NEC Storage Manager Installation Guide

Size: px
Start display at page:

Download "NEC Storage Manager Installation Guide"

Transcription

1 NEC Storage Manager Installation Guide A

2

3 Preface NEC Storage Manager English Version VERSION: 6.2 This CD includes the setup programs and the PDF manuals of NEC Storage Manager. For further usage after installation and the function of NEC Storage Manager, refer to the PDF manuals in this CD. Note: NEC Storage Manager is available for both Windows and Linux. Refer to the description of the installation method for each OS in this document according to your OS in use. Remarks 1. The NEC Storage Manager is referred to as ism or Storage Manager in this guide unless clearly specified. Also, the following terms refer to the corresponding NEC Storage software products. Term NEC Storage Software Product ControlCommand NEC Storage ControlCommand (*1) ReplicationControl NEC Storage ControlCommand (*1) SnapControl NEC Storage ControlCommand (*1) PerformanceMonitor NEC Storage PerformanceMonitor PerformanceOptimizer NEC Storage PerformanceOptimizer Note: NEC Storage ControlCommand is a program product that has integrated the following five functions. ReplicationControl SnapControl ReplicationControl/DisasterRecovery ProtectControl PowerControl

4 2. The NEC Storage series disk array subsystem is referred to as a disk array in this guide unless clearly specified. Also, the following terms refer to the corresponding NEC Storage hardware products. Term NEC Storage Hardware Product D series NEC Storage D series D1 series NEC Storage D1 series D3 series NEC Storage D3 series D4 series NEC Storage D4 series D8 series NEC Storage D8 series E series NEC Storage E series S series NEC Storage S series A series NEC Storage A series 3. The following terms in this guide refer to the NEC Storage software manuals. Term NEC Storage Software Manual User s Manual (UNIX) NEC Storage Software User s Manual (UNIX) (IS001) User s Manual NEC Storage Software User s Manual (IS004) Performance Monitoring User s NEC Storage Software Manual Performance Monitoring User s Manual (IS025) 4. JRE in this guide is an abbreviation for Java Runtime Environment. 5. Trademarks and registered trademarks Microsoft, Windows, Windows Server, and Windows Vista, are trademarks or registered trademarks of Microsoft Corporation in the United States and other countries. UNIX is a registered trademark of The Open Group in the United States and other countries. Linux is a trademark or registered trademark of Mr. Linus Torvalds in the United States and other countries. Red Hat is a trademark or registered trademark of Red Hat, Inc. in the United States and other countries. Java is a trademark or registered trademark of Sun Microsystems, Inc. in the US and other countries. Other product names and company names, etc. are trademarks or registered trademarks of the associated companies. 6. This product includes the OSSs below. For details about the licenses, see the appendixes of the manuals on the installation media. Apache log4j ( flex ( OpenSSL ( 7. The client function provides the following two GUIs. Windows-based GUI GUI based on the Web In this manual, to describe the former GUI, ism client (Win GUI) or client (Win GUI) is used, and to describe the latter GUI only, ism client (Web GUI) or client (Web GUI) is used.

5 8. In this document, matters to which careful attention needs to be paid will be described as follows. Be sure to observe the instructions. If the indications are ignored and the system is improperly operated, settings which have been already made might be affected. Type of Indication Type Description Describes contents which require users to pay special attention for operation. Describes information about restrictions on operation. 1st Edition in March rd Edition in January 2010

6

7 Contents Introduction Flow of installation procedure... 1 CHAPTER 1 SERVER INSTALLATION (LINUX) Operating Environment ism Server Installation Installation Uninstallation Updating Environment Settings of ism server Disk Array Monitoring Method Setting Environment Definition File ism Express Connector Installation Installation Uninstallation Updating Environment Settings of ism Express Connector Environment Definition File Setting System Parameter CHAPTER 2 STORAGE MANAGER SETUP (WINDOWS) Quick Install Management Server Configuration Application Server Configuration Custom Install CHAPTER 3 SERVER INSTALLATION (WINDOWS) Operating Environment ism Server and ism Express Connector Installation Installation When Using the D1 Series/D3 Series/D4 Series (Not Initialized) When Using the D1 Series/D3 Series/D4 series (Already Initialized) When Using the D8 Series When Using the E Series When Using the S Series or A Series Uninstallation Updating Setup Wizard of ism server i

