HP XP7 Remote Web Console User Guide

Size: px
Start display at page:

Download "HP XP7 Remote Web Console User Guide"

Transcription

1 HP XP7 Remote Web Console User Guide Abstract This document provides information and instructions to help you set up Remote Web Console for the HP XP7 Storage system, set up end-user computers and web browsers, and establish user accounts and permissions. It explains the GUI features and provides basic navigation information. Complete information for performing specific tasks in Remote Web Console is contained in the HP XP7 Storage software user guides. HP Part Number: H6F Published: September 2014 Edition: 2

2 Copyright 2014 Hewlett-Packard Development Company, L.P. Confidential computer software. Valid license from HP required for possession, use or copying. Consistent with FAR and , Commercial Computer Software, Computer Software Documentation, and Technical Data for Commercial s are licensed to the U.S. Government under vendor's standard commercial license. The information contained herein is subject to change without notice. The only warranties for HP products and services are set forth in the express warranty statements accompanying such products and services. Nothing herein should be construed as constituting an additional warranty. HP shall not be liable for technical or editorial errors or omissions contained herein. Acknowledgments Itanium and the Intel Inside logo are trademarks or registered trademarks of Intel Corporation or its subsidiaries in the United States and other countries. Microsoft, Windows, Windows XP, and Windows NT are U.S. registered trademarks of Microsoft Corporation. Adobe and Acrobat are trademarks of Adobe Systems Incorporated. Java is a registered trademark of Oracle and/or its affiliates. UNIX is a registered trademark of The Open Group. Revision History Revision 2 September 2014 Applies to microcode version /00 or later. Revision 1 May 2014 Applies to microcode version /02 or later.

3 Contents 1 Remote Web Console overview...10 Managing the storage system...10 GUI feature highlights...10 Multitaskinig...11 Wizards and task management...11 Reporting...12 Online Help...12 Remote Web Console components Setting up Remote Web Console...13 Setup workflow...13 Cable connection requirements...13 Enabling IPv6 communication...13 Configuring IPv6 communication in Windows Configuring IPv6 communication in Solaris Registering the Primary SVP Host Name...14 Setting up SSL encryption...14 Flow of SSL communication settings...15 Notes on updating the signed certificate to the SVP...15 Creating a keypair...15 Creating a private key (.key file)...15 Creating a public key (.csr file)...16 Acquiring a signed certificate...17 Acquiring a self-signed certificate...17 Acquiring a signed and trusted certificate...17 Uploading the signed certificate...17 Returning the certificate to default...19 Importing the certificate to the SVP...20 Blocking HTTP communication to the storage system...23 Releasing HTTP communication blocking...24 Setting up a client computer...24 Requirements for client computers...24 Requirements for Windows-based computers...25 Requirements for UNIX/Linux-based computers...26 Configuring a Windows Server...27 Setting up TCP/IP for a firewall...27 Configuring the web browser...27 Installing Adobe Flash Player...27 Configuring certificates for CVAE...28 Registering certificates for CVAE...28 Notes on registering certificates for CVAE...29 Deleting certificates for CVAE...29 Using the SMI-S function with a RWC user account...30 Using the SMI-S function...30 Prerequisites...31 Procedure...31 Troubleshooting...31 Uploading a signed certificate to the SMI-S provider...31 Prerequisites...31 Procedure...31 Returning an SMI-S provider certificate to default...32 Uploading an SMI-S provider configuration file...33 Contents 3

4 Prerequisites...33 Procedure...33 Returning an SMI-S provider configuration file to default...34 Installing the report configuration tool...35 Prerequisites...35 Installation procedure...36 Using the report configuration tool Getting started using Remote Web Console...37 Logging in to Remote Web Console...37 Initial super-user login...37 Normal login...37 Changing your password...39 Adding your SVP to the trusted sites zone for Windows server...39 Remote Web Console restrictions...40 General restrictions...40 Web browser restrictions while using Remote Web Console...40 Unsupported actions in Windows version of RWC...41 Unsupported actions in UNIX version of RWC...41 Applying changes made in Remote Web Console...41 Refreshing data after an Auto LUN or Quick Restore operation...42 Refreshing data after operations performed with another application...42 Capacities displayed on the Remote Web Console screen...42 Caution on LUN ID notation...42 Refreshing your user view...42 Setting the view back to default...43 Remote Web Console main window...43 Main window and wizard...45 Main window controls...46 Buttons...46 Table Controls...47 Filtering...47 Tooltip...48 Balloon dialog box...48 Setting Remote Web Console secondary windows...48 For more information about Remote Web Console Setting up and managing user accounts...50 Workflow for creating and managing user accounts...50 Using an authentication server and authorization server...50 Authentication server protocols...51 Authorization server requirements...51 Connecting two authentication servers...52 Connecting authentication and authorization servers...52 Naming a user group in Remote Web Console...53 User Groups...53 Precautions when working with user groups...54 Roles...54 Built-in groups, roles, and resource groups...56 Creating a new user group...58 Managing user accounts...58 Creating user accounts...59 Changing user passwords...60 Changing user permissions...61 Disabling user accounts...62 Deleting user accounts Contents

5 Managing certificates for HP Systems Insight Manager...62 Required role for single sign-on...63 Importing a tool definition file into HP Systems Insight Manager...63 Registering the certificates for single sign-on...63 Deleting the certificates for single sign-on...65 Removing a tool definition file from HP Systems Insight Manager...65 Changing the user group configuration...65 Changing a user group name...65 Changing user group permissions...66 Changing resource groups assigned to a user group...66 Deleting a user group...67 Account lock policy...67 Session timeout Configuring the Remote Web Console environment...68 Configuration overview...68 Creating a login message...68 Setting storage system information...68 Reporting failure information about storage systems...69 Requirements of the new Syslog protocol (TLS1.2/RFC5424)...69 Obtaining a client certificate for the new Syslog protocol...70 Setting and configuring syslog notification for SIMs...70 Configuring notification...71 Setting system options...73 Setting Remote Web Console environmental parameters...74 Backing up and restoring RWC configuration files License keys...78 License keys overview...78 License key types...78 Using the permanent key...79 Using the term key...79 Using the temporary key...79 Using the emergency key...79 Using the meter key...80 Grace Period status with meter key...81 Estimating licensed capacity...82 Software and licensed capacity...82 Calculating licensed capacity for a normal volume...84 Calculating licensed capacity for an external volume...84 Calculating pool capacity...84 Installing and uninstalling software...85 Installing the software...85 When the status is Installed (Disabled)...86 Enabling a license...86 Disabling a license...86 Removing a software application...86 Updating license status...87 Viewing license information...87 Cautions on license capacities in non-license-related windows...88 Cautions on licenses...89 License key expiration Viewing and managing the storage system...90 Viewing and managing overview...90 Viewing storage system information...90 Contents 5

6 Viewing basic information...90 Viewing specific information...91 Viewing other system information...91 Viewing port conditions...91 Status icons for certain resources...92 Viewing Remote Web Console data using external applications...92 Using reports to verify system changes...93 Viewing a Remote Web Console report...93 Creating a configuration report...94 Deleting a configuration report...94 Managing tasks...94 Tasks window...95 Managing your tasks...95 Stalled tasks...95 Setting the status refresh interval of the Tasks window...96 Creating a configuration report using the Report Configuration Tool...96 Preparing a script file...96 Example execution and explanation of script files...99 Error in executing Report Configuration Tool...99 Executing a regularly scheduled script file Troubleshooting General troubleshooting Checking alerts Login errors No-response errors Incorrect display errors UNIX operation errors Other errors Clearing the web browser cache Enabling JavaScript for Windows Firefox web browser problems on UNIX Downloading dump files using the Dump tool Support and other resources Contacting HP Subscription service Related information Websites Typographic conventions Customer self repair Documentation feedback A Storage configuration reports Reports in table view Disk Adapters report Host Groups report Hosts report Logical Devices report LUNs report MP Blades report MP Blade Details report Parity Groups report Ports report Spare Drives report SSD Endurance report Contents

7 Storage System Summary report Reports in graphical view Cache Memories report Channel Adapters report Physical View report B Report Configuration Tool command reference (raidinf commands) raidinf command list and command description raidinf command syntax raidinf add report raidinf delete report raidinf download report raidinf get reportinfo C SMI-S provider configuration file User-defined.properties file File description format File organization format Parameters defined in user configuration files CipherSuites parameter VVolForSnapshot parameter PoolIDForSnapshot parameter DefaultSnapshotFunction parameter D Using Remote Web Console secondary windows Requirements for using RWC secondary windows Installing and configuring JRE Java Runtime Environment version Path setting (UNIX) Configuring JRE Setting up Java Enabling the Remote Web Console secondary window Using the Remote Web Console secondary window Secondary window menus and buttons Opening Remote Web Console secondary windows RWC secondary windows and Modify mode Resetting timeout period for Modify mode Main window and Modify mode Cautions on use of the secondary window Java Update Needed dialog box Troubleshooting Clearing Java caches Saving Java log and trace files E Remote Web Console user management GUI reference User Groups window Selected User Group Window Create User Group wizard Create User Group window Confirm window (Create User Group) Create User wizard Create User window Confirm window (Create User) Change Password Wizard Change Password window Confirm window (Change Password) Edit User wizard Contents 7

8 Edit User window Confirm window (Edit User) Add User wizard Add Users window Confirm window (Add Users) Remove Users window Delete Users window Edit User Group wizard Edit User Group window Confirm window (Edit User Group) Delete User Groups window Edit Resource Group Assignment wizard Edit Resource Group Assignment window Confirm window (Edit Resource Group Assignment) Edit Role Assignment wizard Edit Role Assignment window Confirm window (Edit Role Assignment) Setup Server wizard Select Authentication Server window Confirm window (Select Authentication Server) LDAP Properties window RADIUS Properties window Kerberos Properties window Setup Server for LDAP LDAP Setup Server window Confirm window (LDAP Setup Server) Setup Server for RADIUS RADIUS Setup Server window Confirm window (RADIUS Setup Server) Setup Server for Kerberos Kerberos Setup Server window Confirm window (Kerberos Setup Server) F Remote Web Console licenses GUI reference License Keys window Install Licenses wizard Install Licenses window Confirm window (Install Licenses) Enable Licenses window Disable Licenses window Remove Licenses window Update License Status window G Configuring storage systems GUI reference Login Message window Edit Storage System wizard Edit Storage System window Confirm window (Edit Storage System) Edit Alert Settings wizard Edit Alert Settings window Add SNMP Manager window Add SNMP Traps window Change SNMP Traps window Add Community window Change Community window Add Address window Contents

9 Change Settings window Confirm window (Edit Alert Settings) Edit System Options wizard Edit System Options window Confirm window (Edit System Options) Column Settings window H Remote Web Console system GUI reference Storage Systems window Port Condition window Tasks window Task Properties window Suspend Tasks window Resume Tasks window Delete Tasks window Disable Auto Delete window Enable Auto Delete window Edit Information Display Settings window Reports window Create Configuration Report window Delete Reports window Alerts window Alert Properties window Resource Lock Properties window I Tool Panel GUI Reference Control Panel Environment Parameter window Download File window Restore File window Download Dump Files window Update Certificate Files window Update Certificate Files for the SMI-S window Set or Delete Certificate File for CVAE window Upload Configuration Files for SMI-S window J Regulatory information Belarus Kazakhstan Russia marking Turkey RoHS material content declaration Ukraine RoHS material content declaration Warranty information Contents 9

10 1 Remote Web Console overview Remote Web Console provides a unified GUI for managing and optimizing the HP XP7 Storage system. You access a system with Remote Web Console from any computer with a web browser. Remote Web Console can be set up in either Windows or UNIX environments. Managing the storage system With Remote Web Console, you can perform the following tasks: Provision storage. Set up data replication for restoring lost data. View and manage the configuration of the storage system. Monitor and tune performance. Acquire logs for actions and commands performed on the storage system. GUI feature highlights Remote Web Console allows you to set up and manage more than one storage system with a use-case in mind. Whether creating LDEVs or pools, adding host groups or LUN paths, enabling performance monitoring, or creating pairs for replication these and all storage system tasks are made simpler because the GUI seamlessly crosses the underlying HP XP7 Storage software functionality. The use of wizards for major use-case tasks makes it possible to complete the set of tasks in one procedural flow, with a minimum of steps and a minimum of clicks. The following illustration shows an example of the GUI main window. The Logical Devices Tab has been selected. A top level view of the main window is shown in Viewing basic information (page 90). 10 Remote Web Console overview

11 Figure 1 Remote Web Console GUI features 1. Main menu 2. Explorer tree 3. Storage Systems menu 4. General Tasks menu The menu contains six main functions. These are described in Using Remote Web Console secondary windows (page 142) and Remote Web Console system GUI reference (page 231). The Explorer tree contains sets of menu items that you use to accomplish the setup, administrations, and general tasks to set up and maintain the storage system. The Storage System menu contains links to the windows and dialog boxes that you can use to complete the main system setup and maintenance functions. The menu contains links to ten main task windows that you use to complete the general tasks that set up and maintain the storage system. These tasks and the procedures to complete them are described in detail in the appendixes in this manual. Multitaskinig Operations you perform are executed in the background. This means you can start the next operation without waiting for the previous one to complete. Wizards and task management Wizards are provided for each main task. The wizard guides you through all the subtasks that you ordinarily perform one at a time. For example, the Create LDEVs wizard guides you through a series of screens in which you create the LDEVs for the V-VOLs and add LUN paths by selecting LDEVs, selecting host groups, and mapping LUNs. Remote Web Console also provides a window checking on the tasks you have committed to the system. The Task window provides detailed information about each task and shows the priority and status of each task you are tracking. GUI feature highlights 11

12 Reporting Online Help Remote Web Console provides views of various aspects of your storage system. In addition to these views, you can generate a report for specific areas of the system. Reports can be generated for a summary of the system data, ports, Channel Adapters, and disk adapters. Reports are formatted in either CSV or HTML. Use these reports to determine if the storage system configurations have changed properly. The Report Configuration Tool allows you to create a configuration report by using a command prompt. You can automate the creation or deletion of configuration reports by writing.bat script files. Use the Windows Task Scheduler to execute the script files at regular intervals. Remote Web Console online help provides procedural information for setting up and managing the storage system. Links to the major storage system tasks, search functions, and glossary are included. Remote Web Console components The following figure shows an example of the Remote Web Console computer and SVP configuration. Figure 2 Remote Web Console and SVP configuration 12 Remote Web Console overview

13 2 Setting up Remote Web Console This chapter provides Remote Web Console requirements and set up procedures. Setup workflow The following workflow describes the set up tasks for Remote Web Console: An HP representative attaches the SVP in your storage system to the LAN. Remote Web Console is already set up on the SVP and is therefore ready for access by client computers. Ensure that the correct LAN cabling and connections are in place. If needed, see Cable connection requirements (page 13). Set up network connections. If needed, see Enabling IPv6 communication (page 13). You can set up additional communications security for remote operations with Secure Sockets Layer (SSL). See Setting up SSL encryption (page 14) for details. Set up the Remote Web Console computer(s). See Setting up a client computer (page 24). Set up user accounts. See Setting up and managing user accounts (page 50). Configure the Remote Web Console environment. See Configuring the Remote Web Console environment (page 68). Install license keys for any software applications that are installed on the system. See License keys (page 78). Requirements for the various elements are included in the following topics. Cable connection requirements Ensure that the following LAN cable and connection requirements are met: Thinnet coaxial cable is used for twisted-pair connections. If needed, contact HP Technical Support for assistance. The total length of the LAN cable must not be greater than 185 meters (607 feet). Enabling IPv6 communication If Internet Protocol Version 6 (IPv6) addresses are used in the storage system LAN, you may need to enable IPv6 communication on the SVP. For Windows 7 and Solaris 10, you can enable IPv4 (standard) communication, IPv6 communication, or both. You determine which protocol to use based on the IP addresses that are used within the LAN. Use the same communication options for both the Remote Web Console computer and the SVP. If you use IPv6 to display the Remote Web Console main window when both IPv4 and IPv6 are available, IPv6 addresses are displayed in the Remote Web Console secondary window but IPv4 communication is actually used. For information on how to configure IP communication from an SVP, contact the HP Technical Support. The following topics give brief instructions on configuring IPv6 communication in Windows 7 and Solaris 10 environments. Configuring IPv6 communication in Windows 7 To configure a Remote Web Console computer to use IPv6 for communication with an SVP: 1. Select Control Panel > Network and Sharing Center > Manage network connections. 2. Right-click the network where the SVP resides, and then click Properties in the pop-up menu. If the User Account Control dialog box opens click Continue. Otherwise, the Networking dialog box opens. Setup workflow 13

14 3. In the Networking dialog box, clear the Internet Protocol Version 4 (TCP/IPv4) checkbox. 4. Click OK to save he changes and close the dialog box. Configuring IPv6 communication in Solaris 10 To configure a Remote Web Console computer to use IPv6 for communication with an SVP: 1. Start a command window / system console. 2. Execute the following command: ipconfig network-interface-name inet down Registering the Primary SVP Host Name You must register the primary SVP host name before completing any of the following tasks. Specify a host name instead of an IP address when accessing Remote Web Console. Acquire the public key certificate for SSL-encrypted communication from the CA (Certificate Authority). Note that you must register the server name as the host name to the DNS server or the hosts file. The server name is entered in the certificate as a common name. Enter the SVP host name and IP address in the DNS server or the hosts file of the Remote Web Console PC. You can register any host name to the DNS server or the hosts file, but there are restrictions on the letters you can use for the host name. DNS setting: You need to register the IP address and host name of the SVP to the DNS server that manages the network to which the SVP is connected. Hosts file setting: You need to enter the IP address and host name of the SVP to the hosts file of the Remote Web Console PC. The general directory of the hosts file is: Windows 7: C:\Windows\System32\drivers\etc\hosts UNIX: /etc/hosts Setting up SSL encryption To improve security of remote operations from a Remote Web Console SVP to a storage system, you can set up Secure Sockets Layer (SSL) encrypted communication. By setting SSL encryption, the Remote Web Console User ID and Password are encrypted. Note the following SSL terms: Secure Sockets Layer: SSL is a protocol first developed by Netscape to securely transmit data over the Internet. Two SSL-enabled peers use their private and public keys to establish a secure communication session, with each peer encrypting transmitted data with a randomly generated and agreed-upon symmetric key. Keypair: A keypair is two mathematically-related cryptographic keys consisting of a private key and its associated public key. Server Certificate: A Server Certificate (also called a Digital Certificate) forms an association between an identity (in this case the SVP server) and a specific keypair. A Server Certificate is used to identify the SVP server to a client so that the server and client can communicate using SSL. Server Certificates come in two basic types: Self-signed: You generate your owned self-signed certificate and the subject of the certificate is the same as the issuer of the certificate. If the Remote Web Console computers and the SVP are on an internal LAN behind a firewall, you may find that this option provides sufficient security. Signed and Trusted: For a Signed and Trusted Server Certificate, a Certificate Signing Request (CSR) is sent to and certified by a trusted Certificate Authority (CA) such as VeriSign ( Use of this certificate results in higher reliability in exchange for more cost and requirements. 14 Setting up Remote Web Console

15 If you enable SSL, you must make sure that the key pair and associated server certificate do not expire. If either the key pair or the server certificate expires, users will be unable to connect to the SVP. Flow of SSL communication settings The following illustration shows the procedure to set up SSL communication. Unless otherwise noted, all steps are required. Note that creation of private and public keys requires a dedicated program. Download one from the OpenSSL website ( Notes on updating the signed certificate to the SVP Read the following notes about uploading the signed certificate to the SVP: While the SVP server certificate is being updated, tasks that are being executed or scheduled for execution on Remote Web Console are not executed. Certificates for RMI communication are updated asynchronously (within approximately two minutes). If an SVP certificate is updated during Command View Advanced Edition setup operation, the Command View Advanced Edition setup operation will result in an error Update of the SSL certificate gives a great influence to the system and may lead to SVP failure. Therefore take sufficient care about the content of the certificate and private key to be set. After the certificate update is complete, depending on the environment, the SVP web server can take 30 to 60 minutes to restart. When it takes that long, an internal server error occurs, and the update completion dialog box does not display. However, the certificate update is complete. Creating a keypair To enable SSL, you must create a keypair consisting of a public and a private key. The instructions use Windows Vista as an example. Creating a private key (.key file) A private key is required to create an SSL keypair. The following procedure is for the Windows Vista operating system. Setting up SSL encryption 15

16 Before you begin, download openssl.exe from the OpenSSL website. To create a private key (.key file) in a Windows Vista environment: 1. If the read-only attribute is set, release it from the c:\openssl folder. 2. Open a command prompt. 3. Move the current directory to the folder to which the key file is output (such as c:\key), and execute the following command: c:\key > c:\openssl\bin\openssl genrsa -out server.key 2048 This procedure creates a file called server.key in the c:\key folder. This file becomes the private key. Creating a public key (.csr file) A public key is required to create an SSL keypair. The following procedure is for the Windows Vista operating system. Before you begin, download openssl.exe from the OpenSSL website. To create a public key in a Windows Vista environment: 1. Open a command prompt. 2. Move the current directory to the folder to which the key file is output (such as c:\key). Execute the following command: c:\key > c:\openssl req -sha256 -new -key server.key -config c:\openssl\bin\openssl.cfg -out server.csr 3. Enter the following information in the prompt: Country Name (two-letter code) State or Province Name Locality Name Organization Name Organization Unit Name Common Name To create a self-signed certificate, enter the IP address of the web server (SVP). The name you entered here is used as the server name (host name). To obtain a signed and trusted certificate, ensure that the server name is the same as the host name of the SVP. Address Challenge password (optional) Company name (optional) The following example shows the contents of a command window when you create a public key is (0x10001) C:\key>c:\openssl\bin\openssl req -sha256 -new -key server.key -config c There are quite a few fields but you can leave some blank. You are about to be asked to enter information that will be incorporated into your certificate request. What you are about to enter is what is called a Distinguished Name or a DN. \openssl\bin\openssl.cfg -out server.csr For some fields there will be a default value. If you enter '.', the field will be left blank Setting up Remote Web Console

17 Country Name (2 letter code) [AU]:JP State or Province Name (full name) [Some-State]:Kanagawa Locality Name (eg, city) []:Odawara Organization Name (eg, company) [Internet Widgits Pty Ltd]:HP Organization Unit Name (eg, section) []:ITPD Common Name (eg, YOUR name) []: Address []: Please enter the following 'extra' attributes to be sent with your certificate request A challenge password []: Acquiring a signed certificate After creating private key and public key, please acquire signed certificate file of public key. Below are the three ways to acquire signed certificate file. Create a certificate by self-signing. Acquire a certificate of certificate authority which is used within your company. Acquire an official certificate by requesting one from a certificate authority such as VeriSign. When you send a request to a certificate authority, specify SVP as the host name. There will be an extra charge. NOTE: HP recommend that self-signed certificates be used only for testing encrypted communication. Acquiring a self-signed certificate To acquire a self-signed certificate, open the command prompt and execute the following command: c:\key>c:\openssl\bin\openssl x509 -req -sha256 -days in server.csr -signkey server.key -out server.crt NOTE: This command uses SHA-256 as a hash algorithm. MD5 or SHA-1 is not recommended for a hash algorithm due to its low security level. This creates a server.crt file in the c:\key folder, which is valid for 10,000 days. This is the signed private key, which is also referred to as a self-signed certificate. Acquiring a signed and trusted certificate To acquire a signed and trusted certificate, you must acquire a certificate signing request (CSR), send that file to a Certificate Authority (CA), and request that the CA issue a signed and trusted certificate. Each certificate authority has its own procedures and requirements, and there is generally a cost for doing so. The signed and trusted certificate is the signed Public Key. Uploading the signed certificate To use SSL-encrypted communication, you must update and upload the private key and the signed server certificate (Public Key) to the SVP. Setting up SSL encryption 17

18 Prerequisites A private key (.key file) has been created. Change the file name to server.key unless the file is already named that. See Creating a private key (.key file) (page 15). A signed public key certificate (.crt file) has been acquired. Change the file name to server.crt unless the file is already named that. See Creating a public key (.csr file) (page 16). The private key (.key file) and the signed public key certificate (.crt file) are in X509 PEM format. See Acquiring a self-signed certificate (page 17). Related information Notes on updating the signed certificate to the SVP (page 15) Procedure To upload the signed SSL certificate: 1. Close all Remote Web Console sessions on the SVP. 2. On the Remote Web Console computer, open a web browser and enter the following URL to open the Tool Panel dialog box In the Tool Panel dialog box, click Update Certificate Files. If SSL communication has been established, the Security Alert dialog box opens before the login dialog box opens. In the Security Alert dialog box, click OK. The Security Alert dialog box closes and the Login dialog box opens. 4. In the Login dialog box, enter the administrator user ID and password, and click login. The Upload dialog box opens. 5. In the Upload dialog box, enter the public key certificate file name in the Certificate file box and the private Key file name (server.key file) in the Key file box. You can enter the file names directly or by clicking Browse. 6. In the Upload dialog box, click Upload. A confirmation dialog box opens. 7. Click OK to begin the certificate update. When the update is complete, the SVP web server restarts. Depending on the environment, the SVP web server can take 30 to 60 minutes to restart. When it takes that long, an internal server error occurs, and the update completion dialog box does not display. However, the certificate update is complete. It can take 30 to 60 minutes for the web server to restart. After the SVP restarts, the Completion dialog box does not appear. Instead, an internal server error message is displayed. However, the setting is actually completed. 18 Setting up Remote Web Console

19 8. In the error message box, click OK. If the Security Alert dialog box for the certificate opens, click View Certificate to display the certificate. Confirm that the certificate is correct, and click Yes. NOTE: If an error occurs during the certificate update, an error message displays. Resolve the problem described in the error message and then repeat this procedure, starting with Step 4 (log in) above. Returning the certificate to default You can return the certificate that was updated by the procedure in Uploading the signed certificate (page 17) to default. To return the certificate to default: 1. Close all Remote Web Console sessions on the SVP. 2. On the Remote Web Console computer, open a web browser and enter the following URL to open the Tool Panel dialog box In the Tool Panel dialog box, click Update Certificate Files. The Update Certificate Files login dialog box opens. If SSL communication has been established, the Security Alert dialog box opens before the login dialog box. In the Security Alert dialog box, click OK. 4. In the Login dialog box, enter the administrator user ID and password, and click login. The Upload dialog box opens. 5. In the Upload dialog box, click Return to Default. A confirmation dialog box opens. 6. Click Yes to confirm and close the dialog box. When the certificate update is complete, the SVP Web server restarts to show the update. When the restart is complete, the Update Completion dialog box opens. 7. In the Update Completion dialog box, click OK. The dialog box closes and the display returns to the Login dialog box. NOTE: If an error occurs during the certificate update, an error message appears. Resolve the problem described in the error message and then repeat this procedure, starting with Step 4 (log in) above. NOTE: If the Security Alert dialog box for the certificate opens at other times, click View Certificate to confirm that the certificate is correct and then click Yes. Setting up SSL encryption 19

20 Importing the certificate to the SVP If the public key certificate uploaded to SVP is self-signed or not signed by certificate authority which is in the browser by default, the browser displays a warning message when it connects to an SSL-enabled SVP. You can disable this by importing the certificate to the browser. To import the certificate to the browser: 1. Log on to the Remote Web Console SVP using a secure connection (specify the URL using https). The Security Alert dialog box opens. Figure 3 Security Alert dialog box 2. in the Security Alert dialog box, click Continue to this website (not recommended). 3. Click Page > Security Report. The Certificate Invalid dialog box opens. Figure 4 Certificate dialog box (example) 4. Click View certificates. 5. In the Certificate window, click the General tab. 20 Setting up Remote Web Console

21 Figure 5 Certificate window 6. Click Install Certificate... The welcome window of the Certificate Import Wizard opens. Figure 6 Certificate Import Wizard dialog box (Welcome to the Certificate Import Wizard) 7. Click Next. The Certificate Store window of the wizard opens. Setting up SSL encryption 21

22 Figure 7 Certificate Import Wizard dialog box (Certificate Store) 8. Select Automatically select the certificate store based on the type of certificate and click Next. The completion window opens. Figure 8 Certificate Import Wizard dialog box (Completing the Certificate Import Wizard) 9. Click Finish. If the import was successful, the confirmation window opens. 22 Setting up Remote Web Console

23 Figure 9 Certificate Import wizard dialog box 10. Click OK. Blocking HTTP communication to the storage system If the web server supports SSL (HTTPS), the HTTP setting tool allows you to block access to port 80. When you block access to port 80, the connection used to import the certificate from the web browser to the web server occurs on port 443 (HTTPS). If you are using Command View Advanced Edition to access Remote Web Console, blocking HTTP communication might interfere with that access. Make sure the Command View Advanced Edition can use SSL communication to access Remote Web Console. To block HTTP communication: 1. Close all Remote Web Console sessions on the SVP. 2. On the Remote Web Console computer, open a web browser and enter the following URL to open the Tool Panel dialog box In the Tool Panel dialog box, click Set up HTTP Blocking. A login dialog box opens. 4. in the Login dialog box, Enter the storage administrator User ID and Password, then click Login. The Set up HTTP Blocking dialog box opens. 5. In the dialog box, click OK. A confirmation dialog box opens. 6. In the confirmation dialog box, click OK to implement HTTP blocking. When the configuration change is complete, the SVP web server restarts. When the restart is complete, the HTTP Communications Blocked dialog box opens. Depending on the environment, it can take 30 to 60 minutes for the web server to restart. If it does, after the SVP restarts, the Completion dialog box does not appear. Instead, an internal server error message appears. However, the setting is actually completed. 7. Click OK to continue the operation and return to the Login dialog box, or click Cancel to cancel the operation and return to the Login dialog box. Setting up SSL encryption 23

24 Releasing HTTP communication blocking To release the HTTP communication blocking: 1. Close all Remote Web Console sessions on the SVP. 2. On the Remote Web Console computer, open a web browser. Enter the following URL to open the Tool Panel dialog box In the Tool Panel dialog box, click Release HTTP Blocking. 4. Enter the User ID and Password for the root storage administrator, then click Login. The Release HTTP Blocking dialog box opens. 5. Click OK. A configuration dialog box opens. 6. Click OK to release HTTP blocking. When the configuration change is complete, the SVP web server reboots. Once the reboot is complete, the Release HTTP Blocking Complete dialog box opens. Depending on the environment, it can take 30 to 60 minutes for the web server to restart. After the SVP restarts, the Completion dialog box does not appear. Instead, an internal server error message is displayed. However, the setting is actually completed 7. Click OK to continue the operation and return to the Login dialog box, or click Cancel to cancel the operation and return to the Login dialog box. Setting up a client computer The Remote Web Console administrator is responsible for setting up the web client on Remote Web Console computers. This includes the following: Ensure that client computers can handle Remote Web Console. See Requirements for client computers (page 24). If you are using a Windows server as a Remote Web Console computer, make sure to follow the instructions in Configuring a Windows Server (page 27) (if applicable). Setting up TCP/IP for a firewall (page 27) Configuring the web browser (page 27) Installing Adobe Flash Player (page 27) Requirements for client computers This topic explains the requirements for Remote Web Console computers on supported versions of the Windows and UNIX/Linux operating systems. 24 Setting up Remote Web Console

25 General requirement A maximum of 32 Remote Web Console users can access the same storage system concurrently. Requirements for Windows-based computers NOTE: The operating system/architecture/browser/java Runtime Environment/Flash Player combinations and versions in this table are fixed requirements. Using other combinations or versions might produce unpredictable results such as the inability to operate GUI windows. Table 1 Hardware requirements for Windows-based computers Processor (CPU) Memory (RAM) Available storage space Monitor Keyboard and mouse Ethernet LAN card for TCP/IP network Requirement Pentium GHz or better (Recommended: Core2Duo E GHz or better) 2 GB or more Recommended: 3 GB 500 MB or more True Color 32-bit or better Resolution: 1280 x 1024 or better You cannot use the mouse wheel feature. 100BASE-T 1000BASE-T Table 2 Software requirements for Windows-based computers Operating system 1 Architecture Browser (Internet Explorer) Java Runtime Environment (JRE) Flash Player 2 Windows Server 2008 SP1 32 bit, 64 bit 8.0 JRE 7.0 Update Windows Server 2008 SP2 32 bit, 64 bit 8.0 JRE 7.0 Update Windows Server 2008 R2 64 bit 9.0 JRE 7.0 Update Windows Server 2008 R2 SP1 64 bit JRE 7.0 Update 17 JRE 7.0 Update Windows Server bit 10.0 JRE 7.0 Update Windows Server 2012 R2 64 bit 11.0 JRE 7.0 Update Windows Vista 32 bit, 64 bit 8.0 JRE 7.0 Update Windows Vista SP1 32 bit, 64 bit 8.0 JRE 7.0 Update Windows Vista SP2 32 bit, 64 bit 8.0 JRE 7.0 Update Windows 7 32 bit 9.0 JRE 7.0 Update bit 8.0 JRE 7.0 Update JRE 7.0 Update JRE 7.0 Update Setting up a client computer 25

26 Table 2 Software requirements for Windows-based computers (continued) Operating system 1 Architecture Browser (Internet Explorer) Java Runtime Environment (JRE) Flash Player 2 Windows 7 SP1 32 bit, 64 bit 9.0 JRE 7.0 Update Windows 8 32 bit, 64 bit 10.0 JRE 7.0 Update Windows bit 11.0 JRE 7.0 Update Notes: 1. None of these operating systems is supported as a guest OS on a virtual server. When the SVP supports Internet Protocol Version 6 (IPv6), you can specify IPv6 addresses. 2. Use Flash Player with the same architecture (32 bit or 64 bit) as the browser. NOTE: To use Remote Web Console secondary windows, you need to install Java Runtime Environment (JRE). For details, see Installing and configuring JRE (page 142). Requirements for UNIX/Linux-based computers NOTE: The Operating system/architecture/bowser/java Runtime Environment/Flash Player combinations and versions in this table are fixed requirements. Using other combinations or versions might produce unpredictable results such as the inability to operate GUI windows. Table 3 Hardware requirements for UNIX/Linux-based computers Processor (CPU) Memory (RAM) Available storage space Monitor Keyboard and mouse Ethernet LAN card for TCP/IP network Requirement Pentium GHz or better (Recommended: Core2Duo E GHz or better) 2 GB or more Recommended: 3 GB 500 MB or more Resolution: 1280 x 1024 or better You cannot use the mouse wheel feature. 100BASE-T 1000BASE-T Table 4 Software requirements for Unix/Linux-based computers Operating system 1 Architecture Browser Java Runtime Environment (JRE) Flash Player 2 Solaris bit Firefox JRE 7.0 Update Red Hat Enterprise Linux bit Firefox JRE 7.0 Update Notes: 1. None of these operating systems is supported as a guest OS on a virtual server. 2. Use Flash Player with the same architecture (32 bit or 64 bit) as the browser. NOTE: To use Remote Web Console secondary windows, you need to install Java Runtime Environment (JRE). For details, see Installing and configuring JRE (page 142). 26 Setting up Remote Web Console

27 Configuring a Windows Server If you are using a Windows Server and Internet Explorer, set the following options before logging in to an SVP: Navigate to Tools > Internet Options > Advanced, and then click the Do not save encrypted pages to disk checkbox to enable it. Navigate to Tools > Internet Options > Security and register the URL of the SVP. For more information on configuring these settings, see the Internet Explorer help documentation. Setting up TCP/IP for a firewall To connect the HP XP7 Storage Remote Web Console computer and the SVP through a firewall, configure the firewall so that the TCP/IP port for the protocol you use becomes available. When attaching Remote Web Console to multiple storage systems, the installer must log in to the SVP of each storage system using separate Remote Web Console sessions and separate web browser instances. Table 5 Firewall configuration Protocol HTTP HTTPS RMI RMI RMI SMI-S SMI-S SNMP 1 SNMP Trap 1 RAID Manager RAID Manager Port number Direction of communication From the Remote Web Console web client to the SVP From the SVP to the Remote Web Console web client From a host to the SVP From the SVP to a host Notes: 1. Required if you use a Remote Web Console web client as an SNMP manager Configuring the web browser To configure the client web browser, note the following: The browser must allow first-party, third-party, and session cookies. Pop-up blocker and plug-ins must be disabled. Consult your browser's documentation for instructions. CAUTION: Do not use a modem to connect to the internet because connection speed is too slow. Installing Adobe Flash Player To install the latest Adobe Flash Player, go to download the installer to your system, and run the installer. To install a previous version of Adobe Flash Player: Setting up a client computer 27

28 1. Launch the web browser that you normally use and go to the Adobe website Scroll upward as needed to display the top of the Adobe web page. 3. In the Adobe search box in the upper right corner of the web page (not the browser search box) enter archived flash player and click Search. 4. In the search results, select Archived Flash Player versions. The Archived Flash Player version web page on the Adobe website opens. 5. Scroll down to the list of archived Flash player versions, select the archived version you want, download the installer, and then install it Configuring certificates for CVAE This topic explains how to set or delete certificates for CVAE that are used to check the server's reliability when SSL communication for CVAE external authentication is performed. Registering certificates for CVAE To check the server reliability at the time of SSL communication for CVAE external authentication, upload an CVAE public key certificate to the web server to register the certificate. Complete the steps in the following procedure to upload and register a certificate using the certificate update tool. Prerequisites You must have Security Administrator (View & Modify) role to perform this task. If the certificate to be registered has an extension other than ".crt", change it to ".crt". The certificate to be registered must be in X509 format. To register certificates for CVAE: 1. Close all Remote Web Console sessions on the SVP. 2. On the Remote Web Console computer, open a web browser and enter the following URL to open the Tool Panel dialog box In the Tool Panel dialog box, click Set or Delete Certificate File for CVAE. The Login dialog box opens. If SSL communication has been established, the Security Alert dialog box opens before the Login dialog box. In the Security Alert dialog box, click OK. 4. When the Login dialog box opens, enter the administrator user ID and password, and click Login. The Login dialog box opens. 28 Setting up Remote Web Console

29 5. In the dialog box, enter the certificate file for CVAE (.crt file) in the Certificate file (.crt file) box. You can enter the file name directly or by clicking Browse and searching for the file name. 6. Click Register. The execution confirmation dialog for Set or Delete Certificate File for CVAE opens. 7. Click OK to register the certificate. Registration of the certificate starts. When the certificate is registered, the registration completion dialog box for Set or Delete Certificate File for CVAE opens. 8. In the registration completion dialog box for Set or Delete Certificate File for CVAE, click OK. The display returns to the login dialog box. NOTE: If an error occurs during registration of the certificate for CVAE, an error message displays. Resolve the problem and then run the procedure again, starting with logging in, to Set or Delete Certificate for CVAE. NOTE: If the Security Alert dialog box for the certificate opens at other times, click View Certificate to confirm that the certificate is correct and then click Yes. Related Topics Set or Delete Certificate File for CVAE window (page 254). Deleting certificates for CVAE (page 29). Notes on registering certificates for CVAE Read the following notes about registering certificates for CVAE: Ensure that the certificate to be registered is the right one. If you register a wrong certificate, CVAE external authentication is not performed. Only with registration or deletion of the correct certificate, CVAE external authentication operates normally Deleting certificates for CVAE You can delete the certificates you registered in the procedure of the "Registering certificates for CVAE" section. Once you delete a certificate, server, reliability for that certificate is not checked by SSL communication for CVAE external authentication. Prerequisites You must have Security Administrator (View & Modify) role to perform this task. To delete certificates for CVAE: 1. Close all Remote Web Console sessions on the SVP. 2. On the Remote Web Console computer, open a web browser and enter the following URL to open the Tool Panel dialog box. Configuring certificates for CVAE 29

30 3. In the Tool Panel dialog box, click Set or Delete Certificate File for CVAE. The login dialog box opens. If SSL communication has been established, the Security Alert dialog box opens before the login dialog box. In the Security Alert dialog box, click OK. 4. In the login dialog box, enter the administrator user ID and password, and click Login. The Set or Delete Certificate File for CVAE dialog box opens. 5. In the dialog box, click Delete. A confirmation dialog box opens. 6. Click OK to delete the certificate. Deletion of the certificate starts.when the certificate has been deleted, a completion dialog box opens. 7. In the completion dialog box click OK. The display returns to the login dialog box. NOTE: If an error occurs during deletion of the certificate for CVAE, an error message displays. Resolve the problem and then run the procedure again, starting with logging in, to Set or Delete Certificate for CVAE. NOTE: If the Security Alert dialog box for the certificate opens at other times, click View Certificate to confirm that the certificate is correct and then click Yes. Related Topics Set or Delete Certificate File for CVAE window (page 254). Using the SMI-S function with a RWC user account HP XP7 Storage systems support the SMI-S function developed by SNIA. Storage administrators can use the SMI-S function by using SMI-S compliant management software. Information and details about SMI-S are located at Using the SMI-S function To use the SMI-S function, create a Remote Web Console user account and specify a storage system as the access destination from the management software. 30 Setting up Remote Web Console

31 Prerequisites Procedure Troubleshooting SMI-S Provider software application must be installed. 1. Create a Remote Web Console user account in the management software. The user account must belong to one of the following built-in user groups: Storage Administrator (View & Modify) User Group. Users have full permissions to access the SMI-S function from the management software. Storage Administrator (View Only) User Group. Users have read- only permissions to access the SMI-S function from the management software. 2. In the management software program, enter the following storage system information: IP Address of the storage system Protocol: specify HTTPS Port: 5989 Namespace:root/hitachi/smis or interop If you cannot access the SMI-S function, check the network environment and access destination. If access cannot be made even though there is no problem with the network environment and access destination, contact HP Technical Support. Uploading a signed certificate to the SMI-S provider Prerequisites Procedure To use certificates in SSL communication with the SMI-S provider, you must update and upload the private key and the signed server certificate (public key) to the SMI-S provider to update the certificate. Use the following procedure to upload and update certificates using a certificate update tool. Ensure that the following items have been completed: A private key (.key file) has been created. Change the file name to server.key unless the file is already named that. A signed public key certificate (.crt file) has been acquired. Change the file name to server.crt unless the file is already named that. The private key (server.key file) and the signed public key certificate (server.crt file) are in X509 PEM format. 1. Close all Remote Web Console sessions on the SVP. 2. On the Remote Web Console computer, open a web browser and enter the following URL to open the Tool Panel dialog box. Using the SMI-S function with a RWC user account 31

32 3. In the Tool Panel dialog box, click Update Certificate Files for SMI-S. The login dialog box for Update Certificate Files for SMI-S opens. If SSL communication has been established, the Security Alert dialog box opens before the login dialog box. In the Security Alert dialog box, click OK. 4. In the login dialog box for Update Certificate Files for SMI-S, enter the administrator's user ID and password, and click Login. The upload dialog box for Update Certificate Files for SMI-S opens. 5. In the upload dialog box for Update Certificate Files for SMI-S, enter both the public key certificate file name in the Certificate file (server.crt file) box and the Private Key file (server.key file) box. You can enter the file names directly or by clicking Browse. 6. Click Upload. The execution confirmation dialog box for Update Certificate Files for SMI-S opens. 7. Click OK to update the certificate. Update of the certificate starts. Upon completion of the certificate update, the SMI-S provider restarts to reflect the update. Upon completion of the restart of the SMI-S provider, the update completion dialog box for Update Certificate Files for SMI-S opens 8. In the update completion dialog box for Update Certificate Files for SMI-S, click OK. The display returns to the login dialog box. NOTE: If an error occurs during update of the certificate, an error message displays. Resolve the problem and then run the procedure again, starting with logging in, to upload configuration files for SMI-S. NOTE: If the Security Alert dialog box for the certificate opens at other times, click View Certificate to confirm that the certificate is correct and then click Yes. Returning an SMI-S provider certificate to default You can return a certificate updated in Uploading a signed certificate to the SMI-S provider (page 31) to default. Procedure 1 To return a certificate to default: 1. Close all Remote Web Console sessions on the SMI-S provider. 2. On the Remote Web Console computer, open a web browser and enter the following URL to open the Tool Panel dialog box Setting up Remote Web Console

