Recovery of VMs in a Consistency Group
Precautions
Agentless Backup API 3rd-party Integration User Guide
About This Document
Environment Deployment and Configuration
HCI
SCP
Licensing
HCI
SCP
Transport Mode
Deployment of Backup Proxy VMs
Supported Architectures
Connection Preparations
Connect to Agentless Backup via SCP
Enable Agentless Backup Service Port
Configure Agentless Backup
User Permission Control
SFVDDK
SFVDDK Installation
SFVDDK APIs
Open APIs
Asynchronous Task Mechanism
Feature Connection
Platform Connection
Authentication and Authorization
Platform Version Check
Add VMs to a Backup Policy
Backup and Recovery
Create a Backup
Recover to a New VM
Recover to the Original VM
Differentially Recover to the Original VM
Rapid Recovery
Notes
Ecological Docking Documentation(New)
Product Overview
Product Architecture
Management Layer
Virtualization Layer
Physical Infrastructure Layer
Key Functionalities
aSV
Architecture
Business Deployment
Resource Management
Data Protection
Fault Prevention and Handling
Performance and Reliability Optimization
aSAN
Architecture
High Performance
High Reliability
Smart O&M
Advanced Storage Features
aNET
Architecture
Network Deployment
High-Performance Network
Virtual Network Elements
Network Traffic Forwarding Models
Intelligent DFW Policy Recommendation Based on aNI
Traffic Mirroring
Network O&M
aSecurity
Architecture
VM Security
Cloud Firewall
vNGAF
vAC
vSSL VPN
vAD
Data Security
Management
Resource Management
System Management
Licensing
Operations Management
Application Scenarios
Private Cloud Solution
Business Scenarios and Challenges
Solution Architecture and Benefits
Customer Value
Disaster Recovery Solution
Business Scenarios and Challenges
Solution Architecture and Benefits
Customer Value
Database Management Solution
Business Scenarios and Challenges
Solution Architecture and Benefits
Customer Value
Server Virtualization Solution
Business Scenarios and Challenges
Solution Architecture
Customer Value
GPU Scenario Solution
Business Scenarios and Challenges
Solution Architecture and Benefits
Customer Value
VDI Solution
Business Scenarios and Challenges
Solution Architecture and Benefits
Customer Value
Installation And Deployment
Networking Installation Introduction
Introduction to Network Planes
Recommended Networking Configuration
Introduction to HCI Ordinary Cluster Networking
Introduction to HCI Stretched Cluster Networking
Preparation Before Installation
Document and Tool Preparation
HCI Cluster Configuration Requirements
Witness Node Configuration Requirements
Switch Configuration Requirements
Introduction to Installation Process
HCI Virtualization System Installation
aServer
Third-Party Server
Witness Node System Installation (Optional)
Stretched Clusters
Preventing Split-Brain in Dual-Host Clusters
Service Packs
Service Packs Settings
Obtain Service Pack Information
HCI Cluster Initialization
HCI Cluster Initialization Conditions
Cluster Formation
Configure Cluster IP
Configure Cluster Time
Configure Alert Notification (Optional)
Add Node
Configure Controller Node Pool
Manage Communication Port Configuration
Overlay Network Interface Configuration
Virtual Storage Configuration
Configure Storage Network Interface
Enable RDMA (Optional)
Configuring Datastore Type and Disks
aDesk Communication Interface (Optional)
Platform License
SCP Licensing
Virtual Key Licensing
HCI Licensing
USB Key Licensing
Virtual Key Licensing
Configure Link Layer Discovery Protocol (LLDP)
Physical Edge Configuration
Three Networks Multiplexing (Optional)
Four Networks Multiplexing (Optional)
Health Check of Cluster Status
Use the aDeploy Tool For Detection
Sangfor aSecurity (aSEC) Deployment
aSEC Deployment
Enable Security Capabilities
Install the VM Security Component
Platform License
Authorization Change Description
Virtual Machine Service
Introduction
Introduction to VMs
VM Benefits
Application Scenarios
Specifications
VM Types and Specifications
Ordinary VMs
VMs with Turbo Mode Enabled
VMs with USB Passthrough Enabled
GPU-Enabled VMs
VMs with Shared Disk
VMs with Disk Passthrough Enabled
Related Concepts
Turbo Mode
Huge-Page Memory
HA
Procedure
VM Creation
Applying for VM
VM Creation Statuses
vmTools Installation
Data Disk Initialization
Login to VM
VM Lifecycle Management
Power-On
Power-Off
Restart
Reset
Suspension
Deletion
Allocation
Deallocation
Filtering
Search
VM List Export
VM Export
Image Creation
Compatibility Upgrade
Migration and Scheduling
Live Migration (VM in Running Status)
Cold Migration (Off Status)
Resource and Configuration Changes
Resource Change
Feature Change
Attribute and Tag Management
Custom Attribute Configuration
Tag Configuration
Expiration Date and Group Management
VM Expiration Date Management
Create Group
Change Group
VM Security and Authentication
Authentication Management
Security Configuration
Back Up VM
Clone VM
VM Advanced Features
Enable Turbo Mode
FAQ
The cloned VM cannot access the network, and the message prompts that IP address conflicts exist. What should I do?