8 3.3.1 Disk Array Subsystems Setup User Setup Storage Manager Client Setup Log Setup File Transfer Function Setup File Transfer Setup (1/3) File Transfer Setup (2/3) File Transfer Setup (3/3) Contents Setting Confirmation Setup Complete Setup Utility of ism server Disk Array User State Monitoring Setting Up the Server and Client Event Link File Transfer Performance Monitoring Performance Optimization Replication/Snapshot Data Retention Environment Settings of ism Express Connector Environment Definition File CHAPTER 4 CLIENT INSTALLATION Supported ism Client Types Operating Environment Installation and Setting ism Client Installation When Using ism Client (Web GUI) When Using ism Client (Win GUI) ism Client Uninstallation ism Client Updating Relationship between Server and Client Versions CHAPTER 5 VOLUME LIST INSTALLATION (LINUX) Operating Environment Volume List Installation Installation Uninstallation Updating ii

9 5.2.4 Host Information Collection/Storage Volume List Creation CHAPTER 6 VOLUME LIST INSTALLATION (WINDOWS) Operating Environment Volume List Installation and Uninstallation Installation When Using the D Series When Using the S Series or A Series Uninstallation Updating Host Information Collection/Storage Volume List Creation ism Host Agent Service Other Settings Appendix A Special File Creation Command (Linux) Appendix B Password Cipher Command Appendix C Event Link Definition File Appendix D Performance Analysis Supporting Tool and Graph Making Tool Appendix E Backup File Appendix F Environment with Firewall Introduced Appendix G Host Information collection/storage Appendix H Troubleshooting iii

10 This page is intentionally left blank. iv

11 Introduction Flow of installation procedure To use the disk array from the application server after installing the disk array, an installation procedure like that described below is needed. This procedure does not apply to the E series. The basic installation procedure is as follows. (1) Installing and setting up software Install software, and specify necessary environment setting. (2) Collecting/storing host information (3) Configuring the disk array (4) Checking the connection on the application server When installing a D series disk array with FC, collect and store the host information. Configure the disk array, and assign a logical disk to an application server. The logical disk assigned to the application server must be recognized by the application server. (5) Preparing volumes Create volumes using the logical disk which is assigned to the application server. In the following procedure, as for the procedure that the maintenance member has already executed at your request, execution is unnecessary. Perform the procedure that has not been executed yet. (1) Installing and setting up software Install software, and perform the environment setting if necessary. (1) Introduction and setting of ism server and ism client Install ism server and ism client, and then perform the environment setting. If ism server is installed in Linux environment, perform the setting of system parameters of OS if necessary. Refer to Chapter 1, Chapter 2, and Chapter 4 according to the OS environment of install destination. 1

12 If ism server and ism client of this version was already installed using Storage Manager Setup, installation is not necessary. (2) Installing the ismvollist command (on all application servers) Install the ismvollist command on all application servers that are connected using Fibre Channel cable (for a disk array with FC) or LAN cable (for a disk array with iscsi). Refer to Chapter 5 or Chapter 6 according to the OS environment on the application server. On each application server, install the HBA (host bus adaptor), NIC (network interface card), the driver for the host bus adaptor, and the installation of the pass management software beforehand. If ismvollist command of this version was already installed using Storage Manager Setup, installation is not necessary for that application server. If ControlCommand which is the related software will be installed, installation of ismvollist command is not necessary because ControlCommand includes ismvollist command. For introduction of ControlCommand, refer to the installation guide of ControlCommand. (2) Collecting and storing host information This procedure is not required. However, when using a D series disk array with FC, if the host information is collected and stored, the following operation becomes possible: - The following disk array configuration settings can be easily be specified by using the host information. - LD Quick Configuration (only for the D1 series/d3 series/d4 series) - LD Set Setting of Access Control - Connected host information can be displayed in the connected host list screen of the ism client (Web GUI). 2

13 If a D series disk array with FC is installed, collect and store the host information for all application servers on which the ismvollist command or ControlCommand was installed. For details, refer to Host Information collection/storage of Chapter 5 or Chapter 6 and Appendix G Host Information collection/storage according to the OS environment on the application server. For an S series, A series, or D series disk array with only iscsi, this procedure is not necessary. Go to the next procedure. For the D1 series/d3 series/d4 series disk array, if host information was already stored during the initial setting of disk array, this procedure is not necessary. (3) Configuring the disk array Configure the disk array, and assign a logical disk to an application server. It is necessary to design the composition of pool, spare disk, and logical disk beforehand according to operation. The following operation is performed using configuration setting function of ism client. For details, refer to "Configuration Setting Tool User s Manual (GUI)". For the D1 series/d3 series/d4 series disk array, if the initial setting of disk array was already done by using Initialization Wizard of ism client (Web GUI), the following procedure from (1) to (4) has already been completed. (1) License unlocking Prepare the license sheet (license key) which is appended to the bought program product. Unlock license by enter the license key of program product using configuration setting screen of ism client. (2) Pool binding Bind a pool using wizard of configuration setting screen of ism client. It might take time to bind a pool. Afterwards, bind spare disks using wizard of configuration setting screen of ism client. 3