33 3. In the Tool Panel dialog box, click Upload Configuration Files for SMI-S. The Upload Configuration Files Login dialog box opens. If SSL communication has been established, the Security Alert dialog box opens before the login dialog box. In the Security Alert dialog box, click OK. 4. In the Login dialog box, enter the administrator's user ID and password, and click Login. The upload dialog box for Update Certificate Files for SMI-S opens. 5. In the upload dialog box for Update Certificate Files for SMI-S, click Return to the default configuration. The execution confirmation dialog box for Update Certificate Files for SMI-S opens. 6. Click OK to update the certificate. Update of the certificate starts. Upon completion of the certificate update, the SMI-S provider restarts to reflect the update. Upon completion of the restart of the SMI-S provider, the update completion dialog box for Update Certificate Files for SMI-S opens. 7. In the update completion dialog box for Update Certificate Files for SMI-S, click OK. The display returns to the login dialog box. NOTE: If an error occurs during update of the certificate, an error message displays. Resolve the problem and then run the procedure again, starting with logging in, to update certificate files for SMI-S. NOTE: If the Security Alert dialog box for the certificate opens at other times, click View Certificate to confirm that the certificate is correct and then click Yes. Uploading an SMI-S provider configuration file Prerequisites Procedure You can control the SMI-S function using the SMI-S provider configuration file that you create. Ensure that the SMI-S provider configuration file (user-defined.properties) has already been created. Change the file name to user-defined.properties unless the file is already named that. Procedure 2 To upload the SMI-S provider configuration file: 1. Close all Remote Web Console sessions on the SMI-S provider. 2. On the Remote Web Console computer, open a web browser and enter the following URL to open the Tool Panel dialog box. Using the SMI-S function with a RWC user account 33

34 3. In the Tool Panel dialog box, click Upload Configuration Files for SMI-S. The Login dialog box opens. If SSL communication has been established, the Security Alert dialog box opens before the Login dialog box. In the Security Alert dialog box, click OK to confirm and open the Login dialog box. 4. In the Login dialog box, enter the administrator user ID and password, and click Login. The Upload dialog box opens. 5. In the Upload dialog box, enter the SMI-S provider configuration file (user-defined.properties). Enter a file name in Configuration file or click Browse and then select a file in the displayed dialog box. 6. Click Upload. The execution confirmation dialog box opens. 7. Click OK to update the configuration file. Update of the configuration file starts. Upon completion of the configuration file update, the SMI-S provider restarts to reflect the update.upon completion of the restart of the SMI-S provider, the update completion dialog box for Upload Configuration Files for SMI-S opens. 8. In the Upload Configuration Files for SMI-S dialog box, click OK. The display returns to the login dialog box. NOTE: If an error occurs during update of the certificate, an error message displays. Resolve the problem and then run the procedure again, starting with logging in, to upload configuration files for SMI-S. NOTE: If the Security Alert dialog box for the certificate opens at other times, click View Certificate to confirm that the certificate is correct and then click Yes. Returning an SMI-S provider configuration file to default You can return the configuration file updated in Uploading an SMI-S provider configuration file (page 33). Procedure 3 To return the configuration file to default: 1. Close all Remote Web Console sessions on the SMI-S provider. 2. On the Remote Web Console computer, open a web browser and enter the following URL to open the Tool Panel dialog box Setting up Remote Web Console

35 3. In the Tool Panel dialog box, click Upload Configuration Files for SMI-S. The Login dialog box opens. If SSL communication has been established, the Security Alert dialog box opens before the Login dialog box. In the Security Alert dialog box, click OK to confirm and open the Login dialog box. 4. In the Login dialog box, enter the administrator user ID and password, and click Login. The Upload dialog box opens. 5. In the Upload dialog box, click Return to the default configuration. A confirmation dialog box opens. 6. In the confirmation dialog box, Click OK to update the configuration file. The update process starts. When the file has been updated, the SMI-S provider restarts to include the update. When the SMI-S provider restarts, the update completion dialog box opens. 7. In the update completion dialog box, click OK to confirm and return to the Login dialog box. NOTE: If an error occurs during update of the SMI-S provider configuration file, an error message appears. Resolve the problem described in the error message and then run the procedure again, starting with Step 4. NOTE: If the Security Alert dialog box for the certificate opens at other times, click View Certificate to confirm that the certificate is correct and then click Yes. Installing the report configuration tool Prerequisites Complete the following instructions to install the report configuration tool. You need the following items to install the report configuration tool: A Windows computer running Windows 2000, Windows Server 2003, or Windows Server You can use either an IPv4 address or an IPv6 address to connect the SVP to the windows computer. You can also connect the computer to the SVP over an IPv4 proxy server. When you use the proxy server, specify a name and a port number of the proxy server as the HTTP_PROXY environment variable on the Windows computer. For example: Installing the report configuration tool 35

36 SET HTTP_PROXY= A user account for exclusive use of the report configuration tool. To use the report configuration tool, you must create a user account that is used exclusively for the report configuration tool. Assign the storage administrator role (initial configuration) to this user account. For information on user accounts, see Creating user accounts (page 59). The report configuration tool installation software The Report Configuration Tool is located on the CD-ROM Disc 2, which is named Host PP. Click Setup.exe in the directory to execute the Report Configuration Tool. Installation procedure To install the report configuration tool: 1. Insert the Report Configuration Tool installation CD into the CD-ROM drive. 2. On the CD, navigate to the /program/config_report_cli/win32 folder and double-click setup.exe. Follow the instructions on the screen. 3. When prompted, enter the name of the directory in which to install the report configuration tool. The installer continues until the tool is installed. NOTE: The directory where the report configuration tool is installed is not specified as an application path. When necessary, specify the directory as the application path Using the report configuration tool You can use the report configuration tool to create up to 20 configuration reports and then view or download them. Creating a configuration report (page 94) describes how to create a configuration report. The list of commands for creating reports is located in Report Configuration Tool command reference (raidinf commands) (page 133). 36 Setting up Remote Web Console

37 3 Getting started using Remote Web Console This chapter describes login and restrictions when using Remote Web Console. For instructions on navigating to storage system information, see Viewing and managing the storage system (page 90). Logging in to Remote Web Console There are two types of logins to Remote Web Console: One-time only initial login by the administrator or super-user who logs in first to create other user accounts Normal login for all other Remote Web Console and storage system users and administrators Normal login allows users to perform only tasks related to initial settings such as account management or software application management. When the initial settings are complete, use Command View Advanced Edition to configure the storage system. Initial super-user login Normal login This login procedure is for the super-user who logs into Remote Web Console for the first time and sets up the user accounts. The super-user has a built-in ID which includes all permissions, and a default password. Procedure 4 To log in to Remote Web Console as the super-user: 1. Call your local service representative to obtain the super-user ID and default password. 2. In your web browser, specify the URL for your SVP: 3. Log in with the superuser ID and password. 4. To prevent unauthorized use of the superuser account, change the password immediately after you log in. Click Settings > User Management > Change Password to change your password. This login procedure is for all users other than the super-user. NOTE: When connecting to a second storage system, you must start a new web browser instance and log in to the system's URL. When the initial settings are complete, use Command View Advanced Edition to configure the storage system. Logging in to Remote Web Console 37

38 Procedure 5 To log in to a Remote Web Console: 1. In your web browser, specify the following URL: 2. The following actions might be required to open the login dialog box, depending on your environment: If a message indicates that the enhanced security configuration is enabled on the computer, select In the future, do not show this message and click OK. If the SVP is set to support SSL-encrypted communication and security messages appear, make sure the certificate is correct and follow the instructions in the dialog box. If a message indicates that certain web sites are blocked, follow instructions in Adding your SVP to the trusted sites zone for Windows server (page 39). 3. Type the user ID and password. 4. Click Login. 5. If the Security Information dialog box appears, click Yes. 38 Getting started using Remote Web Console

39 6. If a local storage area pop-up dialog box of Adobe Flash Player Setting appears, click Allow to open the Remote Web Console main window. The cache function of Flash Player optimizes the process of Remote Web Console. Denial of the request might delay the processing speed of Remote Web Console. Figure 10 Flash Player local storage area dialog box NOTE: The roles and resource groups for each user are set up ahead of time and will be available to you when you log in to Remote Web Console. If the roles or resource allocations for your username are changed after you log in, the changes will not be effective until you log out and log back in again. NOTE: If login fails three times with the same user ID, Remote Web Console stops responding for one minute. This is for security purposes and is not a system failure. Wait, then try again. Changing your password After the administrator gives you a user ID and password, you should change the password. Procedure 6 To change your user account password: 1. Log in to Remote Web Console with the user ID and password given to you by the administrator. 2. Click Settings > User Management > Change Password to change your password. Adding your SVP to the trusted sites zone for Windows server If you are using Remote Web Console on a Windows Server 2003/2008 computer, the following message may appear during login. If it does, you must add the SVP to the trusted sites zone. Figure 11 Trusted sites message To add the SVP to the trusted sites zone: 1. Click Add in the message dialog box. The Trusted Sites dialog box opens. Logging in to Remote Web Console 39

40 2. In Add this web site to the zone, enter the URL of the SVP that you want to log in to. For example, if the host name is host01, the URL is If the IP address is , the URL is 3. Click Add to add the URL of the SVP to the web sites list. 4. Click Close to close the dialog box. Remote Web Console restrictions This topic lists actions that are restricted within Remote Web Console, and within the browser when using Remote Web Console: General restrictions (page 40) Web browser restrictions while using Remote Web Console (page 40) Unsupported actions in Windows version of RWC (page 41) Unsupported actions in UNIX version of RWC (page 41) Applying changes made in Remote Web Console (page 41) Refreshing data after an Auto LUN or Quick Restore operation (page 42) Refreshing data after operations performed with another application (page 42) General restrictions To avoid errors while using Remote Web Console: Do not change the local storage area value in Adobe Flash Player. Do not change the Remote Web Console computer clock setting while you are logged in to the SVP. Do not change screen display settings such as resolution or refresh rate. Do not use Microsoft Remote Desktop. Do not use screen savers that change the screen resolution. Do not set the Remote Web Console computer to standby or hibernate. Do not allow the computer battery to discharge far enough so that the computer automatically enters standby or hibernate. If you do, you must restart Remote Web Console. If applicable, disable the auto-login function of any web-based software or web site being used on the Remote Web Console computer. NOTE: The functions keys, as well as the Home, End, and Delete keys are disabled for Remote Web Console operations. Web browser restrictions while using Remote Web Console When logged in to Remote Web Console, do not use web browser menus, shortcuts, or other browser options as described here\ If you use Back, Next, or web browser shortcut keys such as F5 and Esc, you will be logged out of Remote Web Console. Any settings you made during the session will be lost. Do not use the button, the Close option in the File menu, or the Alt + F4 shortcut to close the web browser. To close Remote Web Console, click Logout or File > Close in the Remote Web Console menu. Do not change the web browser settings such as Tools > Folder options in Internet Explorer. If you do so and see unexpected results, close the web browser and log in to Remote Web Console again. 40 Getting started using Remote Web Console

41 Do not disable Flash Player because Flash Player is necessary for Remote Web Console and works as an add-on to a web browser. If you use Internet Explorer, do not change the settings in Tools > Manage Add-ons. Do not use the following web browser functions: character encoding, text size, the zoom function, the Ctrl + F (search), Ctrl + A (select all). Use only the Tab key to move the focus to the Flash Player window. If you use Shift + Tab to move the focus in reverse, the focus may not move from the web browser to the Flash Player. Unsupported actions in Windows version of RWC The following actions are not supported in any version of Remote Web Console: The right mouse button does not open a popup menu in the Remote Web Console main window. If you right click, the Flash Player pop-up menu opens instead. The copy (Ctrl+C) and paste (Ctrl+V) shortcuts do not copy and paste text to a text box in Remote Web Console. No drag-and-drop operation is available in Remote Web Console. The mouse wheel may not function in the Remote Web Console secondary window. The zoom in and zoom out function of the web browser cannot be used in the Remote Web Console window. When you hold down on the Ctrl key and use the mouse wheel, a part of the Remote Web Console window may not be displayed because of the zoom in and zoom out function of the web browser. Unsupported actions in UNIX version of RWC The following actions are not supported in the UNIX version of Remote Web Console: You cannot change the Remote Web Console window size. You cannot drag-and-drop objects in the Auto LUN or LUN Manager windows. If you click the Remote Web Console secondary window when you are using Auto LUN, the Auto LUN window may be fully or partially hidden behind the Remote Web Console window. However you cannot use the front Remote Web Console window. Close the Auto LUN window before using the Remote Web Console secondary window. If the Auto LUN window is hidden behind the Remote Web Console window, click the Auto LUN window to bring it to the foreground, and then close it. The Close button on the Auto LUN window remains active even if you click Apply while the Auto LUN process is running. If you click Close after clicking Apply, the Auto LUN window closes but the Auto LUN process continues. The word "Loading..." only appears in the Auto LUN window message dialog box for the first operation. This message does not re-appear after the first operation. Applying changes made in Remote Web Console When applying changes in Remote Web Console, be aware of the following behavior: When an internal process is running on the SVP (for example, a configuration change, option check, or an operational information acquisition), Remote Web Console processing might be temporarily delayed. If you request a change to the storage system configuration in the secondary window while another change is being made, an error message appears. If the error occurs while you are logging in or clicking Apply to implement changes, wait a few minutes, then retry the operation. Remote Web Console restrictions 41

42 If the error occurs while you are either switching between Modify and View mode, or switching tabs, wait a few minutes, click Refresh on the File menu, and then retry the operation. When the microcode is being updated on the SVP, you must exit and restart all web client sessions on the Remote Web Console computer. When you use Remote Web Console on Windows, the Add or Remove Programs window in the Windows Control Panel might or might not display Remote Web Console. Remote Web Console works in both cases. Refreshing data after an Auto LUN or Quick Restore operation During a Auto LUN operation or Business Copy or Business Copy Z Quick Restore operation, a Remote Web Console window may display old information (data from before the operation) on logical volume (LDEV) configurations. Wait until the operation completes, and then click File > Refresh > or File > Refresh All to update the Remote Web Console window. Refreshing data after operations performed with another application Be aware that it may take time to refresh the information in Remote Web Console after you have performed an operation on the storage system using another application, such as RAID Manager. Capacities displayed on the Remote Web Console screen Unless otherwise specified in this manual, capacity values are rounded down to the second decimal place for TB, GB, or MB or to the nearest integer for Cyl when displayed on the Remote Web Console screen. Therefore, displayed values may be lower than the actual values. The value converted from 1Cyl to KB depends on the volume's emulation type. The following table lists cylinder capacities by emulation type. Emulation Type Open Systems Mainframe OPEN-V Other - 1 Cylinder Capacity (KB) Caution on LUN ID notation The default LUN ID format used in the Remote Web Console main window in HP XP7 Storage is decimal. You can change this format to hexadecimal when needed. The format of LUN IDs in the Remote Web Console secondary window in HP XP7 Storage is always decimal. You cannot change this format. In comparison, the LUN ID format used in Remote Web Console in both XP24000/XP20000 Disk Array and P9500 is hexadecimal. If the hexadecimal format is selected in the HP XP7 Storage, you can enter the XP24000/XP20000 Disk Array or P9500 LUN IDs as is. However, if the decimal format is set for LUN IDs in the HP XP7 Storage, convert the LUN IDs to decimal format before entering them in Remote Web Console. To switch the LUN ID notation of the Remote Web Console main window between decimal and hexadecimal, use the Edit Information Display Settings window See Edit Information Display Settings window (page 241). Refreshing your user view If you remain in the same Remote Web Console view while other users change the configuration of the system, the changes that others make do not appear in your view. You can tell how long it has been since your screen was refreshed by checking the clock on the title bar to the left of the Refresh button. The clock displays server time, not the time on your local workstation. When you 42 Getting started using Remote Web Console

43 place the cursor over the clock, the system displays the number of minutes that have passed since the screen was refreshed. To see changes that others might have made, click refresh on the far right title bar in the top right corner of the screen. Setting the view back to default You can adjust Remote Web Console settings for column width and order, table options, filter conditions, and similar parameters. Remote Web Console saves these settings after you logout. When you login again, your settings appear as you left them in your last session. You can also return your settings to default. To return your settings to default, select Settings > Environmental Settings > Reset User s View Settings. The parts and items that are recorded as user settings are shown in the following table: Table 6 User view items that can be reset Window part State after reset Magnification - Normal (100%) Summary Open/Closed Open Table General Selecting row NA Page First page Scroll position Top left Setting column Default state 1 Column Sort NA Width Default state 1 Order Default state 1 Option Row/Page 1000 Capacity unit GB or Cyl Filter ON/OFF OFF Settings NA Open/Closed Closed Wizard Option part Open/Closed Default state 1 LUN ID notation - - Decimal integer 1. The default state varies from window to window. Remote Web Console main window The following illustration shows an example of the GUI main window. In this view, the Logical Devices Tab has been selected. A top level view of the main window is shown in Viewing basic information (page 90). Setting the view back to default 43

44 Menu Bar The following illustration shows the menu bar in the Remote Web Console main window. The table below the illustration describes the menu items and their functions. Click to return to the previous window Click to advance to the next window File Refresh All: Acquires all the information about the storage system and updates both the SVP and Remote Web Console. You must have Storage Administrator (initial configuration) permissions to use this function. See Table 8 (page 55). Logout: Logs the current user out of Remote Web Console. Actions Provides actions to the storage system such as creating LDEVs or performing replication copy. 44 Getting started using Remote Web Console

45 Reports Task Management: Manages the tasks that will be applied to the storage system. Configuration Report: Creates and downloads the configuration report about the storage system. Performance Monitor: Monitors performance of the storage system. Shredding Report: Downloads the shredding report. Settings User Management: Manages user accounts of Remote Web Console including changing password. Resource management: Performs resource group related operations Security: Performs audit log or encryption operations Environmental Settings: Configures the license, the refresh interval of the window or an external server. Resets view settings that can be customized, such as width or order of table column. See the table, Column Settings window (page 230), for items that are reset using Reset View Settings. View Help Changes the font size in the window. Displays the online help Main window and wizard When you select an operation to perform, a wizard or secondary window appears. Figure 12 Using the Remote Web Console main window To perform an operation using the main window and a wizard: Remote Web Console main window 45

46 1. Click a function in the resource tree in the Explorer. 2. If necessary, choose a tab and use a filter to reduce the number of items in the table. 3. Select an item in the table and click a button to open a wizard. 4. Set options in the wizard and click Finish to confirm the setting. 5. Enter a task name and click Apply to apply the setting to the storage system. The setting is queued as a task and performed in order. TIP: To open the task window after closing the wizard, select Go to tasks window for status and click Apply in the wizard. Figure 13 Using wizard buttons 6. Open the task window to verify the result of the operation. A task can be suspended or canceled if the processing of the task is not started. Main window controls Buttons The following figure shows the buttons that appear in the upper left part of the main window. Figure 14 Back and Next buttons in main window The Back button displays the previous window; the Next button displays the next window. Remote Web Console tracks up to 10 operations and the windows that display depend on the selection from the navigation tree. The following figure shows the buttons that appear in the upper right part of the main window. 46 Getting started using Remote Web Console

47 Figure 15 Buttons at upper right of main window Table Controls The following figures shows the controls used to view and filter the results in a main window table: Figure 16 Table options in main window To scroll through pages of the table, use the left and right arrows or type a page number into the number field. To select all rows in the table, click Select All Pages. To display a table column, click Column Settings. If filter is ON, the filtered rows are selected. To sort the table, click the header of the column that you want to use to sort. When you sort a capacity column, the column will be sorted by bytes regardless of the capacity unit used in the items in the column. Therefore columns in units of cylinders (cyl) may not necessarily be sorted in ascending or descending order of the number of cylinders. Even if the number of cylinders is the same, the capacity may not be the same according to the emulation type. To save the displayed information to a TSV file, click Export under More Actions. This action is demonstrated in the following figure. Figure 17 Export button to save a TSV file Filtering When you change the default file name, confirm that the file name contains the.tsv extension to save the file. To filter the table, select or input the desired filtering conditions and click Apply. NOTE: Users can set up to 16 conditions. When the input condition is wrong, click Apply to clear the condition. Select the attribute whose date and time values must be entered, and then enter the values. The values of date and time are "YYYY/MM/DD" and "hh:mm:ss", respectively. After you enter the date in the first box, "00:00:00" is displayed in the second box as a default time value. Edit this value as needed and click Apply. Remote Web Console main window 47

48 Figure 18 Filtering in main window Tooltip When text displays in the main window, ellipses (...) may be displayed to show that the text is truncated. If you place the mouse cursor over an ellipsis (...), the full text displays in a tooltip (a small hover box ). Figure 19 Tooltip in main window Balloon dialog box When you click an underlined link on the Remote Web Console screen, additional information may appear as a pop-up, which is called a "balloon dialog box." The following illustration shows an example of a balloon dialog box. Setting Remote Web Console secondary windows The Remote Web Console secondary window performs on the Java Runtime Environment (JRE), and the window launches when you select the menu on the Remote Web Console main window. 48 Getting started using Remote Web Console

49 The following are functions and software applications using Remote Web Console secondary windows. Authentication function of LUN Manager Login Message function Cache Residency Parallel Access Volumes Compatible XRC Data Retention Performance Control Volume Retention To use the Remote Web Console secondary window, you must enable the secondary window in advance. For details about setting the secondary window, see Using Remote Web Console secondary windows (page 142). By default, the setting of the secondary window is disabled. In this case, these functions and software applications do not appear in the menu on the Remote Web Console main window. For more information about Remote Web Console After you log in, the Remote Web Console main window opens. You can navigate using the menu, tree, or General Tasks. Precise instructions for performing an operation can be found in the software user guides. Also, see Appendixes C through H, which describe the screens in the GUI. For more information about Remote Web Console 49

50 4 Setting up and managing user accounts When Remote Web Console has been set up on the SVP, and the client computers are set up, you create user accounts for Remote Web Console users and define their roles. This section provides information for setting up and managing user accounts. Workflow for creating and managing user accounts Administrators use Remote Web Console to create accounts for all users. The following steps show a basic workflow: If an authentication server is used, connect the client computers to it. An authentication server allows users to log in to Remote Web Console with the same password as the one used for other applications in a system. Review Using an authentication server and authorization server (page 50) for information and instructions. Review User Groups (page 53) to understand the user groups and roles you can assign new or existing users. Create user accounts and assign permissions. See Creating user accounts (page 59). Change, disable, or delete user passwords and permissions. See Changing user passwords (page 60). Using an authentication server and authorization server An authentication server enables users to log in to Remote Web Console with the same password as the password that they use for other applications. The authentication server must be configured for each user. The following figure shows login workflow without an authentication server: Figure 20 Logging in when an authentication server is not used The following figure shows login workflow with an authentication server: Figure 21 Logging in when an authentication server is used If an authorization server works together with an authentication server, the user groups that are registered in the authorization server can be assigned to a user for Remote Web Console. The following figure shows login workflow when an authentication server and an authorization server are used in combination: 50 Setting up and managing user accounts

51 Figure 22 Logging in when an authentication server and an authorization server are used in combination You can use the authentication server without knowing the host names and port numbers, if you register the information of the authentication server as an SRV record in the DNS server. If you register multiple numbers of authentication servers to the SRV record, you can determine the authentication server to be used, based on the priority that has been set in advance. Authentication server protocols Authentication servers support the following protocols: LDAPv3 Simple bind authentication RFC2865 compliant RADIUS with PAP and CHAP authentication Kerberos v5 The certificate file formats available for LDAP server setting are: X509 DER format X509 PEM format One of following encryption types must be used for the Kerberos server: Windows AES128-CTS-HMAC-SHA1-96 RC4-HMAC DES3-CBC-SHA1 DES-CBC-CRC DES-CBC-MD5 Solaris or Linux DES-CBC-MD5 Authorization server requirements The authorization server must satisfy the following requirements if it works together with the authentication server: Prerequisite OS Windows Server 2003 Windows Server 2003 R2 Windows Server 2008 Windows Server 2008 R2 Using an authentication server and authorization server 51

52 Prerequisite software Active Directory Authentication protocol for user for searching LDAP v3 Simple bind Connecting two authentication servers Two authentication servers can be connected. When the servers are connected, the server configurations must be the same, except for the IP address and the port. If you search for a server using information registered in the SRV records in the DNS server, confirm that the following conditions are satisfied: LDAP server conditions: The environmental setting for the DNS server is completed at the LDAP server. The host name, the port number, and the domain name of the LDAP server are registered in the DNS server. Kerberos server conditions: The host name, the port number, and the domain name of the Kerberos server are registered in the DNS server. You cannot use the SRV records on a RADIUS server. Because UDP/IP is used to access the RADIUS server, no encrypted communications are available, such as negotiations between processes. To access the RADIUS server in a secure environment, encryption in the packet level is required, such as IPsec. If an LDAP server or Kerberos server is used as an authentication server and works with an authorization server, the authentication server and the authorization server must use the same host. If you use RADIUS servers as authentication servers, you can connect two authentication servers (primary server and secondary server) and one authorization server. If you use RADIUS servers as authentication servers with both primary and secondary servers specified and you specify different domains of authorization servers for the primary and the secondary servers prior to SVP microcode version x/00, a server configuring operation in the Setup Server window in SVP microcode version x/00 or later will only enable the authorization server with the domain you have specified on the primary server. Connecting authentication and authorization servers Before you can connect an authentication server and an authorization server, you must configure your network. Prerequisites If you have not already done so, obtain a security administrator account with a View & Modify role. Contact your server administrator for information about the values to be written in the LDAP, RADIUS, or Kerberos configuration file. If you use LDAP servers, the files of the LDAP servers must be certified; obtain certification. Contact your network administrator for information about the network settings. Give your service representative the IP address of the DNS server and ask that representative to configure the SVP. Procedure 7 To connect authentication and authorization servers: 1. Click Settings > Environmental Settings > View External Authentication Server Properties. 52 Setting up and managing user accounts

53 2. Click Setup Server to open the Setup Server window 3. Select the type of the authentication server. 4. Specify options to connect to the authentication server. If you use more than one authentication server or an authorization server, specify an option for each server. 5. To test the connection, in the Server Configuration Test field, click Check. 6. Click Finish. 7. Enter a task name and then click Apply. 8. After you finish setting up the authentication and authorization servers and confirm that you can use the servers, save a copy of the configuration files for connecting the authentication server. For details on saving a copy, see Backing up and restoring RWC configuration files (page 75). Naming a user group in Remote Web Console When you create a user group in Remote Web Console, you name the group with the user s memberof attribute value which is found in the Active Directory. Remote Web Console supports Active Directory nested groups. After entering the user group name, verify that the user group name that you entered is registered in the authorization server. CAUTION: If a user needs to use different user groups for different purposes, create local user accounts on Remote Web Console. Do not use the authorization server. NOTE: The domain name (DN) of the user group to be set to Active Directory must be between 1 and 250 characters. The number of user groups that can be registered at one time is 20 at maximum. User Groups The administrator creates Remote Web Console user accounts and adds each user to a built-in group. Registered users are able to use the Remote Web Console privileges that are assigned to the user group(s) to which each user belongs. A user can belong to one or more groups. Roles and user groups The operations allowed to users depends on the roles assigned to the user groups. Roles are not set in each user account, but in each user group. There are two ways to change the operations that are allowed to users. Moving the users to another user group. See Changing user permissions (page 61) for more information. Changing the roles assigned to the user group to which the user belongs. See Changing user group permissions (page 66) for more information. Resource group and user groups The resources that users can manipulate depend on the resource groups. The resource groups are not assigned to users but to user groups. There are two ways to change the resources that are allowed to users. Moving users to another user group. See Changing user permissions (page 61) for more information. Changing the resource groups assigned to the user group where the user belongs. See Changing resource groups assigned to a user group (page 66) for more information. User Groups 53

54 For details about resource groups, see the HP XP7 Provisioning for Open Systems User Guide. User registering example The setting operations that affect the security of the whole system must be done by the administrator. The setting operations on the resource group 10 must be done by user A. The setting operations on the resource group 20 must be done by user B. To implement the above configuration, assign the users to the user groups as shown below. Table 7 User registration example User User group to be registered Roles to be assigned to the user group Resource group to be assigned to user group Administrator user group 1 Security Administrator (View & Modify) All Resource Groups Assigned 1 User A user group 10 Storage Administrator 2 Resource group 10 User B user group 20 Storage Administrator 2 Resource group 20 Notes: 1. For the user group that is assigned the Security Administrator role, All Resource Groups Assigned is automatically set to Yes. 2. There are a few types of storage administrators. See Table 8 (page 55) for more information. Precautions when working with user groups Before creating or manipulating user groups, read and understand the following precautions. When a user is assigned to multiple user groups, the user has the permissions of all the roles in each user group that are enabled on the resource groups assigned to each user group. If a user has All Resource Groups Assigned set to Yes, the user can access all the resources in the storage system. For example, if a user is a security administrator and a storage administrator taking care of some resources, have all resource groups assigned, and has roles of Security Administrator (View & Modify) and Storage Administrator (View & Modify), the user can edit the storage for all the resources. If this is a problem, the recommended solution is to register the following two user accounts in the HP XP7 Storage system and use these different accounts for different purposes A security administrator user account that has All Resource Groups Assigned set to Yes. A storage administrator user account that does not have all resource groups assigned and has only some of the resource groups assigned. For the user groups whose roles are other than the Storage Administrator, All Resource Groups Assigned is automatically set to Yes. If you delete all the roles except the Storage Administrator, reassign resource groups to the user group because All Resource Groups Assigned is automatically set to No. To assign resource groups to the user group, see Changing resource groups assigned to a user group (page 66). Roles The following table shows all the roles that are available for use and the permissions that each role provides to the users. You cannot create a custom role. 54 Setting up and managing user accounts

55 Table 8 Roles and Capabilities Role Security Administrator (View Only) Security Administrator (View & Modify) Audit log Administrator (View Only) Audit log Administrator (View & Modify) Storage Administrator (View Only) Capabilities Viewing information about user accounts and encryption settings Viewing information about encryption key in the key management server Configuring user accounts Creating encryption keys and configuring encryption settings Viewing and switching where encryption keys are generated Backing up and restoring encryption keys Deleting encryption keys backed up in the key management server Viewing and changing the password policy for backing up encryption keys on the Remote Web Console computer Connection to the external server Backing up and restoring connection configuration to the external server Configuring the certificate used for the SSL communication Configuring the fibre channel authentication (FC-SP) Configuring resource groups Editing virtual management settings Setting reserved attribute for High Availability Viewing audit log information and downloading audit logs Configuring audit log settings and downloading audit logs Viewing storage system information Storage Administrator Configuring settings for storage systems (Initial Configuration) Configuring settings for SNMP Configuring settings for notification Configuring settings for license keys Storage Administrator Configuring settings for CLPR (System Resource Management) Viewing, deleting, and downloading storage configuration reports Acquiring all the information about the storage system and refreshing Remote Web Console window by clicking [Refresh All] Configuring settings for MP Blade Deleting tasks and releasing exclusive locks of resources Completing SIMs Configuring attributes for ports Configuring LUN security Configuring Performance Control Configuring tiering policies Storage Administrator Configuring caches (Provisioning) Configuring LDEVs, pools, and virtual volumes Formatting and shredding LDEVs Configuring external volumes Configuring alias volumes for Parallel Access Volumes Configuring Thin Provisioning User Groups 55

56 Table 8 Roles and Capabilities (continued) Role Capabilities Configuring host groups, paths, and WWN Configuring Auto LUN except splitting Auto LUN pairs when using RAID Manager Configuring access attributes for LDEVs Configuring LUN security Creating and deleting Quorum Disk used with High Availability Creating and deleting High Availability pairs Storage Administrator Configuring monitoring (Performance Management) Starting and stopping monitoring Storage Administrator Performing pair operations for local copy (Local Copy) Configuring environmental settings for local copy Splitting Auto LUN V2 pairs when using RAID Manager Storage Administrator Remote copy operations in general (Remote Copy) Operating High Availability pairs (except for creation and deletion) Support Personnel (View & Modify) User Maintenance Configuring SVP Normally, this role is for HP service representative. Downloading dump files using the Dump tool Configuring the SVP NOTE: Normally, the Support Personnel role is assigned to an HP service representative, but if the role is assigned to a user account, dump files can be downloaded using the Dump tool Built-in groups, roles, and resource groups More than one built-in group is available to each user. You cannot change roles or resource groups set to the built-in groups. The following table shows the built-in groups, and their built-in roles and resource groups. For more information about resource groups, see the HP XP7 Provisioning for Open Systems User Guide or the HP XP7 Provisioning for Mainframe Systems User Guide. 56 Setting up and managing user accounts

57 Table 9 Roles and resource groups configured in built-in groups Built-in Group Role Resource group Administrator Security Administrator (View & Modify) Audit log Administrator (View & Modify) Storage administrator (Initial Configuration) Storage Administrator (System Resource Management) Storage Administrator (Provisioning) Storage Administrator (Performance Management) Storage Administrator (Local Copy) Storage Administrator (Remote Copy) User Maintenance System Security Administrator (View & Modify) Audit log Administrator (View & Modify) Storage Administrator (Initial Configuration) Storage Administrator (System Resource Management) Storage Administrator (Provisioning) Storage Administrator (Performance Management) Storage Administrator (Local Copy) Storage Administrator (Remote Copy) Security Administrator (View Only) Security Administrator (View Only) Audit log Administrator (View Only) Storage Administrator (View Only) Security Administrator (View & Modify) Security Administrator (View & Modify) Audit log Administrator (View & Modify) Storage Administrator (View Only) Audit Log Administrator (View Only) Audit log Administrator (View Only) Storage Administrator (View Only) Audit Log Administrator (View & Modify) Audit log Administrator (View & Modify) Storage Administrator (View Only) All Resource Groups Assigned All Resource Groups Assigned All Resource Groups Assigned All Resource Groups Assigned All Resource Groups Assigned All Resource Groups Assigned Storage Administrator (View Only) Storage Administrator (View Only) meta_resource Storage Administrator (View & Modify) Storage Administrator (Initial Configuration) Storage Administrator (System Resource Management) Storage Administrator (Provisioning) Storage Administrator (Performance Management) Storage Administrator (Local Copy) Storage Administrator (Remote Copy) Support Personnel Storage Administrator (Initial Configuration) Storage Administrator (System Resource Management) Storage Administrator (Provisioning) meta_resource All Resource Groups Assigned User Groups 57

58 Table 9 Roles and resource groups configured in built-in groups (continued) Built-in Group Role Storage Administrator (Performance Management) Storage Administrator (Local Copy) Storage Administrator (Remote Copy) Support Personnel User Maintenance Resource group Maintenance Storage Administrator (View Only) User Maintenance All Resource Groups Assigned Creating a new user group This section explains how administrators can create a user group. Prerequisites You must have Security Administrator (View & Modify) role to perform this task. A user group name consists of 1 to 64 characters including alphanumeric characters (ASCII), spaces and the following symbols:! # $ % & ' ( ) + -. [ ] ^ _ ` { } ~ The system can support a maximum of 256 user groups, including the built-in user groups. Procedure 8 To create a new user group: 1. In the Administration tree select User Groups. 2. Open the Create User Groups window in one of the following ways: In the User Groups tab, click Create User Groups to open the Create User Group window From Settings, click User Management > Create User Groups. 3. Enter a user group name. 4. If you use an authorization server, click Check and verify that the entered user group name is registered in the authorization server. 5. Click Next to open the Assign Roles window. 6. Select the roles to assign to the user group, and click Add. 7. Click Next to open the Assign Resource Groups window. 8. Select the resource groups to assign to the user group, and click Add. If you select a role other than the storage administrator in the Assign Roles window, you do not need to select resource groups because all the resource groups are assigned automatically. 9. Click Finish to finish and confirm settings. Click Next to add another user. 10. Check the settings and enter a task name in Task Name. 11. Click Apply. The task is registered. If the Go to tasks window for status checkbox is checked, the Task window opens. Managing user accounts This section provides instructions for the following tasks: Creating user accounts (page 59) Changing user passwords (page 60) Changing user permissions (page 61) 58 Setting up and managing user accounts

59 Disabling user accounts (page 62) Deleting user accounts (page 62) Creating user accounts This section explains how to create a user account and register the account to a user group with appropriate permissions. Prerequisites You must have the Security Administrator (View & Modify) role to perform this task. You can log in to the SVP and the RAID Manager with user accounts that are created by Remote Web Console. You must have Support Personnel role to log in to the SVP. The system can support a maximum of 512 user accounts, including the built-in user accounts. Table 10 User name and password for Remote Web Console Length in characters Characters that can be used User name Alphanumeric (ASCII code) characters The following symbols: # $ % & ' * + -. / ^ _ ` { } ~ You cannot use the # symbol when you enter a user name in a screen from the Tool Panel dialog box. Password Alphanumeric (ASCII code) characters All symbols You cannot use the quotation mark ( ) or backslash (\) symbols when you enter a password in a screen from the Tool Panel dialog box. NOTE: If you cannot log in on a Tool Panel dialog box screen, check to see if you have used a number sign (#) in the user name, or used a quotation mark ( ) or a backslash (\) in the password. Table 11 User name and password for logging in to SVP Length in characters Characters that can be used User name Alphanumeric (ASCII code) characters Following symbols:! # $ % & ' ^ _ ` { } ~ Password Alphanumeric (ASCII code) characters All symbols Managing user accounts 59

60 Table 12 User name and password for logging in to RAID Manager Length in characters Characters that can be used User name 1-63 Alphanumeric (ASCII code) characters Following symbols (see the Note below) : _ Password 6-63 Alphanumeric (ASCII code) characters Following symbols (see the Note below) : _ NOTE: When you use a Windows computer for RAID Manager, you can also specify a backslash (\). When you use a UNIX computer for RAID Manager, you can also specify a slash (/). Procedure 9 To create a user account: 1. In the Administration tree,> select User Groups. 2. In the User Groups tab, select a user group to which to add a user. This is dependent on which permissions you want to give to the user. 3. In the Roles tab, confirm that the displayed permissions are appropriate for the user. 4. Open the Create User window in one of the following ways: In the User tab, click Create User. From Settings, click User Management > Create User. 5. Enter a name. 6. Select Activate or Lock for the account. If you select Lock, the user of this account is disabled and cannot log in to Remote Web Console. 7. To use an authentication server, select External. To authenticate users with only Remote Web Console, select Local. 8. If you select Local, enter the password of this user account in two places. For a password, all alphanumeric characters and symbols can be used. The length must be between 6 and Click Finish. 10. In the Confirm window, check the settings and enter a task name in Task Name. 11. Click Apply. The task is registered. If the Go to tasks window for status checkbox is selected, the Task window opens. Changing user passwords This section explains how to change or re-issue passwords for other users on Remote Web Console. Prerequisites Security administrators with View & Modify roles can change user passwords on Remote Web Console. If the target user has a local user account for Remote Web Console, the security administrator can use Remote Web Console to change the target user s password. If the target user has a local user account for the authentication server, the security administrator can use the authentication server to change the target user s password. After the password is changed, the target user can use the new password on both the authentication server and Remote Web Console. 60 Setting up and managing user accounts

61 Procedure 10 To change the password of a Remote Web Console user: 1. In the Administration tree, select User Groups. 2. In the User Groups tab, select the user group to which the user belongs. 3. In the User tab, select the user whose password you want to change. 4. Open the Change Password window in one of the following ways: In the User tab, click Change Password. From Settings, click User Management > Change Password. 5. Specify a new password for the user in the two password fields. 6. Click Finish. 7. In the Confirm window, check the settings and enter a task name in Task Name. 8. Click Apply. The task is registered. If the Go to tasks window for status checkbox is selected, the Task window opens. Changing user permissions User permissions are determined by the groups to which the user belongs. You change these permissions by changing membership in the user group. A user can belong to multiple user groups. For example, if you want to change the role of the user who manages security to the performance management role, add this user to the Storage Administrator (Performance Management) role group and then remove the user from the Security Administrator (View & Modify) role group. Prerequisites You must have Security Administrator (View & Modify) role to perform this task. The user whose permissions you want to change must belong to at least one user group. A user account can belong to up to 8 user groups. A user group can contain a maximum of 512 user accounts, including the built-in user accounts. Procedure 11 To change user permissions: 1. In the Administration tree, select User Groups. 2. In the User Groups tab, select a user group to add the user to. 3. Open the Add Users dialog box in one of the following ways: In the User Groups tab, click Add Users. From Settings, click User Management > Add Users. 4. In the Add User dialog box, select the user and click Add. 5. Click Finish. 6. In the Confirm window, check the settings and enter a task name in Task Name. 7. Click Apply. The task is registered. If the Go to tasks window for status checkbox is checked, the Task window opens. 8. In the Administration tree, click User Groups. 9. Click the User Groups tab, then select the user group from which to remove a user. to remove from this user group, and then. 10. In the User tab, select the user group from which to remove a user. 11. Open the Remove Users window in one of the following ways: Click More Actions > Remove Users. From Settings, click User Management > Remove Users. 12. Enter a task name in Task Name and click Apply. Managing user accounts 61

62 Disabling user accounts Security Administrators can disable a user account to temporarily prevent the user from logging in to Remote Web Console. Prerequisites Log into an account that is different from the user whose account that you want to disable. You must have Security Administrator role with View & Modify role to perform this task. Procedure 12 To disable a user account: 1. In the Administration tree, click User Groups. 2. In the User Group tab, select the user group. 3. In the User tab, select a user. 4. Open the Edit User window in one of the following ways: Click Edit User. From Settings, click User Management > Edit User. 5. Click the Account Status checkbox and click Disabled. 6. Click Finish. 7. In the Confirm window, check the settings and enter a task name in Task Name. 8. Click Apply. The task is registered. If the Go to tasks window for status checkbox is checked, the Task window opens. To allow the user to log in to Remote Web Console, perform the operation above and click Activate instead of Lock in the Edit User dialog box. Deleting user accounts Security Administrators can delete a user account when the account is no longer in use. Built-in user accounts cannot be deleted. Prerequisites You must have Security Administrator (View & Modify) role to perform this task. Procedure 13 To delete a user account: 1. In the Administration tree, select User Groups. 2. In the User Groups tab, click a user group to which a user belongs. 3. In the User tab, select the user whose account you want to delete. 4. Open the Delete Users window in one of the following ways: Click More Actions > Delete Users. From Settings, click User Management > Delete Users. 5. Check the settings and click Apply. Managing certificates for HP Systems Insight Manager Remote Web Console supports single sign-on from HP Systems Insight Manager. A user who logs in to HP Systems Insight Manager can operate Remote Web Console main window by clicking Remote Web Console in the Tool menu of HP Systems Insight Manager. The user is not required to enter a user ID and password in Remote Web Console because the user is already logged into HP Systems Insight Manager. To implement single sign-on using HP Systems Insight Manager, you need to import a Remote Web Console tool definition file into HP Systems Insight Manager, and register certificates of HP Systems Insight Manager to SVP. 62 Setting up and managing user accounts