Software license becomes invalid after cloning, and the message prompts that the device does not match. What is the reason?
The cloned VM performs worse than the source VM, with significant lag. What is the reason?
When a cloned Windows VM is joined to a domain controller, the message prompts that SID conflicts exist. What should I do?
Live migration speed of the VM is too low. How to improve efficiency?
After cross-version migration, the VM cannot perform operations, including expanding disk capacity or performing live migration, and the message prompts that the feature is restricted. What should I do?
Will configured monitoring or backup policies become invalid after a VM's name or group is changed?
Can a VM be cloned or migrated across different architectures (Example: migrate a VM from x86 cluster to ARM cluster)?
Networking Service Manual
Topology
Introduction
Working Principles
Application Scenarios
Related Concepts
Constraints and Restrictions
Topology Edit Mode
Direct Connect Gateways
Network Node Settings
Connectivity Test
Virtual Switch Configuration
Router Configuration (in Topology)
IP and Bandwidth
Elastic IP Addresses
1.2.1.5 Elastic IP Pool Creation
Virtual IP Addresses
Network Insight
Overview
aNI Deployment
Internal IP Address Management
Alert Settings
Feature Management
aNI Upgrade
Recommended Policy Set
Access Records and Risk Monitoring
Access Relationship Topology
Traffic Mirroring
Introduction
Traffic Mirroring Policy Creation
Traffic Mirroring Policy Editing
Traffic Mirroring Policy Deletion
Network Deployment
VPC Gateway Management
Tenant Network Management
Communication Domain Creation
Edge Creation
Shared Service Network
Introduction
Gateway Planning
Shared Service Network Creation
Shared Service Network Editing
Shared Service Network Deletion
Overview of Tenant Shared Service
Tenant Shared Service Editing
Image Service
Introduction
Service Introduction
Image Types
Public VM Images
Private VM Images
Network Device Images
Advanced Service Images
Supported Features
Application Scenarios of Image Service
Creating Virtual Machines from Images
Creating Private Images from Virtual Machines
Creating Private Images from External Files
Operation Procedures
Create Images
Upload Public Images
Upload Private Images
Make Image
Use Images
Images Management
Public VM Images Management
View Public Images
Edit Images
Download Images
Delete Images
Private image management
View Private VM Images
Network Device Images Management
Advanced Service Images
Image Storage Settings
Migration
General Principles of Migration Design
Migration Preparation
Information Collection and Analysis
Information Collection for Common Migration
Hardware Information
Software Information
Resource Load
Information collection from VMware
Summarize Information
Application Dependency Analysis
Business Cutover Window
Task Duration
Cutover Time
Migration Design
Migration Design General Rules
Migration Method
SCMT
Platform Components
Point-to-point Migration (agentless)
Point-to-point Migration (agent-based)
Hot Standby Migration
Backup Migration
Compatibility
Port and Network Requirements
aHM
ISO
Choose the right migration method
Resource Assessment
CPU Configuration Assessment
Memory Configuration Assessment
Storage Configuration Assessment
Resource Overcommitment Principles
Resource Planning
VM Configuration Plan
VM Resource Allocation
Critical Virtual Machine Assurance
Advanced Virtual Machine Configuration
Virtual Machine Scheduling Policies
Migration Feasibility Assessment
Migration Implementation
Migration Implementation
SCMT
SCMT Installation
Point-to-Point Agentless Migration
Point-to-Point Agent-Based Migration
Hot Standby Migration
Backup Migration
aHM
Add VMware to Sangfor SCP
Create Migration Task
Task Monitoring and Cut Over
ISO
Migration verification
Rollback
VM Settings on HCI
Troubleshooting
SCMT
Agent Installation Issues
The kernel version is not compatible
The initrd(initial ramdisk) of default start item is mismatched with running kernel version.
error “modinfo: not found” is reported
“Uncompressing linux-agent SetupExtraction failed” is displayed.