14 (3) Logical disk binding You must prevent the constructed logical disk from influencing an existing application server when a new disk array with FC is added to a configuration in which the application server has been operated. In this case, you must perform the procedures described below while either of the following conditions is satisfied before starting Access Control. - The FC cable is not connected. - The existing application server is stopped. Bind logical disks using the wizard in the configuration setting screen of the ism client. Set the OS Type of a logical disk appropriately according to the OS environment of the application server that is assigned to the logical disk. It might take time to bind a logical disk. (4) Access control setting Perform the following setting of access control using configuration setting screen of ism client. Changing the Port Mode Setting LD Sets Linking an LD Set and Path Assigning a Logical Disk Starting the Access Control (4) Checking the connection on the application server Check the FC cable (for a disk array with FC) or the LAN cable (for a disk array with iscsi) connecting the disk array and application server. Next, restart the application server and make sure that the logical disk assigned to the application server is recognized by the application server. (5) Preparing volumes Create volume using logical disk assigned to the application server. The following procedure is performed from each application server. For procedure of volume list creation/update, refer to Volume List Creation of Chapter 5 or Chapter 6 according to the OS environment of the application server. (1) Volume list creation Create volume list, and confirm the relationship between device information (disk number, special file name) of the application server and logical disk. 4

15 (2) Volume creation Create volume (file system, etc) using logical disk recognized by the application server. (3) Volume list update If the application server is Windows, update the volume list to reflect the information of created partition, the drive letter allocated to the volume, etc. If the application server is Linux, it is not necessary to update volume list after create volume. If ControlCommand which is the related software is installed, perform the operation preparation according to using function. For details, refer to the installation guide of ControlCommand and manual of each function. 5

16 Chapter 1 Server Installation (Linux) 1..1 Operatiing Enviironment Table 1-1 Operating Environment (Linux) Operating systems < D series or E series > Red Hat Enterprise Linux Version 3 Red Hat Enterprise Linux ES 3 Update8 and 3.9 (IA32) Red Hat Enterprise Linux AS 3 Update8 and 3.9 (IA32) Red Hat Enterprise Linux AS 3 Update8 and 3.9 (EM64T) Red Hat Enterprise Linux Version 4 Red Hat Enterprise Linux ES 4 Update4 and 4.5 to 4.8 (IA32/EM64T) Red Hat Enterprise Linux AS 4 Update4 and 4.5 to 4.8 (IA32/EM64T) Red Hat Enterprise Linux Version 5 Red Hat Enterprise Linux 5.1, 5.2, 5.3 (IA32/EM64T) Red Hat Enterprise Linux 5.1, 5.2, 5.3 Advanced Platform (IA32/EM64T) Memory < S series or A series > Red Hat Enterprise Linux Version 2.1 Red Hat Enterprise Linux AS 2.1 Update2 (IA32) Red Hat Enterprise Linux Version 3 Red Hat Enterprise Linux ES 3 Update2 and Update4 to Update8 and 3.9 (IA32) Red Hat Enterprise Linux AS 3 Update2 and Update4 to Update8 and 3.9 (IA32) Red Hat Enterprise Linux AS 3 Update3 to Update8 and 3.9 (EM64T) Red Hat Enterprise Linux Version 4 Red Hat Enterprise Linux ES 4 Update2 to Update4 and 4.5 to 4.8 (IA32/EM64T) Red Hat Enterprise Linux AS 4 Update2 to Update4 and 4.5 to 4.8 (IA32/EM64T) Red Hat Enterprise Linux Version 5 Red Hat Enterprise Linux 5.1, 5.2, 5.3 (IA32/EM64T) Red Hat Enterprise Linux 5.1, 5.2, 5.3 Advanced Platform (IA32/EM64T) OS required memory capacity + 13 MB or more Disk capacity <When monitoring the E series> OS required memory capacity + 15 MB or more Program capacity: 48 MB Required capacity for operation: 78 MB or more <When monitoring the E series> Program capacity: 55 MB Required capacity for operation: 95 MB or more 6