63 To stop using single sign-on function, delete the certificate from SVP, and then remove the tool definition file from HP Systems Insight Manager. Required role for single sign-on All users who are allowed to log in to HP Systems Insight Manager can also log in to Remote Web Console. The user group for Remote Web Console depends on what kind of role the user has when the user logs in to HP Systems Insight Manager. Table 13 User group of Remote Web Console user after single sign-on Role for HP Systems Insight Manager Administrator User group of Remote Web Console Administrator User Group Operator Storage Administrator (View & Modify) Audit Log Administrator (View & Modify) User Audit Log Administrator (View Only) Security Administrator (View Only) User accounts registered to HP Systems Insight Manager are different from the user accounts for Remote Web Console. To implement single sign-on, you do not need to register user accounts of HP Systems Insight Manager to Remote Web Console. If a user logs in with both ways (to log in directly to Remote Web Console, and to log in with single sign-on from HP Systems Insight Manager), make sure that the role of the user account registered to HP Systems Insight Manager matches the role of Remote Web Console. If they do not match, the user has only the role of HP Systems Insight Manager. Importing a tool definition file into HP Systems Insight Manager To implement single sign-on, you need to import a Remote Web Console tool definition file into HP Systems Insight Manager. Procedure 14 To import a Remote Web Console tool definition file into HP Systems Insight Manager: 1. Download a Remote Web Console tool definition file from the following URL. Some Web browsers may display the content of the tool definition file. In this case, save the displayed content as an XML file by using the web browser Execute the following command to import the XML file into HP Systems Insight Manager. HP-SIM-installation-directory\bin>mxtool af definition-file-path-of-the-tool The example follows: C:\Program Files\HP\Systems Insight Manager\bin>mxtool af C:\tmp\RWCTool.xml Registering the certificates for single sign-on To implement single sign-on, the certificates of HP Systems Insight Manager must be registered to SVP before a user logs in to HP Systems Insight Manager. Whoever belongs to one of the following user groups is allowed to register the certificates of HP Systems Insight Manager to SVP. Administrator User Group System User Group Security Administrator (View & Modify) User Group Managing certificates for HP Systems Insight Manager 63

64 When you register a certificate, you can set an alias name for the certificate. Procedure 15 To register certificates to SVP: 1. Specify the following URL to open the Register Certificate window Enter the IP address or the host name of the HP Systems Insight Manager for which you want to implement single sign-on. NOTE: The IP address must be an IPv4 address. 3. Click Search. The information of the certificate appears on the Register Certificate window. Figure 23 Register Certificate window 4. Verify the certificate. If the certificate has some incorrect information, click Cancel to go back to the Register Certificate window. 5. If necessary, enter an alias name of the certificate into the Alias Name box. By default, the IP address or the host name that you specified in the Register Certificate window is displayed in the Alias Name box. 6. Enter the user name and password of Remote Web Console. 7. Click Register. 64 Setting up and managing user accounts

65 Deleting the certificates for single sign-on Procedure 16 To delete certificates from SVP: 1. Specify the following URL to open the Delete Certificates window. Figure 24 Register Certificate window (before retrieving) 2. Select the checkbox of the certificates which you want to delete. To display the certificate, click Detail. The IP address, the host name, or the alias name which you specified when you registered the certificate(s), appears on the list in the Delete Certificates window. 3. Enter administrator, which is the user name and password of Remote Web Console. 4. Click Delete. Removing a tool definition file from HP Systems Insight Manager To remove a Remote Web Console tool definition file from HP Systems Insight Manager, execute the following command. HP-SIM-installation-directory\bin>mxtool r -f definition-file-path-of-the-tool An example follows: C:\Program Files\HP\Systems Insight Manager\bin>mxtool r -f C:\tmp\RWCTool.xml Changing the user group configuration Changing a user group name This section explains how to change the name of a user group. Prerequisites You must have Security Administrator (View & Modify) role to perform this task. The names of built-in groups cannot be changed. A user group name consists of 1 to 64 characters including alphanumeric characters (ASCII), spaces and the following symbols: # $ % & ' ( ) + -. [ ] ^ _ ` { } ~ Procedure 17 To change the user group name: 1. In the Administration tree, select User Groups. 2. In the User Groups tab, select the user group. Changing the user group configuration 65

66 3. Open the Edit User Group window in one of the following ways: Click More Actions > Edit User Group. From Settings, click User Management > Edit User Group. 4. In the Edit User Group window, enter a new user group name. 5. If you use an authorization server, click Check and verify that the entered user group name is registered in the authorization server. 6. Click Finish. 7. In the Confirm window, check the settings and enter a task name in Task Name. 8. Click Apply. The task is registered. If the Go to tasks window for status checkbox is checked, the Task window opens. Changing user group permissions This section explains how to change the permissions that are assigned to user groups. Prerequisites You must have Security Administrator (View & Modify) role to perform this task. The permissions of a built-in group cannot be changed. Procedure 18 To change the permissions of a user group: 1. In the Administration tree, select User Groups. 2. In the User Groups tab, select the user group whose permission you want to change. 3. Click the Roles tab. 4. Open the Edit Role Assignment window in one of the following ways: Click Edit Role Assignment. From Settings, click User Management > Edit Role Assignment 5. In the Edit Role Assignment window, change roles to be assigned to the user group. Select roles to add, and then click Add. Select a role to remove, and then click Remove. 6. Click Finish. 7. In the Confirm window, check the settings and enter a task name in Task Name. 8. Click Apply. The task is registered. If the Go to tasks window for status checkbox is checked, the Task window opens. Changing resource groups assigned to a user group This section explains how to change the resource groups that are assigned to the user group. Prerequisites You must have Security Administrator (View & Modify) role to perform this task. Create a resource group to be assigned to the user group in advance. You cannot change the resource groups of the user group that has All Resource Groups Assigned set to Yes. You cannot change resource groups of the built-in group. Procedure 19 To change a resource group that is assigned to a user group: 1. In the Administration tree, select User Groups. 2. In the User Groups tab, select a user group to change the resource group. 3. Select the Resource Groups tab. 66 Setting up and managing user accounts

67 4. Open the Edit Resource Group Assignment window in one of the following ways: Click Edit Resource Group Assignment. From Settings, click User Management > Edit Resource Group Assignment. 5. In the Edit Resource Group Assignment window, change resource groups to be assigned to the user group. Select the resource group to add, and click Add. Select the resource group to remove, and click Remove. 6. Click Finish. 7. In the Confirm window, check the settings and enter a task name in Task Name. 8. Click Apply. The task is registered. If the Go to tasks window for status checkbox is checked, the Task window opens. Deleting a user group Delete a user group when the user group is no longer needed. Prerequisites You must have Security Administrator (View & Modify) role to perform this task. You cannot delete built-in groups. A user group cannot be deleted if there are users that belong to only the user group to delete. Procedure 20 To delete a user group: 1. In the Administration tree, select User Groups. 2. In the User Groups tab, select user groups that you want to delete. 3. Open the Delete User Groups window in one of the following ways: Click More Actions > Delete User Groups. From Settings, click User Management > Delete User Groups. 4. Check the settings and click Apply. Account lock policy A user account is automatically locked after three unsuccessful logins to Remote Web Console or RAID Manager. The account is locked for 60 seconds. Session timeout A session timeout occurs if the system receives no user operation for one minute due to a network error. Account lock policy 67

68 5 Configuring the Remote Web Console environment This chapter provides instructions for setting customized behaviors on Remote Web Console, including timeout and polling periods, notifications, and so on. Also, instructions are included for saving your Remote Web Console configuration settings and restoring them as needed. Configuration overview You can set up the following Remote Web Console behaviors: Create a message to display on the Remote Web Console login screen. See Creating a login message (page 68). Configure notification when certain system failures occur. See Configuring notification (page 71). Establish times for timeouts and polling limits. You can also hide the Alerts tab. See Setting Remote Web Console environmental parameters (page 74). Back up Remote Web Console configuration settings, which are used if it becomes necessary to restore the settings. See Backing up and restoring RWC configuration files (page 75). Restore configuration settings. See Backing up and restoring RWC configuration files (page 75). Creating a login message This topic explains how to create text to be displayed on Remote Web Console's log-in screen. Prerequisites You must have Security Administrator (View & Modify) role to perform this task. You must enable the Remote Web Console secondary window. See Using Remote Web Console secondary windows (page 142). Procedure 21 To create a login message: 1. Click Settings > Security > Login Message. The Remote Web Console secondary window opens. 2. Click to change to Modify mode. 3. Enter the message in the window. Alphanumeric characters and symbols can be used in the message. The maximum length of the message is 2,048 characters. 4. Click Apply. Related Topics Login Message window (page 213) Setting storage system information This topic explains how to set the name, contact information, and location of the storage system. CAUTION: The configured values are required to use SNMP agents. Make sure to document the information, because the settings will be cleared when the SVP is replaced. CAUTION: You can change more than one parameter, multiple times, but change only one at a time. Wait until the current task finishes before starting a new task. If you apply a setting (a new task) before the current task finishes, only the new task will be applied, so the result might be different from what you expected. 68 Configuring the Remote Web Console environment

69 To set storage system information: 1. In the Storage System tree, select the storage system. 2. Open the Edit Storage System window in one of the following ways: Click Edit Storage System. From Settings, click Environmental Settings > Edit Storage System. 3. Enter the items that you want to set. You can enter up to 180 alphanumeric characters (ASCII codes) excluding several symbols (\, / ; : *? " < > & % ^). Avoid using a space at the beginning and the end. 4. Click Finish. The Confirm window opens. 5. In the Confirm window, check the settings and enter a task name in Task Name. 6. Click Apply. The task is registered. If the Go to tasks window for status checkbox is checked, the Task window opens. Related Topics Edit Storage System window (page 213) Reporting failure information about storage systems This topic explains how to report storage system failure though Syslog or . You can report failure information (SIM) about storage systems through Syslog, SNMP trap, and . Failure information reported through is the same as SIM displayed on the Alert window or reported through SNMP trap. For SNMP trap, the user needs to access the SNMP Manager to check for failure. However, for report through Syslog or , the user has only to check Syslog or to know about the occurrence of failure. See the XP7 SNMP Agent User Guide for methods of notification with SNMP traps. Requirements of the new Syslog protocol (TLS1.2/RFC5424) The new Syslog protocol (TLS1.2/RFC5424) requires the following: Operation confirmed Syslog server (rsyslog version 4.6.2) Syslog server certificate. The IP address of the Syslog server in Subject Alternative Name: IP Address of the Syslog server certificate. Client certificate. Upload the following: Certificate type Syslog server root certificate Client certificate Format X.509 PKCS#12 Notes Obtain the Syslog server root certificate from the server administrator. Convert the Syslog server client certificate that is signed by a Certificate Authority (CA) to PKCS#12 format. (See Obtaining a client certificate for the new Syslog protocol (page 70).) Each certificate has an expiry date, after which you are prevented from connecting to the Syslog server. Note the expiration dates when preparing certificates. Contact the Syslog server administrator for the following: Password set up in the PKCS#12-format client certificate More information about the certificates Reporting failure information about storage systems 69

70 Obtaining a client certificate for the new Syslog protocol To obtain a client certificate: 1. Download the program to create the certificate from the following website: OpenSSL website, 2. Install the OpenSSL program in the C:\openssl folder. 3. Convert the client certificate to the PKCS#12 format. Example The following example to obtain a client certificate, Windows Vista is the operating system. Both a private key and a public key are created. The client.p12 file is the client certificate in PKCS#12 format. This file is created in the c:\key folder. 1. Create a private key (.key file). See Creating a private key (.key file) (page 15). 2. Create a public key (.csr file). See Creating a public key (.csr file) (page 16). 3. Send the new key to the Syslog server Certificate Authority for signature to obtain a certificate. The certificate is used as the client certificate. When preparing a certificate, note its expiration date. If the expiration date passes, you will not be able to connect to the Syslog server. Setting and configuring syslog notification for SIMs You can be notified in syslog format when storage system failures occur. Prerequisites You must have the Storage Administrator (Initial Configuration) role to perform this task. See Table 8 (page 55). You must have a server that supports syslogs. If a firewall is used, a port must be opened to transfer syslogs. To configure settings for syslog notification: 1. Click Settings > Environmental Settings > Edit Alert Settings. 2. In Notification Alert, select the destination of the alert notification. Host Report: Reports alerts only to the host(s) for which SIM report setting is made. All: Reports alerts to all hosts. 3. In Transfer Protocol, select the protocol for Syslog transfer. 4. To transfer Syslog to the primary server, select Enable and set the following items: IP Address Port Number Client Certificate File Name, Password, and Root Certificate File Name Use this field only when you select New Syslog Protocol (TLS1.2/RFC5424) in Transfer Protocol. 5. To transfer Syslog to the alternate server (secondary server), select Enable and set the following items: IP Address Port Number Client Certificate File Name, Password, and Root Certificate File Name Use this field only when you select New Syslog Protocol (TLS1.2/RFC5424) in Transfer Protocol. 6. Enter a name in Location Identification Name for identification for the storage system. 7. If you select New Syslog Protocol (TLS1.2/RFC5424) in Transfer Protocol, also specify timeout, retry interval, and number of retries. 70 Configuring the Remote Web Console environment

71 8. As necessary, click Test Send to Syslog Server to test the settings. 9. Check that the Syslog server has received log (Detailed data: "RefCode:7FFFFF, This is Test Report."). 10. Click Finish. The Confirm window opens. 11. In the Confirm window, check the settings and enter a task name in Task Name. 12. Click Apply. The task is registered. If the Go to tasks window for status checkbox is checked, the Task window opens. SIMs failures reported by typically require user action. These SIMs are caused either by reaching the threshold levels configured by the user, or by a software license needing user attention. The following SIMs are reported by Table 14 SIM reference codes reported by Reference code Alert level SIM 22 SIM 23 SIM 13 7F F7 xx Expiration. License key SERIOUS 7F F8 xx Exceeded the licensed capacity. SERIOUS 7F F9 xx Software invalidated by the expiration of the prerequisite software. SERIOUS xx Exceeded the pool usage threshold. Failure with paired volumes MODERATE 60 2x xx Pool blockade. Snapshot Pool or Fast Snap Pool MODERATE x 1x xx xx Exceeded the pool usage warning threshold. Exceeded the pool usage system threshold. Thin Provisioning Pool MODERATE MODERATE 62 2x xx Pool became full. MODERATE 62 6x xx Exceeded the pool usage depletionthreshold. MODERATE Related Topics Edit Alert Settings window (page 215) Configuring notification Prerequisites You must have a Storage Administrator account with an Initial Configuration role to perform this task. You must have a mail server that supports the Simple Mail Transfer Protocol (SMTP). If a firewall is used, port 25 must be used. Procedure 22 To configure settings for notices: 1. Click Settings > Environmental Settings > Edit Alert Settings. The Information window opens. 2. In Notification Alert, select the destination of the alert notification. Host Report: Reports alerts only to the host(s) for which SIM report setting is made. All: Reports alerts to all hosts. Alert notification destination is common to Syslog, SNMP, and Select Enable in Mail Notice on the tab. Reporting failure information about storage systems 71

72 4. In the Settings table, set the destination address and attributes (To, Cc, Bcc). To add an address, click Add. On the Add Address window, set the address and attributes. To change an address and attributes, select the line for the address to be changed, and click Change. In the Change Settings window, change the address and attributes. You can select more than one address. When you selected more than one address, you can change only attributes. To delete an address, select the line for the address to be deleted and click Delete. You can select more than one address. This field is mandatory when you select Enable in Mail Notice. 5. Enter the source address (mandatory) and return address (optional). You can use up to 255 alphanumeric characters (ASCII codes) and symbols (! # $ % & ` + - * / ' ^ { } _. ) 6. Enter the following server information: Identifier. To specify a host name, select Identifier. You can use up to 63 alphanumeric characters (ASCII codes) and symbols ("! # $ ` + - * ' { } _. ). IPv4. To set an IPv4 address, select IPv4, and enter four numbers within the range of 0 to 255. Example: XXX.XXX.XXX.XXX (X indicates a numeral) IPv6. To set an IPv6 address, select IPv6, and enter eight hexadecimal alphanumeric characters within the range of 0 to FFFF. You can also use an abbreviated-format IPv6 address. Example: YYYY:YYYY:YYYY:YYYY:YYYY:YYYY:YYYY:YYYY (Y indicates a hexadecimal digit) 7. In SMTP Authentication, select Enable to use SMTP authentication. Select Disable to not use SMTP authentication. If you select Enable, enter an account and password for SMTP authentication. You can use up to 255 alphanumeric characters (ASCII codes) and symbols (! # $ % & ` + - * / ' ^ { } _.). This field is mandatory when you selected Enable in Mail Notice. 8. If necessary, click Test Send to test the settings. 9. Check that the test has been received. For a test example and explanation, see Example of test , below. 10. Click Finish. The Confirm window opens. 11. In the Confirm window, check the settings and enter a task name in Task Name. 12. Click Apply. The task is registered. If the Go to tasks window for status checkbox is checked, the Task window opens. Related Topics Edit Alert Settings window (page 215) Example of test Date: FRI 25 OCT :10: (JST) To: HP XP7 alarm@example.com From: xxxx@itg.example.com Reply-To: xxxx@itg.example.com 72 Configuring the Remote Web Console environment

73 Subject: HP XP7 Report Date : 25/10/2013 Time : 10:09:30 Machine : HP XP7 (Serial# 64019) RefCode : 7FFFFF Detail: This is Test Report. The field definitions in the test are listed in the following table: Table 15 details for system failures notice # Date To From Reply-To Subject Date Time Machine RefCode Detail Date and time when the was sent. This time stamp is set by the mail server. address of the receiver. address of the sender. address to which replies from the receivers will be sent. Optional. title (Name of the storage system) + (Report) Date when a system failure occurred. Time when a system failure occurred. Name and serial number of the storage system. Reference code. The same code as the one reported by SNMP traps. Failure details. The same information as the one reported by SNMP traps. See the HP XP7 SNMP Agent User Guide for reference codes and failure details. Setting system options You can change settings about alert display and data acquisition by setting system options. Log off and log in again when you enabled or disabled a system option. Prerequisites You must have the Storage Administrator (Initial Configuration) role to perform this task. To set system options: 1. Click Settings > Environmental Settings > Edit System Options. 2. Select the system option to set and click Enable. Hide alert information. If you enable this system option, the Alert window does not open. Refresh forcibly after Apply. If you enable this system option, after settings changes are applied to the storage system, the configuration information for the storage system is forcibly updated. Disable data polling. If you enable this system option, polling stops. Disable retry of data updating. If you enable this system option, retry does not occur even if data cannot be acquired. Enable Remote Web Console 2 All Function. If you enable this system option, the restrictions on login from Remote Web Console's login window are cleared, including the restrictions on the users who can log in and on the functions available after login. When enabling or disabling the system option, log in again. 3. Click Finish. The Confirm window opens. 4. In the Confirm window, check the settings and enter a task name in Task Name. Setting system options 73

74 5. Click Apply. The task is registered. If the Go to tasks window for status checkbox is checked, the Task window opens. Related Topics Edit System Options window (page 228) Setting Remote Web Console environmental parameters You can set the following Remote Web Console environmental parameters: Polling period for monitoring who is changing information while others are viewing Time interval for monitoring disk controller and disk array unit status Time period that a user is logged out of the SVP because of a network error Time period when no changes are made that access the RMI server and the user is released from Modify mode as a result You can also specify whether to show or hide the Alerts tab. Prerequisites You must have the Storage Administrator (Initial Configuration) role to perform this task. See Table 8 (page 55). Procedure 23 To set time periods: 1. Start a web browser and enter the following URL to open the tool panel Click Control Panel to open the Control Panel. 3. Enter the user ID and password and click Login. 4. Click the Set Env. tab to open the Environment Parameter window. 5. Specify the Remote Web Console parameters as required. 6. Click Submit. 7. Click Exit ( ) to close the Control Panel. 8. Log out of the Remote Web Console SVP and then log in again to make the new parameters take effect. 9. Back up the Remote Web Console configuration file by downloading the file from the SVP. Remote Web Console environment parameters are described in the following table: 74 Configuring the Remote Web Console environment

75 Table 16 Environment parameters RMI time-out period If the user cannot access the SVP for a certain period of time because of a network error, the RMI time-out logs the user out of the SVP. The value of the RMI time-out period must be greater than the value set for the smallest polling period, either for checking exclusive lock or for checking obstacles (see below for those parameters). For example, specify a value of the RMI time-out period to satisfy the following condition: RMI time-out period > min [A, B] where A = Polling period for checking exclusive lock B = Polling period for checking obstacles, and min [A, B] indicates the minimum value selected from A and B. The default is 1 minute. You can specify 1 minute, 5 60 minutes in 5-minute increments, 70 to 120 minutes in 10-minute increments, or one day (24 hours). This parameter cannot be disabled. RMI time-out period for Modify Polling period for checking exclusive lock Polling period for checking obstacles If a user is in Modify mode but does not make any changes that access the RMI server for a specified period of time, Modify mode is released, and the View mode appears. The default time period is 30 minutes. You can specify between 10 and 60 minutes in 10-minute increments, or between 120 and 360 minutes in 60-minute increments. Specify NO to disable this parameter. Using Remote Web Console's secondary window, specify the polling period for monitoring who is changing information while in Modify mode when other users are viewing the storage system information in View mode. The Locked and Unlocked icons are automatically updated either when a user who is in Modify mode either logs out from Remote Web Console or changes to View mode. The shorter the time period you specify, the more frequently the Lock/Unlock status is updated, but this does increase network traffic. The default time period is 35 seconds. You can specify 5 to 60 seconds in 5-second increments, or 70 to 120 in 10-second increments. Specify NO to disable this parameter. Specify a time interval to monitor the Disk Controller and Disk Array Unit status, which is indicated by the Alerts window or the Remote Web Console secondary window. The default time period is 110 seconds. You can specify 5 to 60 seconds in 5-second increments, and 70 to 120 seconds in 10-second increments for the parameter. Specify NO to disable this parameter. We recommend that you select NO when Option to hide Alerts window checkbox is selected. Backing up and restoring RWC configuration files You can make backup copies of the various Remote Web Console configuration files by downloading them to a folder that you specify. You can then use the backup copies to restore one or more configuration files if it becomes necessary. Prerequisites You must have one of the following roles, depending on the configuration you are backing up or restoring. Backing up and restoring RWC configuration files 75

76 Table 17 Roles required to back up and restore configuration files Configuration file Required role to back up a file Required role to restore a file User Account Information User account information registered to the Remote Web Console. Security Administrator (View Only) Security Administrator (View & Modify) Environment Parameter List The parameters settings in the Set Env. window. Storage Administrator (Initial Configuration) Storage Administrator (Initial Configuration) Log Transfer Information Settings made in the Edit Audit Log Settings window and the Edit Alert Settings wizard Audit log Administrator (View Only) Audit log Administrator (View & Modify) SIMSyslog Transfer Information Settings made in the Edit Alert Settings wizard Storage Administrator (Initial Configuration) Storage Administrator (Initial Configuration) External Authentication Connection to the authentication server. Security Administrator (View & Modify) Security Administrator (View & Modify) External Application Link Connection to the authentication application. Storage Administrator (Initial Configuration) Storage Administrator (Initial Configuration) Key Management Server Connection to the Key Management Server 1 Security Administrator (View & Modify) Security Administrator (View & Modify) Password Policy Password policy for backing up encryption keys on the Remote Web Console computer Security Administrator (View & Modify) Security Administrator (View & Modify) Note 1. The client certificate in use when the key management (KMIP) server is connected cannot be backed up or restored by Remote Web Console. Consult the administrator of the key management server to determine the best way to use the server to manage and back up the certificate. Procedure 24 To back up configuration files: 1. Start a web browser and enter the following URL to open the tool panel: 2. Click Control Panel to open the Control Panel. 3. Enter the user ID and password and click Login. 4. Click the Download tab to open the Download file window. 5. Click the files to be downloaded. You can download only the files for which you have permission. 6. Click Submit. The Download File dialog box shows the list of the files to be downloaded. 7. Click Download. The File Download dialog box opens. 8. Click Save. The Save As dialog box opens. 9. Specify the name of a folder to save the compressed file, and then click Save to start downloading. 76 Configuring the Remote Web Console environment

77 10. Decompress the downloaded *.tgz file as required. To decompress the *.tgz file, use a tool supporting tar and gzip. Procedure 25 To restore the configuration files: 1. Start a web browser and enter the following URL to open the tool panel: 2. Click Control Panel to open the Control Panel. 3. Enter the user ID and password and click Login. 4. Click the Restore tab to open the Restore file window. 5. Click the files and click Browse to specify the directory of the file. You can restore only the files for which you have permission. 6. Click Next. 7. Click the configuration files to restore. 8. Click Submit. 9. If the Password check dialog box opens, enter User ID, Password, and Re-enter Password of the storage administrator on the backup user list, and click Submit on the Password check dialog box. The Restore File dialog box opens. 10. Confirm the restoring process has been completed successfully. 11. Click Close to close the dialog box. Backing up and restoring RWC configuration files 77

78 6 License keys Accessing software functionality requires a license key. This chapter provides information on license keys and instructions for installing, disabling, enabling, and uninstalling license keys. License keys overview When you install a license key, it is also enabled. The functionality for the software that you installed is available in Remote Web Console. The license key can be disabled. This allows you to conserve time on a term key, for example. If you have a 365-day term key for a software product, the license server starts the count the day you install the key. However, you may not use the license immediately, in which case you can disable the key. Disabling stops the count. You re-enable the key when you become ready to use it. This topic provides information in the order it is required: License key types (page 78). Lists the key types; explains whether keys are permanent or temporary; shows the term limit, if any; and provides the estimated license capacity, if required. Using the term key (page 79). Explains that you can conserve the term key when you are not using it. Using the temporary key (page 79). Explains that you can conserve the temporary key when you are not using it. Using the meter key (page 80). Explains that you can conserve the meter key when you are not using it. Estimating licensed capacity (page 82). Provides information and instructions for calculating license capacity according to your system and organization requirements. Installing and uninstalling software (page 85). Provides instructions for installing, disabling, enabling, and removing keys. License key expiration (page 89) provide information for dealing with these situations. License key types Table 18 License key types Type Effective term 1 Estimating licensed capacity permanent For purchase No limit Required term For purchase 365 days Required temporary For trial use before purchase (Try and Buy) 120 days Not required emergency For emergency use 30 days Not required meter For purchase (prepaid licensed capacity) Varies according to the capacity 2 Required Notes: 1. When you log in to Remote Web Console, a warning message appears if 45 days or less remain before the expiration. 2. See Using the meter key (page 80) for details. 78 License keys

79 Using the permanent key You can purchase the permanent key to use a software application indefinitely. You must estimate a licensed capacity required for using the software application and purchase a license key for the amount of the required capacity. If insufficient license capacity is installed, Not Enough License displays in the status field of the License Keys window, and the software application is not enabled. If the capacity of the usable volume exceeds the licensed capacity while the storage system is running, for example, an LDEV was additionally installed, Grace Period displays in the status field of the License Keys window. You can continue to perform the same operations, but the deficient amount of license must be purchased within 30 days. Using the term key You can purchase the term key to use the software application for a specific number of days. You must estimate a licensed capacity required for using the software application and purchase a license key for the amount of the required capacity. Not Enough License or Grace Period displays in the status field of the License Keys window if there is insufficient license capacity. You can enable or disable the term key for each software application. Unlike the temporary key and the emergency key, the number of days the term key is enabled is counted as the number of effective days of the term key rather than the number of elapsed days from the date of installation. The number of effective days is decremented by one day when the date changes. For example, if the term key is set to be enabled for 150 days at the time of installation and the term key is disabled for 100 days and a total of 250 days have elapsed since the installation, the number of remaining effective days of the term key is 215 days. This is determined by subtracting 150 days from 365 days. By disabling the term key on the days when the software application is not used, you can prevent the unnecessary decrease of the period in which the term key can be used. If the term key is expired, Not Installed displays in the status field of the License Keys window, and the software application is disabled. Using the temporary key You can use the temporary key for trial purposes. The effective term is 120 days from the time of installation of the temporary key. The effective term is not increased even if the temporary key is reinstalled during the effective term. If you uninstall the temporary key, even though the effective term remains, [Temporary] is displayed in the status field, [Not Installed] is displayed in the Key Type field, and remaining days of the effective term are displayed in the Term (days) field of the License Keys window. If the temporary key expires, you cannot reinstall the temporary key for 180 days. Expired displays in the status field of the License Keys window, and the software application is disabled. Using the emergency key You can use the emergency key if the license key cannot be purchased if an emergency occurs, such as a system failure or a communication error. You can also use the emergency key if the configuration of the software application that is installed by the temporary key remains in the changed status and cannot be restored to the original status. For example, if you do not plan to purchase the software application after using the temporary Using the permanent key 79

80 key for trial purposes, you can restore the changed configuration to the original status by temporarily enabling the software application with the emergency key. CAUTION: If the emergency key is installed in the software application in which the permanent key,, the term key or the meter key is installed, the effective term of the license key is 30 days. However, because the emergency key can be reinstalled during the effective term, the effective term can be restored to 30 days. In other scenarios, the emergency key can be installed only once. Using the meter key The permanent license must be already installed. The meter license is used if the used amount exceeds the permanent licensed capacity. The expiration date is calculated from the amount of the used capacity exceeding the permanent license capacity and the remaining meter licensed capacity. On the other hand, if the used capacity is within the permanent licensed capacity, the meter license is not used, and the expiration date is not displayed. Meter licensed capacity is checked daily at 13:00, based on the SVP clock. At this time, one day is deducted from the number of TB-Days. If others are using Remote Web Console during that time, the License Key window update might be delayed. Unlike a term key, the license of a meter key cannot be disabled. The meter license after removal cannot be reinstalled. The remaining TB/Day license will be forfeited. The license capacity of software applications such as Auto LUN is based on the mounted capacity. To stop the meter license capacity from being reduced when used with one of these software applications, disable the meter license. When the meter license is disabled, Remote Web Console reports the software application status as "Not Enough License," and the software application cannot be used. Calculating the effective term of the meter key The effective term of the meter key is calculated from the following three types of capacities. The used capacity. The licensed capacity of the permanent key. The remaining licensed capacity of the meter key. The calculation formula is as follows. Effective term = remaining licensed capacity of meter key / used capacity - licensed capacity of permanent key If the used capacity is within the licensed capacity of the permanent key, the license of the meter key is not used, and the expiration date for use is not displayed. An example is shown next. Example of licensed capacity of permanent key >= used capacity The meter license is not used. Therefore, the licensed capacity of the meter key is not subtracted. Meter is displayed in the key type field, and Installed is displayed in the status field. 80 License keys

81 Example of licensed capacity of permanent key + licensed capacity of meter key >= used capacity The meter license is used, and the licensed capacity of the meter key is subtracted. Meter is displayed in the key type field, and Installed is displayed in the status field. If the used capacity is 4TB, the licensed capacity of the permanent key is 3TB, the licensed capacity of the meter key is 2TB, and the effective term is 2 days. Remaining licensed capacity of meter key / used capacity - licensed capacity of permanent key. = 2TB / (4TB - 3TB) Example of licensed capacity of permanent key + licensed capacity of meter key < used capacity The meter license is used, and the licensed capacity of the meter key is subtracted. Meter is displayed in the key type field, and Grace Period is displayed in the status field. Restore the license status from the Grace Period status to the Installed status by any of the following methods. Add the licensed capacity of the meter key. Add the licensed capacity of the permanent key. Decrease the used capacity. Grace Period status with meter key With the license of the meter key, the amount of the licensed capacity of the permanent key exceeding the used capacity is subtracted. In the Example of licensed capacity of permanent key + licensed capacity of meter key < used capacity, Grace Period is displayed in the status field of the License Keys window. The duration of the Grace Period is 30 days. The license for the deficient amount must be purchased within the 30 days. In the Grace Period term, the operation can be performed in the same manner as the Installed status. However, as the license capacity of the meter key continues to be subtracted, the subtraction continues even if the license capacity of the meter key becomes a negative value. For example: If the licensed capacity of the meter key is -10TB and 20TB of license capacity is installed, the remaining licensed capacity becomes 10TB. If the licensed capacity is a negative value and more licensed capacity of the permanent key than the used capacity is installed, the meter license is deleted. Grace Period status with meter key 81

82 If the license key for the deficient amount of capacity is not installed within the 30 days, the status changes to Not Enough License, and the software application is disabled. If a permanent key with more licensed capacity than the used capacity is installed, the meter license is deleted. Estimating licensed capacity The licensed capacity is volume capacity that you are licensed to use with the software application. You need to estimate the amount of capacity which you want to use with the software application before you purchase the permanent key, the term key, or the meter key. Software and licensed capacity Three licensed capacity types are available. The one you choose depends on the software. The following table shows the licensed capacity types: Table 19 Licensed capacity types Type Used capacity Mounted capacity / usable capacity Unlimited capacity The licensed capacity is estimated by using one of the following capacities, which depends on the software product. Normal volumes (LDEVs) External volumes mapped to the storage system Pools The licensed capacity is estimated using the capacity of all the LDEVs in the storage system. You can use the software regardless of the volume capacity. The following table lists the software and the licensed capacity. Table 20 Software and licensed capacity Option name Open Systems Array Management Mainframe Array Management Performance Monitor Auto LUN Auto LUN V2 Continuous Access Synchronous Continuous Access Synchronous Z Continuous Access Journal Continuous Access Journal Z Cont Access Journal 3DC and 4x4 Open MF Licensed capacity Mounted capacity Mounted capacity Mounted capacity Mounted capacity Used capacity for normal volumes 1 Used capacity for normal volumes Used capacity for normal volumes 1 Used capacity for normal volumes Unlimited Notes Used only for open-system devices, including LUN Manager, Open Volume Management, Volume Shredder, Cache Residency, Data Retention, Database Validator, and Cache Partition Used only for mainframe devices, including Virtual LVI, Cache Residency Manager for Mainframe, Volume Retention To use Auto LUN, first install Performance Monitor. To use Continuous Access Journal, first install Continuous Access Synchronous. To use Continuous Access Journal for Mainframe, first install Continuous Access Synchronous for Mainframe. To use Continuous Access Journal 3DC and 4x4 Open MF, first install Continuous Access Journal and Continuous Access Journal for Mainframe. 82 License keys

83 Table 20 Software and licensed capacity (continued) Option name Business Copy/Snapshot Business Copy Z Compatible FlashCopy Compatible FlashCopy SE Fast Snap Thin Provisioning Smart Tiers Thin Provisioning Z Licensed capacity Used capacity for normal volumes 1 Used capacity for normal volumes Used capacity for normal volumes Used capacity for normal volumes Used capacity for normal volumes 1 Used capacity (Total pool capacity) Used capacity (Total pool capacity) Used capacity (Total pool capacity) Notes To use Fast Snap, first install Thin Provisioning To use Smart Tiers, first install Thin Provisioning. To use Thin Provisioning Z, first install Thin Provisioning. Smart Tiers Z Parallel Access Volumes Used capacity (Total pool capacity Used capacity for normal volumes To use Smart Tiers Z, first install Thin Provisioning and Smart Tiers. Hyper Parallel Access Volumes Compatible XRC Mainframe Fibre Data Migration Compatible High Performance FICON Connectivity External Storage High Performance FICON Connectivity Resource Partition High Availability Unlimited Used capacity for normal volumes Used capacity for external volumes Unlimited Used capacity for external volumes Unlimited Mounted capacity Used capacity for normal volumes 1 To use Hyper Parallel Access Volumes, first install Parallel Access Volumes. For controller emulation type I-2107 only. Notes: 1. If you use Thin Provisioning, Smart Tiers, Thin Provisioning Z, or Smart Tiers Z V-VOLs as P-VOLs or S-VOLs in the following software applications, the license capacity of Business Copy, Continuous Access Synchronous, and Continuous Access Journal is calculated using the page capacity allocated to the V-VOLs (that is, used pool capacity). Business Copy Fast Snap Continuous Access Synchronous Continuous Access Journal Business Copy Z Estimating licensed capacity 83

84 Table 20 Software and licensed capacity (continued) Option name Continuous Access Synchronous Z Continuous Access Journal Z Compatible FlashCopy High Availability Licensed capacity Notes Calculating licensed capacity for a normal volume The calculation of the normal volume capacity depends on the volume emulation type. Use the formula in the following table to estimate capacity for purchase. When you calculate the volume capacity, round the value up to the second decimal place. Table 21 Formulas for calculating capacity of a normal volume Volume emulation type 3390-x OPEN-x Formula for calculating capacity of a normal volume 870 KB X (number of user cylinders) Same as the capacity specified when creating the volume Note: In the left column of this table, "x" indicates a number or a letter. For example, OPEN-x refers to emulation types such as OPEN-3 and OPEN-V. An example is shown in the following table: Table 22 Example of estimating capacity for purchase Volume emulation type Number of user cylinders Number of volumes Total capacity of all the volumes Estimated capacity for purchase Value ,339 2, KB X 3,339 X 2,048 = 5,949,296,640 KB 5,949,296,640 KB / 1,024 = 5,809,860 MB 5,809,860 MB / 1,024 5, GB 5, GB / 1, TB At least 6 TB Calculating licensed capacity for an external volume Use the following equation to calculate the licensed capacity for an external volume: External Volume Capacity (KB) = Volume Capacity (number of blocks) X 512 (bytes) / 1,024 Calculating pool capacity The license capacity of Thin Provisioning is calculated using the total capacity of the Thin Provisioning pool. If you use Thin Provisioning V-VOLs as P-VOLs or S-VOLs of Business Copy, Continuous Access Synchronous, Continuous Access Journal, or High Availability, the license capacity of Business Copy, Continuous Access Synchronous, Continuous Access Journal, or High Availability is calculated using the page capacity allocated to the Thin Provisioning V-VOLs (that is, used pool capacity). For more information on calculating pool capacity, see the HP XP7 Provisioning for Open Systems User Guide and the HP XP7 Provisioning for Mainframe Systems User Guide. 84 License keys

85 Installing and uninstalling software This topic provides the following tasks: Installing the software (page 85) When the status is Installed (Disabled) (page 86) Enabling a license (page 86) Disabling a license (page 86) Removing a software application (page 86) Updating license status (page 87) Viewing license information (page 87) Cautions on licenses (page 89) Installing the software Prerequisites You must have Storage Administrator (Initial Configuration) role to perform this task. You must install a license key for each software application before you use it. To install a software application: 1. Display the Install Licenses window in one of the following ways: From General Tasks, select Install Licenses. From the Administration tree, select License Keys. In the License Keys window, click Install Licenses. 2. Select whether to enter a key code or specify a license key file. Key Code: Enter a key code to install the software. In Key Code, enter the license key code for the software. File: Specify a license key file to install the software. Click Browse and specify the license key file. You can use a file name of up to 200 alphanumeric characters (ASCII codes) excluding several symbols (", \, ;, :, *,?, <, >,, /,,). The file extension is "plk". 3. Click Add. 4. In the Selected License Keys table, set the status of license keys for each software application. Enable Licenses: Installs license keys in enabled status. You can select more than one software application to install licenses for. Disable Licenses: Installs license keys in disabled status. You can select more than one software application to install licenses for. Clear All: Delete all license keys from the Selected License Keys table. 5. Click Finish. The Confirm window opens. 6. In the Confirm window, check the settings and enter a task name in Task Name. 7. Click Apply. The task is registered. If the Go to tasks window for status checkbox is checked, the Task window opens. If a software installation fails, the Error Message window opens. To display the cause of error, from the Error Message window, select the software and click Detail. Related Topics Install Licenses window (page 206) When the status is Installed (Disabled) (page 86) Installing and uninstalling software 85

86 When the status is Installed (Disabled) If you do not install the prerequisite software before you install the license key software, the software will install correctly but will be disabled. To enable a license key, install the prerequisite software, then enable the key. Detailed instructions to install the prerequisite software, are located in Software and licensed capacity (page 82). Instructions to enable a license key are located in Enabling a license (page 86). Enabling a license You can enable a license that is in disabled status. Prerequisites You must have Storage Administrator (Initial Configuration) role to perform this task. To enable a license: 1. From the Administration tree, click License Keys. The License Keys window opens. 2. Select the license to enable. You can select more than one license to enable at the same time. 3. Display the Enable Licenses window in either of the following ways: In the License Keys window, click Enable Licenses. From the Settings menu, click Environmental Settings > Enable Licenses. 4. Check the settings and click Apply. Related Topics Enable Licenses window (page 209) When the status is Installed (Disabled) (page 86) Disabling a license Prerequisites You must have Storage Administrator (Initial Configuration) role to perform this task. You can disable a license that is in enabled status. To disable a license: 1. From the Administration tree, click License Keys. The License Keys window opens. 2. Select the license to disable. You can select more than one license to disable at the same time. 3. Display the Disable Licenses window in either of the following ways: In the License Keys window, click Disable Licenses. From the Settings menu, click Environmental Settings > Disable Licenses. 4. Click Finish. 5. Check the settings and click Apply. Related Topics Disable Licenses window (page 210) Removing a software application Prerequisites You must have Storage Administrator (Initial Configuration) role to perform this task. To remove a software application: 1. From the Administration tree, click License Keys. The License Keys window opens. 86 License keys

87 2. In the License Keys window, select the license to uninstall. You can select more than one license to uninstall at the same time. 3. Display the Uninstall Licenses window in either of the following ways: In the License Keys window, click Uninstall Licenses. From the Settings menu, click Environmental Settings > Uninstall Licenses. 4. Check the settings and click Apply. On rare occasions, a software option that is listed as Not Installed but still has available licensed capacity (shown as XX TB) might remain in the list. In this case, select that option and uninstall the software. Related Topics Remove Licenses window (page 210) Cautions on licenses (page 89) Updating license status In the following cases, the status of software may remain at Not Enough License or Grace Period. In that case, update the license status. When the licensed capacity exceeds the mounted capacity after you reduce the number of LDEVs When the licensed capacity exceeds the used capacity after you delete pairs or pool volumes Prerequisites You must have Storage Administrator (Initial Configuration) role to perform this task. To update license status: 1. Display the Update License window in either of the following ways: In the License Keys window, click Update License Status. From the Settings menu, click Environmental Settings > Update License Status. 2. Check the settings and click Apply Related Topics Update License Status window (page 211) Viewing license information You can view license information for each software product on the License Key window. In the Administration tree, select License Keys. The following table lists the display examples. Table 23 Example of window display License key status (example) Status Key type Licensed capacity Term (days) Not installed Not installed blank Blank Blank Installed with the permanent key Installed permanent Permitted - Installed with the term key and set to Enabled Installed term Permitted Number of remaining days before expiration Installed with the term key and set to Disabled Installed (Disabled) term Permitted - Installed with the temporary key. Installed temporary - Number of remaining days before expiration Installing and uninstalling software 87

88 Table 23 Example of window display (continued) License key status (example) Status Key type Licensed capacity Term (days) Installed with the emergency key. Installed emergency - Number of remaining days before expiration A temporary key was installed, but has expired. Expired temporary - Number of remaining days before expiration Installed with the Meter key. Installed Meter Permitted, used, and remaining meter license Estimated number of remaining days before expiration A term key or an emergency key was installed, but has expired. Not installed blank Blank Blank Installed with the permanent key or the term key, but the licensed capacity was insufficient. Not Enough License permanent or term Permitted and Used - Installed with the permanent or term key, and then LDEVs are added, but the license capacity was insufficient. Grace Period permanent or term Permitted and Used Number of remaining days before expiration Installed with the temporary key, and then reinstalled with the permanent key, but the license capacity was insufficient. Installed temporary Permitted and Used Number of remaining days before expiration Used Meter license capacity, where capacity is short. Grace Period Meter Permitted, used, and remaining meter license Estimated number of remaining days before expiration Installed with the permanent or term key, then reinstalled with the emergency key. Installed emergency Permitted and Used Number of remaining days before expiration Related Topics License Keys window (page 204) Cautions on license capacities in non-license-related windows License capacities are displayed not only in license-related windows but also in the Pools window and the Replication window. When you overwrite-install the temporary key or emergency key for an installed software application, the license capacity before the overwrite installation is displayed as Permitted (TB): in license-related windows. However, Unlimited (license capacity for the temporary key or emergency key) is displayed as Licensed Capacity in the Pools window or Replication window. For example, if you install Continuous Access Synchronous with a license capacity of 5 TB by the term key and when the term has expired and you use the emergency key, 5TB (capacity of the term key) is displayed in Permitted (TB): on license-related windows, but Unlimited (capacity for the emergency key) is displayed in Licensed Capacity on the Replication window. 88 License keys