Error: install driver failed: -3
Version “GLIBC_PRIVATE” not found
Issues When Creating Migration Tasks
Target machine cannot select network card
Target machine cannot select running location or storage policy
Issues During Migration Process
Switch failed “Failed to obtain the installation path”
Issue: switch failed error code12321
Sync failed error code 2350
Failed to disable network access for the source
Issues After Migration
After migrating Windows, it cannot Enter the system after switching over.
After cutover, the target machine cannot find the boot device.
After Windows migration and switchover, the target machine has a black screen
Files are found to be missing after migration.
aHM
ISO
Storage Service
Overview
Storage Architecture
Storage Terminology
Storage Type
Storage Feature Comparison
Basic Characteristics Comparison
VM Support Features Comparison
Virtual Storage Creation and Management
Operation Process
aSAN Maximum Configuration Specifications
aSAN Key Technologies and Principles
Virtual Storage Pool Creation
Storage Area Network Settings
Dedicated Mode
Shared Mode
Stretch Cluster Network
Virtual Storage Pool Creation
Ordinary Clusters
Stretch clusters
Virtual Storage Pool Management
Storage pool viewing
Virtual Storage Pool Expansion
Principles of Expansion
Expansion Steps
Storage Policy
Virtual Storage Reliability Configuration
Shared Virtual Disk
Virtual iSCSI Disks
Storage Pool Shrinkage
Storage Pool Deletion
FAQ
Local Storage Pool Creation and Management
Operation Process
Local storage Pool Creation
Local Storage Management
Storage Pool Viewing
Storage Pool Deletion
FAQ
External Storage Integration and Management
Operation Process
External Storage Integration
FC SAN Integration
IP SAN Integration
NFS Storage Integration
External Storage Management
Storage Viewing
Storage Multipathing
Storage Expansion
Share Virtual Disks
Storage Remove
FAQ
Backup Service
Overview
Backup Terminology
Backup Types
Quick Backup
Principle
Precautions
CDP
Principle
Functions and characteristics of HCI CDP
Precautions
Backup Creation and Management
Backup Creation
Quick Backup
Backup Policy
Manually Backup
CDP
Backup Management
Quick Backup
Backups View
Backups recovery
Backups repository view
Backup Copy
Backup Deletion
CDP
Backup Settings
Concurrent Tasks
Speed per VM
FAQ
Snapshot Service
Feature Introduce
Background
Constraints and Limitations
Precautions
Definition
Snapshot Write & Read processes
Storage Based Snapshot Write Process
Storage Based Snapshot Read Process
Disk Based Snapshot Process
Disk Based Snapshot Process
Application Scenarios
Snapshot Implementation
Snapshots Configuration
Configuration Process
Login SCP
Check License
Operation Steps
Snapshots Management
Browse Snapshot information
Modify snapshot properties
Restore Snapshot
Clone virtual machines from snapshots
Delete snapshots
Consistency Snapshot Management
Browse Consistency Group
Create Consistency Group
Modify Consistency Group
Clone Consistency Group
Delete Consistency Group
Create a Consistent Snapshot
Restore from Snapshots
Clone from Snapshots
Snapshot Polices Management
Browse Snapshot Polices
Create a Snapshot Policy
Enable/Disable Snapshot Policies
Activate Snapshot Policies Immediately
Delete Snapshot Policies
Advance Features
Correlated Snapshotting
Correlated NDR
Correlated aSEC
FAQ
Primary-Secondary Disaster Recovery
Product Introduction
Definition and Benefits of DR
Implementation Principle
Terms
Primary/Secondary DR Workflow
Data Backup and Replication
Consistency Group
Primary/Secondary Failover
Applicable Scenarios
Local-Site DR
Cross-Site DR
Constraints and Restrictions
Assessment and Planning
Information Collection
DR Resource Estimation
Online Resource Estimation
Offline Resource Estimation
Backup Repository Requirements
DR Network Planning
Networking Precautions
Introduction to Primary Site and Secondary Site Networking
Installation and Deployment
Basic Configuration
SCP Deployment in Cluster Mode (Recommended)