17 Indispensable hardware Indispensable software NEC Storage series ism Express Connector * Only when monitoring the E series * Above are the supported environments for this version at the point of the initial shipment of this product. Linux Storage Manager syslog Disk Array Activating a shell Operation Log Mail Server ism client Mail Transmission * When monitoring the E series, ism Express Connector must be installed on the same computer as Storage Manager. Figure 1-1 System Configuration Image (Linux) The ism server and ism Express Connector package are expanded and installed under the /opt and /etc directories. If the free space of the /opt partition is insufficient, create a directory to expand and install the package on another partition and make a symbolic link to /opt/ismsvr (When installing ism server) or /opt/ismconn (When installing ism Express Connector). 1. The ism server can monitor more than one disk array simultaneously. However, do not use more than one ism server to simultaneously monitor a single disk array. If multiple ism servers are used to monitor a single disk array, a repeatedly noticed error or a conflict between their performance statistical information may cause operation trouble. 7

18 2. It is recommended to use the ism client (Web GUI) when newly installing the ism server. The sample environment definition file has been set that the permitted connection type of ism client is only the ism client (Web GUI). When updating the ism server version, the permitted connection type of ism client is set to only the ism client (Win GUI) by default. To use the ism client (Web GUI), be sure to change the permitted connection type of ism client to only the ism client (Web GUI). 3. The D1 series, D3 series, or D4 series disk array which has not configured initial settings yet should be connected to the same network the ism server installed server connected. 4. When monitoring the E series, you must install ism server and ism Express Connector. Refer to 1.4 ism Express Connector Installation for the installation of ism Express Connector. 5. When monitoring the E series, you must start ism Express Connector. If ism Express Connector is not started, the E series cannot be monitored. 6. While the E series are monitored, if user information (user name, password) was changed using Storage Manager Express, monitor of the E series become unavailable. If user information was changed, update the environment settings of ism server (monitoring_user in [agent] section) and restart ism server. 8

19 1..2 iism Server IInstallllatiion IInsttallllattiion To install the ism server, use the Linux rpm command and follow the procedure below. 1. To use the ESMPRO link function, ESMPRO Agent must be installed before installing the ism server. For details, refer to 1.7 ESMPRO Link in the User s Manual (UNIX). 2. The ESMPRO link function is supported only by the ism installed in the server machine available for ESMPRO Agent for Linux. For server machines available for ESMPRO for Linux, refer to the ESMPRO Agent product information. (1) Log in using root authority. (2) Insert the CD. When the CD drive is not available, transfer the ismsvr.rpm file from another server before installing. (3) Mount the CD. - Create a mount directory (e.g. /cdrom) - Mount the CD with the mount command. /bin/mount -r /dev/cdrom /cdrom (4) Install the software using the rpm command. /bin/rpm -ivh /cdrom/server/linux/ismsvr.rpm (5) When the following message is output, installation is completed. Installation of ismsvr was successful. (6) Unmount the CD. /bin/umount /cdrom Without interruption, execute the environment setting according to 1.3 Environment Settings of ism server. This section describes the contents to be registered in the environment definition file. Then, the ism server is activated by entering the start command (ismsvr start) or by restarting Linux. For the method to prevent the ism server from being automatically due to the restart of the operating system, refer to 2.1 Server Start/Stop in the User s Manual (UNIX). 9

20 Uniinsttallllattiion To uninstall the ism server, use the Linux rpm command and follow the procedure below. (1) Log in using root authority. (2) Check that the ism server is not yet activated. When the ism server is activated, stop the ism server using the following command. If ism client is connected, the connection will be terminated. ismsvr stop -e (3) Uninstall the software using the following command. /bin/rpm -e ismsvr (4) When the following message is output, uninstallation is completed. Removal of ismsvr was successful. Even though ism has been uninstalled, the environment definition files, operation log files, performance statistical information history files, performance statistical information summary files, performance optimization log files, license-related files, partition user information files are not deleted. When a directory for extracting the package was created on another partition at software installation and symbolic link to /opt/ismsvr was made, the symbolic link file for /opt/ismsvr is not also deleted. To replace the disk array concurrently with installation of this ism server version, delete the (IP address) setting for the disk array to be replaced from the ism server environment settings before uninstalling the older ism server. When the IP address is not deleted, this IP address will be unusable in the network setting for the D1 series, D3 series, or D4 series disk array Updattiing To update the ism server, uninstall the existing software before installing the updated one. For the updating procedure, refer to Installation and Uninstallation. 10