89 Cautions on licenses Observe the following precautions when working with licenses: CAUTION: If you use Thin Provisioning, the licensed capacity might become insufficient because the used capacity of Thin Provisioning pools could increase even if you do not add any volumes. If this occurs, you must purchase an additional license within 30 days to cover the capacity shortage. For details on how to calculate pool capacity, see the HP XP7 Provisioning for Open Systems User Guide. CAUTION: When you remove Data Retention an error might occur even if the Permitted Volumes column of the License Keys window indicates that the licensed capacity is 0 TB. To resolve the Data Retention error and continue removal: 1. Click Actions > Other Function > Data Retention to open the Data Retention window. 2. In the Data Retention window, find logical volumes that are unusable as S-VOLs (secondary volumes). 3. Change the settings so that the logical volumes are usable as S-VOLs. 4. Uninstall Data Retention. Related Topics Data Retention window in the Provisioning Guide for Open Systems manual License key expiration If the license key for software-a expires, the license key of software-b is also disabled if it requires an enabled software-a. In this scenario, Installed (Disabled) appears for software-b in the Status column of the License Keys window. After that, when you re-enable software-a, software-b is also re-enabled. If the Status column for software-b continues to display Installed (Disabled), go to the License Keys window and manually change the status of software-b back to Installed. After your license key expires, no new configuration settings can be made, and no monitoring functions can be used with Performance Monitor. Configuration settings made before the expiration of the license key remain in effect. You can cancel configuration changes for some software. License key expiration 89

90 7 Viewing and managing the storage system This chapter describes how to navigate to storage system information, create and download system configuration reports, and manage Remote Web Console tasks. Viewing and managing overview This topic shows you how to do the following tasks in Remote Web Console: Perform basic navigation to storage system information. See Viewing storage system information (page 90). Create, download, and delete system configuration up to 20 reports. See Viewing a Remote Web Console report (page 93). Manage the queued operations you performed in Remote Web Console. This includes a discussion about tasks, and suspending, resuming and deleting tasks. Managing tasks (page 94). Viewing storage system information This topic describes high-level system information that is available in Remote Web Console. It also describes how to view this information in another application, how to create reports, and how to manage tasks. The storage system information appears immediately when you start Remote Web Console. Viewing basic information The main window shows basic information about the storage system. 90 Viewing and managing the storage system

91 Viewing specific information You can view more specific information when you make a selection in the resource tree in the left pane. Viewing other system information You can also find other system information such as a port status and data regarding used and unused resources. This information displays in a Remote Web Console secondary window. Procedure 26 To view other system information: 1. Click Settings > Environmental Settings > License Keys. Java starts. 2. If a message appears and asks if you want to run the Java application, click Run. The Remote Web Console secondary window opens. 3. In the Remote Web Console secondary window, click File > Reports. The Report Display dialog box opens. 4. Click the tab to display the Report Display dialog box. 5. To save information in the dialog box, click Export. In the dialog box that opens, enter location and file name, then click Save. Viewing port conditions You can view port conditions by clicking Actions > Component > View Port conditions. Viewing storage system information 91

92 Figure 25 Port Condition window Status icons for certain resources The status of certain resources is indicated by the following icons: Status The resource can be used normally. The resource has the following status: The resource can be used, but has a limit on I/O performance and so on. The status of the resource is changing. The status of the resource is being confirmed. The resource has subresources of different status. For example, parity groups are in this status if the statuses of logical volumes in the parity groups are not the same. In this case, the subresources might be blocked. Confirm the status of subresources. The resource has the following status: The resource cannot be used because it is blocked due to a failure or maintenance operations. The status of the resource is unknown. Restore the resource to the normal status. Viewing Remote Web Console data using external applications You can load and view Remote Web Console data in external applications such as HP Systems Insight Manager. 92 Viewing and managing the storage system

93 Prerequisites The SVP must be configured to load Remote Web Console data to another application. Contact your service representative. To add an application, you must specify information about the application in the application information file. Contact your service representative to ask about how to obtain the application information file. Procedure 27 To view Remote Web Console data in another application: 1. Open a Remote Web Console window and select the rows that you want to view. 2. Click Settings > Launch Application > Application Name. The application displays the selected data. Using reports to verify system changes This topic explains Remote Web Console reports and provides instructions for creating, viewing, and deleting them. You can create reports of your storage system s physical configurations and logical settings. Doing this provides a copy of the settings when you intend to make changes. If you make a similar report after the changes, then you can compare the reports to verify that new settings were made as intended. Remote Web Console reports can be saved in a CSV or HTML file. Tables in the HTML version of the configuration report are sortable. Viewing a Remote Web Console report For details on Flash Player, see General restrictions (page 40) and Installing Adobe Flash Player (page 27). Prerequisites Adobe Flash Player must be installed to view reports. Users that create the report or users with Storage Administrator (Initial Configuration) role can view the report. To download and view a report: 1. In the Remote Web Console tree, click Storage Systems > Reports. 2. Specify the report to download. 3. Click Download Reports. 4. Specify a folder in which to save a.tgz file. 5. Extract the downloaded.tgz file. 6. Display the report in the following ways: For an HTML format report: Open html\index.html file in the extracted folder. For a CSV format report: Open a csv file in the csv folder in the extracted folder. Viewing a report in the Reports window You can view only HTML format reports in the Reports window. You can view CSV format reports in the previous procedure. 1. Click Storage Systems > Reports. Using reports to verify system changes 93

94 2. Click the report name to display in the Reports window. The report is displayed in the Reports window. In the Reports window, click the reports name in the list at the left, and you can view the report at the right. For details about each report, see Storage configuration reports (page 117). Creating a configuration report You can use the report configuration tool to create up to 20 configuration reports and then view or download them. Prerequisites You must have Storage View permission to perform this task. Procedure 28 To create a configuration report: 1. From General Tasks, click Create Configuration Report. 2. Specify a task name and click Apply. This task name is used as the report name in the Reports window. This process takes approximately 10 minutes to complete. 3. Click Refresh to update the Reports window. The created report appears in the list. Deleting a configuration report You can delete a report when you no longer need it, or to make room in the Reports window when the number of reports is near the limit. Prerequisites Users that create the report or users with Storage Administrator (Initial Configuration) role can delete a configuration report. Procedure 29 To delete a report: 1. In the tree, click Storage Systems > Reports. 2. Specify the report to delete. 3. Click Delete Reports. 4. Click Apply. Managing tasks This topic describes tasks and the Tasks window, and provides instructions for managing tasks. Because Remote Web Console operations are executed in the background, you start the next task immediately after performing the previous one. You keep track of your tasks' progress by entering a task name during each Remote Web Console procedure and then tracking its status and other information using the Task window. Each procedure you perform requires a task name. For example, when you provision or configure the system, create a pair, or any other procedure, you must assign a name for the task. Each task is queued and then processed by the storage system in the order of its arrival. NOTE: You cannot use a secondary window to make any settings while a a task in the main window has a status of In Progress, Waiting, or Suspended. Only one task is executed at the same time, except for the following. In the case of the following operations, the next task may be executed before the current task completes or fails. Create LDEVs Format LDEVs 94 Viewing and managing the storage system

95 Shred LDEVs Shrink Pool Tasks window Edit Encryption The Tasks window can display 384 tasks, including up to 128 tasks with a status of In Progress, Waiting, and Suspended, and up to 256 tasks with a status of Completed and Failed. If the number exceeds these limits, the oldest completed tasks are automatically removed from the window. Managing your tasks Remote Web Console allows you to suspend, resume, cancel, and prevent tasks from being automatically deleted. Prerequisites Stalled tasks Users that execute the task or users with Storage Administrator (System Resource Management) role can view the details of tasks. Users with the Storage Administrator (System Resource Management) role can delete, suspend, resume tasks, and enable or disable auto-deletion of tasks. Procedure 30 To modify a task: 1. In the tree, click Storage Systems > Tasks. The list of tasks appears. 2. In the list, click the task or tasks that you want to modify. 3. In the bottom right corner of the window, click the corresponding button for the task you want to perform: Click Delete Tasks to delete or cancel a task. Click Suspend Tasks to suspend a queued task. Click Resume Tasks to resume a suspended task. Click More Actions > Enable Auto Delete to delete tasks from the Task list when they have completed and the task list is full. This allows you to check for completed tasks and to clear the list when the limit (384) is reached. Click More Actions > Disable Auto Delete to keep tasks in the task list after the tasks are completed. 4. Verify the displayed settings and click Apply. If a queued task is not performed over a reasonable period, check the following: Did the task fail? Click failed to view the reason. Then delete the task using the Delete Tasks window, correct the problem, and try the task again. Are too many tasks in the task list because Auto Delete is disabled? Use the Enable Auto Delete window to remove tasks from the window. Is another program changing the storage system configuration? Check this by observing whether Resource Lock is displayed for too long a time. If so, verify that another program is running and then wait until its changes are completed. The percentage of progress of an ongoing task may not change if another operation is in progress. Managing tasks 95

96 Setting the status refresh interval of the Tasks window The Tasks window automatically updates every 60 seconds by default. This interval can be changed using the following procedure. Procedure 31 To change the refresh interval: 1. Click Settings > Environmental Settings > Edit Information Display Settings. 2. Specify the interval for Task Screen Refresh Interval. If No Update is specified, the Tasks window will not be automatically updated. In this case, to refresh the window, you must use Refresh or File > Refresh All. 3. Click Apply. Creating a configuration report using the Report Configuration Tool You can create a configuration report by using a command prompt when you use the Report Configuration Tool. By preparing a script file that contains a series of commands and scheduling a task in Windows to execute the script at regular intervals, you can automate the creation and the deletion of the configuration report. Preparing a script file Before creating the configuration report, you will need to write a series of commands in a script file. When you run the Report Configuration Tool, the commands in the script files execute sequentially and then create or delete a configuration report. See Report Configuration Tool command reference (raidinf commands) (page 133) for a list of commands. Two examples of scripts are shown below. Refer to these examples as needed to create a script file that suits your needs. Example script for creating a configuration report Example script for downloading a configuration report Example script for creating a configuration report This script logs the user in, deletes a configuration report, creates a configuration report, and logs the user out, using the Report Configuration Tool. For each command except the logout command, this example performs three retries at intervals of 2 minutes, assuming that communication errors and other errors can occur. In addition, the delete report command is executed with the -fill option before the add report command, so that the script does not terminate when 20 configuration reports accumulate in the SVP. REM REM Create Report Script(CreateReport.bat) REM SET USER=<Username for Remote Web Console> SET PASS=<Password for Remote Web Console> SET SERVER=<Hostname or IP address of SVP> SET REPORT_NAME=DailyConfigurationReport SET LOOP=2 REM LOOP:0-2 3Times SET TIMEOUT=121 REM TIMEOUT 2[minutes]=120[s] SET RAIDINF_PATH="C:\Program Files\raidinf" SET /a CNT_LOGIN=0 :LOGIN_RETRY REM ############################# LOGIN %CNT_LOGIN% SET /a CNT_LOGIN=%CNT_LOGIN% + 1 %RAIDINF_PATH%\raidinf -login %USER% %PASS% -servername %SERVER% if ERRORLEVEL 1 ( if %CNT_LOGIN% GTR %LOOP% GOTO :ABEND CALL :SLEEP 96 Viewing and managing the storage system

97 ) GOTO LOGIN_RETRY SET /a CNT_DEL=0 :DEL_RETRY REM ############################# DELETE %CNT_DEL% SET /a CNT_DEL=%CNT_DEL% + 1 %RAIDINF_PATH%\raidinf delete report -servername %SERVER% ^ -report %REPORT_NAME% -fill if ERRORLEVEL 1 ( IF %CNT_DEL% GTR %LOOP% GOTO :ABEND CALL :SLEEP GOTO :DEL_RETRY ) SET /a CNT_ADD=0 :ADD_RETRY REM ############################# ADD %CNT_ADD% SET /a CNT_ADD=%CNT_ADD% + 1 %RAIDINF_PATH%\raidinf add report -servername %SERVER% -report ^ %REPORT_NAME% if ERRORLEVEL 1 ( IF %CNT_ADD% GTR %LOOP% GOTO :ABEND CALL :SLEEP GOTO ADD_RETRY ) GOTO :END EXIT /B :SLEEP REM REM ############################# SLEEP with %TIMEOUT% sec REM ping n %TIMEOUT% > NUL EXIT /B :ABEND REM ############################# ABEND ECHO "Create Report Script was ABEND" :END REM ############################# Logout %RAIDINF_PATH%\raidinf -logout -servername %SERVER% Example script for downloading a configuration report This script logs the user in, downloads a configuration report, and logs the user out, using the Report Configuration Tool. For each commandexcept the logout command, this example performs 3 retries at intervals of 2 minutes, assuming that communication errors and other errors can occur. The downloaded configuration report is accumulated for 3 generations in the C:\Reports folder by names from Report_DailyConfigurationReport_1.tgz to Report_DailyConfigurationReport_3.tgz. In addition, if the script for creating a configuration report fails, generation copy is terminated so that the past configuration reports may not be overwritten. REM REM Download Report Script(DownloadReport.bat) REM SET USER=<Username for Remote Web Console> SET PASS=<Password for Remote Web Console> SET SERVER=<Hostname or IP Address of SVP> SET REPORT_NAME=DailyConfigurationReport SET LOOP=2 Managing tasks 97

98 REM LOOP:0-2 3Times SET TIMEOUT=121 REM TIMEOUT 2[minutes]=120[s] SET TARGETFOLDER=C:\Reports\tmp SET REPORTFOLDER=C:\Reports SET RAIDINF_PATH="C:\Program Files\raidinf" REM REM Create Report Folder REM IF NOT EXIST %REPORTFOLDER% ( MKDIR %REPORTFOLDER% IF NOT EXIST %TARGETFOLDER% ( MKDIR %TARGETFOLDER% ) ) SET /a CNT_LOGIN=0 :LOGIN_RETRY REM ####################################### Login %CNT_LOGIN% SET /a CNT_LOGIN=%CNT_LOGIN% + 1 %RAIDINF_PATH%\raidinf -login %USER% %PASS% -servername %SERVER% if ERRORLEVEL 1 ( IF %CNT_LOGIN% GTR %LOOP% GOTO :ABEND CALL :SLEEP GOTO LOGIN_RETRY ) SET /a CNT_DL=0 :DL_RETRY REM ####################################### Download %CNT_DL% SET /a CNT_DL=%CNT_DL% + 1 %RAIDINF_PATH%\raidinf download report -servername %SERVER% ^ -report %REPORT_NAME% -targetfolder %TARGETFOLDER% if ERRORLEVEL 1 ( IF %CNT_DL% GTR %LOOP% GOTO :ABEND CALL :SLEEP GOTO :DL_RETRY ) REM ####################################### Create Error Check IF EXIST %REPORTFOLDER%\Report_%REPORT_NAME%_1.tgz ( IF EXIST %TARGETFOLDER%\Report_%REPORT_NAME%.tgz ( GOTO :FC_CHECK ) else ( GOTO :CHECK_END ) ) else ( GOTO :CHECK_END ) :FC_CHECK FC /B %REPORTFOLDER%\Report_%REPORT_NAME%_1.tgz ^ %TARGETFOLDER%\Report_%REPORT_NAME%.tgz > NUL if ERRORLEVEL 1 ( REM ) else ( DEL %TARGETFOLDER%\Report_%REPORT_NAME%.tgz GOTO :END ) :CHECK_END REM ####################################### Migrate Reports IF EXIST %TARGETFOLDER%\Report_%REPORT_NAME%.tgz ( IF EXIST %REPORTFOLDER%\Report_%REPORT_NAME%_2.tgz ( COPY %REPORTFOLDER%\Report_%REPORT_NAME%_2.tgz ^ 98 Viewing and managing the storage system

99 %REPORTFOLDER%\Report_%REPORT_NAME%_3.tgz ) IF EXIST %REPORTFOLDER%\Report_%REPORT_NAME%_1.tgz ( COPY %REPORTFOLDER%\Report_%REPORT_NAME%_1.tgz ^ %REPORTFOLDER%\Report_%REPORT_NAME%_2.tgz ) IF EXIST %TARGETFOLDER%\Report_%REPORT_NAME%.tgz ( COPY %TARGETFOLDER%\Report_%REPORT_NAME%.tgz ^ %REPORTFOLDER%\Report_%REPORT_NAME%_1.tgz DEL %TARGETFOLDER%\Report_%REPORT_NAME%.tgz ) ) GOTO :END EXIT /B :SLEEP REM ####################################### SLEEP with %TIMEOUT% ping n %TIMEOUT% > NUL EXIT /B :ABEND REM ####################################### ABEND ECHO "Download Report Script was ABEND" :END REM ####################################### Logout %RAIDINF_PATH%\raidinf -logout -servername %SERVER% Example execution and explanation of script files The first time you execute the script files to create a configuration report and download a configuration file, the Report_DailyConfigurationReport_1.tgz file is created in the C:\Reports folder. On the second day: Report_DailyConfigurationReport_1.tgz is renamed Report_DailyConfigurationReport_2.tgz, and Report_DailyConfigurationReport_1.tgz is newly created. From the third day on: Report_DailyConfigurationReport_1.tgz and Report_DailyConfigurationReport_2.tgz are renamed Report_DailyConfigurationReport_2.tgz and Report_DailyConfigurationReport_3.tgz, and Report_DailyConfigurationReport_1.tgz are newly created. Because Report_DailyConfigurationReport_3.tgz is overwritten, the reports for three days are always accumulated in the C:\Reports folder. C:\Reports CreateReport.bat DownloadReport.bat Report_DailyConfigurationReport_1.tgz <-Generated today Report_DailyConfigurationReport_2.tgz <-Generated yesterday Report_DailyConfigurationReport_3.tgz <-Generated two days ago Error in executing Report Configuration Tool When using the Report Configuration Tool, you may see Remote Web Console error codes and other error codes that are unique to the Report Configuration Tool. For Remote Web Console error Managing tasks 99

100 codes, see HP XP7 Remote Web Console Messages. The error codes unique to the Report Configuration Tool and the corresponding actions are as follows. Error code Error message Cause of error and action Return value EW_COMERR A certificate does not become effective. Please login again. A certain period of time elapsed after a login. Log in again. 131 EW_COMERR Login is necessary. Please login again. A command was entered before logging in. Log in and then enter the command. 131 EW_ENFILE No such folder. Please refer to the help. The specified folder to download to is not found. See Report Configuration Tool command reference (raidinf commands) (page 133) and specify the parameter again. 131 EW_ENOMEM Memory allocate error. Please other program terminate. Allocation of internal memory fails. Close unnecessary programs or reboot the server. 245 EW_INVOPA Report name reserved. Please check input '-report' parameter. You cannot use the report name specified by the -report option. Check the report name and specify a new one. 131 EW_INVOPT Invalid option. Please refer to the help. The hyphen (-) is not added to the option parameter. See Report Configuration Tool command reference (raidinf commands) (page 133) and revise the parameters. 131 EW_LNGARG Argument too long. Please refer to the help. Either of the following causes is possible. The length of a parameter of the command exceeds 256 bytes. 131 The length of all the parameters of the command exceeds 1,021 bytes. See Report Configuration Tool command reference (raidinf commands) (page 133) and specify a new parameter. EW_MAXAPP Maximum application start. Please check starting application. The maximum number of SVPs that you can connect simultaneously is exceeded. Log out of unnecessary SVPs and reconnect. 131 EW_MAXARG Maximum argument. Please refer to the help. The number of parameters of the command exceeds 10. See Report Configuration Tool command reference (raidinf commands) (page 133) and revise the parameters. 131 EW_REQOPT Required option list. Please refer to the help. The required option and parameters were not entered. See Report Configuration Tool command reference (raidinf commands) (page 133) and specify a valid option and parameters. 131 EW_SYSERR System error. Please call to service center. An internal error occurred. Contact HP Technical Support. 131 EW_SYSERR Install path is too long. Specify the install path with up to 240 bytes. The installation path exceeds 240 bytes. Specify no more than 240 bytes. 131 EW_SYSERR Certificate file invalid. Please call to service center. Updating certificate file fails. Contact HP Technical Support Viewing and managing the storage system

101 Error code Error message Cause of error and action Return value EW_SYSERR The file is illegal. Please move 'raidinfcer' file from the installation directory. The installation directory includes a file that will overlap with another file to be created by the Report Configuration Tool and the Report Configuration Tool cannot start. Remove the overlapping file from the installation directory. 131 EW_SYSERR Log file invalid. Please call to service center. The log file cannot be accessed. Contact HP Technical Support. 131 EW_UNWCMD Unknown command. Please refer to the help. The syntax of the command is not valid. See Report Configuration Tool command reference (raidinf commands) (page 133) and enter a valid parameter. 230 EW_UNWOPT Unknown option. Please refer to the help. The option and parameter are not valid. See Report Configuration Tool command reference (raidinf commands) (page 133) and input a new option and parameter. 252 EW_UNWOPT Invalid environment value. Please confirm the setting of HTTP_PROXY. Unable to connect to the proxy server specified by the environment variable. Check the proxy server name. 252 EW_WEBERR Web access error. Please confirm the setting of server. An internal error occurred while connecting to the server. Check the setting of the server. 131 EW_WEBERR Server name can not be resolved. Please check the setting of server name. The server specified by the -servername option does not exist. Check the server name and specify a new server. 131 EW_WEBERR Server is no response. Input argument server is incorrect or server is not ready. No response from the server specified by the-servername option. Make sure that: The correct server name is specified. 131 The settings of the server are correct. EW_WEBERR Web access error. Please check your network equipment and cables. An internal error occurred while connecting to the server. Check the network devices and cables. 131 EW_WEBERR Web access error. Please confirm the setting of proxy server. An internal error occurred while connecting to the proxy server. Check the settings of the proxy server. 131 EW_WEBERR Proxy server name can not be resolved. Please check the setting of proxy server name. Unable to connect to the proxy server specified by the environment variable. Check the proxy server name. 131 EX_CMDRJE The control command rejected. The execution of the entered command was rejected by the server. Check the error messages of Remote Web Console. 221 Executing a regularly scheduled script file To execute the created script file on a regular basis, register it as a scheduled task in Windows. The following procedure uses the Windows schtasks command to register the script files created in the example shown in Preparing a script file (page 96) as tasks of Windows. Managing tasks 101

102 Registration example Create a configuration report at 21:00 every day (CreateReport.bat). Download a configuration report at 22:00 every day (DownloadReport.bat). Procedure 1. Store the two script files in the C:\Reports folder. C:\Reports CreateReport.bat DownloadReport.bat 2. Run the Windows schtasks command to register the two script files as a task of Windows. Make sure that the <Username for Windows> parameter of this command is a user who has write permissions to the following two folders. C:\Reports folder The log folder in the installation folder of the Report Configuration Tool. schtasks /create /tn CreateReport /tr "C:\Reports\CreateReport.bat" /sc DAILY /st. 21:00:00 /ru <Username for Windows> /rp <Password for Windows> schtasks /create /tn DownloadReport /tr "C:\Reports\DownloadReport.bat" /sc DAILY /st 22:00:00 /ru <Username for Windows> /rp <Password for Windows> 3. Run the schtasks /Query command to confirm that the Windows task is registered. C:\>schtasks /Query Task name Time of next execution Status ============= ====================== =============== CreateReport 21:00:00, 2011/05/17 DownloadReport 22:00:00, 2011/05/ Viewing and managing the storage system

103 8 Troubleshooting This chapter provides information for identifying and correcting problems with Remote Web Console. General troubleshooting A system administrator is responsible for the operation and normal maintenance of the Remote Web Console web client. The following are guidelines for troubleshooting the Remote Web Console web client: Check the cabling and the LAN. Verify that both the computer and LAN cabling are firmly attached, and that the LAN is operating properly. Reboot the computer. Close any programs that are not responding. If necessary, reboot the Remote Web Console computer and restart a Remote Web Console web client session. Check for any general error conditions. For a complete list of Remote Web Console error codes, see the HP XP7 Remote Web Console Messages. Check the alert icon. Confirm the severity level of the storage system alert by clicking Alert in the Remote Web Console main window. If you cannot resolve an error condition, contact HP Technical Support. The following illustration shows the workflow for troubleshooting: General troubleshooting 103

104 Figure 26 Troubleshooting workflow Checking alerts The Remote Web Console main window opens an icon indicating whether service information messages (SIMs) occurred in the storage system. Procedure 32 To check details of a SIM: 1. In the Remote Web Console main window, click Alert. The Alerts window opens. Figure 27 Alert icon on Remote Web Console main window 2. To check the details of each alert, select and right-click one row, and then click Detail in the pop-up menu. The detail dialog box opens. 104 Troubleshooting

105 Login errors 3. If the following SIM reference codes appear, you must resolve the error (XXX indicates the pool ID): 601XXX, 602XXX, 602FFE, and (for Fast Snap) 620XXX, 621XXX, 622XXX, , , and 626XXX (for Thin Provisioning and Thin Provisioning Z). For details on how to resolve the error, see the HP XP7 Fast Snap User Guide, the HP XP7 Provisioning for Open Systems User Guide, or the HP XP7 Provisioning for Mainframe Systems User Guide. Related Topics Alerts window (page 244) Alert Properties window (page 246) The following table lists login errors: Table 24 Login errors Error condition Probable cause / Recommended action Failed to LOGIN is displayed. The page is not displayed because of an invalid syntax error. Remote Web Console does not start even with repeated attempts. A network error occurred when you logged in to Remote Web Console. Check that the user name and password are correct. If you forget your password, log in with the Security Administrator (View & Modify) and set a new password. When you are using an external authentication server such as LDAP, check the following: The authentication server has been started. The authentication server can be accessed from the SVP via the network The user account has been established on the authentication server The connection information for the authentication server that has set on the SVP is correct. If the symptom recurs even after you correct the settings for the authentication server, use the dump tool to collect Remote Web Console normal dump files to some recording media and then contact HP Technical Support. Enter the URL of the desired SVP in the Trusted sites section of the Internet Options dialog box. Close all the web browser windows and then clear the web browser cache. Use the Task Manager to check for hung or duplicate processes. Close all dialog boxes and log in to the Remote Web Console again. If the same error occurs, check the network environment. Related Topics Downloading dump files using the Dump tool (page 111) No-response errors The following table lists no-response errors: Login errors 105

106 Table 25 No-response errors Error condition Probable cause / Recommended action The following errors occur when using Remote Web Console: Error ( ) occurs repeatedly while you are using Remote Web Console. The following errors occur when using Remote Web Console: The SVP web server might have been restarted. Close Remote Web Console, wait 10 minutes, and then restart Remote Web Console. A timeout error may have occurred on Flash Player. Close the Remote Web Console window. Click X in the corner of the browser window or click the window and press Alt+F4. This error may occur if the load to the Remote Web Console computer is high, or if you start multiple instances of Remote Web Console by using multiple tabs in a tab browser or multiple browsers. Close the other applications which cause the high load, or make sure to start only one Remote Web Console 4 The following errors occur when using Remote Web The version of Remote Web Console installed on the Remote Console: Web Console computer might not match the SVP version Close all the browser windows and then clear the browser cache. The Remote Web Console computer might have entered standby or hibernate mode. Restart Remote Web Console. If a proxy server is used for network connections, the proxy server cache may be storing the older version of the program. If the problem continues after you clear the browser cache, contact your network administrator. If none of the above actions solve the problem, save the Remote Web Console dump file and send it to HP Technical Support. Then restart the web browser Remote Web Console does not respond. Remote Web Console may hang in the following cases: The Remote Web Console main window is grayed out and does not display the percentage of progress, and you cannot perform any operation for a long period of time. You cannot perform any operation for a long period of time and the dialog box that says Loading... is not displayed. The dialog box that says Loading... opens when the window switches. However, you cannot move the dialog box or perform any operation for a long period of time. A network error occurred. There is no response to any operation even after 30 minutes. An internal error occurs, or a web browser ended abnormally. During a Remote Web Console operation, the Internet Explorer web browser suddenly disappears. An error (1-4011) occurs while you are using Remote Web Console. The Remote Web Console computer reboots on its own. Close the web browser. When using the Remote Web Console secondary window, exit Remote Web Console by pressing Ctrl + Alt + Shift + D all at once. If you cannot exit Remote Web Console, reboot the Remote Web Console computer or restart Remote Web Console after finishing Remote Web Console forcibly by the following way. For Windows: Exit the web browser and then use the Task Manager to terminate iexplorer.exe. For UNIX: Exit the web browser, and then terminate firefox-bin with the kill command. Restart the Remote Web Console computer. An operation may take over 30 minutes depending on the use condition. For example, when several Remote Web Console web clients are running, an operation may take a long time. Close all dialog boxes and log in to Remote Web Console again. If the same error occurs, restart the Remote Web Console computer. Restart the Remote Web Console computer. The clock time of the Remote Web Console computer may have been changed. Log in to Remote Web Console again. Restart the Remote Web Console computer. 106 Troubleshooting

107 Table 25 No-response errors (continued) Error condition Probable cause / Recommended action A Remote Web Console window is forcibly closed during a time-consuming process, such as LDEV formatting. A Remote Web Console window is incorrectly closed when you do one of the following: Click Use commands such as File > Close on the web browser Press the Alt and F4 keys During a Remote Web Console operation, an add-on (Flash10e.ocx) error occurs. When you log out from the Remote Web Console, an Internet Explorer error occurs. When you click File > Refresh All or Refresh in the Remote Web Console main window, the percentage of progress remains 99%. Close all windows, wait until processing finishes, and then restart Remote Web Console. Restart Remote Web Console. If you cannot log in, wait for one minute and try again. Restart the Remote Web Console computer. If this error occurs repeatedly, reinstall Adobe Flash Player on the Remote Web Console computer. The probable causes are as follows: Internet Explorer has not been updated. Install the latest updates Internet Explorer may be configured incorrectly. Re-install Internet Explorer. The probable causes are as follows: Another application such as RAID Manager may be changing configuration. The window will be refreshed shortly after the configuration change ends. Auto LUN operations, Quick Restore operations or Fast Snap operations may be in progress. The window will be refreshed shortly after the operations end. 16 One of the following errors occurred during a Remote Another application such as RAID Manager may be changing Web Console operation in the main window configuration Auto LUN operations, Quick Restore operations, or Fast Snap operations may be in progress The configuration data may not be matched if a communication error occurs between the storage system and xxxxx SVP. xxxxx Wait a few minutes and then click File > Refresh All to reload the configuration information. Then run Remote Web Console again. No-response errors 107

108 Table 25 No-response errors (continued) Error condition where xxxxx indicates any code. Probable cause / Recommended action When using Encryption License Key: If a failure ( ) occurs when you set the Encryption Environment for the first time from the Edit Encryption Environmental Settings window, do the following: 1. Wait a few minutes and then click File > Refresh All to reload the configuration information. 2. Initialize the Encryption Environment Settings. 3. Set the Encryption Environment again. If a failure ( ) occurs when you set the Encryption Environment again from the Edit Encryption Environmental Settings window, do the following: 1. Wait a few minutes and then click File > Refresh All to reload the configuration information. 2. Set the Encryption Environment again The Remote Web Console window turns white and the icon shown below displays in the center of the web browser when you use Remote Web Console. Operations cannot be performed due to a problem with the Remote Web Console main window. For example, tables are not displayed correctly or some buttons are not displayed. Logging out and back in does not solve the problem. Restart the Remote Web Console computer. The Remote Web Console window setting information may have been saved with an incorrect value. Click Settings > Environmental Settings > Reset View to Settings in the Remote Web Console main window to clear the window setting information. Then click any button in the Remote Web Console window and check that it operates correctly. You do not need to log out and back in. Incorrect display errors The following table lists incorrect display errors: Table 26 Incorrect display errors Error condition Probable cause / Recommended action 1 A question mark (?) displays in a table or other area of When the question mark appears in the View Tier Properties the window. window, see the topic describing this window in the HP XP7 Provisioning for Open Systems User Guide. If the problem still persists, contact HP Technical Support. When the question mark appears in the Add External Volumes window, see the topic describing this window in the HP XP7 External Storage for Open and Mainframe Systems User Guide. If the problem still persists, contact HP Technical Support. If the question mark appears in another window, refresh the window. Contact HP Technical Support if the question mark remains after you refresh the window The product name, vendor name, and function name displayed in Remote Web Console are incorrect. A part of the Remote Web Console window is not displayed. The display on Remote Web Console's main window is not updated to the latest information. "Last Updated" on Remote Web Console's main window is not updated. Contact HP Technical Support. You may be using the zoom in and zoom out function of the web browser. Do not use this function of the web browser when using Remote Web Console. Auto LUN operations, Quick Restore operations, or Fast Snap operations may be in progress. The window will be refreshed shortly after the operations end. 108 Troubleshooting

109 UNIX operation errors The following table lists UNIX operation errors: Table 27 UNIX operation errors Error condition Probable cause / Recommended action 1 2 The web browser is incorrectly displayed because GUI items, such as labels and icons, cannot be loaded properly. Part of a button is outside the window. The web browser closes abnormally. If you use Remote Web Console on the Japanese version of Firefox, log out of Remote Web Console, and then log in to Remote Web Console again. Enter the following commands using the X Server Emulator. B Shell: LANG=C export LANG C Shell: setenv LANG C This problem can occur if a Mozilla process keeps running after Mozilla stops responding. Delete the "java_vm" and "mozilla" processes and continue with Remote Web Console operations. Other errors The following table lists other errors that might occur in Remote Web Console: Table 28 Other errors Error condition Probable cause / Recommended action The microcode on the SVP is upgraded or downgraded. Remote Web Console processing is temporarily delayed. Remote Web Console processing is delayed. You cannot resolve an error condition. Close all Remote Web Console windows, and then clear the browser cache. Even when you are not sure that the microcode on the SVP is upgraded or downgraded, clear the browser cache. Internal processing (such as, configuration change, P.P. check, or operational information acquisition) might be running on the SVP. The local storage value for Adobe Flash Player might decrease. Follow these steps: 1. Right-click on the Remote Web Console main window and click Settings to open the Adobe Flash Player Settings window. 2. In the local storage settings, move the slider until Unlimited appears and then click Close. 3. Close Remote Web Console. 4. Restart Remote Web Console. 5. If the local storage confirmation dialog box appears, click Allow. Do the following, and then contact the HP Technical Support. Copy the Remote Web Console detailed dump files onto recording media using the Dump tool. Obtain the Java log and trace files. Clearing the web browser cache When an error occurs on Remote Web Console, clear the web browser caches to solve the problem. UNIX operation errors 109

110 Clearing web browser cache To clear the cache in Internet Explorer, click Tools > Internet Options, and then click the General tab. Click Delete Files in the General dialog box. To clear the cache in Firefox, click Edit > Preferences. In the displayed dialog box, click Advanced > Cache, and then click Clear Cache. Enabling JavaScript for Windows If you use Windows 8, Windows 8.1, Windows Server 2012, or Windows Server 2012 R2, enable JavaScript as follows: 1. Launch Internet Explorer 2. From Internet Explorer's menu bar, click Tools > Internet Options > Security. The Internet Options window opens. 3. Click the Securities tab. The Securities window opens. 4. Click Custom Level. The Security Settings window opens 5. Set Active scripting to Enable. 6. Click OK. 7. When the Warning dialog box appears, click YES. 8. Click OK to close the Internet Options window. 9. Restart Internet Explorer. Firefox web browser problems on UNIX Note the following when using Firefox web browser on UNIX: If a Mozilla process or a Firefox web browser process becomes unavailable, Remote Web Console performance is affected. Delete the abnormal process and continue with Remote Web Console operations. When using Remote Web Console on the Japanese version of the Firefox web browser, you must use the X Server Emulator to properly configure the browser, as follows: In a B Shell, enter the following command: LANG=C export LANG In a C Shell, enter the following command: setenv LANG C When you use Remote Web Console with Firefox, movements of the focus may differ from movements of the focus in Internet Explorer. For example: When the Remote Web Console login window appears, the focus is not on the User Name box. Even is the User Name box is emphasized, you cannot enter any characters in it. When you move the focus by using the Tab key, the destination browser window does not become active. When you click Logout at the upper right in the Remote Web Console main window on Firefox, the Remote Web Console login window appears after you logout. (With Internet Explorer, the window closes after the logout. 110 Troubleshooting

111 Downloading dump files using the Dump tool Use the Dump tool to download dump files onto a Remote Web Console computer. The downloaded dump files can be used for the following reasons: For troubleshooting purposes. Use the Dump tool to download dump files from SVP and give it to the HP service personnel. For checking configuration. First click File > Refresh All to refresh the configuration information, and then use the Dump tool to download dump files. Prerequisites No other user (including SVP user) should be using the Dump tool. No maintenance operation is being performed. You must have Support Personnel role to log in. Procedure 33 To download dump files from the SVP: 1. Start a web browser and specify the following URL to open the Tool Panel: 2. Click Download Dump Files. The Login dialog box opens. 3. Enter the user ID and password and click Login. The Download Dump Files dialog box opens. 4. Select a file that you want to download. Existing Dump Files indicates the last dump file that you downloaded. Select this when you want to re-download a previously downloaded dump file. If you have not downloaded any dump files from the Tool Panel, this item does not display even if you have acquired a dump file via SVP. Normal Dump includes all information about the SVP and the minimum information about the storage system. Select this when you have a less serious problem such as incorrect display. Detail Dump includes all information about the SVP and the storage system. Select this when Remote Web Console has a serious problem (for example, Remote Web Console does not start) or when you need to determine if the storage system has a problem. Detail Dump (for DKC Performance) contains the I/O-performance-related information. This includes performance monitor collection information, in addition to information applicable to Detail Dump. Choose Detail Dump (for DKC Performance) to check for I/O performance problems. Note that while processing takes place, DKC I/O performance may be affected. During processing, you cannot use Remote Web Console to change the system configuration or perform SVP maintenance operations. Downloading dump files using the Dump tool 111

112 5. Click Next. A message appears confirming the execution of compression of the dump files. 6. Click OK. File compression processing starts. When the file is compressed, the Download Dump Files dialog box opens for the download. 7. Click Download. The File Download dialog box opens. 8. On the File Download dialog box, click Save this file to disk, and then click OK. The Save As dialog box opens. 9. Specify the download destination, and then click Save. When the file is downloaded successfully, the Download complete dialog box opens. 112 Troubleshooting

113 9 Support and other resources Contacting HP For worldwide technical support information, see the HP Support Center: Before contacting HP, collect the following information: Product model names and numbers Technical support registration number (if applicable) Product serial numbers Error messages Operating system type and revision level Detailed questions Subscription service Receive, by , support alerts announcing product support communications, driver updates, software releases, firmware updates, and customer-replaceable component information by signing up at To change options for support alerts you already receive, click the Sign in link on the right. Related information The following documents and websites provide related information: HP XP7 Continuous Access Journal for Mainframe Systems User Guide HP XP7 Continuous Access Synchronous for Mainframe Systems User Guide HP XP7 Continuous Access Synchronous User Guide HP XP7 External Storage for Open and Mainframe Systems User Guide HP XP7 for Compatible FlashCopy Mirroring User Guide HP XP7 Provisioning for Mainframe Systems User Guide HP XP7 RAID Manager User Guide HP XP7 Remote Web Console Messages You can find these documents at: HP Support Center (HPSC) website (Manuals page): Click Storage > Disk Storage System > XP Storage, and then select your Storage System. HP Enterprise Information Library website: Under Products and Solutions, click HP XP Storage. Then, click XP7 Storage under HP XP Storage. Contacting HP 113

114 Websites HP Event Monitoring Service and HA Monitors Software: hpux-ha-monitoring-docs HP Technical Support website: Single Point of Connectivity Knowledge (SPOCK) website: White papers and Analyst reports: Typographic conventions Table 29 Document conventions Convention Element Blue text: Table 29 (page 114) Cross-reference links and addresses A cross reference to the glossary definition of the term in blue text Blue, bold, underlined text Blue, underlined text: addresses Website addresses Bold text Keys that are pressed Text typed into a GUI element, such as a box GUI elements that are clicked or selected, such as menu and list items, buttons, tabs, and checkboxes Italic text Text emphasis Monospace text File and directory names System output Code Commands, their arguments, and argument values Monospace, italic text Code variables Command variables Monospace, bold text Emphasized monospace text WARNING! CAUTION: IMPORTANT: Indicates that failure to follow directions could result in bodily harm or death. Indicates that failure to follow directions could result in damage to equipment or data. Provides clarifying information or specific instructions. NOTE: Provides additional information. TIP: Provides helpful hints and shortcuts. Customer self repair HP customer self repair (CSR) programs allow you to repair your HP product. If a CSR part needs replacing, HP ships the part directly to you so that you can install it at your convenience. Some parts do not qualify for CSR. Your HP-authorized service provider will determine whether a repair can be accomplished by CSR. 114 Support and other resources

115 For more information about CSR, contact your local service provider, or see the CSR website: Customer self repair 115

116 10 Documentation feedback HP is committed to providing documentation that meets your needs. To help us improve the documentation, send any errors, suggestions, or comments to Documentation Feedback Include the document title and part number, version number, or the URL when submitting your feedback. 116 Documentation feedback

117 A Storage configuration reports This appendix describes the configuration reports you can generate in Remote Web Console. They are grouped in this appendix according to the way they display: in tables, graphs, or CSV files. To create, download, and delete reports, see Viewing a Remote Web Console report (page 93). Reports in table view The reports described in this appendix appear in table format, as seen in the following example. icons are displayed before the names of the reports in table view. If the icons are not displayed correctly, refresh the window. Figure 28 Table report (example: Ports) Click each column header to sort tables in table reports. When the table is reading a large amount of data, the table columns cannot be manipulated, sorted, and resized. You can view already displayed items, select rows, and scroll. Disk Adapters report The following illustration shows an example of a Disk Adapters report. The table following the illustration describes the items in the report. Figure 29 Disk Adapters report Reports in table view 117

118 Table 30 Disk Adapters report DKA Module Number of PGs Number of LDEVs (Total) Number of LDEVs (Unallocated) Total LDEV Capacity (MB) Unallocated LDEV Capacity (MB) Location of the disk adapter. "External" is displayed when the storage system has an external storage system. "External (FICON DM) " is displayed when the storage system has volumes for FICON DM. Module number. A hyphen (-) displays if DKA is External or "External (FICON DM) ". The number of the parity groups that the disk adapter controls. If "DKA" is "External", this item indicates the number of parity groups mapped to external volumes. If "DKA" is "External (FICON DM) ", this item indicates the number of parity groups mapped to volumes for FICON DM. The number of the logical volumes belonging to the parity groups that the disk adapter controls. The number of the logical volumes that are inaccessible from the host and belong to the parity groups controlled by the disk adapter. Total capacity of the logical volumes belonging to the parity groups that the disk adapter controls. Total capacity of the logical volumes that are inaccessible from the host and belong to the parity groups controlled by the disk adapter. Host Groups report The following illustration shows an example of a host groups report. The table following the illustration describes the items in the report. Figure 30 Host Groups report 118 Storage configuration reports