SCP Deployment in Active/Standby Mode (Optional)
Cluster Initialization
DR Transmission Interface Configuration
Add Resource Pools
Time Settings (Required)
SP Check with aDeploy
DR Configuration Guide
Primary/Secondary DR Configuration
Add DR Sites
Add DR Links
Configure DR Policies
Replica Seeds
Add Protection Groups
Create Recovery Plans
Recovery Configuration
Recovery Workflow
DR Test
Recover VMs on Primary Site
Recover VMs on Secondary Site
Fail Back to Primary Site
Multiple-Tenant Management
Feature Description
Feature Introduction
Constraints and Limitations
Application Scenario
Multiple-Tenant Configuration
Configuration Process
Operation Steps
MSP Administrator (Optional)
Tenant Creation
Tenant User Creation
MSP Management
Browse MSP Accounts
Edit MSP Accounts
Set MSP Quotas
Select Resource Pools
Reset MSP Account Passwords
Enable Login Protection
Delete MSP Accounts
Export MSP Accounts Information’s
Multiple-Tenant Management
Browser Tenant Accounts
Disable Tenant Accounts
Enable Tenant Accounts
Edit Tenant Accounts
Set Tenant Quotas
Select Resource Pools
Reset Tenant Account Passwords
Enable Login Protection
Delete Tenant Accounts
Invite Tenants
Export Tenant Account Information’s
Tenant User
Browse Tenant Users
Edit Tenant Users
Reset Tenant User Passwords
Enable Login Protection
Delete Tenant Users
Tenant User Guide
Compute
Virtual Machine
Create / Delete Virtual Machine
Virtual Machine Validity
View Virtual Machine Summary
Export Virtual Machine
Virtual Machine Snapshots
Virtual Machine Backup
Browse Files
Image
Networking
Network Topology
Virtual Machine Operation
Subnet Management
Port Mapping Configuration
IP And Bandwidth
Elastic IP
Shared Bandwidth
Network Deployment
VPC
Classic Network
Application Delivery Controller (ADC)
Security
NFV Features
Distributed Firewall
Reliability
Scheduled Backup Policy
CDP Policy
Disaster Recovery
Auto Scaling
Creating AS Group
Creating AS Configuration
Create AS Policy
Monitor and Management
Monitoring Dashboard
Alert
Quota
Recycle Bin
Bills
Work Orders
Monitor Center
Product Introduction
Definition and Benefits of Monitoring
Common O&M Metrics
Applicable Scenarios
Constraints and Restrictions
Integration with Third-Party Monitoring Ecosystem
Syslog Integration
Alert SMS Pushing Configuration
Alert Email Pushing Configuration
SNMP Integration and Deployment (Zabbix)
Disable Encryption for Host Monitoring
Enable Encryption for Host Monitoring
Monitor Center Configuration Guide
Monitoring Overview
Monitoring Reports
Alert Center
Alert Records
Alert Policies
Notification Policies
Monitoring Configuration Best Practices
Timeliness (Notification Policies)
Classification and Grading (Alert Policies)
Accuracy (Alert Policies)
Cluster Management
Overview
Terminology
Cluster Creation and Management
Cluster Creation
HCI Cluster Initialization Conditions
Configure Cluster IP
Configure Cluster Time
Add New Node
SCP Deployment
SCP Import and Creation
SCP License
Cluster Management
HCI Cluster Management
Add Physical Resources
Cluster License
VMware Management
Third-Party Public Cloud Management
Cluster Reliability
HA
HA Test Guide
Business Network Failure Scenario HA (Suggest)
Host Power Failure Scenario HA
DRS
VM Scheduling
Scheduling Policies:
Scheduling Policies Creation
VM Startup Order
VM Groups
Host Groups
Cluster Maintenance
Maintenance Mode
System Backup and Restore
Cluster Configuration Backup
System Log Backup
Restored to Factory Defaults (High-Risk Operation)
Expansion
aSAN Expansion Principles
aSV Expansion Principles
aSV Expansion Steps
aSAN Expansion Steps
Upgrade
Upgrade Sequence
Upgrade Process Overview
HCI Upgrade
Upgrade Methods
Upgrade Impacts
Upgrade Notes
Pre-upgrade Check
Upgrade Steps
Graphics Card Driver Upgrade
SCP Upgrade
SCP Pre-Upgrade Check
SCP Upgrade Steps
Patch
HCI Patch Pre-check
HCI Patch Steps
SCP Patch
FAQ
Platform Management
User Management
Platform Admins
Permission Policies
LDAP Authentication
System management
Date And Time
Platform IP Configuration