21 1..3 Enviironment Settiings of iism server Diisk Array Moniittoriing Metthod Settttiing You can monitor disk arrays via an IP or FC connection. However, a disk array with only iscsi or an E series disk array can be monitored only via an IP connection. Also, not that it is recommended to monitor disk arrays via an IP connection. (1) IP connection To monitor disk arrays via IP connection, specify the IP address set to the disk arrays in the environment definition file. For details on how to specify the environment definition file, refer to Environment Definition File. When initializing the ism server from the ism client (Web GUI) for a D1 series, D3 series, or D4 series disk array for which initial settings have been specified, monitoring though an IP connection is required, but do not specify an IP address that you intend to use for the disk array in advance, because this address will be specified in the environment definition file on initialization. For the E series disk arrays, IP address of disk array and user information for monitoring disk array is required. The user information is user name and password for login to disk array from Storage Manager Express. (2) FC connection To monitor disk arrays via FC connection, you must execute the special file creation command (ismmknod) by root. For details of the special file creation command, refer to Appendix A Special File Creation Command (Linux). # ismmknod... (1) 101: INFO: Creating internal device files (2) 102: INFO: Creating device list file (3) 103: INFO: ismmknod ended normally.... (4) Please refer to device list file(/etc/ismsvr/ism_diskarray.devlist) and confirm it. (1) Execute ismmknod. (2) Message indicating that a special file is being created. (3) Message indicating that a disk array list file is being created. (4) Messages indicating that ismmknod terminated normally. 11

22 Next, set to monitor disk arrays by whether automatic detection of a special file or specification of a special file name. To monitor disk arrays by specification of a special file name, refer to the created disk array list file (/etc/ismsvr/ism_diskarray.devlist) and specify the environment definition file. For details of the environment definition file specification, refer to Environment Definition File. The following shows an example of a disk array list file (/etc/ismsvr/ism_diskarray.devlist). # # ism_diskarray.devlist # Created: Sat Jan 1 00:00: (1) # +=============================================================+ # PRODUCT NAME:S4000 Disk Array SERIAL NUMBER: #... (2) +============================================================= HD:00h Port No:00h SCSI address: 2/00/01... (3) /dev/nec_ism/mkdl/sda /dev/nec_ism/mkdl/sdb... (4) /dev/nec_ism/mkdl/sdc /dev/nec_ism/mkdl/sdd HD:01h Port No:01h SCSI address: 3/00/01... (5) /dev/nec_ism/mkdl/sde... (6) /dev/nec_ism/mkdl/sdf /dev/nec_ism/mkdl/sdg /dev/nec_ism/mkdl/sdh (1) Creation date (2) Disk array s Product name:s4000 Disk Array and Serial number: (3) Disk array s Host director (HD) number: 00h, Host director port number: 00h, and SCSI device address: 2/00/01. (4) List of special file to which (2) is connected (5) Disk array s Host director (HD) number: 00h, Host director port number: 00h, and SCSI device address: 3/00/01. (6) List of special file to which (2) is connected Special files reported in this file use a logical volume path that can be referred to from a server to which an ism server has been installed. To use it as an ism server's control path, it is preferable to explicitly specify an appropriate special file in the environment definition file by paying attention to the following. 12

23 Select special files via different paths (that is, paths different from a server s FC card or disk array host director port) as much as possible. When an I/O error is detected in a special file, the ism server switches to another special file described in the environment definition file and attempts to continue accessing. When a failure occurs in an FC card, host adaptor, or port, you can continue monitoring disk array if access to the special file is routed a different path. For details on which logical disk a special file indicates, refer to the ismvollist command execution result described in 2.5 Volume List Command (ismvollist) in the User s Manual (UNIX). You can execute the ismvollist command before the ismmknod command Enviironmentt Deffiiniittiion Fiille (1) Sample files The ism server provides four types of sample files as follows. These sample files are under /etc/ismsvr. Create an environment definition file (/etc/ismsvr/ismsvr.conf) referring to the following sample files in accordance with the operation. The following sample files are set that only the ism client (Web GUI) is available. A sample file in which minimum settings for the D series disk array are possible ismsvr.easy-d.sample A sample file in which minimum settings for the E series disk array are possible ismsvr.easy-e.sample A sample file in which minimum settings for the S series or A series disk array are possible ismsvr.easy-sa.sample A sample file in which all settings are possible ismsvr.sample (2) Minimum settings The following can be set when you use the sample file which performs minimum settings: (1) Minimum settings for the D series disk array Disk array Users Web browser connection port number Operation log file (2) Minimum settings for the E series disk array Disk array Users Web browser connection port number Operation log file 13