119 Table 31 Host Group report Port Location Host Group Resource Group Name Resource Group ID Number of LUNs Number of LDEVs Number of PGs Number of DKAs Total LDEV Capacity (MB) Port Security Host Mode Host Mode Option Number of Hosts Name of the port Name of the host group Resource Group Name where the host group belongs Resource Group ID where the host group belongs The number of LU paths defined to the host group The number of logical volumes that are accessible from the hosts in the host group The number of parity groups with logical volumes that are accessible from the hosts in the host group The number of disk adapters controlling the parity groups where the logical volumes that are accessible from the hosts in the host group belong Total capacity of the logical volumes accessible from the hosts in the host group. This is the total capacity of LDEVs referred to in Number of LDEVs. Security of the port Host mode of the host group Host mode option of the host group. Host mode options are separated by semicolons (;) when more than one option is specified. The number of the hosts in the host group. Hosts report The following illustration shows an example of a hosts report. The table following the illustration describes the items in the report. When a host is registered to more than one port, more than one record shows information about the same host. Figure 31 Hosts report Table 32 Hosts report Port Location Port Internal WWN Port Security Name of the port WWN of the port Security of the port Reports in table view 119

120 Table 32 Hosts report (continued) Host Group Host Mode Host Mode Option Host Name HBA WWN Name of the host group Host mode of the host group Host mode option of the host group. Host mode options are separated by semicolons (;) when more than one option is specified. Name of the host that can access the LU path through the port WWN of the host Logical Devices report The following illustration shows an example of a logical volumes report. The table following the illustration describes the items in the report Figure 32 Logical Devices report Table 33 Logical Devices report LDEV ID LDEV Name Capacity (MB) Emulation Type Resource Group Name Resource Group ID PG The logical volume number The logical volume name Capacity of the logical volume Emulation type of the logical volume Resource group name where LDEV belongs Resource group ID where LDEV belongs The parity group number. If the number starts with "E" (for example, E1-1), the parity group contains external volumes. If the number starts with "M" (for example, M1-1), the parity group contains FICON DM volumes. A hyphen displays for Thin Provisioning or Fast Snap V-VOLs. RAID Level Drive Type/RPM RAID level of the parity group where the logical volume belongs 1 Drive type and round-per-minute (RPM) of the drive of the parity group where the logical volume belongs. A hyphen (-) is displayed as RPM when the drive is SSD Storage configuration reports

121 Table 33 Logical Devices report (continued) Drive Type-Code Drive Capacity PG Members Allocated SSID CVS OCS Attribute Provisioning Type Type code of the drive of the parity group where the logical volume belongs 1 Capacity of the drive of the parity group where the logical volume belongs. 1 List of the drive locations of the parity group where the logical volume belongs 1 Information about whether the host can access the logical volume. For mainframe volumes and multi-platform volumes, Y is displayed unless the volumes are in the reserved status. SSID of the logical volume Information about whether the logical volume is a customized volume Oracle checksum The attribute of the logical volume Provisioning type of the logical volume Pool Name For V-VOLs of Thin Provisioning, the name of the pool related to the logical volume is displayed 1 If the logical volume attribute is Pool, the name of the pool where the logical volume belongs is displayed When neither of the above are displayed, the pool name is blank Pool ID Current MPB Setting MPB Command Device: Security Command Device: User Authentication Command Device: Device Group Definition Encryption The ID of the pool indicated by "Pool Name" A hyphen (-) displays for volumes other than pool-vols or V-VOLs The number of the microprocessor that currently controls the logical volume The number of the MP blade that you specified to control the logical volume Indicates whether Security is specified as the attribute for the command device. A hyphen (-) displays when "Attribute" is not "CMDDEV". Indicates whether User Authentication is specified as the attribute for the command device. A hyphen (-) displays when "Attribute" is not "CMDDEV". Indicates whether Device Group Definition is specified as the attribute for the command device. A hyphen (-) displays when "Attribute" is not "CMDDEV". Information about whether the parity group is where the LDEV belongs is encrypted or not For Internal Volumes: Enable (encrypted) or Disable For External Volumes: blank Notes: 1. A hyphen (-) displays if the LDEV is an external volumes or a FICON DM volume. LUNs report The following illustration shows an example of a LU path definitions report. A record is created for each LU path. The table following the illustration describes the items in the report Reports in table view 121

122 Figure 33 LUNs report Table 34 LUNs report Port Location Port Internal WWN Port Security Host Group Host Mode Host Mode Option LUN LDEV ID Emulation Type Capacity (MB) Name of the port WWN of the port The name of the type of security of the port The name of the host group Host mode of the host group Host mode option of the host group. Host mode options are separated by semicolons (;) when more than one option is specified Logical unit number Logical volume number Emulation type of the logical volume Capacity of the logical volume MP Blades report The following illustration shows an example of a MP blades report. The table following the illustration describes the items in the report 122 Storage configuration reports

123 Figure 34 MP Blades report Table 35 MP Blades report MP Blade ID MP Blade Name Module Auto Assignment Number of Resources (LDEV) Number of Resources (Journal) Number of Resources (External Volume) Number of Resources (Total) MP blade ID MP blade Name Module number Auto assignment attribute for the MP blade The number of logical volumes that the MP blade controls The number of journals that the MP blade controls The number of external volumes that the MP blade controls, including FICON DM volumes The total number of resources that the MP blade controls The sum of Number of Resources (LDEV), Number of Resources (Journal), and Number of Resources (External Volume) MP Blade Details report The following illustration shows an example of a MP blade details report. The table following the illustration describes the items in the report. Figure 35 MP Blades Details report Reports in table view 123

124 Table 36 MP Blades Details report MP Blade ID MP Blade Name Auto Assignment Resource ID Resource Name Type MP blade ID MP blade Name Auto assignment attribute for the MP blade ID of this resource that the MP blade controls The name of the resource that the MP blade controls. If "Type" is LDEV, the LDEV name that is set is displayed. A hyphen (-) displays for journal volumes or external volumes. The type of the resource that the MP blade controls Parity Groups report The following illustration shows an example of a parity groups report. The table following the illustration describes the items in the report. Figure 36 Parity Groups report Table 37 Parity Groups report PG Module DKA RAID Level Resource Group Name Resource Group ID Parity group number. If the number starts with "E" (for example, E1-1), the parity group contains external volumes (HP XP7 External Storage for Open and Mainframe Systems User Guide). If the number starts with "M" (for example, M1-1), the parity group contains volumes for FICON DM. Module number 1 Name of the disk adapter that controls the parity group 1 RAID level of the parity group 1. Name of the resource group in which the parity group belongs ID for the resource group in which the parity group belongs 124 Storage configuration reports

125 Table 37 Parity Groups report (continued) Emulation Type Number of LDEVs (Total) Number of LDEVs (Unallocated) Total LDEV Capacity (MB) Unallocated LDEV Capacity (MB) Drive Type-Code Drive Type/RPM Drive Capacity RAID Concatenation #0 RAID Concatenation #1 RAID Concatenation #2 Encryption Emulation type of the parity group The number of the logical volumes in the parity group The number of the logical volumes in the parity group that the host cannot access Capacity of the logical volumes in the parity group Capacity of the logical volumes in the parity group that the host cannot access The type code of the drive in the parity group. The type code of the first drive in the parity group. If the parity group contains external volumes, the drive type code displays the vendor, the model, and the serial number of the storage system. A hyphen (-) displays if the parity group contains volumes for FICON DM. Drive type and revolutions-per-minute (RPM) of the drive in the parity group 1 A hyphen (-) is displayed instead of the RPM when the drive is an SSD. Capacity of the drive in the parity group 1 The number indicating a parity group #0 connected to this parity group 1,2 The number indicating a parity group #1 connected to this parity group 1,2 The number indicating a parity group #1,2 connected to this parity group 1,2 Information about whether the parity group is encrypted or not For Internal Volumes: Enable (encrypted) or Disable For External Volumes: A hyphen (-) is displayed Notes: 1. A hyphen (-) displays if the parity group contains external volumes or FICON DM volumes. 2. A hyphen (-) displays if the parity group is not connected with another parity group or if the parity group contains external volumes including volumes for FICON DM. Ports report The following illustration shows an example of part of a ports report. The actual report includes several more columns of information. The table following the illustration describes the items in the report. Reports in table view 125

126 Figure 37 Ports report Table 38 Ports report CHA Type Port Location Port Attribute Port Internal WWN Fabric Connection Type Address (Loop ID) Port Security Speed Resource Group Name Resource Group ID Number of Hosts Number of LUNs Number of LDEVs Number of PGs Number of DKAs Name of the channel adapter Package type of the channel adapter Name of the port on the channel adapter Port attribute WWN of the port 1 One of the Fibre topology settings indicating the setting status of the Fabric switch One of the Fibre topology settings Point to Point FC-AL 1 Fibre port address and Loop ID of the port 1 Security of the port 1 Data transfer speed of the port 1 Name of the resource group in which the port belongs 1 ID for the resource group in which the port belongs 1 The number of the hosts registered to the port 1 The number of the LU paths defined to the port 1 The number of the logical volumes that can be accessed through the port 1 The number of the parity groups having the logical volumes that can be accessed through the port 1 The number of the disk adapters controlling the parity group that contains the logical volumes that can be accessed through the port 1 Note 1. A hyphen (-) displays for ports used in mainframe systems. 126 Storage configuration reports

127 Spare Drives report The following illustration shows an example of a spare drives report. The table following the illustration describes the items in the report. Figure 38 Spare Drives report Table 39 Spare Drives report Drive Capacity Drive Type-Code Location Capacity of the spare drive Type code of the spare drive Location of the spare drive SSD Endurance report The following illustration shows an example of an SSD endurance report. The table following the illustration describes the items in the report. Reports in table view 127

128 Figure 39 SSD Endurance report Table 40 SSD Endurance report Drive Type-Code Drive Capacity Location Used Endurance Indicator (%) Type code of the SSD Capacity of the SSD Location of the SSD Used endurance of the SSD Storage System Summary report The following illustration shows an example of part of a report of a summary of the storage system. The actual report includes several more rows of information. The table following the illustration describes the items in the report. 128 Storage configuration reports

129 Figure 40 Storage System Summary report Table 41 Storage System Summary report Storage System Type Full Serial Number IP Address Microcode Versions Type of the storage system. Serial number of the storage system. IP address of the SVP. Version of the following programs. Main HTP FCHF DKAF SVP SSVP FCDG CUDG4 ROM BOOT RAM BOOT CMBK BTCL Expander Expander(FMU) Reports in table view 129

130 Table 41 Storage System Summary report (continued) Config CFM HDD HDD (SVP) Printout Tool Number of CUs Shared Memory Size (GB) Cache Size (GB) Number of DKAs System Options Drive Capacity (TB) Spare Drive Capacity (TB) OPEN Volume Capacity (GB) 1 M/F Volume Capacity (GB) 1 The number of control units in the storage system Capacity of shared memory Capacity of the cache The number of disk adapters on the module List of the system options specified for the storage system Total capacity of drives in the storage system except for external volumes Total capacity of the spare drives in the storage system List of the capacity of the open volumes The list of the capacity of the mainframe volumes and multi-platform volumes List of the numbers of the volumes in the following status. Number of LDEVs 1 allocated Notes: 1. You cannot sort the list. unallocated reserved free Reports in graphical view The list for open-systems and the list for mainframe-systems are separate. The reports described in this topic display as graphics. icons are displayed before names of reports in graphical view. If the icons or graphics are not displayed properly, refresh the window Cache Memories report This report shows cache memory data, including shared memory capacity and PCB and DIMM cache. 130 Storage configuration reports

131 Figure 41 Cache Memories report Total capacity of the cache memory and shared memory is displayed separately for each module. Channel Adapters report This report shows the channel adapters and the ports and types of channel adapters for each channel adapter. The keys (green = installed, gray= not installed) show which channel adapters are installed and which are not installed. Figure 42 Channel Adapters report Physical View report This report shows disk controllers and disk units, and includes cache PCBs, MP blades, channel adapters, disk adapters, data drives, and spare drives. The report also shows the storage system type, serial number, and microcode version. You can also check the legend for disk units, such as SAS, SSD, Spare, or Not Installed. Reports in graphical view 131

132 Figure 43 Physical View report 132 Storage configuration reports

133 B Report Configuration Tool command reference (raidinf commands) This appendix describes the raidinf commands, symbols, and reports used in Remote Web Console. raidinf command list and command description The following lists the raidinf commands and symbols. Table 42 raidinf command list Command raidinf add report raidinf delete report raidinf download report raidinf get reportinfo Creates a report. Deletes a report. Downloads a report. Displays a list of reports. Table 43 Conventions of the command format Symbol < > Vertical bar [ ] Square brackets The item enclosed in this symbol is variable. Symbol is placed between multiple items to indicate "or". For example: -A -B Specifies -A or -B. The enclosed item can be omitted. If some items are delimited by the vertical bar, specify one or omit all items. For example: [ -A ] Specifies nothing or specifies -A. [ -a -b ] Specifies nothing or specifies -a or -b. { } The meaning differs depending on the enclosed item. Curly brackets If items in curly brackets are delimited by vertical bars, one of the items must be specified. For example: {-A -B -C } Specifies -A, -B, or -C. If curly brackets enclose items enclosed by square brackets, at least one of the items must be specified. For example: {[ -A ][ -B ][ -C ]} Specifies one or more items from -A, -B, or -C. raidinf command syntax The syntax of the raidinf commands and the basic format of the options and parameters are described next. raidinf command list and command description 133

134 Syntax raidinf [-h] <action> <object> servername <hostname/ipaddress> [ {-report <report_name> -report_id <report_id>}] [-targetfolder <folder>] [-fill] raidinf [-h] login <user_name> <password> servername <hostname/ ipaddress> raidinf [-h] logout servername <hostname/ipaddress> Options and parameters Option [-h] <action> <object> -servername <hostname/ipaddress> [ {-report <report_name> -report_id <report_id>}] [-targetfolder <folder>] [-fill] -login [<user_name> <password>] -logout Displays help for raidinf. Specifies command operation. You can specify the following commands. get: Displays a list of reports. add: Creates a report. delete: Deletes a report. download: Downloads a report. Specifies an operation target object. You can specify the following objects. reportinfo to display a list of reports. report to create, delete, or download a report. Specifies the host name or the IP address of the SVP. -report specifies a report name within 32 characters. If you specify more than 32 characters, the 33rd and subsequent characters are ignored. -report_id specifies a report ID displayed by the report list. Because a report ID is a unique ID to each of the reports, a specific report can be identified even if reports of the same name exist. Specifies a folder name to which a report is downloaded. The folder whose name you specify must already exist and you must have permissions to the folder. Deletes a report only if the number of created reports is 20. Executes a user authentication for Remote Web Console. Specifies a user name and a password. The user is logged out automatically three minutes (180 seconds) after the last command is entered. Logs out of Remote Web Console. Examples This example authenticates user01 using the password xxxxxx. # raidinf -login user01 xxxxxx -servername svp.xxx.co.jp This example executes a logout. # raidinf -logout -servername svp.xxx.co.jp Displays help. # raidinf -h Model : RAIDINF/WindowsNT VerandRev: /00 Usage: raidinf [options] raidinf <action> <object> [parameters] 134 Report Configuration Tool command reference (raidinf commands)

135 Options: -h Help/Usage -login <user_name> <password> Specify LOGIN explicitly -logout Specify LOGOUT <User authentification> <option> <parameters> -login <user_name> <password> -servername <hostname/ipaddress> -logout -servername <hostname/ipaddress> <Report management> <action> <object> <parameters> get reportinfo -servername <hostname/ipaddress> add report -servername <hostname/ipaddress> [-report <report_name>] download report -servername <hostname/ipaddress> {-report <report_name> -report_id <report_id>} -targetfolder <folder> delete report -servername <hostname/ipaddress> {-report <report_name> -report_id <report_id>} [-fill] Parameters: -servername <hostname/ipaddress> Specify the SVP hostname or IP address. -report <report_name> Specify the Report Name. -report_id <report_id> Specify the ReportID. -targetfolder <folder> Specify the download folder. -fill Report is deleted only full of the server reports. raidinf add report The raidinf add report command creates a report. If other users have created 20 reports, the logged in user cannot create a report and will receive an error. Syntax raidinf add report servername <hostname/ipaddress> [-report <report_name>] Options and parameters Option -servername <hostname/ipaddress> [-report <report_name>] Specifies the host name or the IP address of the SVP. Specifies a report name, up to 32 characters. If you specify more than 32 characters, the 33rd and subsequent characters are ignored. If the report name is omitted, the default report name YYMMDD-CreateConfigurationReport is specified. The hyphen (-) cannot be specified at the beginning of the report name. Examples This example creates a report with the default report name. # raidinf add report -servername ReportName UserName CreateTime CreateConfigurationReport user /10/09-12:43:10 This example specifies the report name CreateConfigurationReport and creates a report. # raidinf add report -servername report raidinf add report 135

136 CreateConfigurationReport ReportName UserName CreateTime CreateConfigurationReport user /10/09-12:43:10 The respective items of the output example are explained next. ReportName The report name is displayed (up to 32 characters). UserName The user name is displayed (up to 16 characters). If the user name exceeds 16 characters, an ellipsis (...) is displayed. CreateTime The time of creating a report is displayed (up to 19 characters). raidinf delete report The raidinf delete report command deletes a report. If multiple reports of the same name exist, the command deletes the oldest report. If the specified report does not exist, the command does not do anything and is normally terminated. Reports created using Remote Web Console can also be deleted. Syntax raidinf delete report -servername <hostname/ipaddress> {-report<report_name> -report_id <report_id>} [-fill] Options and parameters Option -servername <hostname/ipaddress> {-report <report_name> -report_id <report_id>} [-fill] Specifies the host name or the IP address of the SVP. Specifies either -report or -report_id. -report specifies a report name (up to 32 characters). If you specify more than 32 characters, the 33rd and subsequent characters are ignored. -report_id specifies a report ID displayed by the report list. Because a report ID is a unique ID to each of the reports, a specific report can be identified even if reports of the same name exist. Deletes the report only if the total number of reports is 20. In there are less 20 reports, the specified report is not deleted even if it exists. Examples This example specifies the report name CreateConfigurationReport and deletes the report. # raidinf delete report -servername report CreateConfigurationReport CreateConfigurationReport is deleted in the SVP. raidinf download report The raidinf download report command downloads a report. Reports created by Remote Web Console can also be downloaded. The report in process of creation cannot be downloaded. 136 Report Configuration Tool command reference (raidinf commands)

137 The name of the downloaded file is Report_report name.tgz. Note that the files are overwritten if reports of the same name has already existed. Example: the name of the downloaded file when the report name is CreateConfigurationReport Report_ CreateConfigurationReport.tgz Syntax raidinf download report -servername <hostname/ipaddress> {-report <report_name> -report_id <report_id>} -targetfolder <folder> Options and parameters Option -servername <hostname/ipaddress> {-report <report_name> -report_id <report_id>} Specifies the host name or the IP address of the Web server (SVP). Specifies either -report or -report_id. -report: specifies a report name within 32 characters. If you specify more than 32 characters, the 33rd and subsequent characters are ignored. If a special name LatestReport is specified as a report name, the report created on the newest date is downloaded. To download another report having the same name as the special name "LatestReport", specify the relevant report ID in -report_id. If multiple reports of the same name exist, the report of the newest date is the target of download. -report_id: specifies a report ID displayed by the report list. As a report ID is a unique ID to each of the reports, a specific report can be identified even if reports of the same name exist. -targetfolder <folder> Specifies a folder name to which a report is downloaded. The folder whose name you specify must already exist and you have permissions to the folder. Examples Downloads the most recently created report. # raidinf download report -servername report LatestReport -targetfolder C:\tmp Report_ CreateConfigurationReport.tgz is downloaded to C:\tmp. This example specifies the report name CreateConfigurationReport and downloads the report. # raidinf download report -servername report CreateConfigurationReport -targetfolder C:\tmp Report_ CreateConfigurationReport.tgz is downloaded to C:\tmp. raidinf get reportinfo The raidinf get reportinfo command displays a list of reports. Reports created using Remote Web Console are also displayed. A report currently being created cannot be downloaded. Syntax raidinf get reportinfo servername <hostname/ipaddress> raidinf get reportinfo 137

138 Options and parameters Option -servername <hostname/ipaddress> Specifies the host name or the IP address of the Web server (SVP). Examples Displays a list of reports. # raidinf get reportinfo -servername ReportName UserName CreateTime ReportID CreateConfigurationReport user /10/09-12:43:10 33S CreateConfigurationReport user /10/08-11:22:31 33J CreateConfigurationReport user /10/07-11:17: CreateConfigurationReport configuration /10/06-15:30:42 4n1j The respective items of the output example are explained next. ReportName The report name is displayed (up to 32 characters). UserName The user name is displayed (up to 16 characters). If the user name exceeds 16 characters, an ellipsis (...) is displayed. CreateTime The time of creating a report is displayed (up to 19 characters). ReportID The report ID is displayed. 138 Report Configuration Tool command reference (raidinf commands)

139 C SMI-S provider configuration file This appendix describes the SMI-S provider configuration files. User-defined.properties file This section describes the description format and organization format of SMI-S provider user configuration files and parameters to be defined. The user-defined.properties file is an SMI-S provider user configuration file. File description format The format of the user-defined.properties file includes the following items: File format: text Character code: ISO Line-end symbol: \n, \r, or \r\n Comment: Line on which # or! is the first non-space character File organization format The organization of the user-defined.properties file is shown here: # comment line parameter1= parameter1_setting_value parameter2= parameter2_setting_value # comment line Parameters defined in user configuration files Table 44 Parameters defined in user configuration files Parameter name CipherSuites VVolForSnapshot PoolIDForSnapshot DefaultSnapshotFunction Specifies usable cipher suites. Optional item. If no value is specified, the default value applies. For parameter details, see CipherSuites parameter (page 139). Specifies virtual volumes that can be used by the SMI-S provider. Optional item. If no value is specified, the default value applies. If you specify this item, be sure to specify PoolIDForSnapshot as well. For detail parameter details, see VVolForSnapshot parameter (page 140). Specifies pools that can be used by the SMI-S provider. Optional item. If no value is specified, the default value applies. If you specify this item, be sure to specify VVolForSnapshot as well. For parameter details, see PoolIDForSnapshot parameter (page 141). Specifies replication function from the SMI-S provider. Optional item. If no value is specified, the default value applies. For parameter details, see DefaultSnapshotFunction parameter (page 141). CipherSuites parameter Use the CipherSuites parameter to specify usable cipher suites (encryption algorithms). All cipher suites that can be set are specified by default. User-defined.properties file 139

140 The CipherSuites parameter can use any of the following values: TLS_DHE_RSA_WITH_AES_128_CBC_SHA TLS_DHE_DSS_WITH_AES_128_CBC_SHA TLS_RSA_WITH_AES_128_CBC_SHA SSL_DHE_RSA_WITH_3DES_EDE_CBC_SHA SSL_DHE_DSS_WITH_3DES_EDE_CBC_SHA SSL_RSA_WITH_3DES_EDE_CBC_SHA Setting up the CipherSuites parameter Connect cipher suites with a comma (,) as a delimiter. Example CipherSuites=TLS_DHE_DSS_WITH_AES_128_CBC_SHA,TLS_RSA_WITH_AES_128_CBC_SHA, SSL_DHE_RSA_WITH_3DES_EDE_CBC _SHA,SSL_DHE_DSS_WITH_3DES_EDE_CBC_SHA, SSL_RSA_WITH_3DES_EDE_CBC_SHA VVolForSnapshot parameter Use the VVolForSnapshot parameter to specify virtual volumes that the SMI-S provider can use when you operate Fast Snap from CreateElementReplica of HITACHI_ReplicationService. All virtual volumes are specified by default. Setting up the VVolForSnapshot parameter Set up the parameter by using <RangeOfVVol> and <SingleVVol> with a comma (,) as a delimiter: <RangeOfVVol>: Specifies a range of virtual volumes <SingleVVol>: Specifies a single virtual volume <RangeOfVVol> format <S2HexLDKC>:<S2HexCU>:<S2HexLDEV>to<E2HexLDKC>:<E2HexCU>:<E2HexLDEV> <S2HexLDKC>: LDKC number (two-digit hexadecimal) of the first virtual volume in the specified range <S2HexCU>: CU number (two-digit hexadecimal) of the first virtual volume in the specified range <S2HexLDEV>: LDEV number (two-digit hexadecimal) of the first virtual volume in the specified range <E2HexLDKC>: LDKC number (two-digit hexadecimal) of the last virtual volume in the specified range <E2HexCU>: CU number (two-digit hexadecimal) of the last virtual volume in the specified range <E2HexLDEV>: LDEV number (two-digit hexadecimal) of the last virtual volume in the specified range <SingleVVol> format <2HexLDKC>:<2HexCU>:<2HexLDEV> <2HexLDKC>: LDKC number (two-digit hexadecimal) of the single virtual volume to be specified <2HexCU>: CU number (two-digit hexadecimal) of the single virtual volume to be specified <2HexLDEV>: LDEV number (two-digit hexadecimal) of the single virtual volume to be specified Example VVolForSnapshot=00:00:00to00:00:FF,00:02:00,00:04:00to00:04:FF 140 SMI-S provider configuration file

141 In this example, a virtual volume having one of the following LDEV IDs is used as the snapshot target: From 00:00:00 (LDKC=0,CU=0,LDEV=0) to 00:00:FF (LDKC=0,CU=0,LDEV=255) 00:02:00 (LDKC=0,CU=2,LDEV=0) From 00:04:00 (LDKC=0,CU=4,LDEV=0) to 00:04:FF (LDKC=0,CU=4,LDEV=255) PoolIDForSnapshot parameter Use the PoolIDForSnapshot parameter to specify pools that the SMI-S provider can use when you run Fast Snap from CreateElementReplica of HITACHI_ReplicationService. All pools are specified by default. Setting up the PoolIDForSnapshot parameter Set up the parameter by using <RangeOfPoolID> and <SinglePoolID> with a comma (,) as a delimiter: <RangeOfPoolID>: Specifies a range of pool IDs <SinglePoolID>: Specifies a single pool ID <RangeOfPoolID> format <Start PoolID>to<End PoolID> <Start PoolID>: ID of the first pool in the specified range <End PoolID>: ID of the last pool in the specified range <SinglePoolID> format <PoolID> <PoolID>: ID of the pool to be specified Example PoolIDForSnapshot=1to2,4,6to8 In this example, pools having one of the following pool IDs are used as snapshot pools: 1 to to 8 DefaultSnapshotFunction parameter Use the DefaultSnapshotFunction parameter to specify a replication function from CreateElementReplica of HITACHI_ReplicationService. Only Fast Snap is supported by the HP XP7 Storage system. It is specified by default. Table 45 Values for the DefaultSnapshotFunction parameter Value FS Enables Fast Snap Setting up the DefaultSnapshotFunction parameter Enter FS. Example DefaultSnapshotFunction=FS User-defined.properties file 141

142 D Using Remote Web Console secondary windows This appendix describes requirements, operation methods, notes, and troubleshooting required to use Remote Web Console secondary windows. Requirements for using RWC secondary windows This topic describes the prerequisites for using the Remote Web Console secondary windows. Installing and configuring JRE Complete the steps in the following procedures to install JRE in a Windows or Unix environment. Java Runtime Environment version To use Remote Web Console secondary windows: 1. Check the architecture (32-bit or 64-bit) of the browser you are using. 2. From download and install Java Runtime Environment, version JRE 7.0 Update 17, 21 or 51, with the same architecture as the browser. 3. Download the JRE Installation Guide from the same site and follow the instructions to install JRE. NOTE: Use only JRE supplied by Oracle Corporation. Path setting (UNIX) Configuring JRE Verify that JRE is installed correctly by opening the ControlPanel.html file. It is located in the JRE root directory. If the file opens, JRE is installed correctly. On the JRE of each Remote Web Console computer, Java log file trace and logging must be enabled and caching must be disabled. The Java log file can help you troubleshoot a problem when an application error occurs in the Remote Web Console web client. Disabling the caching feature can help prevent complications when the microcode is updated. See the website for more information on configuring JRE through the Java Control Panel. Setting up Java This topic describes how to set up Java to: Enable tracing and logging so that you can collect log files when an application error occurs on a Remote Web Console computer Change the cache settings so that to prevent the old microcode from remaining in cache when a microcode is updated, the old microcode will not remain in the cache Configure a proxy server Proxy server settings You can set Remote Web Console to either use or not use a proxy server to access the SVP. To do this, change the HTTP setting on the web browser on the Remote Web Console computer to either use a proxy server, or set the SVP as an exception so that it does not use a proxy server. Whichever setting you use, make the same setting for Java. 142 Using Remote Web Console secondary windows

143 Procedure 1. Start the Java Control Panel. In Windows, from Windows Control Panel, double-click the Java icon. In Unix, run one of the following executable files: <SDK_destination_directory>/jre/bin/ControlPanel <SDK_destination_directory>/jre/ControlPanel <JDK_destination_directory>/jre/ControlPanel Alternatively, use a web browser to display one of the following Control Panel pages: <SDK_destination_directory>/jre/ControlPanel.html <JDK_destination_directory>/ControlPanel.html 2. In the Java Control Panel, click the Advanced tab. 3. Under Debugging, click Enable tracing and Enable logging. 4. In the Java Control Panel, click the General tab. 5. In the Temporary Internet Files, click Settings. The Temporary Files Settings dialog box displays. Setting up Java 143

144 6. In the Temporary Files Settings dialog box: 1. For JRE 7.0, click the Keep temporary files on my computer checkbox to enable it. 2. In the Disk Space area, enter 1 MB. 3. Click OK to close the dialog box. 7. Configure the proxy settings as required. 1. In the Java Control Panel, select the General tab. 2. Click Network Settings to display the Network Settings dialog box. 8. In the Java Control Panel, click OK to close it. Enabling the Remote Web Console secondary window This section explains how to enable the Remote Web Console secondary window. Prerequisites You must have Storage Administrator (View Only) role to perform this task. To enable the Remote Web Console secondary window 1. From the Settings menu, click Environmental Settings > Edit Information Display Settings. The Edit Information Display Settings window opens. 2. In the Secondary window field, click Enable. 3. Click Apply. Related Topics Edit Information Display Settings window (page 241) Using the Remote Web Console secondary window The Remote Web Console secondary window is reset when you do any of the following: Click Apply or Cancel Click Refresh or Refresh All on the File menu Switch tabs Secondary window menus and buttons The following illustration shows the Remote Web Console secondary window. The tables following the illustration describe the menus and buttons accessible in the window. 144 Using Remote Web Console secondary windows

145 Title bar File > Refresh All File > Refresh File > Close Go menu Help menu Unlocked Locked Provides information about the connected storage system. IP indicates the IP address of the SVP. S/N indicates the serial number. D/N indicates the device name specified in the Edit storage system window. Updates the information on the SVP. All information displayed on the Remote Web Console secondary window is reacquired from the storage system. We recommend that you use this command only when error recovery is required. Takes time until the processing has been completed. While updating, other users are not allowed to perform any operation on the Remote Web Console windows. Maintenance of the storage system or the SVP operation by the service personnel is not allowed, either. Available only for the user with Storage Administrator (Initial Configuration) role. Available only when the user is in Modify mode. The information may not display correctly if SVP maintenance is in progress. Try this command if the configuration information displayed on the Remote Web Console differs from the actual configuration information that can be recognized from the host. Displays the latest information on Remote Web Console. The information might not display correctly when the exclusive lock is effective or SVP maintenance is in progress. Closes the Remote Web Console secondary window Indicates software names Home Page: Opens the home page of the help system Documentation Home Page: Opens the website of the Remote Web Console manuals. About: Opens the About dialog box to show the version of the storage system. Indicates the current operational mode of Remote Web Console. If all logged in users are currently working in the view mode, the blue unlocked-shaped icon ( ) appears. If any user is working in the Modify mode, the red locked-shaped icon ( ) appears. Using the Remote Web Console secondary window 145

146 Note: The operational status might not be displayed correctly when the exclusive lock is effective or SVP maintenance is in progress. View Modify Reset Logged in as Logout Apply Cancel Allows users to switch the operation mode between Modify and View. The button always shows the current user operation mode. To change the modes, click the button. You cannot switch to the Modify mode while any other user is operating in the Modify mode. Make sure to confirm the exclusive lock icon before switching to the Modify mode. Reset the remaining time for the Modify mode. Appears only when you are in Modify mode. Shows the user ID of the currently logged-in user. Closes the Remote Web Console secondary window. Implements all the changes or settings displayed in blue bold italics. This button is available only in Modify mode. You can create and store up to 20,000 settings or operations before actually applying them to the storage system. To avoid a possible error, do not apply more than 20,000 settings at a time. Cancels the changes or settings made on the window. This button is available only in Modify mode. Opening Remote Web Console secondary windows Some Remote Web Console operations are performed through secondary windows that use a Java application. For this reason, whether you are using JRE 5.0 or 6.0, a message might appear and ask if you want to run a Java Application. You might see slightly different dialog boxes depending on your environment and configuration. For JRE 5.0, the Warning - Security dialog box( shown below) displays when the digital signature has expired. To use Remote Web Console, if you select Always trust content from this publisher in the Warning - Security dialog box before clicking Run, Remote Web Console is always allowed to access the local files. When you click Run, you will not see this dialog box again. NOTE: The Remote Web Console digital signature has an expiration date and it might be expired depending on the Remote Web Console version that you use. Even though the digital signature is expired, you can continue using Remote Web Console. 146 Using Remote Web Console secondary windows

147 RWC secondary windows and Modify mode A secondary window opens when you click a command from the Remote Web Console menu. To make settings in a secondary window, you must change to Modify mode by clicking. Modify mode prohibits other users or programs from changing the storage system setting. As soon as you close the secondary window, Modify mode is released. Modify mode has a timeout period. If you do not access SVP before the end of the timeout period, Modify mode is released. On some windows, the settings made but not yet applied to the storage system will be canceled. Resetting timeout period for Modify mode The secondary window displays the progress bar (shown in the following figure) indicating the remaining time in the timeout period. To extend this period and remain in Modify mode, click Reset. The Modify mode default timeout period is 30 minutes, but can be changed by modifying RMI time-out period for Modify. If Modify mode is released due to a timeout, the current window will still be visible, but an error message is returned when you click Apply, or when you try to refresh the window through File > Refresh All or Refresh. Main window and Modify mode There is no Modify mode for the Remote Web Console main window. Main window and wizard operations are queued as tasks and performed in order. However, when using a Remote Web Console secondary window, you must be in Modify mode before changing any settings. Secondary window operations are not queued or displayed in the task window. Cautions on use of the secondary window If you use IPv6 to display the Remote Web Console main window when both IPv4 and IPv6 are available, IPv6 addresses are displayed in the Remote Web Console secondary window but actually IPv4 communication is used. The mouse wheel may not function in the Remote Web Console secondary window. If you accept other processing while you are changing the configuration of the storage system on the secondary window, an error occurs. If an error occurs when you try to log in or when you click Apply, wait awhile and log in again. If an error occurs when you switches operation modes (View/Modify) or tabs, wait awhile and click File > Refresh. Java Update Needed dialog box Some Remote Web Console operations are performed using Java applications. You may be prompted to update the Java application when navigating to these operations, as shown in the following figure. Cautions on use of the secondary window 147

148 Note the following: Update is recommended. If you click either Update or Block, you must close the web browser and restart Remote Web Console. To use Remote Web Console with the current Java version, click Later. To prevent this dialog box from appearing again, check Do not ask again until the next update is available and then click Later. If an error occurs, repeat the procedure. Troubleshooting This topic describes cautions peculiar to the Remote Web Console secondary window. For troubleshooting issues common to the main and secondary windows, see Chapter 8 Troubleshooting. Table 46 Java application errors 1 2 Error condition When you click the Remote Web Console menu, the system does not respond. One minute later, application error ( ) occurs. When you click the Remote Web Console menu, a message appears asking you to download the file SJsvlSNStartServlet.do or SJsvlAppStartServlet.do. One minute later, the application error ( ) occurs. Probable cause / recommended action The pop-up blocker function of your web browser might restrict Remote Web Console. If the problem still continues after you perform the operation multiple times, perform one or both of the following actions: Disable the pop-up blocker function of your web browser. Disable the pop-up blocker function of any browser plug-in/add-on. If neither of the above can be performed in Internet Explorer, you can open the window by clicking the Remote Web Console menu while holding down the Ctrl key. Another possible cause is that a Java application was not allowed to start. If a message appears and asks if you want to run an application, click Run. If none of the above actions solve the problem, reinstall the JRE. The possible causes are that the JRE is not installed in the Remote Web Console computer, the JRE installation failed, or the JRE add-on is disabled on the web browser. Cancel the message, and install the JRE. If the JRE is already installed, reinstall it. 148 Using Remote Web Console secondary windows

149 Table 46 Java application errors (continued) Error condition 3 The application errors ( and ) occur when you click the Remote Web Console menu. The application error ( ) occurs and Remote Web Console terminates when you click the Remote Web Console menu. Probable cause / recommended action If the problem continues after you perform the operation multiple times, see the probable causes listed below. For Windows: Exit all applications using Java, and then terminate the javaw.exe and javaws.exe applications through Task Manager. Java on the Remote Web Console web client might have failed to start due to timeout. Close all other applications and perform the Remote Web Console operation again. The version of Remote Web Console installed on the client computer might not match the SVP version. Close all the windows of your web browser and then clear the Java and web browser cache. The Remote Web Console computer might have entered standby or hibernate mode. Restart Remote Web Console computer. If a proxy server is used for network connections, the proxy cache may be storing the older version of the program. If the problem continues after you clear the Java and web browser caches, contact your network administrator. The network connection between the SVP and the Remote Web Console computer might be blocked by a firewall or some kind of device. Check the firewall settings and contact your network administrator. If none of the above actions solve the problem, save the dump file, the Java trace file and the log file on the Remote Web Console computer, and report to HP Technical Support. Then restart the Remote Web Console. 4 5 When you click the Remote Web Console menu, the system does not respond. The application error (1-7050) occurs when you click the Remote Web Console menu. If the problem continues after you perform the operation multiple times, close all the Remote Web Console windows and clear the Java and web browser caches. The version of Remote Web Console installed on the Remote Web Console computer might not match the SVP version. Close all the windows of your web browser and then clear the Java and web browser caches. In addition, if a proxy server is used for network connections, the proxy server cache may be storing the older version of the program. If the problem continues after you clear cache of both Java and web browser, contact your network administrator. 6 Java console is grayed out and does not start when you try to open the Remote Web Console secondary window (Java application). Restart the Remote Web Console computer, or terminate the Remote Web Console process with one of the following methods: For Windows: Exit all applications using Java, and then terminate the javaw.exe and javaws.exe applications through Task Manager. For UNIX: Exit all applications using Java, and then terminate javaw and javaws with the kill command. 7 A message box remains displayed when opening the Remote Web Console secondary window (Java application). The Remote Web Console secondary window does not appear for a long time. Restart the Remote Web Console computer, or terminate the Remote Web Console process with one of the following methods: For Windows: Exit all applications using Java, and then terminate the javaw.exe and javaws.exe applications through the Task Manager. For UNIX: Exit all applications using Java, and then terminate javaw and javaws with the kill command. Troubleshooting 149

150 Table 46 Java application errors (continued) Error condition Probable cause / recommended action 8 A message remains displayed when the Remote Web Console secondary window opens and the system does not respond. The SVP may be set as an exception on the proxy setting of the web browser. Make the settings the same on the Network Configuration dialog box, which is located in the Java Control Panel's General dialog box If you open the Java console dialog box by selecting the Java icon on the system tray while opening the Remote Web Console secondary window (Java application), the browser and Java console may stop responding. When you click the Remote Web Console menu. The application error ( ) occurs. Do not open the Java console dialog box while opening the Remote Web Console secondary window. If the browser and Java console stop responding, restart the Remote Web Console computer. If the problem continues after you repeat the operation several times, you might have cancelled the display of the secondary window. Restart the Remote Web Console computer, or terminate the Remote Web Console process with one of the following methods: For example: You might have clicked Exit on the Security Warning window. You might have clicked Cancel on the Warning - Security window. Close all the Remote Web Console windows and clear the Java and web browser caches. If the problem continues after you clear both Java and web browser caches, save the Remote Web Console dump file and the Java trace file, and send them to HP Technical Support. 11 The following message displays in Remote Web Console. Select Yes to continue using Remote Web Console.If the Java has discovered application components that could problem continues, the cause may be one of the following: indicate a security concern. The version of Remote Web Console might not match the Block potentially unsafe components from being run. (recommended) The application contains both signed and unsigned code. Contact the application vendor to ensure that it has not been tampered with. SVP version. Close all the windows of your web browser and then clear the cache of both Java and the web browser If a proxy server is used for network connections, the proxy server cache may be storing an older version of the program. Clear the cache of both Java and the web browser. If the problem remains, contact your network administrator In Internet Explorer, the following pop-up window appears when you open the Remote Web Console secondary window. "Internet Explorer has stopped working. A problem caused the program to stop working correctly. Windows will close the program and notify you if a solution is available." In Internet Explorer, an application error ( ) occurs when you open the Remote Web Console secondary window. Third-party browser extensions of Internet Explorer might be enabled. Disable third-party browser extensions as follows: 1. In the Windows menu bar, click Tools > Internet Options, and then click the Advanced tab. 2. In the Advanced tab, clear the Enable third-party browser extensions (requires restart) checkbox. 3. Restart Internet Explorer. The SmartScreen Filter function might be enabled when you use Internet Explorer 8.0 or later. Turn off SmartScreen Filter as follows: 1. In the Windows menu bar, click Safety > SmartScreen Filter > Turn Off SmartScreen Filter. 2. Restart Internet Explorer. 150 Using Remote Web Console secondary windows

151 Table 47 No response errors Error condition Probable cause / recommended action 1 Remote Web Console hangs and does not respond. Remote Web Console may hang in the following cases: From the Remote Web Console secondary window, press Ctrl + Alt + Shift + D all at once to exit Remote Web Console. If you cannot exit Remote Web Console, reboot the Remote When you move a window displayed in front of the Web Console computer or restart Remote Web Console after Remote Web Console secondary window, the area finishing Remote Web Console forcibly by the following way. behind the window remains gray and does not go back to normal for a long period of time. For Windows: Exit all applications using Java, and then The entire Remote Web Console secondary window goes gray and does not go back to normal for a long period terminate the javaw.exe and javaws.exe applications through Task Manager. of time. For UNIX: Exit all applications using Java, and then terminate javaw and javaws with the kill command When you click Refresh All or Refresh in the Remote Web Console secondary window, it displays the message "Loading" for a long time". Error occurred during a Remote Web Console operation on the secondary window. While you are using a Remote Web Console secondary Window, it closes unexpectedly and error occurs. The web browser closes abnormally One of the following sets of errors occurred when using Remote Web Console: and and The probable causes are: Another application such as RAID Manager may be changing configuration. The window will be refreshed shortly after the configuration change ends. Auto LUN operations, Quick Restore operations or Fast Snap operations may be in progress. The window will be refreshed shortly after the operations end. The probable causes are: Another application such as RAID Manager may be changing configuration. Auto LUN operations, Quick Restore operations, or Fast Snap operations may be in progress. The configuration data may not be matched if a communication error occurs between the storage system and the SVP. Wait a few minutes and then click File > Refresh All to reread the configuration information. Then launch Remote Web Console again. Start the Remote Web Console secondary window from the Remote Web Console main window again. If this error occurs repeatedly, close all the Remote Web Console windows, and then clear the Java and web browser caches. This problem can occur if a Mozilla process keeps running after Mozilla stops responding. Delete the "java_vm" and "mozilla" processes and continue with Remote Web Console operations. The probable causes are: The SVP may have been restarted. Close Remote Web Console, wait 10 minutes, and then restart it. The version of Remote Web Console installed on the Remote Web Console computer might not match the SVP version. Close all the browser windows and then clear the browser cache. The Remote Web Console computer might be in standby or hibernate mode. Restart Remote Web Console. If a proxy server is used for network connections, the proxy server cache may be storing the older version of the program. If the problem continues after you clear the browser cache, contact your network administrator. Restart the web browser If none of the above actions solve the problem, save the Remote Web Console dump file and send it to the Technical Support Center. Troubleshooting 151