Data Center Settings
SMTP Server
Certificate Settings
Component Management
Operational Audit
Recycle Bin
Custom Attributes
Platform Customization
Services Management
Security Management
Login Policy
Login Protection
Disk Encryption Settings
Data Erasure Settings
Key Pairs
Key Management Service
Security Service
Overview
Core System Hardening (Hypervisor & OS Level)
Platform-Level Security Configuration
HCI Platform
Access Control & Identity Management
Implementing Password Policy and Login Policy
Configure Role-Based Access Control (RBAC)
Enforce Login Restrictions
Enable Two-Factor Authentication (2FA)
Manage System Ports
Configure Residual Information Protection
System Auditing & Monitoring
Configure Syslog Forwarding
Configure Alert Notifications
Monitor Platform Alerts
SCP Platform
Access Control & Identity Management
Configure Role-Based Access Control (RBAC)
Permission Policies
Access Restriction
Login Policy
Login Protection(2FA)
Data Erasure
Remote Maintenance (SSH)
System Auditing & Monitoring
Virtual Machine
Distributed Firewall
VPC Firewall
aSEC Deployment
Preparation
Steps
Import SCP License
Create Account User for aSEC
Enable Correlated Security Service
Import aSEC VM
Configuration Of aSEC VM
Add Resource Pool and Enable the Security Capabilities
VM Security Agent Installation
Data Protection Policy
Cyber Attack Protection
Dashboard
VM Security
Security Events
Vulnerabilities
Logs
Settings
vNGAF
Classical vNGAF deployment
VPC vNGAF Deployment
VM Disk Encryption
Proactive Maintenance & Vulnerability Management
Comprehensive Audits with the aDeploy Tool
Maintenance & Operations Guide
SCP O&M Guide
Monitoring and Alerting Module
Core Objectives
O&M Guidelines
Health Check
Core Objectives
O&M Guidelines
aDeploy
Core Objectives
O&M Guidelines
Sangfor CLI
Core Objectives
O&M Guidelines
SCP Routine O&M Guide
Daily O&M Guidelines
Core Objectives
Focuses and Guidelines
Weekly O&M Guidelines
Core Objectives
Focuses and Guidelines
Monthly O&M Guidelines
Core Objectives
Focuses and Guidelines
Basic Service Adjustment Guide
System Power-On and Power-Off
Applicable Scenarios
Core Principles
O&M Guidelines
Upgrade and SP Installation Guidelines
Applicable Scenarios
Core Principles
O&M Guidelines
Network Configuration Adjustment
Applicable Scenarios
Core Principles
O&M Guidelines
Capacity Expansion
Applicable Scenarios
Core Principles
Capacity Expansion Guidelines
SCP O&M Risks and Precautions
Common O&M Risks
Risk Mitigation
O&M Responsibilities and Archiving Requirements
aDeploy Use Guide
Overview
Introduction
Auto Upgrade
Key Features
Installation and Upgrade
Download aDeploy
Install aDeploy
Upgrade aDeploy
Manual Upgrade
Uninstall aDeploy
Usage
Health Check
HCI Health Check
SCP Health Check
Toolkit
Sangfor HCI Installation
Disk Cleanup
Interface Reordering
Patch Validation Removal
IPMI Password Change
Sangfor Installer
Install Endpoint Secure Agent on HCI
Install Endpoint Secure Agent, LAS Agent, and DAS Agent on SCP
HCI Cluster Shrink
Admin Password Encryption
Allow SSD
Burn-in Test
Allow RDMA
Hardware Replacement
HCI Logs and Configuration Collection
License Info
Pre-sales Selection
Performance Diagnostics
Log in to the HCI Cluster
Check VMs
Check Nodes
Automatically Check VMs or Nodes
Hardware Troubleshooting
Patch Application
Pre-change Check
Pre-upgrade Check
Check for HCI Upgrade Path
HCI Pre-upgrade Check and Pre-upgrade Package Installation
Pre-patch Check
Pre-expansion Check
Pre-replacement Check for Disks
Pre-replacement Check for Nodes
Feedback
Troubleshooting Common Issues
Windows Compatibility Issues
The Mapping Relationship Between HCI and SCP
DMP_V2.3.6_User Manual
Sangfor Cloud Platform (SCP)
{{ breadTitle }}
Storage Service
Local Storage Pool Creation and Management
Local Storage Management
{{sendMatomoQuery("Sangfor Cloud Platform (SCP)","Local Storage Management")}}
Local Storage Management
{{ $t('productDocDetail.updateTime') }}: 2025-12-18
Storage Pool Viewing
Storage Pool Deletion