152 Table 48 Incorrect display errors Error condition Probable cause / recommended action Only the Exit button and the Refresh and Refresh All commands are effective when accessing the SVP from Remote Web Console. Only the Exit button and the Refresh All command are effective when accessing the SVP from the Remote Web Console. The commands in the Go menu are unavailable. When you switch windows from one window to the Remote Web Console window, the Remote Web Console window is not displayed. The items in a list are not synchronized with a scroll bar. The focus disappears from the edit box. The web browser does not display correctly, because some GUI items such as labels and icons cannot be loaded properly. The characters are unreadable because they are overlapped or garbled. The characters are garbled in a window where a tree is displayed. Even though you have clicked Apply to change storage system settings, the new settings are not displayed in Remote Web Console. The dialog box that says Loading... stays open for a long period of time. The following information does not display in Remote Web Console windows: Information on the storage system, such as ports or HDDs Information configured with another Remote Web Console computer The SVP might not be ready to perform some write processes from the other system. Wait a few minutes and then click File > Refresh. If the SVP is not restored, click Refresh All. An error may have occurred in the SVP. Click File > Refresh All. If the SVP is not restored, log in to Remote Web Console again. The required software options might not be installed or an error might occur on the window that appears after you click the command. Make sure that all the required software options are installed. If they are installed, do one of the following: Click File > Refresh. Click File > Refresh All. Log in to Remote Web Console again. Close all windows, and then log in to Remote Web Console again. Click the scroll buttons or above and below the scroll bar. Close all dialog boxes, and then log in to Remote Web Console again. Log out of Remote Web Console, and then log in again. If this error occurs before you log in to the Remote Web Console, close all dialog boxes and then log in to Remote Web Console. Log out of Remote Web Console, and then log in again. Click File > Refresh. Click File > Refresh. A Remote Web Console message dialog box other than the dialog box that says Loading... might be displayed behind this window. Press Alt + Tab to switch the dialog box. If the dialog box that says Loading... remains displayed for several hours after you apply the settings to the storage system, contact HP Technical Support. Click File > Refresh. If the problem continues, close all Remote Web Console windows, and then clear the Web browser caches. 152 Using Remote Web Console secondary windows

153 Table 49 Other errors Error condition Probable cause / recommended action If you click in a Remote Web Console secondary window while a dialog box is open, the dialog box disappears behind the Remote Web Console secondary window. An error occurs because a digital signature or security certificate has expired. You specify IPv6 communication addresses when you start Remote Web Console. However, ipv6 is not being used. Instead, IPv6 is being used and IPv4 addresses are output to audit logs for operations on the Remote Web Console secondary window. Click the dialog box again. You can continue using Remote Web Console even though the digital signature for the Remote Web Console Java application is expired. IPv4 has higher priority when both IPv4 communication and IPv6 communication can be used. As a result, IPv4 may be used when you specify IPv6 communication addresses. Also, IPv4 addresses may appear in audit logs. For details on configuring only IPv6 communication, see Enabling IPv6 communication on page 2-2. Clearing Java caches When an error occurs on Remote Web Console, clear the Java and web browser caches to solve the problem. To clear the Java cache, click Delete the temporary files in the General dialog box of the Java Control Panel. Saving Java log and trace files Before you contact your service representative, save the detail dump files collected using the Dump tool, and the Java log and trace file on your Remote Web Console computer, and then restart the web browser. Examples of the Windows trace and log file locations are shown below. C:\Users\logon user ID\AppData\LocalLow\Sun\Java\Deployment\log\*.trace C:\Users\logon userid\appdata\locallow\sun\java\deployment\log\*.log Examples of the UNIX trace and log file locations follow: user home directory\.java\deployment\log\*.trace user home directory\.java\deployment\log\*.log Troubleshooting 153

154 E Remote Web Console user management GUI reference This appendix describes the Remote Web Console windows and wizards that you use to manage user security and to set up and manage user accounts on HP XP7 Storage systems. User Groups window This section includes the following: Summary User Groups tab This window lists all user groups created in Remote Web Console. Summary The following table describes the fields in the summary section in the User Groups window. Number of User Groups Number of user groups created in Remote Web Console. User Groups tab The following table describes the fields in the User Groups tab in the User Groups window. User Group Name User Group Type Number of Roles Number of Resource Groups Number of Users All Resource Groups Assigned Create User Group Displays user group name. Displays the user group type. Built-in: Indicates a built-in user group. User-created: Indicates a user group that users created. Displays the number of the roles that are assigned to the user group. Displays the number of the resource groups that are assigned to the user group. Displays the number of users who belong to the user group. Displays whether all the resource groups are assigned. Yes: All the resource groups are assigned to the user group. No: All the resource groups are not assigned to the user group. Creates a new user group. 154 Remote Web Console user management GUI reference

155 Add Users Edit Resource Group Assignment Edit Role Assignment 1 Delete User Groups 1 Edit User Group 1 Export 1 Adds the created users to the selected user group. Assigns the created resource groups to the selected user groups. Assigns the created roles to the selected user groups. Deletes the selected user groups. Edits the user group name. Displays the window for outputting table information. Note 1. Appears when you click More Actions. Related Topics User Groups (page 53) Selected User Group Window The User Group window lists the names of all of the built-in user groups and any user groups that were created in Remote Web Console. To open a window for a specific user group, in the User Groups tab, click the user group name. The features of the window that opens when a user group is selected are the same, no matter which user group is selected. The following example uses the Administrator User Group window to show the features in the window. The window for each selected user group contains a Summary sections and three tabs. Summary section Users tab Roles tab Resource Groups tab Summary section The following table describes the fields and settings in the Summary section of the selected user group window. Number of Roles Number of Resource Groups Number of Users Displays the number of roles that are assigned to the selected user group. Displays the number of resource groups that are assigned to the selected user group. Displays the number of users who belong to the selected user group. Selected User Group Window 155

156 User Group Type All Resource Groups Assigned Displays the user group type. Built-in: Indicates a built-in user group. User-created: Indicates a user group that a user created. Displays whether all the resource groups are assigned. Yes: All the resource groups are assigned to the user group. No: All the resource groups are not assigned to the user group. Users tab The following table describes the fields and settings in the Users tab of the selected user group window. It lists the users who belong to the selected user group. User Name Account Status Authentication User Type Number of User Groups Create User Change Password Edit User Add Users 1 Remove Users 1 Delete Users 1 Export 1 Name of user who belongs to the user group. Account status. The following statuses are available: Enabled: The user can use the account. Disabled: The user cannot use the account or log in to Remote Web Console. Authentication method. The following methods are available: Local: Does not use authentication server. Uses a dedicated password for Remote Web Console. External: Uses authentication server. User type. The following types are available: Built-in or User-created Displays the number of the user groups where the user belongs. Creates a new user account. Changes your own password if you click this. Changes the password of other users if you select a user and then click this. Changes the setting for authentication or for the account status. You can set the password of the selected user if you change Authentication from External to Local. Adds the created users to the selected user group. Removes the selected user from the user group. The user account itself will not be deleted. Deletes the selected users. Window for outputting table information. Note 1. Appears when you click More Actions. Roles tab The following illustration shows the Roles tab of the selected user group window. 156 Remote Web Console user management GUI reference

157 The following table describes the fields and settings in the Roles tab of the selected user group window. Role displays the roles assigned to the user group, which determines the operations the user can perform. Role Roles Edit Role Assignment Export Permitted operations Displays the roles that are assigned to the user group. Assigns the created roles to the selected user groups. Displays the window for outputting table information. Resource Groups tab The following illustration shows the Resource Groups tab of the selected user group window. The following table describes the fields and settings in the Resource Groups tab of the selected user group window. It lists the resource groups that are assigned to the selected user group. Resource Group Name Number of User Groups Number of Parity Groups Number of LDEVs Number of Ports Number of Host Groups Displays the name and ID of the resource group assigned to the user group. Displays the number of user groups that are assigned to the resource group. Displays the number of the parity groups that are assigned to the resource group. Displays the number of the LDEVs that are assigned to the resource group. Displays the number of the ports that are assigned to the resource group. Displays the number of the host groups that are assigned to the resource group. Selected User Group Window 157

158 Edit Resource Group Assignment Export Virtual Storage Machine 1 Assigns the created resource groups to the user groups. Displays the window for outputting table information. Displays the model type of the virtual storage machine and serial number set for the resource group. Notes: 1. This content is not displayed as default. If you want to display this content, please change the settings at Column Settings window of table option. Related Topics Deleting user accounts (page 62) Column Settings window (page 230) Create User Group wizard Create User Group window Use this window to create a new user group. User Group Name Check Enter the name of the user group to be created. You can specify ASCII code characters, spaces, and the following symbols:! # $ % & ' ( ) + -. [ ] ^ _ ` { } ~ Check whether the entered user group name is registered to the authorization server when you use an authorization server. 158 Remote Web Console user management GUI reference

159 Related Topics Creating a new user group (page 58) Confirm window (Create User Group) Create User Group The following table describes the fields in the Create User Group section of the Create User Group Window. User Group Name Number of Roles Number of Resource Groups Number of Users All Resource Groups Assigned Displays the name of user groups to be created. Displays the number of roles that are assigned to the user group to be created. Displays the number of resource groups that are assigned to the user group to be created. Displays the number of users that belong to the user group to be created. Displays whether all resource groups are assigned. Yes: All resource groups are assigned to the user group. No: All resource groups are not assigned to the user group. Create User Group wizard 159

160 Assigned Roles The following table describes the fields in the Assigned Roles section of the Create User Group Window. Role Displays the roles that are assigned the user group to be created. Assigned Resource Groups The following table describes the fields in the Assigned Resource Group section of the Create User Group Window. Resource Group Name (ID) Number of User Groups Number of Parity Groups Number of LDEVs Number of Ports Number of Host Groups Detail Displays the name and ID of the resource group not assigned to the user group to be created. Displays the number of user groups that are assigned to the resource group. Displays the number of parity groups that are assigned to the resource group. Displays the number of LDEVs that are assigned to the resource group. Displays the number of ports that are assigned to the resource group. Displays the number of host groups that are assigned to the resource group. Displays details of the selected resource group. Selected Users The following table describes the fields in the Selected Users section of the Create User Group Window. This table displays only when users are added to the user group. This table displays only when users are added to the user group. User Name Account Status Authentication Number of User Groups Displays the name of the users that belong to the user group to be created. Displays the account status. The following status are available: Enabled: The user can use the account. Disabled: The user cannot use the account or log in to Remote Web Console. Displays the authentication method. The following methods are available: Local: Does not use authentication server. Uses a dedicated password for Remote Web Console. External: Uses authentication server. Displays the number of user groups where the user belongs. Related Topics User Groups (page 53) Roles (page 54) Built-in groups, roles, and resource groups (page 56) 160 Remote Web Console user management GUI reference

161 Create User wizard Create User window Use this window to create a new user account. Create User The following table describes the fields and settings in the Create User window. User Name Account Status Authentication Password Re-enter Password Enter the user name to be created. The allowable characters and length of user names depend on the application that the user uses. Account statuses. The following statuses are available: Enabled: The user can use the account. Disabled: The user cannot use the account or log in to Remote Web Console. Authentication method. The following methods are available: Local: Does not use authentication server. Uses a dedicated password for Remote Web Console. External: Uses authentication server. Password that the user enters for login. The allowable characters and length of passwords depend on the application that the user uses. Password as above. Create User wizard 161

162 Confirm window (Create User) Selected Users The following table describes the fields and settings used to create a new user account. User Name Account Status Authentication Password User Group Name User name to be created. Account statuses. The following statuses are available: Enabled: The user can use the account. Disabled: The user cannot use the account or log in to Remote Web Console. Authentication methods. The following methods are available: Local: Does not use authentication server. Uses a dedicated password for Remote Web Console. External: Uses authentication server. Password that the user enters for login. User group name where the user is added. Change Password Wizard Change Password window Use this window to change the password for yourself or another user. 162 Remote Web Console user management GUI reference

163 Change Password The following table describes the fields and settings used to change a password. User Name Current Password New Password Re-enter New Password Selected user name. Current password of your user account. Required only when you change your own password. New password that the selected user enters for login. The allowable characters and length of passwords depend on the application that the user uses. Same password as above. Change Password Wizard 163

164 Related Topics Changing user passwords (page 60) Confirm window (Change Password) The following table describes the fields and settings used to change user passwords. User Name Current Password New Password Selected user name. Current password. A hyphen (-) indicates no current password is specified. New password. Edit User wizard Edit User window Use this window to change the setting for authentication or for the account status. 164 Remote Web Console user management GUI reference

165 Edit User The following table describes the fields and settings used to edit user account information. User Name Account Status Authentication Password Re-enter Password Selected user name. Account statuses. The following statuses are available: Enabled: The user can use the account. Disabled: The user cannot use the account or log in to Remote Web Console. Authentication method. The following methods are available: Local: Does not use authentication server. Uses a dedicated password for Remote Web Console. External: Uses authentication server. Password that the user enters for login. You can specify ASCII code characters and the following symbols:! # $ % & ' ( ) * +, -. / : ; < = [ \ ] ^ _` { } ~ Password that the user enters for login. Edit User wizard 165

166 Related Topics Changing user permissions (page 61) Confirm window (Edit User) Selected User The following table describes the fields and settings in the Edit Users window. User Name Account Status Authentication Password Selected user name. Account status. The following statuses are available: Enabled: The user can use the account. Disabled: The user cannot use the account or log in to Remote Web Console. Authentication method. The following methods are available: Local: Does not use authentication server. Uses a dedicated password for Remote Web Console. External: Uses authentication server. Password that the user enters for login. Related Topics Changing user permissions (page 61) Add User wizard Add Users window Use this window to add the created user accounts to the selected user group. 166 Remote Web Console user management GUI reference

167 Related Topics Changing user permissions (page 61) Available Users The following table lists all the candidate users who do not belong to the selected user group. User Name Account Status Authentication Number of User Groups Selected user name. Account status. The following statuses are available: Enabled: The user can use the account. Disabled: The user cannot use the account or log in to Remote Web Console. Authentication method. The following methods are available: Local: Does not use authentication server. Uses a dedicated password for Remote Web Console. External: Uses authentication server. Displays the number of user groups where the user belongs. Add User wizard 167

168 Add button Adds the selected users in the Available Users list to the Selected Users list. Remove button Removes the selected users from the Selected Users list and relocates the selected users to the Available User list. Selected Users table Lists users to be added to the user group. User Name Account Status Authentication Number of User Groups Selected user name. Account status. The following statuses are available: Enabled: The user can use the account. Disabled: The user cannot use the account or log in to Remote Web Console. Authentication method. The following methods are available: Local: Does not use authentication server. Uses a dedicated password for Remote Web Console. External: Uses authentication server. Displays the number of user groups where the user belongs. 168 Remote Web Console user management GUI reference

169 Confirm window (Add Users) Selected User Group User Group Name Displays the user group name where the user is added. Selected Users table User Name Account Status Authentication Number of User Groups Selected user name. Account status. The following statuses are available: Enabled: The user can use the account. Disabled: The user cannot use the account or log in to Remote Web Console. Authentication method. The following methods are available: Local: Does not use authentication server. Uses a dedicated password for Remote Web Console. External: Uses authentication server. Displays the number of user groups where the user belongs. Confirm window (Add Users) 169

170 Related Topics Changing user permissions (page 61) Remove Users window Selected User Group table User Group Name Displays the name of the user group where the user is removed. Selected Users table User Name Account Status Authentication Number of User Groups Selected user name. Account status. the following statuses are available: Enabled: The user can use the account. Disabled: The user cannot use the account or log in to Remote Web Console. Authentication method. The following methods are available: Local: Does not use authentication server. Uses a dedicated password for Remote Web Console. External: Uses authentication server. Displays the number of user groups where the user belongs. 170 Remote Web Console user management GUI reference

171 Delete Users window Selected Users User Name Account Status Authentication Number of User Groups Selected user name. Account status. the following statuses are available: Enabled: The user can use the account. Disabled: The user cannot use the account or log in to Remote Web Console. Authentication method. The following methods are available: Local: Does not use authentication server. Uses a dedicated password for Remote Web Console. External: Uses authentication server. Displays the number of user groups to which the user belongs. Edit User Group wizard Edit User Group window Use this window to change the name of a user group. Delete Users window 171

172 Edit User Group The following table describes the fields and settings used to edit user group information. User Group Name Check Enter the new name of the user group. You can use ASCII code characters, spaces, and the following symbols:! # $ % & ' ( ) + -. [ ] ^ _ ` { } ~ Check whether the entered user group name is registered to the authorization server when you use an authorization server. Confirm window (Edit User Group) 172 Remote Web Console user management GUI reference

173 Edit User Group The following table describes the fields and settings used to edit user group information. User Group Name Number of Roles Number of Resource Groups Number of Users All Resource Groups Assigned Displays the new name of the user group. Displays the number of roles that are assigned to the user group. Displays the number of resource groups that are assigned to the user group. Displays the number of users that belong to the user group. Displays whether all the resource groups are assigned. Yes: All resource groups are assigned to the user group. No: All resource groups are not assigned to the user group. Delete User Groups window Selected User Groups table User Group Name Number of Roles Number of Resource Groups Number of Users All Resource Groups Assigned Displays the new name of the user group. Displays the number of roles that are assigned to the user group. Displays the number of resource groups that are assigned to the user group. Displays the number of users that belong to the user group. Displays whether all resource groups are assigned. Yes: All resource groups are assigned to the user group. No: All resource groups are not assigned to the user group. Delete User Groups window 173

174 Edit Resource Group Assignment wizard Edit Resource Group Assignment window Use this window to assign created resource groups to the user group and to assign created resource groups to the user group in the Create User Group. The following table describes the fields and settings used to assign resource groups with the Create User Group wizard. All Resource Groups Assigned Displays whether all the resource groups are assigned to the user group. This item is set to Yes when the following roles are assigned in the Assign Roles window. Security Administrator (View Only) Security Administrator (View & Modify) Audit log Administrator (View Only) Audit log Administrator (View & Modify) Support Personnel User Maintenance When this item is set to Yes, Unassigned Resource Groups table, Assigned Resource Groups table, Add button, and Remove button are disabled. 174 Remote Web Console user management GUI reference

175 Unassigned Resource Groups table The following table lists the resource groups that are not assigned to the user group. Resource Group Name (ID) Number of User Groups Number of Parity Groups Number of LDEVs Number of Ports Number of Host Groups Detail Displays the name and ID of the resource group that is not assigned to the user group to be created. Displays the number of user groups that are not assigned to the resource group. Displays the number of parity groups that are not assigned to the resource group. Displays the number of LDEVs that are not assigned to the resource group. Displays the number of ports that are not assigned to the resource group. Displays the number of host groups that are not assigned to the resource group. Displays the detail of the selected resource group. Add button Adds the selected resource groups in the Unassigned Resource Groups list to the Assigned Resource Groups list. Remove button Removes the selected resource groups from the Assigned Resource Groups list and relocates the resource groups to the Unassigned Resource Groups list. Edit Resource Group Assignment wizard 175

176 Assigned Resource Groups table Lists the resource groups to be assigned to the user group. Resource Group Name (ID) Number of User Groups Number of Parity Groups Number of LDEVs Number of Ports Number of Host Groups Detail Displays the name and ID of the resource group assigned to the user group to be created. Displays the number of user groups that are assigned to the resource group. Displays the number of parity groups that are assigned to the resource group. Displays the number of LDEVs that are assigned to the resource group. Displays the number of ports that are assigned to the resource group. Displays the number of host groups that are assigned to the resource group. Displays the detail of the selected resource group. 176 Remote Web Console user management GUI reference

177 Confirm window (Edit Resource Group Assignment) The following tables describe the fields and settings used to assign user group names with the Create User Group wizard. User Group Name Displays the new name of the user group. Selected Resource Groups as Assigned Table The following table describes the fields and settings used to assign resource groups with the Create User Group wizard. Resource Group Name (ID) Number of User Groups Number of Parity Groups Number of LDEVs Number of Ports Number of Host Groups Detail Displays the name and ID of the resource group assigned to the user group to be created. Displays the number of user groups that are assigned to the resource group. Displays the number of parity groups that are assigned to the resource group. Displays the number of LDEVs that are assigned to the resource group. Displays the number of ports that are assigned to the resource group. Displays the number of host groups that are assigned to the resource group. Displays the detail of the selected resource group. Edit Resource Group Assignment wizard 177

178 Selected Resource Groups as Unassigned Table The following table lists the resource groups that are not assigned to the user group. Resource Group Name (ID) Number of User Groups Number of Parity Groups Number of LDEVs Number of Ports Number of Host Groups Detail Displays the name and ID of the resource group not assigned to the user group to be created. Displays the number of user groups that are not assigned to the resource group. Displays the number of parity groups that are not assigned to the resource group. Displays the number of LDEVs that are not assigned to the resource group. Displays the number of ports that are not assigned to the resource group. Displays the number of host groups that are not assigned to the resource group. Displays the detail of the selected resource group. Related Topics Changing resource groups assigned to a user group (page 66) Edit Role Assignment wizard Edit Role Assignment window Use this window to add roles to the user group and to assign roles to the user group in the Create User Group. 178 Remote Web Console user management GUI reference

179 Unassigned Roles Lists roles that are not assigned to the user group. Role Displays roles. Add button Adds the selected roles in the Unassigned Roles list to the Assigned Roles list. Remove button Removes the selected roles from the Assigned Roles list and relocates the selected roles to the Unassigned Roles list. Assigned Roles The following window shows the roles that can be assigned to the selected user group. Edit Role Assignment wizard 179

180 Role Displays roles. 180 Remote Web Console user management GUI reference

181 Related Topics Changing user group permissions (page 66) Confirm window (Edit Role Assignment) Selected User Group User Group Name All Resource Groups Assigned Displays the new name of the user group. Displays whether all the resource groups are assigned. Yes: All the resource groups are assigned to the user group. No: All the resource groups are not assigned to the user group. Selected Assigned Roles Role Displays the roles that are assigned to the user group. Selected Unassigned Roles Role Displays the roles that are not assigned to the user group. Edit Role Assignment wizard 181

182 Setup Server wizard Select Authentication Server window To open this window, select Server Setup from the LDAP, RADIUS, or Kerberos properties window. The following tables describe the fields and settings used to set up external authentication in the Select Authentication Server window. External Authentication Select the type of authentication server. Disable: Does not use any authentication server. Users are authenticated with user information registered in the SVP. LDAP: Users are authenticated with user information registered in the LDAP server. RADIUS: Users are authenticated with user information registered in the RADIUS server. Kerberos: Users are authenticated with user information registered in the Kerberos server. When you select Disable, click Finish to open the confirm window. When you select LDAP, RADIUS, or Kerberos, click Next to open the Setup Server window. Confirm window (Select Authentication Server) To open this window, select Disable in the Select Authentication Server window. 182 Remote Web Console user management GUI reference

183 Selected Server The following table describes the fields and settings in the Disable authentication server setup window. External Authentication Displays the type of the authentication server. Disable: Does not use any authentication server. Users are authenticated with user information registered in the SVP. LDAP: Users are authenticated with user information registered in the LDAP server. RADIUS: Users are authenticated with user information registered in the RADIUS server. Kerberos: Users are authenticated with user information registered in the Kerberos server. LDAP Properties window To open this window, select Disable or LDAP in the External Authentication window. LDAP Properties window 183

184 LDAP Properties DNS Lookup Authentication Protocol External User Group Mapping Primary Host Name Primary Port Number Domain Name User Name Attribute Base DN Search User's DN Password Displays whether to search for the LDAP server using the information registered in the SRV records in the DNS server. Enable: Performs the search using information registered in the SRV records in the DNS server. Disable: Performs the search using the host name and the port number. Displays the LDAP protocol to use. Displays whether to connect an authentication server to an authorization server. Enable: Connects an authentication server to an authorization server. Disable: Does not connect an authentication server to an authorization server. Displays the host name of the LDAP server. Displays the port number of the LDAP server. Displays the domain name that the LDAP server manages. Displays the attribute name to identify a user, such as a user ID. Displays the Base DN for searching for users to authenticate. Displays the DN of the user for searching. Displays asterisks (*) to mask the password of the user for searching. 184 Remote Web Console user management GUI reference

185 Timeout Retry Interval Number of Retries Secondary Host Name Secondary Port Number Setup Server Displays the number of seconds before connection to the LDAP server times out. Displays the retry interval in seconds when the connection to the LDAP server fails. Displays the retry times when the connection to the LDAP server fails. Displays the host name of the secondary LDAP server. Displays the port number of the secondary LDAP server. Displays the Setup Server window. RADIUS Properties window This window opens when you select RADIUS in External Authentication. RADIUS Properties window 185

186 RADIUS Properties settings The following table describes the fields and settings in the RADIUS properties window. Authentication Protocol Primary Host Name Secret NAS Address Primary Port Number Timeout Number of Retries Secondary Host Name Secondary Port Number External User Group Mapping - Authentication Protocol External User Group Mapping - DNS Lookup External User Group Mapping - Host Name External User Group Mapping - Port Number External User Group Mapping - Domain Name External User Group Mapping - Base DN External User Group Mapping - Search User's DN External User Group Mapping - Password External User Group Mapping - Timeout External User Group Mapping - Retry Interval External User Group Mapping - Number of Retries Setup Server Displays the RADIUS protocol to use. PAP: Password authentication protocol that transmits plaintext user ID and password. CHAP: Challenge-handshake authentication protocol that transmits encrypted password. Displays the host name, the IPv4 address, or the IPv6 address of the RADIUS server. Displays asterisks (*) to mask the RADIUS secret key used for the PAP or CHAP authentication. Displays the identifier for the RADIUS server to find SVP. Displays the port number of the RADIUS server. Displays the number of seconds before connection to the RADIUS server times out. Displays the retry times when the connection to the RADIUS server fails. Displays the host name, the IPv4 address, or the IPv6 address of the secondary RADIUS server. Displays the port number of the secondary RADIUS server. Displays the LDAP protocol to use. Displays whether to search for the LDAP server using the information registered in the SRV records in the DNS server. Enable: Performs the search using information registered in the SRV records in the DNS server. Disable: Performs the search using the host name and the port number. Displays the host name, the IPv4 address, or the IPv6 address of the LDAP server. Displays the port number of the LDAP server. Displays the domain name of the LDAP server. Displays the base DN to search for users to authenticate. Displays the search user's domain name. Displays asterisks (*) to mask the password of the user for searching. Displays the number of seconds before connection to the LDAP server times out. Displays the retry interval in seconds when the connection to the LDAP server fails. Displays the retry times when the connection to the LDAP server fails. Displays the Setup Server window. 186 Remote Web Console user management GUI reference

187 Kerberos Properties window To open this window, select Kerberos in the External Authentication window. Kerberos Properties The following table describes the fields and settings used to edit the Kerberos properties. DNS Lookup Realm Name Primary Host Name Primary Port Number Clock Skew Timeout Secondary Host Name Secondary Port Number Displays whether to search for the Kerberos server using the information registered in the SRV records in the DNS server. Enable: Performs the search using information registered in the SRV records in the DNS server. Disable: Performs the search using the host name and the port number. Displays the default realm name. Displays the name of the Kerberos server. Displays the port number of the Kerberos server. Displays the acceptable range of time difference between the SVP and the Kerberos server. Displays the number of seconds before connection to the Kerberos server times out. Displays the name of the secondary Kerberos server. Displays the port number of the secondary Kerberos server. Kerberos Properties window 187

188 External User Group Mapping - Authentication Protocol External User Group Mapping - Primary Port Number External User Group Mapping - Base DN External User Group Mapping - Search User's DN External User Group Mapping - Password External User Group Mapping - Timeout External User Group Mapping - Retry Interval External User Group Mapping - Number of Retries External User Group Mapping - Secondary Port Number Setup Server Displays the LDAP protocol to use. Displays the port number of the LDAP server. Displays the base domain name to search for users to authenticate. Displays the search user's domain name. Displays asterisks (*) to mask the password of the user for searching. Displays the number of seconds before connection to the LDAP server times out. Displays the retry interval in seconds when the connection to the LDAP server fails. Displays the retry times when the connection to the LDAP server fails. Displays the port number of the secondary LDAP server. Displays the Setup Server window. Setup Server for LDAP LDAP Setup Server window To open this window, select LDAP in the Select Authentication Server window. 188 Remote Web Console user management GUI reference

189 Setup Server The following table describes the fields and settings used to edit the server information. Certificate File Name DNS Lookup Authentication Protocol External User Group Mapping Specify a certificate file. Click Browse to find the file. Specify whether to search for the LDAP server using the information registered in the SRV records in the DNS server. Enable: Performs the search using information registered in the SRV records in the DNS server. Disable: Performs the search using the host name and the port number. Specify an LDAP protocol to use. Available protocols are as follows. LDAP over SSL/TLS STARTTLS If you select Enable in DNS Lookup, you cannot select LDAP over SSL/TLS. Specify whether to connect an authentication server to an authorization server. Enable: Connects an authentication server to an authorization server. Disable: Does not connect an authentication server to an authorization server. Setup Server for LDAP 189

190 External User Group Mapping - Host Name External User Group Mapping - Port Number External User Group Mapping - Domain Name External User Group Mapping - User Name Attribute Specify a host name of the LDAP server. ASCII code characters, hyphens (-), and periods (.) can be specified. If you select Enable in DNS Lookup, this item is disabled. Specify a port number of the LDAP server. If you select Enable in DNS Lookup, this item is disabled. Specify a domain name that the LDAP server manages. You can specify ASCII code characters, hyphens (-), and periods (.). Specify an attribute name to identify a user, such as a user ID. You can specify ASCII code characters and the following symbols:! # $ % & ' ( ) * +, -. / : ; < = \ ] ^ _` { } ~ Hierarchical model Specify an attribute name where the value that can identify a user is stored. Flat model Specify an attribute name for a user entry's RDN. External User Group Mapping - Timeout External User Group Mapping - Retry Interval External User Group Mapping - Number of Retries External User Group Mapping - Base DN External User Group Mapping - Search User's DN External User Group Mapping - Password External User Group Mapping - Re-enter Password Secondary Server Secondary Server - Host Name Secondary Server -Port Number Specify the number of seconds before connection to the LDAP server times out. Specify a retry interval in seconds when the connection to the LDAP server fails. Specify retry times when the connection to the LDAP server fails. Displays the base DN to search for users to authenticate. Displays the search user's domain name. Search for a user by specifying his password.search for a user by specifying his password. Specify the same password that is registered in the LDAP server. You can specify ASCII code characters and the following symbols:! # $ % & ' ( ) * + -. \ ^ _ If you specify samaccountname in External User Group Mapping - User Name Attribute, or if you select Enable in External User Group Mapping, this item must be specified. Re-enter the password of the user group you are searching for to confirm your entry. You can specify ASCII code characters and the following symbols:! # $ % & ' ( ) * + -. \ ^ _ If you enter any password in External User Group Mapping - Password, you must specify this item. Specify whether to use a secondary LDAP server. Enable: Uses a secondary LDAP server. Disable: Does not use a secondary LDAP server. If you select Enable in DNS Lookup, this item is disabled. Specify a host name of the secondary LDAP server. You can specify ASCII code characters, hyphens (-), and periods (.). If you select Disable in Secondary Server, this item is disabled. Specify a port number of the secondary LDAP server. 190 Remote Web Console user management GUI reference

191 If you select Disable in Secondary Server, this item is disabled. Test User Name Password Server Configuration Test Server Configuration Test - Result Specify a user name for a server connection test. You can specify ASCII code characters and the following symbols:! # $ % & ' * + -. / ^ _ ` { } ~ Specify a password of the user name for a server connection test. You can specify ASCII code characters and the following symbols:! # $ % & ' ( ) * +, -. / : ; < = \ ] ^ _` { } ~ Click Check to conduct a server connection test for the authentication server and the authorization server based on the specified settings. Displays a result of the server connection test for the authentication server and the authorization server. Confirm window (LDAP Setup Server) Selected Server External Authentication Displays the type of the authentication server. Disable: Does not use any authentication server. Users are authenticated with user information registered in the SVP. LDAP: Users are authenticated with user information registered in the LDAP server. RADIUS: Users are authenticated with user information registered in the RADIUS server. Kerberos: Users are authenticated with user information registered in the Kerberos server. Setup Server for LDAP 191

192 Setup Server Certificate File Name DNS Lookup Authentication Protocol External User Group Mapping Primary Host Name Primary Port Number Domain Name User Name Attribute Base DN Search User's DN Password Timeout Retry Interval Number of Retries Secondary Host name Secondary Port Number Displays the certificate file. Displays whether to search for the LDAP server using the information registered in the SRV records in the DNS server. Enable: Performs the search using information registered in the SRV records in the DNS server. Disable: Performs the search using the host name and the port number. Displays the LDAP protocol. Displays whether to connect an authentication server to an authorization server. Enable: Connects an authentication server to an authorization server. Disable: Does not connect an authentication server to an authorization server. Displays the host name of the LDAP server. Displays the port number of the LDAP server. Displays the domain name that the LDAP server manages. Displays the attribute name to identify a user. Displays the base DN for searching for users to authenticate. Displays the DN of a user for searching. Displays asterisks (*) to mask the password of the user for searching. Displays the number of seconds before connection to the LDAP server times out. Displays the retry interval in seconds when the connection to the LDAP server fails. Displays the retry times when the connection to the LDAP server fails. Displays the host name of the secondary LDAP server. Displays the port number of the secondary LDAP server. Setup Server for RADIUS RADIUS Setup Server window To open this window, select RADIUS in the Select Authentication Server window. 192 Remote Web Console user management GUI reference

193 Setting RADIUS information The following table describes the fields and settings used to edit server RADIUS information. Authentication Protocol Host Name Secret Re-enter Secret NAS Address Specify a RADIUS protocol to use. PAP: Password authentication protocol that transmits plaintext user ID and password. CHAP: Challenge-handshake authentication protocol that transmits encrypted password. Specify a name of the RADIUS server. You can specify ASCII code characters, hyphens (-), and periods (.). Specify a RADIUS secret key used for the PAP authentication or the CHAP authentication. You can specify ASCII code characters and the following symbols:! # $ % & ' ( ) * + -. \ ^ _ Re-enter the RADIUS secret key to confirm your entry. You can specify ASCII code characters and the following symbols:! # $ % & ' ( ) * + -. \ ^ _ Specify an identifier for the RADIUS server to find SVP. To specify a host name, select Identifier and enter the host name. You can specify ASCII code characters and the following symbols: Setup Server for RADIUS 193

194 ! " # $ % & ' ( ) * +, -. / ; : < > [ \ ] ^ _ ( } ~ To specify an IPv4 address, select IPv4 and enter 4 numbers (0-255). For example: XXX.XXX.XXX.XXX (X indicates a digit) Specify only numbers. Do not specify any periods. To specify an IPv6 address, select IPv6 and enter 8 hexadecimal numbers (0-FFFF). For example: YYYY:YYYY:YYYY:YYYY:YYYY:YYYY:YYYY:YYYY (Y indicates a hexadecimal digit) Enter 0 to omit a segment. Port Number Timeout Number of Retries Secondary Server Secondary Server - Host Name Secondary Server - Port Number External User Group Mapping External User Group Mapping - Certificate File Name External User Group Mapping - DNS Lookup External User Group Mapping - Authentication Protocol External User Group Mapping - Host Name Specify a port number of the RADIUS server. Specify the number of seconds before connection to the RADIUS server times out. Specify the retry times when the connection to the RADIUS server fails. Specify whether to use a secondary RADIUS server and a secondary LDAP server. Enable: Uses secondary servers. Disable: Does not use secondary servers. Specify a name of the secondary RADIUS server. You can specify ASCII code characters, hyphens (-), and periods (.). If you select Disable in Secondary Server, this item is disabled. Specify a port number of the secondary RADIUS server. If you select Disable in Secondary Server, this item is disabled. Specify whether to connect an authentication server to an authorization server. Enable: Connects an authentication server to an authorization server. Disable: Does not connect an authentication server to an authorization server. Specify a certificate file. Click Browse to find the file. If you select Disable in External User Group Mapping, this item is disabled. Specify whether to search for the LDAP server using the information registered in the SRV records in the DNS server. Enable: Performs the search using information registered in the SRV records in the DNS server. Disable: Performs the search using the host name and the port number. If you select Disable in External User Group Mapping, this item is disabled. Specify an LDAP protocol to use. Available protocols are as follows. LDAP over SSL/TLS STARTTLS If you select Enable in DNS Lookup, you cannot select LDAP over SSL/TLS. If you select Disable in External User Group Mapping, this item is disabled. Specify a host name of the LDAP server. You can specify ASCII code characters, hyphens (-), and periods (.). If you select Enable in DNS Lookup, or if you select Disable in External User Group Mapping, this item is disabled. 194 Remote Web Console user management GUI reference

195 External User Group Mapping - Port Number External User Group Mapping - Domain Name External User Group Mapping - Base DN Specify a port number of the LDAP server. If you select Enable in DNS Lookup, or if you select Disable in External User Group Mapping, this item is disabled. Specify a domain name of the LDAP server. You can specify ASCII code characters, hyphens (-), and periods (.). If you select Disable in External User Group Mapping, this item is disabled. Specify a base DN to search for users to authenticate. Available characters: Alphanumeric characters (ASCII characters) and all symbols. Hierarchical model Specify a DN of hierarchy that includes all the targeted users for searching. External User Group Mapping - Search User's DN Flat model Specify a DN of hierarchy that is one level up of the targeted user for searching. You can enter alphanumeric characters and all symbols. Note, however, that when you enter symbols like the following, you need to use a backslash to escape for each symbol: + ;, < = > \ / " In some cases, you may need to use a backslash and an ASCII character to escape. \ -> \5c (hexadecimal) / -> \2f (hexadecimal) "-> \22 (hexadecimal) Search for a user by specifying a DN Available characters: Alphanumeric characters (ASCII characters) and all symbols. If you specify samaccountname in External User Group Mapping - User Name Attribute, or if you select Enable in External User Group Mapping, this item must be specified. You can enter alphanumeric characters and all symbols. Note, however, that when you enter symbols like the following, you need to use a backslash to escape for each symbol: + ;, < = > \ / " In some cases, you may need to use a backslash and an ASCII character to escape. \ -> \5c (hexadecimal) / -> \2f (hexadecimal) "-> \22 (hexadecimal) External User Group Mapping - Password External User Group Mapping - Re-enter Password External User Group Mapping - Timeout External User Group Mapping - Retry Interval Search for a user by specifying his password. Specify the same password that is registered in the LDAP server. You can specify ASCII code characters and the following symbols:! # $ % & ' ( ) * + -. \ ^ _ If you select Disable in External User Group Mapping, this item is disabled. Re-enter the password of the user you are searching for to confirm your entry. You can specify ASCII code characters and the following symbols:! # $ % & ' ( ) * + -. \ ^ _ If you enter any password in External User Group Mapping - Password, you must specify this item. If you select Disable in External User Group Mapping, this item is disabled. Specify the number of seconds before connection to the LDAP server times out. If you select Disable in External User Group Mapping, this item is disabled. Specify a retry interval in seconds when the connection to the LDAP server fails. If you select Disable in External User Group Mapping, this item is disabled. Setup Server for RADIUS 195

196 External User Group Mapping - Number of Retries Test User Name Password Server Configuration Test Server Configuration Test - Result Specify retry times when the connection to the LDAP server fails. If you select Disable in External User Group Mapping, this item is disabled. Specify a user name for a server connection test. You can specify ASCII code characters and the following symbols:! # $ % & ' * + -. / ^ _ ` { } ~ Specify a password of the user name for a server connection test. You can specify ASCII code characters and the following symbols:! # $ % & ' ( ) * +, -. / : ; < = \ ] ^ _` { } ~ Click Check to conduct a server connection test for the authentication server and the authorization server based on the specified settings. Displays a result of the server connection test for the authentication server and the authorization server. Confirm window (RADIUS Setup Server) Selected Server The following table describes the fields and settings in the Server section of the Confirm window for (RADIUS Setup Server) window. External Authentication Displays the type of the authentication server. Disable: Does not use any authentication server. Users are authenticated with user information registered in the SVP. LDAP: Users are authenticated with user information registered in the LDAP server. 196 Remote Web Console user management GUI reference

197 RADIUS: Users are authenticated with user information registered in the RADIUS server. Kerberos: Users are authenticated with user information registered in the Kerberos server. Setup Server The following table describes the fields and settings in the Setup Server section of the Confirm window for (RADIUS Setup Server) window. Authentication Protocol Primary Host Name Secret NAS Address Primary Port Number Timeout Number of Retries Secondary Host Name Secondary Port Number External User Group Mapping - Certificate File Name External User Group Mapping - Authentication Protocol External User Group Mapping - DNS Lookup External User Group Mapping - Host Name External User Group Mapping - Port Number External User Group Mapping - Domain Name External User Group Mapping - Base DN External User Group Mapping - Search User's DN External User Group Mapping - Password Displays the RADIUS protocol to use. PAP: Password authentication protocol that transmits plaintext user ID and password. CHAP: Challenge-handshake authentication protocol that transmits encrypted password. Displays the name of the RADIUS server. Displays asterisks (*) to mask the RADIUS secret key used for the PAP authentication or the CHAP authentication. Displays the identifier for the RADIUS server to find SVP. Displays the port number of the RADIUS server. Displays the number of seconds before connection to the RADIUS server times out. Displays the retry times when the connection to the RADIUS server fails. Displays the name of the secondary RADIUS server. Displays the port number of the secondary RADIUS server. Displays the certificate file. Displays the LDAP protocol to use. Displays whether to search for the LDAP server using the information registered in the SRV records in the DNS server. Enable: Performs the search using information registered in the SRV records in the DNS server. Disable: Performs the search using the host name and the port number. Displays the LDAP server host name Displays the LDAP server port number Displays the LDAP server domain name. Displays the base DN to search for users to authenticate. Displays the user s DN for searching. Displays asterisks (*) to mask the password of the user for searching. Setup Server for RADIUS 197

198 External User Group Mapping - Timeout External User Group Mapping - Retry Interval External User Group Mapping - Number of Retries Displays the number of seconds before connection to the LDAP server times out. Displays the retry interval in seconds when the connection to the LDAP server fails. Displays the retry times when the connection to the LDAP server fails. Setup Server for Kerberos Kerberos Setup Server window To open this window, select Kerberos in the Select Authentication Server window. 198 Remote Web Console user management GUI reference

199 Kerberos Settings The following table describes the fields and settings in the Setup Server section of Kerberos window. DNS Lookup Realm Name Host Name Port Number Clock Skew Timeout Secondary Server Secondary Server - Host Name Secondary Server - Port Number External User Group Mapping External User Group Mapping - Certificate File Name External User Group Mapping - Authentication Protocol External User Group Mapping - Primary Port Number Specify whether to search for the Kerberos server using the information registered in the SRV records in the DNS server. Enable: Performs the search using information registered in the SRV records in the DNS server. Disable: Performs the search using the host name and the port number. Specify a default realm name. You can specify ASCII code characters and hyphens (-). Specify a host name of the Kerberos server. You can specify ASCII code characters, hyphens (-), and periods (.). If you select Enable in DNS Lookup, this item is disabled. Specify a port number of the Kerberos server. If you select Enable in DNS Lookup, this item is disabled. Specify an acceptable range of time difference between the SVP and the Kerberos server. Specify the number of seconds before connection to the Kerberos server times out. Specify whether to use a secondary Kerberos server. Enable: Uses the secondary server. Disable: Does not use the secondary server. If you specify Enable in DNS Lookup, this item is disabled. Specify a name of the secondary Kerberos server. You can specify ASCII code characters, hyphens (-), and periods (.). If you select Enable in DNS Lookup, or if you select Disable in Secondary Server, this item is disabled. Specify a port number of the secondary Kerberos server. If you select Enable in DNS Lookup, or if you select Disable in Secondary Server, this item is disabled. Specify whether to connect an authentication server to an authorization server. Enable: Connects an authentication server to an authorization server. Disable: Does not connect an authentication server to an authorization server. Specify a certificate file. Click Browse to find the file. If you select Disable in External User Group Mapping, this item is disabled. Specify an LDAP protocol to use. Available protocols are: LDAP over SSL/TLS STARTTLS If you select Enable in DNS Lookup, you cannot select LDAP over SSL/TLS. If you select Disable in External User Group Mapping, this item is disabled. Specify a port number of the LDAP server. If you select Enable in DNS Lookup, or if you select Disable in External User Group Mapping, this item is disabled. Setup Server for Kerberos 199

200 External User Group Mapping - Secondary Port Number External User Group Mapping - Base DN Specify a port number of the secondary LDAP server. If you select Disable in Secondary Server, Enable in DNS Lookup, or External User Group Mapping fields, this item is disabled. Specify a base DN to search for users to authenticate. Available characters: Alphanumeric characters (ASCII characters) and all symbols. Hierarchical model Specify a DN of hierarchy that includes all the targetedusers for searching. External User Group Mapping - Search User's DN Flat model Specify a DN of hierarchy that is one level up of thetargeted user for searching. You can enter alphanumeric characters and all symbols. Note, however, that when you enter symbols like the following, you need to use a backslash to escape for each symbol: + ;, < = > \ / " In some cases, you may need to use a backslash and an ASCII character to escape. \ -> \5c (hexadecimal) / -> \2f (hexadecimal) "-> \22 (hexadecimal) Search for a user by specifying a DN Available characters: Alphanumeric characters (ASCII characters) and all symbols. If you specify samaccountname in External User Group Mapping - User Name Attribute, or if you select Enable in External User Group Mapping, this item must be specified. If you select Disable in External User Group Mapping, this item is disabled. You can enter alphanumeric characters and all symbols. Note, however, that when you enter symbols like the following, you need to use a backslash to escape for each symbol: + ;, < = > \ / " In some cases, you may need to use a backslash and an ASCII character to escape. \ -> \5c (hexadecimal) / -> \2f (hexadecimal) "-> \22 (hexadecimal) External User Group Mapping - Password External User Group Mapping - Re-enter Password External User Group Mapping - Timeout External User Group Mapping - Retry Interval Search for a user by specifying his password. Specify the same password that is registered in the LDAP server. You can specify ASCII code characters and the following symbols:! # $ % & ' ( ) * + -. \ ^ _ If you select Disable in External User Group Mapping, this item is disabled. Re-enter the password of the user you are searching for to confirm your entry. You can specify ASCII code characters and the following symbols:! # $ % & ' ( ) * + -. \ ^ _ If you enter any password in External User Group Mapping - Password, you must specify this item. If you select Disable in External User Group Mapping, this item is disabled. Specify the number of seconds before connection to the LDAP server times out. If you select Disable in External User Group Mapping, this item is disabled. Specify a retry interval in seconds when the connection to the LDAP server fails. If you select Disable in External User Group Mapping, this item is disabled. 200 Remote Web Console user management GUI reference

201 External User Group Mapping - Number of Retries Test User Name Password Server Configuration Test Server Configuration Test - Result Specify retry times when the connection to the LDAP server fails. If you select Disable in External User Group Mapping, this item is disabled. Specify a user name for a server connection test. You can specify ASCII code characters and the following symbols:! # $ % & ' * + -. / ^ _ ` { } ~ Specify a password of the user name for a server connection test. You can specify ASCII code characters and the following symbols:! # $ % & ' ( ) * +, -. / : ; < = \ ] ^ _` { } ~ Click Check to conduct a server connection test for the authentication server and the authorization server based on the specified settings. Displays a result of the server connection test for the authentication server and the authorization server. Confirm window (Kerberos Setup Server) Selected Server The following table describes the fields and settings in the Server section of Confirm window for (Kerberos Setup Server) window. External Authentication Displays the type of the authentication server. Disable: Does not use any authentication server. Users are authenticated with user information registered in the SVP. LDAP: Users are authenticated with user information registered in the LDAP server. Setup Server for Kerberos 201

202 RADIUS: Users are authenticated with user information registered in the RADIUS server. Kerberos: Users are authenticated with user information registered in the Kerberos server. Setup Server The following table describes the fields and settings in the Setup Server section of Confirm window for (Kerberos Setup Server) window. DNS Lookup Realm Name Primary Host Name Primary Port Number Clock Skew Timeout Secondary Host Name Secondary Port Number External User Group Mapping - Certificate File Name External User Group Mapping - Authentication Protocol External User Group Mapping - Primary Port Number External User Group Mapping - Base DN External User Group Mapping - Search User's DN External User Group Mapping - Password External User Group Mapping - Timeout External User Group Mapping - Retry Interval Displays whether to search for the Kerberos server using the information registered in the SRV records in the DNS server. Enable: Performs the search using information registered in the SRV records in the DNS server. Disable: Performs the search using the host name and the port number. Displayed the default realm name. Displays the name of the Kerberos server. Displays the port number of the Kerberos server. Displays the acceptable range of time difference between the SVP and the Kerberos server. Displays the number of seconds before connection to the Kerberos server times out. Displays the name of the secondary Kerberos server. Displays the port number of the secondary Kerberos server. Displays the certificate file. Displays the LDAP protocol to use. Displays the port number of the LDAP server. Displays the base DN to search for users to authenticate. Displays the search user's domain name. Displays asterisks (*) to mask the password of the user for searching. Displays the number of seconds before connection to the LDAP server times out. Displays the retry interval in seconds when the connection to the LDAP server fails. 202 Remote Web Console user management GUI reference

203 External User Group Mapping - Number of Retries External User Group Mapping - Secondary Port Number Displays the retry times when the connection to the LDAP server fails. Displays the port number of the secondary LDAP server. Setup Server for Kerberos 203

204 F Remote Web Console licenses GUI reference This appendix describes the Remote Web Console windows that you use to view and manage the licenses for the software applications on HP XP7 Storage systems License Keys window Use the License Keys window to install and uninstall license keys. Summary The following table describes the fields and settings in the Summary section of the License Keys window. Mounted capacity Number of License Keys Displays the capacity of internal and external volumes created in the storage system. When you install the software whose license capacity type is Mounted Capacity, install more license capacity than the mounted capacity to keep the software in Installed status. Values are rounded up to the second decimal place. Numbers of license keys are displayed for each status. License Keys The following table describes the fields and settings in the License Keys section of the License Keys window. Software product name Status Name of the software application The current status of the software Installed: The software is available. Installed (Disabled): Installation is complete, but the license is set to Disabled. This status might appear if an error occurs after you install software. Resolve the error and enable the license. This status also appears when the license key of this software is installed but the license key of the prerequisite software has expired. Not Installed: The software is not installed. Not Enough License: Installation is complete, but the license capacity is insufficient. Not Enough License might remain displayed when the licensed capacity exceeds the mounted capacity after you reduce the number of LDEVs, or when the licensed capacity exceeds the used capacity after you delete pairs or pool volumes. In 204 Remote Web Console licenses GUI reference

205 these cases, you can refresh the license status by selecting Update License Status and then installing the software. Grace Period: The licensed capacity is insufficient because LDEVs are added, or copy pairs are created, or pool volumes are added. The license expires in 30 days. Please purchase the licenses before the license key expires. Grace Period might remain displayed when the licensed capacity exceeds the mounted capacity after you reduce the number of LDEVs, or when the licensed capacity exceeds the used capacity after you delete pairs or pool volumes. In these cases, you can refresh the license status by selecting Update License Status and then installing the software. Expired: The term has already expired for the temporary key. When the status is Expired, you cannot re-install the temporary key. Key Type The license key type: permanent term temporary emergency meter This field is blank if no license key is installed. Licensed Capacity Permitted (TB): Displays the permitted volume capacity for this software in integers. If no upper limit value is set for the capacity, "Unlimited" displays. This field is blank if no license is installed. Used (TB): Capacity of the volumes used by the software. Up to the second decimal place is displayed. The third decimal place is rounded up. If the license capacity type is other than Used, a hyphen (-) displays. If no license is installed, a blank displays. Licensed capacity displayed is found from calculations based on the following: 1k byte = 1,024 bytes, 1M byte = 1,024 kilobytes, 1G byte = 1,024 megabytes, 1T byte = 1,024 gigabytes Remaining Meter License (TB): If the license key type is not meter, a hyphen (-) displays. If the license is not installed, a blank displays. Term (days) Install Licenses Uninstall Licenses Enable Disable 1 Update License Status 1 Export 1 The number of days remaining before the expiration of a temporary key, an emergency key, or a term key. After the temporary key has expired, the column shows the number of days that remain before you can reinstall the temporary key. A hyphen (-) displays if the If there is no limit on validity, a hyphen (-) displays. This field is blank if no license is installed. Opens the Install Licenses window Opens the Uninstall Licenses window Opens the Enable Licenses window Opens the Disable Licenses window Opens the Update License Status window Displays the window for outputting table information Note 1. Appears when you click More Actions. Install Licenses wizard This topic describes the Install Licenses wizard. Install Licenses wizard 205

206 Install Licenses window License Key License Key Select whether to enter a key code or specify a license key file. Key Code : Enter a key code to install the software. Use the license key code for the software to be installed. File :Specify a license key file to install software. Click Browse and specify the license key file. Add button Adds the specified license key to the Selected License Keys table, shown below). Selected License Keys table Software product name Status Name of the software application The current status of the software Installed: The software is available. Installed (Disabled): Installation is complete, but the license is set to Disabled. This status might appear if an error occurs after you install software. Resolve the error and enable the license. This status also appears when the license key of this software is installed but the license key of the prerequisite software has expired. 206 Remote Web Console licenses GUI reference

207 Not Installed: The software is not installed. Not Enough License: Installation is complete, but the license capacity is insufficient. Not Enough License might remain displayed when the licensed capacity exceeds the mounted capacity after you reduce the number of LDEVs, or when the licensed capacity exceeds the used capacity after you delete pairs or pool volumes. In these cases, you can refresh the license status by selecting Update License Status and then installing the software. Grace Period: The licensed capacity is insufficient because LDEVs are added, or copy pairs are created, or pool volumes are added. The license expires in 30 days. Please purchase the licenses before the license key expires. Grace Period might remain displayed when the licensed capacity exceeds the mounted capacity after you reduce the number of LDEVs, or when the licensed capacity exceeds the used capacity after you delete pairs or pool volumes. In these cases, you can refresh the license status by selecting Update License Status and then installing the software. Expired: The term has already expired for the temporary key. When the status is Expired, you cannot re-install the temporary key. Key Type The license key type: permanent term temporary emergency meter This field is blank if no license key is installed. Licensed Capacity Permitted (TB): The window displays the permitted volume capacity for this software in integers. If no upper limit value is set for the capacity, "Unlimited" displays. This field is blank if no license is installed. Used (TB): This is the capacity of the volumes used by the software. Up to the second decimal place is displayed. The third decimal place is rounded up. If the license capacity type is other than Used, a hyphen (-) displays. If no license is installed, a blank displays. Licensed capacity displayed is found from calculations based on the following: 1k byte = 1,024 bytes, 1M byte = 1,024 kilobytes, 1G byte = 1,024 megabytes, 1T byte = 1,024 gigabytes Remaining Meter License (TB): If the license key type is not meter, a hyphen (-) displays. If the license is not installed, a blank displays. Term (days) Enable Disable Clear All The number of days remaining before the expiration of a temporary key, an emergency key, or a term key. After the temporary key has expired, the column shows the number of days that remain before you can reinstall the temporary key. A hyphen (-) displays if the If there is no limit on validity, a hyphen (-) displays. This field is blank if no license is installed. Installs license keys in Enabled status. You can select more than one software product. Installs license keys in Disabled status. You can select more than one software product. Deletes all license keys from the Selected License Keys table. Install Licenses wizard 207

208 Confirm window (Install Licenses) This topic describes the Confirm window (Install Licenses) window. Software name Status Key Type Name of the software application Displays the software's installation status. See the Status item in the of the Selected License Keys table in the section Install Licenses window (page 206). The license key type: permanent term temporary emergency meter This field is blank if no license key is installed. Licensed Capacity Permitted (TB): The window displays the permitted volume capacity for this software in integers. If no upper limit value is set for the capacity, "Unlimited" displays. This field is blank if no license is installed. Used (TB): This is the capacity of the volumes used by the software. Up to the second decimal place is displayed. The third decimal place is rounded up. If the license capacity type is other than Used, a hyphen (-) displays. If no license is installed, a blank displays. Licensed capacity displayed is found from calculations based on the following: 1k byte = 1,024 bytes, 1M byte = 1,024 kilobytes, 1G byte = 1,024 megabytes, 1T byte = 1,024 gigabytes Remaining Meter License (TB): If the license key type is not meter, a hyphen (-) displays. If the license is not installed, a blank displays. Term (days) The number of days remaining before the expiration of a temporary key, an emergency key, or a term key. After the temporary key has expired, the column shows the number of days that remain before you can reinstall the temporary key. A hyphen (-) displays if the If there is no limit on validity, a hyphen (-) displays. This field is blank if no license is installed. 208 Remote Web Console licenses GUI reference

209 Enable Licenses window This section describes the Enable Licenses window. The following table describes the fields and settings in the Enable Licenses window. Software product name Status Key Type Name of the software application Displays the software's installation status. See the Status item in the of the Selected License Keys table in the section Install Licenses window (page 206). The license key type: permanent term temporary emergency meter This field is blank if no license key is installed. Licensed Capacity Permitted (TB): The window displays the permitted volume capacity for this software in integers. If no upper limit value is set for the capacity, "Unlimited" displays. This field is blank if no license is installed. Used (TB): This is the capacity of the volumes used by the software. Up to the second decimal place is displayed. The third decimal place is rounded up. If the license capacity type is other than Used, a hyphen (-) displays. If no license is installed, a blank displays. Licensed capacity displayed is found from calculations based on the following: 1k byte = 1,024 bytes, 1M byte = 1,024 kilobytes, 1G byte = 1,024 megabytes, 1T byte = 1,024 gigabytes Remaining Meter License (TB): If the license key type is not meter, a hyphen (-) displays. If the license is not installed, a blank displays. Term (days) The number of days remaining before the expiration of a temporary key, an emergency key, or a term key. After the temporary key has expired, the column shows the number of days that remain before you can reinstall the temporary key. A hyphen (-) displays if the If there is no limit on validity, a hyphen (-) displays. This field is blank if no license is installed. Enable Licenses window 209

210 Disable Licenses window This section describes the Disable Licenses window. The following table describes the fields and settings in the Disable Licenses window. Software product name Status Key Type Name of the software application Displays the software's installation status. See the Status item in the of the Selected License Keys table in the section Install Licenses window (page 206). The license key type: permanent term temporary emergency meter This field is blank if no license key is installed. Licensed Capacity Permitted (TB): The window displays the permitted volume capacity for this software in integers. If no upper limit value is set for the capacity, "Unlimited" displays. This field is blank if no license is installed. Used (TB): This is the capacity of the volumes used by the software. Up to the second decimal place is displayed. The third decimal place is rounded up. If the license capacity type is other than Used, a hyphen (-) displays. If no license is installed, a blank displays. Licensed capacity displayed is found from calculations based on the following: 1k byte = 1,024 bytes, 1M byte = 1,024 kilobytes, 1G byte = 1,024 megabytes, 1T byte = 1,024 gigabytes Remaining Meter License (TB): If the license key type is not meter, a hyphen (-) displays. If the license is not installed, a blank displays. Term (days) The number of days remaining before the expiration of a temporary key, an emergency key, or a term key. After the temporary key has expired, the column shows the number of days that remain before you can reinstall the temporary key. A hyphen (-) displays if the If there is no limit on validity, a hyphen (-) displays. This field is blank if no license is installed. Remove Licenses window This topic describes the Remove Licenses window. 210 Remote Web Console licenses GUI reference

211 Software product name Status Key Type Name of the software application Displays the software's installation status. See the Status item in the of the Selected License Keys table in the section Install Licenses window (page 206). The license key type: permanent term temporary emergency meter This field is blank if no license key is installed. Licensed Capacity Permitted (TB): The window displays the permitted volume capacity for this software in integers. If no upper limit value is set for the capacity, "Unlimited" displays. This field is blank if no license is installed. Used (TB): This is the capacity of the volumes used by the software. Up to the second decimal place is displayed. The third decimal place is rounded up. If the license capacity type is other than Used, a hyphen (-) displays. If no license is installed, a blank displays. Licensed capacity displayed is found from calculations based on the following: 1k byte = 1,024 bytes, 1M byte = 1,024 kilobytes, 1G byte = 1,024 megabytes, 1T byte = 1,024 gigabytes Remaining Meter License (TB): If the license key type is not meter, a hyphen (-) displays. If the license is not installed, a blank displays. Term (days) The number of days remaining before the expiration of a temporary key, an emergency key, or a term key. After the temporary key has expired, the column shows the number of days that remain before you can reinstall the temporary key. A hyphen (-) displays if the If there is no limit on validity, a hyphen (-) displays. This field is blank if no license is installed. Update License Status window This topic describes the Update License Status window. Update License Status window 211

212 The following table describes the fields and settings in the Remove Licenses window. Software product name Status Key Type Name of the software application Displays the software's installation status. See the Status item in the of the Selected License Keys table in the section Install Licenses window (page 206). The license key type: permanent term temporary emergency meter This field is blank if no license key is installed. Licensed Capacity Permitted (TB): The window displays the permitted volume capacity for this software in integers. If no upper limit value is set for the capacity, "Unlimited" displays. This field is blank if no license is installed. Used (TB): This is the capacity of the volumes used by the software. Up to the second decimal place is displayed. The third decimal place is rounded up. If the license capacity type is other than Used, a hyphen (-) displays. If no license is installed, a blank displays. Licensed capacity displayed is found from calculations based on the following: 1k byte = 1,024 bytes, 1M byte = 1,024 kilobytes, 1G byte = 1,024 megabytes, 1T byte = 1,024 gigabytes Remaining Meter License (TB): If the license key type is not meter, a hyphen (-) displays. If the license is not installed, a blank displays. Term (days) The number of days remaining before the expiration of a temporary key, an emergency key, or a term key. After the temporary key has expired, the column shows the number of days that remain before you can reinstall the temporary key. A hyphen (-) displays if the If there is no limit on validity, a hyphen (-) displays. This field is blank if no license is installed. 212 Remote Web Console licenses GUI reference

213 G Configuring storage systems GUI reference This appendix describes the Remote Web Console windows and wizards that you use to configure storage systems. Login Message window The following table describes the fields and settings in the Login Message window. Login Message Enter a login message. You can use up to 2,048 alphanumeric characters (ASCII codes) and symbols. Edit Storage System wizard Edit Storage System window Login Message window 213

214 The following table describes the fields and settings in the Edit Storage System window. Storage System Name Contact Location Device name of the storage system. Contact information such as personnel and telephone number where you can inquire about the storage system. Location of the connected storage system. Related Topics Setting storage system information (page 68) Confirm window (Edit Storage System) The following table describes the fields and settings in the Confirm window (Edit Storage System). Storage System Name Contact Location Device name of the storage system. Contact information such as personnel and telephone number where you can inquire about the storage system. Location of the connected storage system. Edit Alert Settings wizard This section describes the Edit Alert Settings wizard. 214 Configuring storage systems GUI reference

215 Edit Alert Settings window The window for the wizard contains three tabs: Syslog tab SNMP tab tab Notification Alert Select the destination of the alert notification. Host Report: Reports alerts only to the host(s) for which SIM report setting is made. All: Reports alerts to all hosts. Alert destinations are common to Syslog, SNMP, and . Syslog tab The following table describes the fields and settings in the Syslog tab. Transfer Protocol Primary Server Select the protocol for Syslog transfer. New Syslog Protocol (TLS1.2/RFC5424) Old Syslog Protocol (UDP/RFC3164) Select whether or not to use the Syslog Server. Enable: Reports SIM to the Syslog Server through Syslog. Does not report SIM to the Syslog Server through Syslog. Edit Alert Settings wizard 215

216 Primary Server - Server Setting Enter the IP address of the server that you want to set as the Syslog Server. You cannot set an address with all 0s. To set an IPv4 address, select IPv4, and enter four numbers within the range of 0 to 255. Example: XXX.XXX.XXX.XXX (X indicates a numeral) To set an IPv6 address, select IPv6, and enter eight hexadecimal alphanumeric characters within the range of 0 to FFFF. You can also use an abbreviated-format IPv6 address. Example: YYYY:YYYY:YYYY:YYYY:YYYY:YYYY:YYYY:YYYY (Y indicates a hexadecimal digit) Use this field only when you select Enable in Primary Server. Primary Server - Port Number Primary Server - Client Certificate File Name Primary Server - Password Primary Server - Root Certificate File Name Secondary Server Secondary Server - Server Setting Enter the port number used by the Syslog Server. Use this field only when you selected Enable in Primary Server. Specify a certificate file. Click Browse and specify the certificate file. Use this field only when you select New Syslog Protocol (TLS1.2/RFC5424) in Transfer Protocol and selected Enable in Primary Server. Enter a password for the client certificate. You can use a password of up to 128 characters. Usable characters are: Alphanumeric characters (ASCII codes) and symbols (! # $ % & ' ( ) * +, -. / : ; < = [ \ ] ^ _ ` { } ~) Use this field only when you specified Client Certificate File Name. Specify a certificate file. Click Browse and specify the certificate file. Use this field only when you select New Syslog Protocol (TLS1.2/RFC5424) in Transfer Protocol and selected Enable in Primary Server. Select whether or not to use an alternate server for the Syslog Server. Enable: Reports SIM to the alternate server for the Syslog Server through Syslog. Disable: Does not report SIM to the alternate server for the Syslog Server through Syslog. Enter the IP address of the server that you want to set as the Syslog Server. You cannot set an address with all 0s. To set an IPv4 address, select IPv4, and enter four numbers within the range of 0 to 255. Example: XXX.XXX.XXX.XXX (X indicates a numeral) To set an IPv6 address, select IPv6, and enter eight hexadecimal alphanumeric characters within the range of 0 to FFFF. You can also use an abbreviated-format IPv6 address. Example: YYYY:YYYY:YYYY:YYYY:YYYY:YYYY:YYYY:YYYY (Y indicates a hexadecimal digit)use this field only when you select Enable in Secondary Server. Secondary Server - Port Number Secondary Server - Client Certificate File Name Secondary Server - Password Secondary Server - Root Certificate File Name Location Identification Name Specify a certificate file. Click Browse and specify the certificate file. Use this field only when you select New Syslog Protocol (TLS1.2/RFC5424) in Transfer Protocol and select Enable in Secondary Server. Specify a certificate file. Click Browse and specify the certificate file.use this field only when you select New Syslog Protocol (TLS1.2/RFC5424) in Transfer Protocol and selected Enable in Secondary Server. Enter a password for the client certificate. You can use a password of up to 128 characters.usable characters are: Alphanumeric characters (ASCII codes) and symbols (! # $ % & ' ( ) * +, -. / : ; < = [ \ ] ^ _ ` { } ~) Use this field only when you specify Client Certificate File Name. Specify a certificate file. Click Browse and specify the certificate file. Use this field only when you select New Syslog Protocol (TLS1.2/RFC5424) in Transfer Protocol and selected Enable in Secondary Server. Enter a name for identification of the storage system for which SIM is transferred to the Syslog Server. You can use a name of up to 32 characters. Usable characters are: 216 Configuring storage systems GUI reference

217 Alphanumeric characters (ASCII codes) and symbols (! # $ % & ' ( ) * +, -. / : ; < = [ \ ] ^ _ ` { } ~) Spaces are not allowed. Timeout Retry Interval Number of Retries Send Test Message to Syslog Server Reset settings Enter a value as the time before the timeout for connection to the Syslog Server is detected. The default is 10. Use this field only when you selected New Syslog Protocol (TLS1.2/RFC5424) in Transfer Protocol. Enter a value between 1 and 60 (seconds) as the retry interval when communication with the Syslog Server fails. The default is 1.Use this field only when you selected New Syslog Protocol (TLS1.2/RFC5424) in Transfer Protocol. Enter a value between 1 and 50 as the number of retries when communication with the Syslog Server fails. The default is 3.Use this field only when you selected New Syslog Protocol (TLS1.2/RFC5424) in Transfer Protocol. Reports SIM for test with Syslog. Cancels the changes within the tab SNMP tab Edit Alert Settings wizard 217

218 The following table describes the fields and settings in the SNMP tab. Extension SNMP Select whether or not to use the SNMP Agent. Enable: Reports SIM through SNMP trap Disable: Does not report SIM through SNMP trap SNMP Trap Settings Community: Displays the community name for which SNMP trap is reported. IP Address: Displays the IP address of the SNMP Manager for which an SNMP trap is set. SNMP Trap - Add: Adds an SNMP trap. The Add SNMP Trap window opens. SNMP Trap - Change: Changes the IP address and community name for the SNMP Manager for which SNMP trap is set. The Change SNMP Traps window opens. SNMP Trap - Delete: Deletes the selected SNMP trap. You can select more than one SNMP trap. Community - Add: Add a community. The Add Community window opens. Community - Change: Changes a community name. The Change Community window opens. Community - Delete: Deletes the selected community. You can select more than one community. SNMP Manager IP Address: Displays the IP address of the SNMP Manager. Add: Adds an SNMP Manager. The Add SNMP Manager window displays. Delete: Deletes the selected SNMP Manager. You can select more than one SNMP Manager. System Group Information - Storage System Name System Group Information - Contact System Group Information - Location Send Test SNMP Trap Reset settings Enter the storage system name. You can enter up to 180 alphanumeric characters (ASCII codes) excluding several symbols (\, / ; : *? < > & % ^). Caution: Make sure to document the information about the storage system because the settings will be cleared when the SVP is replaced. Enter the administrator's name or contact information.you can enter up to 180 alphanumeric characters (ASCII codes) excluding several symbols (\, / ; : *? " < > & % ^). Specify a location of the storage system. You can enter up to 180 alphanumeric characters (ASCII codes) excluding several symbols (\, / ; : *? " < > & % ^). Reports test trap to communities that are already registered in the storage system. Note: Trap is reported using the content applied previously to the storage system rather than the current settings in the SNMP tab. Before reporting test trap, click Finish to apply the changes to the storage system. Cancels the changes within the tab 218 Configuring storage systems GUI reference

219 tab Mail Notice Settings Select whether or not to report failure information through . Enable: Reports SIM through . Disable: Does not report SIM through . This field is mandatory when you selected Enable in Mail Notice. Mail Address: The address displays. Attribute: Adds addresses. The Add Address window opens. Add: Adds addresses. The Add Address window opens Change: Changes the selected address and attribute. The opens. You can select more than one address. When you select more than one address, you can change only attributes. Delete: Deletes the selected address. You can select more than one address. Mail Address (From) Mail Address (Reply - To) Enter the source address of the for failure information report. You can use a name of up to 255 characters. Usable characters: Alphanumeric characters (ASCII codes) and symbols (! # $ % & ` + - * / ' ^ { } _. ) This field is mandatory when you selected Enable in Mail Notice. Specify the return address. If you specify this address, return from the recipient is transmitted to the address. If you omit this address, return from the recipient is transmitted to Mail Address (From).You can use a name of up to 255 characters.usable characters: Alphanumeric characters (ASCII codes) and symbols (! # $ % & ` + - * / ' ^ { } _. ) Edit Alert Settings wizard 219

220 Mail Server Setting - Server Enter the server information. You cannot set an IP address with all 0s. Identifier: To specify a host name, select Identifier. You can enter a name of up to 63 characters. IPv4: To set an IPv4 address, select IPv4, and enter four numbers within the range of 0 to 255. Example: XXX.XXX.XXX.XXX (X indicates a numeral) IPv6: To set an IPv6 address, select IPv6, and enter eight hexadecimal alphanumeric characters within the range of 0 to FFFF. You can also use an abbreviated-format IPv6 address. Example: YYYY:YYYY:YYYY:YYYY:YYYY:YYYY:YYYY:YYYY (Y indicates a hexadecimal digit)this field is mandatory when you select Enable in Mail Notice. Mail Server Setting - SMTP Authentication Send Test Reset settings Select whether or not to perform SMTP authentication. Enable: Performs SMTP authentication. Disable: Does not perform SMTP authentication. When you select Enable, enter values in Account and Password. You can use a name of up to 255 characters.usable characters are: Alphanumeric characters (ASCII codes) and symbols (! # $ ` + - * ' { } _. ) This field is mandatory when you select Enable in Mail Notice. Sends SIM for testing through . Cancels the changes within the tab Add SNMP Manager window 220 Configuring storage systems GUI reference

221 The following table describes the fields and settings in the Add SNMP Manager window. SNMP Manager Specify the IP address of the SNMP Manager. You cannot use an address with all 0s. IPv4: To set an IPv4 address, select IPv4, and enter four numbers within the range of 0 to 255. Example: XXX.XXX.XXX.XXX (X indicates a numeral) IPv6:To set an IPv6 address, select IPv6, and enter eight hexadecimal alphanumeric characters within the range of 0 to FFFF. You can also use an abbreviated-format IPv6 address. Example: YYYY:YYYY:YYYY:YYYY:YYYY:YYYY:YYYY:YYYY (Y indicates a hexadecimal digit) Add SNMP Traps window The following table describes the fields and settings in the Add SNMP Traps window. IP Address Specify the IP address of the SNMP Manager. You cannot use an address with all 0s. IPv4: To set an IPv4 address, select IPv4, and enter four numbers within the range of 0 to 255. Example: XXX.XXX.XXX.XXX (X indicates a numeral) IPv6: To set an IPv6 address, select IPv6, and enter eight hexadecimal alphanumeric characters within the range of 0 to FFFF. You can also use an abbreviated-format IPv6 address. Example: YYYY:YYYY:YYYY:YYYY:YYYY:YYYY:YYYY:YYYY, where Y indicates a hexadecimal digit. Community Set a community name for which SNMP traps are reported. You can issue traps (report from the SNMP Agent to the SNMP Manager) to the IP address registered to the community. You can register up to 32 communities. For community names, you can use up to 180 alphanumeric characters (ASCII codes) excluding these symbols: (\, / ; : *? " < > & % ^ ). Edit Alert Settings wizard 221

222 Change SNMP Traps window The following table describes the fields and settings in the Change SNMP Traps window. IP Address Specify the IP address of the SNMP Manager. You cannot use an address with all 0s. IPv4: To set an IPv4 address, select IPv4, and enter four numbers within the range of 0 to 255. Example: XXX.XXX.XXX.XXX (X indicates a numeral) IPv6: To set an IPv6 address, select IPv6, and enter eight hexadecimal alphanumeric characters within the range of 0 to FFFF. You can also use an abbreviated-format IPv6 address. Example: YYYY:YYYY:YYYY:YYYY:YYYY:YYYY:YYYY:YYYY, where Y indicates a hexadecimal digit. Community Set a community name for which changed SNMP traps are reported. You can issue traps (report from the SNMP Agent to the SNMP Manager) to the IP address registered to the changed community. You can register up to 32 communities. For community names, you can use up to 180 alphanumeric characters (ASCII codes) excluding these symbols: (\, / ; : *? " < > & % ^ ). Add Community window Use the change community window to add a new SNMP community. 222 Configuring storage systems GUI reference

223 The following table describes the fields and settings in the Add Community window. Community Enter community names. You can register up to 32 communities. For community names, you can use up to 180 alphanumeric characters (ASCII codes) excluding these symbols: (\, / ; : *? " < > & % ^ ). Change Community window Use the change community window to change to a different SNMP community. Edit Alert Settings wizard 223

224 The following table describes the fields and settings in the Change Community window. Community Enter community names. You can register up to 32 communities. For community names, you can use up to 180 alphanumeric characters (ASCII codes) excluding these symbols: (\, / ; : *? " < > & % ^ ). Add Address window Use the add address window to add an address to the list of addresses to notify of a system error. The following table describes the fields and settings in the Add Address window. Mail Address Enter an address and select an attribute (To, Cc, or Bcc). For an address, you can use up to 255 characters. Usable characters: Alphanumeric characters (ASCII codes) and symbols (! # $ % & ` + - * / ' ^ { } _. ) Change Settings window Use the change settings window to change an address. 224 Configuring storage systems GUI reference

225 The following table describes the fields and settings in the Change Settings window. Mail Address Enter an address after change and select an attribute.you can select more than one address. When you select more than one address, you can change only attributes. For an address, you can use up to 255 characters.usable characters: Alphanumeric characters (ASCII codes) and symbols (! # $ % & ` + - * / ' ^ { } _. ) Confirm window (Edit Alert Settings) NOTE: Only the tables related to the items you edited are displayed in the Confirm window. Edit Alert Settings wizard 225

226 The following tables describe the fields and settings in the Confirm window (Edit Alert Settings) Notification Alert Displays the destination for alert notification. This table describes the Syslog Server settings. Primary Server - Syslog Server Primary Server - IP Address Primary Server - Port Number Primary Server - Client Certificate File Name Primary Server - Password Primary Server - Root Certificate File Name Secondary Server - Syslog Server Secondary Server - IP Address Secondary Server - Port Number Secondary Server - Client Certificate File Name Secondary Server - Password Secondary Server - Root Certificate File Name Location Identification Name Timeout Retry Interval Number of Retries Displays whether or not to use the Syslog Server Displays the IP address of the server specified as the Syslog Server Displays the port number used by the Syslog Server Displays the file name of the client certificate Displays the password of the client certificate as asterisks Displays the file name of the root certificate Displays whether or not to use an alternate server for the Syslog Server Displays the IP address of the alternate server for the Syslog Server Displays the port number used by the alternate server for the Syslog Server Displays the file name of the client certificate Displays the password of the client certificate as asterisks Displays the file name of the root certificate Displays the name for identifying the storage system that transfers SIM to the Syslog Server Displays the time before the timeout for connection to the Syslog Server is detected Displays the retry interval when communication with the Syslog Server fails Displays the number of retires when communication with the Syslog Server fails This table describes the SNMP Information settings. Extension SNMP System Group Information - Storage System Name System Group Information - Contact System Group Information - Location Displays whether or not to use the SNMP Agent. Displays the storage system name. Displays the administrator's name or contact information. Displays the location of the storage system. 226 Configuring storage systems GUI reference

227 The following table describes the SNMP Trap Settings Community IP Address Displays the name of the community for which the SNMP trap is reported. Displays the IP address of the SNMP Manager for which SNMP trap setting is made. The following table describes the SNMP Manager settings. IP Address Displays the IP address of the SNMP Manager for which SNMP trap setting is made. The following table describes the Notification settings. Mail Notice Mail Address (From) Mail Address (Reply - To) Server Host Name SMTP Authentication SMTP Authentication - Account SMTP Authentication - Password Displays whether or not to use for notification of failure information. Displays the source address for notification of failure information. Displays the return address of . Displays the host name or the IP address of the server. Displays whether or not to perform SMTP authentication. Displays the account used for SMTP authentication. Displays the password for SMTP authentication as asterisks. The following table describes the settings. Mail Address Attribute Displays the address after the change. Displays the attribute of for SIM notification. Edit System Options wizard This topic describes the Edit System Options window (page 228) Edit System Options wizard 227

228 Edit System Options window Environmental Settings table The following table describes the environmental settings fields and settings in the Edit System Options window. No. System Options Status Enable Disable Displays the number of function bits for the system option. Displays system option names. Hide alert information: When you enable this system option, the Alert window does not display. Refresh forcibly after Apply: When you enable this system option, the configuration information for the storage system is forcibly updated after the configuration changes are applied to the storage system. Disable data polling: When you enable this system option, polling stops. Disable retry of data updating: When you enable this system option, retry does not take place even when you fail to acquire data. Displays the statuses of the system options. Enables the selected system options. You can select more than one system option. Disables the selected system options. You can select more than one system option. 228 Configuring storage systems GUI reference

229 Confirm window (Edit System Options) No. System Options Status Displays the number of function bits for the system option. Displays the name of the system option. Displays the status of system option. Edit System Options wizard 229

230 Column Settings window Table 50 Setting fields in the Column Settings window Restore Default Settings Checkbox Column Name Changes the selection of the displayed columns to the factory default settings. Selects the columns to display. Click the checkbox next to the name of each column that you want to display. After making the selections, click OK. Only the columns whose checkboxes are selected are displayed. Columns whose checkboxes are not selected are not displayed. Note that you cannot select the checkboxes of the columns that must always be displayed because they are deactivated. When you deselect a checkbox, the filter and sort settings of that column are released. If you display the column again, you must set the filter and sort settings again. Displays the names of the columns in the table. If a column contains two rows, the name of the upper row is shown on the left of the vertical bar ( ). The name of the lower row is shown on the right of the vertical bar. 230 Configuring storage systems GUI reference

231 H Remote Web Console system GUI reference This appendix explains the Remote Web Console windows used to view and manage storage system tasks, reports, and alerts. Storage Systems window The Storage Systems window contains the following sections: Hardware summary - Hardware summary Allocation summary - Allocation summary Physical Summary - Physical Summary Virtual Summary - Virtual Summary Hardware summary This following table describes the fields and settings in the Hardware summary section of the Storage Systems window. Storage System Name Storage System Type Full Serial Number IP Address Contact Location Microcode Version Device name of the storage system. Model type of the storage system. Serial number of the storage system. IP address of the SVP. Contact information such as personnel and telephone number where you can inquire about the storage system. Location of the connected storage system. This item displays the version of the microcode. Main: Version of the microcode installed in the connected storage system. SVP: Version of the Remote Web Console installed in the SVP. RMI Server: Version of the RMI server installed in the SVP. Storage Systems window 231

232 Total Cache Size Edit Storage System Total size of the cache memory in the storage system. Allows editing of storage system name, contact, and location. Allocation summary This following table describes the fields and settings in the Allocation summary section of the Storage Systems window. Internal / External Open/Mainframe Capacity Unit Physical Summary Virtual Summary Total THP Subscription Rate Total Number of LDEVs This item switches the displayed items. Total: Displays information on both the internal volumes and the external volumes. Internal Only: Displays information on only the internal volumes. External Only: Displays information on only the external volumes. This item switches the displayed capacity units. Total: Displays all the open-systems, mainframe-systems and multi-platform volumes Open Only: Displays only open-systems volumes Mainframe Only: Displays mainframe-systems and multi-platform volumes. This item switches the displayed units of the capacity. Appropriate: Displays the capacity in appropriate unit depending on the capacity of each item. TB/GB/MB: Displays the capacity of the specified unit. This item displays the capacity of physical logical devices and the number of devices. It displays different information for open-systems and mainframe-systems. For details about this item, see the Physical Summary table. This item displays capacity of physical logical devices and the number of devices. It displays different information for open-systems and mainframe-systems. For details about this item, see the table below about physical summary. This item displays the ratio of virtual logical device capacity to physical logical device capacity in the pool volume of Thin Provisioning. The number of LDEVs. The information displayed in this field depends on the type of system. See the following table. Physical Summary This following table describes the fields and settings in the Physical summary section of the Storage Systems window. Allocated Reserved - Used THP Pool When Open is selected from Open / Mainframe, this item displays the capacity of path-defined open system volumes (LDEVs) and the number of logical devices that the host can recognize. This capacity does not include the control cylinder. When Mainframe is selected from Open / Mainframe, this item displays the capacity of path-defined mainframe and multiplatform volumes and the number of logical devices that the host can recognize. The Reserved - Used THP Pool, Reserved - Unused THP Pool, and Reserved - Other volumes are not included. This capacity does not include the control cylinder. When Total is selected in Internal / External, this item displays the total capacity of the pages that are actually used in pool volume of Thin Provisioning and the number of logical devices. The pool volumes of Fast Snap are included in the Thin Provisioning pool volume. This capacity does not include the control cylinder. 232 Remote Web Console system GUI reference

233 When an item other than Total is selected in Internal / External, this item displays the number of logical devices that are actually used in the Thin Provisioning pool volume. The capacity does not display in this item, but is counted as part of Reserved - Other. Reserved - Unused THP Pool Reserved - Other Available Space - Unallocated Available Space - Free Space Physical Total When the total is selected in Internal / External, this item displays the capacity that is subtracted Used THP Pool value from total capacity of pool volume of Thin Provisioning. Pool volume of Fast Snap is not included in pool volume of Thin Provisioning. Control cylinder is not included in the capacity. The number of logical devices does not display. When an item other than Total is selected in Internal / External, the capacity and the number of logical devices are not displayed in this item, and the capacity is counted as part of Reserved - Other. When Open is selected from Open / Mainframe, this item displays the total capacity and the number of logical devices of the following volumes: Journal volumes Fast Snap pool volumes The total capacity includes: The pool-vol capacity that is not used as pool capacity The capacity of the system pool-vol management area (approx. 4.1 GB per pool) When Mainframe is selected from Open / Mainframe, this item displays the total capacity and the number of logical devices of the following Mainframe and multi-platform volumes: Journal volumes The total capacity includes: The pool-vol capacity that is not used as pool capacity The capacity of the system pool-vol management area (approx. 3.7 GB per pool) The control cylinder is not included in the capacity. For both open and mainframe, when an item other than Total is selected in Internal / External, the capacities for Reserved - Used THP Pool and Reserved - Unused THP Pool are also counted as part of this item. When Open or Total is selected from Open / Mainframe, this item displays the volume capacity and the number of logical devices from the open volumes that are not defined paths. The Reserved - Used THP Pool, Reserved - Unused THP Pool, and Reserved - Other volumes are not included. The control cylinder is also not included in the capacity. When Mainframe is selected from Open / Mainframe, the capacity and the number of logical devices do not display. When Open is selected from Open / Mainframe, this item displays the free space in which users can create Open volumes. When Mainframe is selected from Open / Mainframe, this item displays the free space in which users can create Mainframe-systems and multi-platform volumes. In both Open and Mainframe, the control cylinder is not included in the capacity. and the number of logical devices does not display. This item displays the total capacity of physical logical devices and the number of logical devices. Control cylinder is not included in the capacity. Virtual Summary THP Allocated When total is selected in Internal / External, this item displays virtual volume capacity of Thin Provisioning that is defined paths and the number of logical devices. Virtual volumes for Fast Snap are not included. Storage Systems window 233

234 When an item other than total is selected in Internal / External, a control cylinder is not included in the capacity and the number of logical devices do not display. THP Unallocated 1 Other 1 Virtual Total 1 When total is selected in Internal / External, this item displays the virtual volume capacity of Thin Provisioning that is not defined paths and the number of logical devices. A virtual volume is not included for either Fast Snap. A control cylinder is not included in the capacity. When total is selected in Internal / External, the item displays the virtual volumes of other than Thin Provisioning and the number of logical devices. Control cylinder is not included in the capacity. This item displays the total capacity of virtual logical devices and the number of logical devices. Control cylinder is not included in the capacity. 1. When an item other than Total is selected in Internal / External, the capacity and the number of logical devices are not displayed. Port Condition window You can switch between information for DKC-0 and DKC-1 through a tab. When DKC-1 is not installed, no such tab is displayed. NOTE: Ports not allocated to the user are indicated with Not Available. Except for the Condition column, there may be a difference between the actual device configuration and the displayed information depending on the update timing of the storage system. Refresh: Refreshes the window display to the latest status. 234 Remote Web Console system GUI reference

235 Number of Ports The following table describes the fields and settings in the Port Condition window. Available (Connected) Available (Not Connected) Not Available Not Installed Number of ports in use Number of ports that are installed but not in use Number of ports that are installed but blocked Ports not installed Port Conditions The following table describes the fields and settings in the Port Condition window. Channel Adapter Adapter Type Port Name Attribute Condition Name of the channel adapter Type of the channel adapter Name of the port Attribute of the port Channel adapter type is Fibre: Initiator, Target, RCU Target, or External Channel adapter type is Mfibre: HTP or FNP When no port is assigned to the user: A hyphen (-) is displayed. Port Condition icon and port status Available (Connected): The port is installed and in use. Available (Not Connected): The port is installed and available Not Available: The port is either blocked or not assigned to the user. Speed Data transfer speed of the fibre channel port is displayed in gigabits per second as follows: 2 GBps 4 GBps 8 GBps 16 GBps If Auto is set for Port Speed in the Edit Ports window, this item is displayed as follows: Auto (2 GBps) Auto (4 GBps) Auto (8 GBps) Auto (16 GBps) The values in the parentheses are set by the storage system. If linkup is not made, a hyphen (-) displays. For details of the Edit Ports window, see the HP XP7 Provisioning for Open Systems User Guide. Port Condition window 235

236 Tasks window This window displays a list of tasks performed on the storage system. Up to 384 tasks can display, including 256 that are Completed and/or Failed. Up to 128 tasks whose statuses are In Progress, Waiting, and Suspended can also display. Summary Tasks tab Summary Completed In Progress Waiting Suspended Failed Number of completed tasks. Number of tasks in progress. Number of tasks waiting. Number of suspended tasks. Number of tasks in which an error occurred. Tasks tab Task Name Status Task name specified by a user when the user performed the task. Click to view the detail of the task. Task status. Click to view more details about status or errors. : Completed or Completed(Request) : the task completed normally. : In progress: the task is being processed by the system. : Waiting: the task is not yet started. : Suspended: the task has been suspended. : Failed: the task ended abnormally. Type User Name Submission Time Start Time General name of the task. User name who performed the task. Date and time when the task was submitted. Date and time when the task was started. Blank indicates the task has not started yet. 236 Remote Web Console system GUI reference

237 End time Auto Delete Suspend Tasks button Resume Tasks button Delete Tasks button Disable Auto Delete 1 Enable Auto Delete 1 Export 1 Date and time when the task completed. Blank indicates the task has not completed yet. Enabled: A task is automatically deleted when the following two events occur: The task is completed The number of tasks in the Task list reaches the maximum number the window can display (384) Disabled: Tasks will remain displayed until users delete them. Tasks whose status is Failed are automatically Disabled by the system. Suspends the selected tasks. They will not be started even if the storage system is ready. Only waiting tasks can be suspended. Resume the selected tasks. The status goes back to waiting. Deletes the selected tasks from the window. The waiting or suspended tasks will be cancelled. The failed or aborted tasks can be deleted from the window. Tasks in progress cannot be deleted. If the maximum number of tasks displayed on the window is reached when Auto Delete is enabled, execution of a new task will result in automatic deletion of a task starting with the oldest one. When disabled, the selected task remains in the task list after the task is completed. When enabled, the selected task is deleted from the Task list when the following two events occur: The task is completed The number of tasks in the Task list reaches the maximum number the window can display (384) Window for saving table information to a file. Note 1. Appears when you click More Actions. Task Properties window This window displays details about a task performed on the storage system. Task Properties window 237

238 Suspend Tasks window Use this window to suspend waiting tasks. Selected Tasks table Task Name Status Type User Name Submission Time Task name specified by a user when the user performed the task. Task status. General name of the task. User name who performed the task. Date and time when the task was submitted. 238 Remote Web Console system GUI reference

239 Resume Tasks window Use this window to resume suspended tasks. Selected Tasks table Task Name Status Type User Name Submission Time Task name specified by a user when the user performed the task. Task status. General name of the task. User name who performed the task. Date and time when the task was submitted. Delete Tasks window Use this window to delete tasks. If you delete a waiting task, the task will be cancelled. Resume Tasks window 239

240 Selected Tasks table Task Name Status Type User Name Submission Time Task name specified by a user when the user performed the task. Task status. General name of the task. User name who performed the task. Date and time when the task was submitted. Disable Auto Delete window Use this window to prevent a task from being automatically deleted from the task window. 240 Remote Web Console system GUI reference

241 Selected Tasks table Task Name Status Type User Name Submission Time Task name specified by a user when the user performed the task. Task status. General name of the task. User name who performed the task. Date and time when the task was submitted. Enable Auto Delete window Use this window to automatically delete completed tasks from the task window when the number of displayed tasks reaches the maximum (384 tasks). Selected Tasks table Task Name Status Type User Name Submission Time Task name specified by a user when the user performed the task. Task status. General name of the task. User name who performed the task. Date and time when the task was submitted. Edit Information Display Settings window Use this window to change the display parameters. Enable Auto Delete window 241

242 Top Status Indicator Refresh Interval (Alerts, Audit log, and Resource Lock) Task Screen Refresh Interval LUN ID Notation Secondary windows Interval for the automatic updates of the icons on the upper-right corner of the Remote Web Console main window. You can specify seconds. The default value is 60 seconds. Interval for the automatic updates of the task window. You can specify seconds, or No Update. The default value is 60 seconds. No Update indicates that the task window will be updated only when a user clicks Refresh or File > Refresh All. Select whether to display the LUN ID in decimal or hexadecimal notation. The default is decimal. Regardless of the setting, LUN IDs are displayed in decimal format on Remote Web Console's secondary window. Specify whether to enable or disable Remote Web Console's secondary window. Enable: Enables Remote Web Console's secondary window. Disable: Disables Remote Web Console's secondary window. Reports window This window lists configuration reports about the storage system. You can create up to 20 reports. 242 Remote Web Console system GUI reference

243 Summary Number of Reports Number of created reports. Reports tab Report Name User Name Submission Time Create Configuration Report Download Reports Delete Reports Export Task name specified when users created a report. Click to view the report in HTML format. User name who created the report. Date and time when the report was created. Creates a new report. Downloads the created report in both HTML and CSV format. Deletes the selected report. Window for outputting table information. Create Configuration Report window Use this window to create storage system configuration reports. Selected Reports Report Type Format Type of the report to be created. File format. Delete Reports window Use this window to delete configuration reports. Create Configuration Report window 243

244 Selected Reports table Report Name User Name Submission Time Task name specified when users created a report. User name who created the report. Date and time when the report was created Alerts window Displays the list of alerts (SIM) that occurred in the storage system. 244 Remote Web Console system GUI reference

245 Figure 44 Alerts window Summary Number of Uncompleted Alerts Displays the number of alerts that are not authenticated yet. Acute: Displays total number of Acute level alerts that are not authenticated yet. Serious: Displays total number of Serious level alerts that are not authenticated yet. Moderate: Displays total number of Moderate level alerts that are not authenticated yet. Service: Displays total number of Service level alerts that are not authenticated yet. Total: Total number of above is displayed. Alerts table Error Code Date Displays reference code of SIM. For details about reference code, contact the HP Technical Support. For information about errors that need to be solved, see Checking alerts (page 104). Displays the date when alerts occurred. Alerts window 245

246 Error Level Displays error level of alerts. Service: No need to deal with immediately. Errors that are dealt with within periodical maintenance. Moderate: No need to deal with immediately. Errors that are dealt with within periodical maintenance. Serious: Contact the HP Technical Support. Take adequate measure as instructed, report and solve the problem. Acute: Contact the HP Technical Support. Take adequate measure as instructed, report and solve the problem. Status Detail If status alert remains, Uncompleted displays. If alert is removed by SVP, Completed displays. Displays the details of alert that is selected in the list. Alert Properties window This window shows details of an alert (SIM) that has occurred in the storage system. When you select multiple alerts in Alert window, click Back and Next button to change alert that is displayed. 246 Remote Web Console system GUI reference

247 Alert properties Error Code Date Error Level Displays reference codes of SIM. For details about reference codes, contact the HP Technical Support.For information about errors that need to be solved, see Checking alerts (page 104). Displays the date when alerts occurred. Displays error level of alerts. Service: No need to deal with immediately. Errors that are dealt with within periodical maintenance. Moderate: No need to deal with immediately. Errors that are dealt with within periodical maintenance. Serious: Contact the HP Technical Support. Take adequate measure as instructed, report and solve the problem. Acute: Contact HP Technical Support. Take adequate measure as instructed, report and solve the problem. Status Error Section Error Detail Location If status alert remains, Uncompleted displays. If alert is removed by SVP, Completed displays. Displays overview of the error where the alert occurred. Displays more detail on the error. Displays where the error occurred. It differs according to the error code. Resource Lock Properties window This window displays information about the user who locks the storage system. Resource Lock Properties window 247

248 Resource Lock Properties Number of Resource Groups Locked Number of Resource Groups Unlocked Displays the number of locked resource groups. Displays the number of unlocked resource groups. Resource Groups table The following table describes the items in the Resource Groups table section of the Resource Lock Properties window. Resource Group Name (ID) Status Lock User System Lock Start Time Displays resource group name and resource group ID that user can operate. Displays lock status of resource groups. Locked: Locked user exists. Unlocked: Locked user does not exist. Displays the user name who locks. Displays the system that locked user is using. Displays the time when the lock starts. 248 Remote Web Console system GUI reference

249 Unlock All Virtual Storage Machine All locked resource groups are forcibly unlocked. Displays the model type of the virtual storage machine and serial number set for the resource group. Resource Lock Properties window 249

250 I Tool Panel GUI Reference This appendix describes the Tool Panel window windows and features. Control Panel This section describes the Tool Panel windows and controls. Environment Parameter window This section describes the Environment Parameter window features and controls. Figure 45 Environment Parameter window RMI time-out period RMI time-out period for Modify Polling period for checking exclusive lock Polling period for checking obstacles Submit Reset This parameter specifies the time-out period for forcible logout when a user performs no operation for a certain period of time because of a network error, etc. This parameter specifies the time-out period for forcible release of Modify mode when the user is in Modify mode but does not make any changes that access the RMI server for a certain period of time. This parameter specifies the polling period for monitoring who is changing information while in Modify mode when other users are viewing the storage system information in View mode. This parameter specifies the time interval to monitor failure within the storage system. Applies the environment parameters to the storage system. Resets the environment parameter settings Download File window This section describes the Download File window features and controls. 250 Tool Panel GUI Reference

251 Figure 46 Download File window Configuration File Submit Reset Select the checkbox for the file to be downloaded. Downloadable configuration files differ according to the system configuration. Downloads the configuration file. Cancels downloading the configuration file. Restore File window This section describes the Restore File window features and controls. Figure 47 Restore File window Upload File (Archive File) Next Reset Click Browse... and specify the configuration file you want to restore. Displays a window for confirming the configuration file to be restored. Cancels restoring the configuration file. Download Dump Files window This section describes the Download Dump Files window features and controls. Download Dump Files window 251

252 Figure 48 Download Dump Files window Existing Dump Files Normal Dump Detail Dump Detail Dump (for DKC Performance) Next Select this when you want to re-download a previously downloaded dump file. This item displays only when one or more compressed dump files exist. If you have not downloaded any dump files, this item does not display even though you have acquired dump files via SVP. Contains all information about the SVP and minimum information about the storage system. Select Normal Dump when there is no fatal problem such as a problem with the display of Remote Web Console. Contains all information about the storage system in addition to the content of Normal Dump. Select this when you cannot start Remote Web Console or when you check for problems with the storage system. Contains information about I/O performance, such as collecting Performance Monitor information in addition to the content of Detail Dump. Select this when you check for problems with the I/O performance. Displays a dialog box for confirm that the downloading of the dump file can start. Update Certificate Files window This section describes the Update Certificate Files window features and controls. 252 Tool Panel GUI Reference

253 Figure 49 Update Certificate Files window Certificate file (.crt file) Key file (.key file) Return to the default configuration Upload Reset Click Browse... and specify the certificate file (server.crt file). Click Browse... and specify the key file (server.key file). Returns the SSL certificate to default. Uploads the SSL certificate. Cancels the upload of the SSL certificate. Update Certificate Files for the SMI-S window This section describes the Update Certificate Files for the SMI-S window features and controls. Figure 50 Update Certificate Files for SMIS window Certificate file (.crt file) Key file (.key file) Click Browse... and specify the certificate file (server.crt file). Click Browse... and specify the key file (server.key file). Update Certificate Files for the SMI-S window 253

254 Return to the default configuration Upload Reset Returns the SSL certificate to default. Uploads the certificate to the SMI-S provider. Cancels the upload of the SMI-S provider certificate. Set or Delete Certificate File for CVAE window This section describes the Set or Delete Certificate File for CVAE window features and controls. Figure 51 Set or Delete Certificate File for CVAE window Certificate file (.crt file) Register Delete Click Browse... and specify the certificate file (server.crt file). Registers the certificate for CVAE. Deletes the certificate for CVAE. Upload Configuration Files for SMI-S window This section describes the Upload Configuration Files for SMI-S window features and controls. 254 Tool Panel GUI Reference

255 Figure 52 Update Certificate Files for SMIS window Configuration file Return to the default configuration Upload Reset Click Browse... and specify the configuration file you want to upload. Returns the SMI-S provider configuration file to default Uploads the configuration file to SMI-S provider. Cancels the upload of the SMI-S provider configuration file. Upload Configuration Files for SMI-S window 255

HP XP P9000 Remote Web Console User Guide

HP XP P9000 Remote Web Console User Guide HP XP P9000 Remote Web Console User Guide Abstract This guide explains how to set up and use the HP Remote Web Console to manage HP XP P9000 disk arrays over a Local Area Network (LAN) connection. Topics

More information

HP Intelligent Management Center Remote Site Management User Guide

HP Intelligent Management Center Remote Site Management User Guide HP Intelligent Management Center Remote Site Management User Guide Abstract This book provides overview and procedural information for Remote Site Management, an add-on service module to the Intelligent

More information

HP XP P9000 Remote Web Console Messages

HP XP P9000 Remote Web Console Messages HP XP P9000 Remote eb Console Messages Abstract This document lists the error codes and error messages for HP XP P9000 Remote eb Console for HP XP P9000 disk arrays, and provides recommended action for

More information

Hitachi Unified Storage VM Block Module

Hitachi Unified Storage VM Block Module Hitachi Unified Storage VM Block Module Hitachi Storage Navigator User Guide Product Version Contents MK-92HM7016-11 2012-2016 Hitachi, Ltd. All rights reserved. No part of this publication may be reproduced

More information

HP StorageWorks XP24000/XP20000 Remote Web Console User Guide

HP StorageWorks XP24000/XP20000 Remote Web Console User Guide HP StorageWorks XP24000/XP20000 Remote Web Console User Guide Abstract This guide explains how to set up and use HP StorageWorks Remote Web Console to manage HP StorageWorks XP24000/XP20000 Disk Arrays

More information

HP UFT Connection Agent

HP UFT Connection Agent HP UFT Connection Agent Software Version: For UFT 12.53 User Guide Document Release Date: June 2016 Software Release Date: June 2016 Legal Notices Warranty The only warranties for Hewlett Packard Enterprise

More information

HP XP7 Performance Advisor Software Installation Guide (v6.1.1)

HP XP7 Performance Advisor Software Installation Guide (v6.1.1) HP XP7 Performance Advisor Software Installation Guide (v6.1.1) Abstract This document describes how to install and configure the HP XP7 Performance Advisor Software. This document is intended for users

More information

HP Management Integration Framework 1.7

HP Management Integration Framework 1.7 HP Management Integration Framework 1.7 Administrator Guide Abstract This document describes the use of HP Management Integration Framework interfaces and is intended for administrators involved in the

More information

UCON-IP-NEO Operation Web Interface

UCON-IP-NEO Operation Web Interface UCON-IP-NEO Operation Web Interface copyright G&D 25/01/2012 Web Interface version 2.30 Subject to possible errors and technical modifications License notes G&D license Copyright G&D GmbH 2003-2012: All

More information

HP StorageWorks Performance Advisor. Installation Guide. Version 1.7A

HP StorageWorks Performance Advisor. Installation Guide. Version 1.7A HP StorageWorks Performance Advisor Installation Guide Version 1.7A notice Copyright 2002-2004 Hewlett-Packard Development Company, L.P. Edition 0402 Part Number B9369-96068 Hewlett-Packard Company makes

More information

HP XP7 High Availability User Guide

HP XP7 High Availability User Guide HP XP7 High Availability User Guide Abstract HP XP7 High Availability helps you create and maintain a synchronous copy of critical data in a remote location. This document describes and provides instructions

More information

HP AutoPass License Server

HP AutoPass License Server HP AutoPass License Server Software Version: 9.0 Windows, Linux and CentOS operating systems Support Matrix Document Release Date: October 2015 Software Release Date: October 2015 Page 2 of 10 Legal Notices

More information

Cisco Unified Serviceability

Cisco Unified Serviceability Cisco Unified Serviceability Introduction, page 1 Installation, page 5 Introduction This document uses the following abbreviations to identify administration differences for these Cisco products: Unified

More information

XP7 Online Migration User Guide

XP7 Online Migration User Guide XP7 Online Migration User Guide Abstract This guide explains how to perform an Online Migration. Part Number: 858752-002 Published: June 2016 Edition: 6 Copyright 2014, 2016 Hewlett Packard Enterprise

More information

HPE XP7 Performance Advisor Software 7.2 Release Notes

HPE XP7 Performance Advisor Software 7.2 Release Notes HPE XP7 Performance Advisor Software 7.2 Release Notes Part Number: T1789-96464a Published: December 2017 Edition: 2 Copyright 1999, 2017 Hewlett Packard Enterprise Development LP Notices The information

More information

LifeSize Control Installation Guide

LifeSize Control Installation Guide LifeSize Control Installation Guide January 2009 Copyright Notice 2005-2009 LifeSize Communications Inc, and its licensors. All rights reserved. LifeSize Communications has made every effort to ensure

More information

HP XP7 Provisioning for Mainframe Systems User Guide

HP XP7 Provisioning for Mainframe Systems User Guide HP XP7 Provisioning for Mainframe Systems User Guide Abstract This document describes and provides instructions for using the provisioning software to configure and perform operations on HP XP7 Storage

More information

HP Intelligent Management Center SOM Administrator Guide

HP Intelligent Management Center SOM Administrator Guide HP Intelligent Management Center SOM Administrator Guide Abstract This guide contains comprehensive conceptual information for network administrators and other personnel who administrate and operate the

More information

Guest Management Software V2.0.2 Release Notes

Guest Management Software V2.0.2 Release Notes Guest Management Software V2.0.2 Release Notes Abstract These release notes provide important release-related information for GMS (Guest Management Software) Version 2.0.2. GMS V2.0.2 is MSM software version

More information

Hewlett Packard Enterprise StoreOnce 3100, 3500 and 5100 System Installation and Configuration Guide

Hewlett Packard Enterprise StoreOnce 3100, 3500 and 5100 System Installation and Configuration Guide Hewlett Packard Enterprise StoreOnce 3100, 3500 and 5100 System Installation and Configuration Guide Abstract This guide is for HPE StoreOnce System Administrators. It assumes that the user has followed

More information

HP StorageWorks. XP Remote Web Console User Guide. HP XP10000 Disk Array. HP 200 Storage Virtualization System

HP StorageWorks. XP Remote Web Console User Guide. HP XP10000 Disk Array. HP 200 Storage Virtualization System nl nl HP StorageWorks XP Remote Web Console User Guide HP XP12000 Disk Array HP XP10000 Disk Array HP 200 Storage Virtualization System Abstract This guide provides information about installing and using

More information

HPE 3PAR OS MU3 Patch 18 Upgrade Instructions

HPE 3PAR OS MU3 Patch 18 Upgrade Instructions HPE 3PAR OS 3.1.3 MU3 Patch 18 Upgrade Instructions This upgrade instructions document is for installing Patch 18 on the HPE 3PAR Operating System Software 3.1.3.334 (MU3). This document is for Hewlett

More information

HP 3PAR OS MU3 Patch 18 Release Notes

HP 3PAR OS MU3 Patch 18 Release Notes HP 3PAR OS 3.2.1 MU3 Patch 18 Release Notes This release notes document is for Patch 18 and intended for HP 3PAR Operating System Software 3.2.1.292 (MU3). HP Part Number: QL226-98326 Published: August

More information

Installing and Configuring VMware Identity Manager Connector (Windows) OCT 2018 VMware Identity Manager VMware Identity Manager 3.

Installing and Configuring VMware Identity Manager Connector (Windows) OCT 2018 VMware Identity Manager VMware Identity Manager 3. Installing and Configuring VMware Identity Manager Connector 2018.8.1.0 (Windows) OCT 2018 VMware Identity Manager VMware Identity Manager 3.3 You can find the most up-to-date technical documentation on

More information

HP 3PAR OS MU1 Patch 11

HP 3PAR OS MU1 Patch 11 HP 3PAR OS 313 MU1 Patch 11 Release Notes This release notes document is for Patch 11 and intended for HP 3PAR Operating System Software HP Part Number: QL226-98041 Published: December 2014 Edition: 1

More information

HP integrated Citrix XenServer Online Help

HP integrated Citrix XenServer Online Help HP integrated Citrix XenServer Online Help Part Number 486855-002 September 2008 (Second Edition) Copyright 2008 Hewlett-Packard Development Company, L.P. The information contained herein is subject to

More information

HP LeftHand SAN Solutions

HP LeftHand SAN Solutions HP LeftHand SAN Solutions Support Document Installation Manuals VSA 8.0 Quick Start - Demo Version Legal Notices Warranty The only warranties for HP products and services are set forth in the express warranty

More information

HP 3PAR OS MU3 Patch 17

HP 3PAR OS MU3 Patch 17 HP 3PAR OS 3.2.1 MU3 Patch 17 Release Notes This release notes document is for Patch 17 and intended for HP 3PAR Operating System Software. HP Part Number: QL226-98310 Published: July 2015 Edition: 1 Copyright

More information

HP Intelligent Management Center v7.1 Branch Intelligent Management System Administrator Guide

HP Intelligent Management Center v7.1 Branch Intelligent Management System Administrator Guide HP Intelligent Management Center v7.1 Branch Intelligent Management System Administrator Guide Abstract This document describes how to administer the HP IMC Branch Intelligent Management System. HP Part

More information

HPE StoreEver MSL6480 Tape Library CLI Utility Version 1.0 User Guide

HPE StoreEver MSL6480 Tape Library CLI Utility Version 1.0 User Guide HPE StoreEver MSL6480 Tape Library CLI Utility Version 1.0 User Guide Abstract This document explains how to install and use the HPE StoreEver MSL6480 Tape Library CLI utility, which provides a non-graphical

More information

HP Storage Provisioning Manager (SPM) Version 1.3 User Guide

HP Storage Provisioning Manager (SPM) Version 1.3 User Guide HP Storage Provisioning Manager (SPM) Version 1.3 User Guide Abstract This guide provides information to successfully install, configure, and manage the HP Storage Provisioning Manager (SPM). It is intended

More information

HP P6000 Cluster Extension Software Installation Guide

HP P6000 Cluster Extension Software Installation Guide HP P6000 Cluster Extension Software Installation Guide This guide contains detailed instructions for installing and removing HP P6000 Cluster Extension Software in Windows and Linux environments. The intended

More information

HPE 3PAR OS MU3 Patch 24 Release Notes

HPE 3PAR OS MU3 Patch 24 Release Notes HPE 3PAR OS 3.1.3 MU3 Patch 24 Release Notes This release notes document is for Patch 24 and intended for HPE 3PAR Operating System Software + P19. Part Number: QL226-99298 Published: August 2016 Edition:

More information

HPE 3PAR OS GA Patch 12

HPE 3PAR OS GA Patch 12 HPE 3PAR OS 3.3.1 GA Patch 12 Upgrade Instructions Abstract This upgrade instructions document is for installing Patch 12 on the HPE 3PAR Operating System Software OS-3.3.1.215-GA. This document is for

More information

HP XP7 Business Copy User Guide

HP XP7 Business Copy User Guide HP XP7 Business Copy User Guide Abstract This guide provides instructions for setting up, planning, and operating Business Copy on the HP XP7 Storage (HP XP7) system. Please read this document carefully

More information

HP Database and Middleware Automation

HP Database and Middleware Automation HP Database and Middleware Automation For Windows Software Version: 10.10 SQL Server Database Refresh User Guide Document Release Date: June 2013 Software Release Date: June 2013 Legal Notices Warranty

More information

HP Data Protector Media Operations 6.11

HP Data Protector Media Operations 6.11 HP Data Protector Media Operations 6.11 Getting started This guide describes installing, starting and configuring Media Operations. Copyright 2009 Hewlett-Packard Development Company, L.P. Part number:

More information

HPE Intelligent Management Center v7.3

HPE Intelligent Management Center v7.3 HPE Intelligent Management Center v7.3 Service Operation Manager Administrator Guide Abstract This guide contains comprehensive conceptual information for network administrators and other personnel who

More information

HP Operations Manager

HP Operations Manager HP Operations Manager Software Version: 9.22 UNIX and Linux operating systems Java GUI Operator s Guide Document Release Date: December 2016 Software Release Date: December 2016 Legal Notices Warranty

More information

HP OneView for VMware vcenter User Guide

HP OneView for VMware vcenter User Guide HP OneView for VMware vcenter User Guide Abstract This document contains detailed instructions for configuring and using HP OneView for VMware vcenter (formerly HP Insight Control for VMware vcenter Server).

More information

Virtual Recovery Assistant user s guide

Virtual Recovery Assistant user s guide Virtual Recovery Assistant user s guide Part number: T2558-96323 Second edition: March 2009 Copyright 2009 Hewlett-Packard Development Company, L.P. Hewlett-Packard Company makes no warranty of any kind

More information

HPE 1/8 G2 Tape Autoloader and MSL Tape Libraries Encryption Kit User Guide

HPE 1/8 G2 Tape Autoloader and MSL Tape Libraries Encryption Kit User Guide HPE 1/8 G2 Tape Autoloader and MSL Tape Libraries Encryption Kit User Guide Abstract This guide provides information about developing encryption key management processes, configuring the tape autoloader

More information

Viewing System Status, page 404. Backing Up and Restoring a Configuration, page 416. Managing Certificates for Authentication, page 418

Viewing System Status, page 404. Backing Up and Restoring a Configuration, page 416. Managing Certificates for Authentication, page 418 This chapter describes how to maintain the configuration and firmware, reboot or reset the security appliance, manage the security license and digital certificates, and configure other features to help

More information

HP QuickTest Professional

HP QuickTest Professional HP QuickTest Professional Software Version: 10.00 Installation Guide Manufacturing Part Number: T6513-90038 Document Release Date: January 2009 Software Release Date: January 2009 Legal Notices Warranty

More information

HP 3PAR Recovery Manager 2.0 Software for Microsoft Hyper-V

HP 3PAR Recovery Manager 2.0 Software for Microsoft Hyper-V HP 3PAR Recovery Manager 2.0 Software for Microsoft Hyper-V User Guide Abstract This document provides information about using HP 3PAR Recovery Manager for Microsoft Hyper-V for experienced Microsoft Windows

More information

Trend Micro Incorporated reserves the right to make changes to this document and to the products described herein without notice. Before installing and using the product, please review the readme files,

More information

HP EVA Cluster Extension Software Installation Guide

HP EVA Cluster Extension Software Installation Guide HP EVA Cluster Extension Software Installation Guide Abstract This guide contains detailed instructions for installing and removing HP EVA Cluster Extension Software in Windows and Linux environments.

More information

HP ilo 3 Release Notes

HP ilo 3 Release Notes HP ilo 3 Release Notes 1.70 HP Part Number: 616296-401 Published: February 2014 Edition: 1 Copyright 2014 Hewlett-Packard Development Company, L.P Confidential computer software. Valid license from HP

More information

Transport Gateway Installation / Registration / Configuration

Transport Gateway Installation / Registration / Configuration CHAPTER 4 Transport Gateway Installation / Registration / Configuration This chapter covers the following areas: Transport Gateway requirements. Security Considerations When Using a Transport Gateway.

More information

HP ProLiant Agentless Management Pack (v 3.2) for Microsoft System Center User Guide

HP ProLiant Agentless Management Pack (v 3.2) for Microsoft System Center User Guide HP ProLiant Agentless Management Pack (v 3.2) for Microsoft System Center User Guide Abstract This guide provides information on using the HP ProLiant Agentless Management Pack for System Center version

More information

XP7 High Availability User Guide

XP7 High Availability User Guide XP7 High Availability User Guide Abstract HPE XP7 High Availability helps you create and maintain a synchronous copy of critical data in a remote location. This document describes and provides instructions

More information

Trend Micro Incorporated reserves the right to make changes to this document and to the products described herein without notice. Before installing and using the product, please review the readme files,

More information

Guidelines for using Internet Information Server with HP StorageWorks Storage Mirroring

Guidelines for using Internet Information Server with HP StorageWorks Storage Mirroring HP StorageWorks Guidelines for using Internet Information Server with HP StorageWorks Storage Mirroring Application Note doc-number Part number: T2558-96338 First edition: June 2009 Legal and notice information

More information

Trend Micro Incorporated reserves the right to make changes to this document and to the products described herein without notice. Before installing and using the product, please review the readme files,

More information

HP Business Service Management

HP Business Service Management HP Business Service Management Software Version: 9.26 Getting Started With BPM - Best Practices Document Release Date: September 2015 Software Release Date: September 2015 Legal Notices Warranty The only

More information

GIGABYTE Remote Management Console User s Guide. Version: 1.0

GIGABYTE Remote Management Console User s Guide. Version: 1.0 GIGABYTE Remote Management Console User s Guide Version: 1.0 Table of Contents Using Your GIGABYTE Remote Management Console...2 Software Install...3 Prerequisites on remote management PC...3 Install Java

More information

HP Operations Orchestration

HP Operations Orchestration HP Operations Orchestration For the Linux or Windows operating systems Software Version: 9.02 Document Release Date: October 2011 Software Release Date: October 2011 Legal Notices Warranty The only warranties

More information

Enterprise Integration Module for SAP Solution Manager 7.2

Enterprise Integration Module for SAP Solution Manager 7.2 Enterprise Integration Module for SAP Solution Manager 7.2 Software Version: 12.53-12.55 User Guide Go to HELP CENTER ONLINE http://admhelp.microfocus.com/alm Document Release Date: May 2018 Software Release

More information

Version Installation Guide. 1 Bocada Installation Guide

Version Installation Guide. 1 Bocada Installation Guide Version 19.4 Installation Guide 1 Bocada Installation Guide Copyright 2019 Bocada LLC. All Rights Reserved. Bocada and BackupReport are registered trademarks of Bocada LLC. Vision, Prism, vpconnect, and

More information

HPE 3PAR OS MU3 Patch 97 Upgrade Instructions

HPE 3PAR OS MU3 Patch 97 Upgrade Instructions HPE 3PAR OS 3.2.2 MU3 Patch 97 Upgrade Instructions Abstract This upgrade instructions document is for installing Patch 97 on the HPE 3PAR Operating System Software. This document is for Hewlett Packard

More information

HP Business Availability Center

HP Business Availability Center HP Business Availability Center for the Windows and Solaris operating systems Software Version: 8.00 Embedded UCMDB Applets Using Direct Links Document Release Date: January 2009 Software Release Date:

More information

dctrack Quick Setup Guide (Recommended) Obtain a dctrack Support Website Username and Password

dctrack Quick Setup Guide (Recommended) Obtain a dctrack Support Website Username and Password dctrack 5.0.0 Quick Setup Guide This guide walks you through installing dctrack for the first time. In other words, this is a clean install - it is not an integration of dctrack and Power IQ, and it is

More information

HPE ALM Excel Add-in. Microsoft Excel Add-in Guide. Software Version: Go to HELP CENTER ONLINE

HPE ALM Excel Add-in. Microsoft Excel Add-in Guide. Software Version: Go to HELP CENTER ONLINE HPE ALM Excel Add-in Software Version: 12.55 Microsoft Excel Add-in Guide Go to HELP CENTER ONLINE http://alm-help.saas.hpe.com Document Release Date: August 2017 Software Release Date: August 2017 Legal

More information

HP ALM Lab Management

HP ALM Lab Management HP ALM Lab Management Software Version: 12.00 Lab Management Guide Document Release Date: March 2014 Software Release Date: March 2014 Legal Notices Warranty The only warranties for HP products and services

More information

Release Date March 10, Adeptia Inc. 443 North Clark Ave, Suite 350 Chicago, IL 60610, USA Phone: (312)

Release Date March 10, Adeptia Inc. 443 North Clark Ave, Suite 350 Chicago, IL 60610, USA Phone: (312) Adeptia Server 4.9 Installation Guide Version 1.2 Release Date March 10, 2009 Adeptia Inc. 443 North Clark Ave, Suite 350 Chicago, IL 60610, USA Phone: (312) 229-1727 Copyright Copyright 2000-2008 Adeptia,

More information

Hitachi Freedom Storage Lightning 9900 V Series. Remote Console Storage Navigator User s Guide

Hitachi Freedom Storage Lightning 9900 V Series. Remote Console Storage Navigator User s Guide Hitachi Freedom Storage Lightning 9900 V Series Remote Console Storage Navigator User s Guide 2002 Hitachi Data Systems Corporation, ALL RIGHTS RESERVED Notice: No part of this publication may be reproduced

More information

HP Travel Phone User s Guide

HP Travel Phone User s Guide HP Travel Phone User s Guide Version 1.0 Copyright 2007 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice. The only warranties for HP products

More information

HPE ProLiant Gen9 Troubleshooting Guide

HPE ProLiant Gen9 Troubleshooting Guide HPE ProLiant Gen9 Troubleshooting Guide Volume II: Error Messages Abstract This guide provides a list of error messages associated with HPE ProLiant servers, Integrated Lights-Out, Smart Array storage,

More information

Hewlett Packard Enterprise. HPE OmniStack for vsphere Upgrade Guide

Hewlett Packard Enterprise. HPE OmniStack for vsphere Upgrade Guide Hewlett Packard Enterprise HPE OmniStack for vsphere Upgrade Guide Part number: P00126-001 Published: September 2017 2017 Hewlett Packard Enterprise Development LP Notices The information contained herein

More information

HP Operations Orchestration

HP Operations Orchestration HP Operations Orchestration For Windows and Linux operating systems Software Version: 9.07.0006 System Requirements Document Release Date: April 2014 Software Release Date: February 2014 Legal Notices

More information

Hypertext Transfer Protocol over Secure Sockets Layer (HTTPS)

Hypertext Transfer Protocol over Secure Sockets Layer (HTTPS) Hypertext Transfer Protocol over Secure Sockets Layer (HTTPS) This chapter provides information about Hypertext Transfer Protocol over Secure Sockets Layer. HTTPS, page 1 HTTPS for Cisco Unified IP Phone

More information

HPE Enterprise Integration Module for SAP Solution Manager 7.1

HPE Enterprise Integration Module for SAP Solution Manager 7.1 HPE Enterprise Integration Module for SAP Solution Manager 7.1 Software Version: 12.55 User Guide Document Release Date: August 2017 Software Release Date: August 2017 HPE Enterprise Integration Module

More information

Guest Management Software Administrator Guide. Installation and Getting Started Guide Administrator Guide

Guest Management Software Administrator Guide. Installation and Getting Started Guide Administrator Guide Guest Management Software Administrator Guide Guest ProCurve Management 5400zl Switches Software Installation and Getting Started Guide Administrator Guide Guest Management Software Administrator Guide

More information

Apptix Online Backup by Mozy User Guide

Apptix Online Backup by Mozy User Guide Apptix Online Backup by Mozy User Guide 1.10.1.2 Contents Chapter 1: Overview...5 Chapter 2: Installing Apptix Online Backup by Mozy...7 Downloading the Apptix Online Backup by Mozy Client...7 Installing

More information

Network Guide NPD EN

Network Guide NPD EN NPD5659-00 EN Copyright and Trademarks No part of this publication may be reproduced, stored in a retrieval system, or transmitted in any form or by any means, mechanical, photocopying, recording, or otherwise,

More information

Installing and Configuring vcloud Connector

Installing and Configuring vcloud Connector Installing and Configuring vcloud Connector vcloud Connector 2.6.0 This document supports the version of each product listed and supports all subsequent versions until the document is replaced by a new

More information

HP Insight Remote Support Advanced HP StorageWorks P4000 Storage System

HP Insight Remote Support Advanced HP StorageWorks P4000 Storage System HP Insight Remote Support Advanced HP StorageWorks P4000 Storage System Migration Guide HP Part Number: 5900-1089 Published: August 2010, Edition 1 Copyright 2010 Hewlett-Packard Development Company, L.P.

More information

HP Project and Portfolio Management Center

HP Project and Portfolio Management Center HP Project and Portfolio Management Center Software Version: 9.30 HP Demand Management User s Guide Document Release Date: September 2014 Software Release Date: September 2014 Legal Notices Warranty The

More information

Installation Guide V1.1

Installation Guide V1.1 Installation Guide V1.1 The information contained in this manual is the licensed property of Fujitsu Software Technology Corporation. Use of the information contained herein is restricted to the terms

More information

Transport Gateway Installation / Registration / Configuration

Transport Gateway Installation / Registration / Configuration CHAPTER 2 Transport Gateway Installation / Registration / Configuration This chapter covers the following areas: Transport Gateway requirements. Security Considerations When Using a Transport Gateway.

More information

XP7 External Storage for Open and Mainframe Systems User Guide

XP7 External Storage for Open and Mainframe Systems User Guide XP7 External Storage for Open and Mainframe Systems User Guide Abstract This guide provides information and instructions for planning, setup, maintenance, and troubleshooting the use of external volumes

More information

HP OneView for VMware vcenter User Guide

HP OneView for VMware vcenter User Guide HP OneView for VMware vcenter User Guide Abstract This document contains detailed instructions for configuring and using HP OneView for VMware vcenter (formerly HP Insight Control for VMware vcenter Server).

More information

HP StorageWorks XP Performance Advisor Software User Guide

HP StorageWorks XP Performance Advisor Software User Guide HP StorageWorks XP Performance Advisor Software User Guide This guide describes how to use HP StorageWorks XP Performance Advisor Software product (XP Performance Advisor), and includes the user tasks

More information

HP LeftHand P4000 Virtual SAN Appliance in an HP BladeSystem environment solution guide

HP LeftHand P4000 Virtual SAN Appliance in an HP BladeSystem environment solution guide HP LeftHand P4000 Virtual SAN Appliance in an HP BladeSystem environment solution guide AT459-96002 Part number: AT459-96002 First edition: April 2009 Legal and notice information Copyright 2009 Hewlett-Packard

More information

Using Hypertext Transfer Protocol over Secure Sockets Layer (HTTPS)

Using Hypertext Transfer Protocol over Secure Sockets Layer (HTTPS) CHAPTER 2 Using Hypertext Transfer Protocol over Secure Sockets Layer (HTTPS) This chapter contains information on the following topics: HTTPS Overview, page 2-1 HTTPS for Cisco Unified IP Phone Services,

More information

HP Intelligent Management Center Branch Intelligent Management System (BIMS) User Guide

HP Intelligent Management Center Branch Intelligent Management System (BIMS) User Guide HP Intelligent Management Center Branch Intelligent Management System (BIMS) User Guide Abstract This guide contains basic information for network administrators, engineers, and operators who use the Branch

More information

School Installation Guide ELLIS Academic 5.2.6

School Installation Guide ELLIS Academic 5.2.6 ELLIS Academic 5.2.6 This document was last updated on 2/16/11. or one or more of its direct or indirect affiliates. All rights reserved. ELLIS is a registered trademark, in the U.S. and/or other countries,

More information

HPE Security Fortify WebInspect Enterprise Software Version: Windows operating systems. Installation and Implementation Guide

HPE Security Fortify WebInspect Enterprise Software Version: Windows operating systems. Installation and Implementation Guide HPE Security Fortify WebInspect Enterprise Software Version: 17.10 Windows operating systems Installation and Implementation Guide Document Release Date: May 2017 Software Release Date: April 2017 Legal

More information

Network Guide NPD EN

Network Guide NPD EN NPD4963-00 EN Copyright and Trademarks No part of this publication may be reproduced, stored in a retrieval system, or transmitted in any form or by any means, mechanical, photocopying, recording, or otherwise,

More information

HP Intelligent Management Center v7.1 MySQL 5.6 Installation and Configuration Guide (Windows)

HP Intelligent Management Center v7.1 MySQL 5.6 Installation and Configuration Guide (Windows) HP Intelligent Management Center v7.1 MySQL 5.6 Installation and Configuration Guide (Windows) Abstract This document provides installation and configuration information for MySQL. It includes the procedures

More information

Client Installation Guide

Client Installation Guide GENView Provisioning and Portals Portal Server Client Installation Guide Release: 9.4 Document revision: 03.01 Describes the steps for installing the GVPP-PS client application. www.genband.com 630-01903-01

More information

HPE 3PAR OS MU5 Patch 49 Release Notes

HPE 3PAR OS MU5 Patch 49 Release Notes HPE 3PAR OS 3.2.1 MU5 Patch 49 Release Notes This release notes document is for Patch 49 and intended for HPE 3PAR Operating System Software + P39. Part Number: QL226-99362a Published: October 2016 Edition:

More information

Content and Purpose of This Guide... 1 User Management... 2

Content and Purpose of This Guide... 1 User Management... 2 Contents Introduction--1 Content and Purpose of This Guide........................... 1 User Management........................................ 2 Security--3 Security Features.........................................

More information

LifeSize Gatekeeper Installation Guide

LifeSize Gatekeeper Installation Guide LifeSize Gatekeeper Installation Guide July 2008 Copyright Notice 2008 LifeSize Communications Inc, and its licensors. All rights reserved. LifeSize Communications has made every effort to ensure that

More information

HPE FlexNetwork MSR Router Series

HPE FlexNetwork MSR Router Series HPE FlexNetwork MSR Router Series Comware 7 OAA Configuration Guides Part number: 5998-8789 Software version: CMW710-E0407 Document version: 6W100-20160526 Copyright 2016 Hewlett Packard Enterprise Development

More information

Hypertext Transfer Protocol Over Secure Sockets Layer (HTTPS)

Hypertext Transfer Protocol Over Secure Sockets Layer (HTTPS) Hypertext Transfer Protocol Over Secure Sockets Layer (HTTPS) This chapter provides information about Hypertext Transfer Protocol over Secure Sockets Layer. HTTPS, page 1 HTTPS for Cisco Unified IP Phone

More information

Installing and Configuring vcenter Multi-Hypervisor Manager

Installing and Configuring vcenter Multi-Hypervisor Manager Installing and Configuring vcenter Multi-Hypervisor Manager vcenter Server 5.1 vcenter Multi-Hypervisor Manager 1.1.2 This document supports the version of each product listed and supports all subsequent

More information

Storage Manager 2018 R1. Installation Guide

Storage Manager 2018 R1. Installation Guide Storage Manager 2018 R1 Installation Guide Notes, Cautions, and Warnings NOTE: A NOTE indicates important information that helps you make better use of your product. CAUTION: A CAUTION indicates either

More information

NBC-IG Installation Guide. Version 7.2

NBC-IG Installation Guide. Version 7.2 Installation Guide Version 7.2 2017 Nuance Business Connect 7.2 Installation Guide Document Revision History Revision Date August 8, 2017 Revision List Updated supported SQL Server versions June 14, 2017

More information

AVALANCHE SE QUICK START

AVALANCHE SE QUICK START AVALANCHE SE QUICK START Avalanche SE is a client management system designed to easily manage software and configuration updates to mobile devices. This document provides a brief overview of the core tasks

More information