24 (3) Minimum settings for the S series or A series disk array Disk array Users ism client type to be permitted to connect Web browser connection port number Operation log file setting File transfer function setting [1] Disk array setting Specify the disk array to be monitored by the ism server. An IP connection is recommended for the disk array setting. When initializing the ism server from the ism client (Web GUI) for a D1 series, D3 series, or D4 series disk array for which initial settings have been specified, monitoring though an IP connection is required, but do not specify an IP address that you intend to use for the disk array in advance, because this address will be specified in the environment definition file on initialization. An iscsi connection cannot be used to monitor disk arrays. Only an IP connection is available for a disk array with only iscsi or an E series disk array setting. You must specify the user information for monitoring the E series disk array. The user information is the user name and password for logging in the E series disk array from Storage Manager Express. [2] User setting Sets the user to be specified when the ism server is connected from an ism client. The users specified here are to be the managers of the whole storage (Storage Manager). If you are planning to use the Virtual Storage Partitioning, specify the manager of the partition (Partition user) from ism client(web GUI). For the D1 series, D3 series, or D4 series disk array for which the initial setting is made after starting the ism server, it is mandatory to set a user with system administrator privilege (user level: L3). [3] ism client type to be permitted to connect setting Sets the ism client type to be permitted to connect to the ism server. When none is specified, only the ism client (Win GUI) is available. To use the ism client (Web GUI), ensure that this is set so that only the ism client (Web GUI) is available. Use the ism client (Web GUI) for the D series or E series disk arrays. [4] Web browser destination port number setting Sets the port number to be specified to connect to the ism server via a Web browser. If the specified port number conflicts with other applications, change it. 14

25 This setting is unnecessary when using the ism client (Win GUI). [5] Operation log file setting The ism server messages are stored in operation log files. The ism server creates up to 100 files of 1 MB each under the /opt/ismsvr/etc/log directory by default. Check the free space of the disk, and change the directory to store operation log files if the free space is not sufficient. If there is sufficient free space, this setting is not required. [6] File transfer function setting This setting is unnecessary when using the ism client (Web GUI). When you execute the following operations from the ism client (Win GUI), the file transfer function setting is required. If you use, however, the ism client (Win GUI) on the same computer as the ism server, this setting is not required. Selecting [Log Collection] on the main screen Selecting [Get Configuration Setting Info.] on the configuration setting screen Selecting [Download statistical information files] on the performance screen Selecting [Busy Ratio Graph] and [Replacement Effect Prediction] on the performance optimization screen For details on how to perform the setting, refer to (4) Setting information of environment definition file (ismsvr.conf) or the sample file in which minimum settings are possible. When you perform other settings than the above-mentioned ones, perform the settings using the sample file in which all settings are possible. For details on the settings, refer to (4) Setting information of environment definition file (ismsvr.conf) or the sample file in which all settings are possible. The ism server definition files include an event link definition file. Actions such as notification mail and shell activation are defined in this file based on various messages output by the ism server. For specification method, refer to Appendix C Event Link Definition File. For details of the event link function, refer to 1.6 Event Link in the User s Manual (UNIX). After new installation, sample files, msgdrv.sample and mail.sample, are created under /etc/ismsvr. Define these files as event link definition files by changing their file name to msgdrv.conf and mail.tpl. 15

26 (3) Description rules of environment definition file (ismsvr.conf) The following explains the description rules of the environment definition file: (a) section The environment definition file contents are divided into multiple blocks by section. Specify the start of section by enclosing the section name between brackets [ (left parenthesis) and ] (right parenthesis). The same section name cannot be specified in the environment definition file twice or more. (b) parameter Specify the definition contents of each section in parameters. A parameter is specified in lines next to the line where the section name is specified. A parameter consists of the keyword identifying the parameter type, =, and the value. A keyword is a clause consisting of alphanumeric characters and _. The same keyword can be specified only once in the defined section. A number, character string, or keyword can be specified to the value. With a number, specify zero or a positive integer up to 9 digits. With a character string, specify 1-byte alphanumeric special characters up to 1023 bytes. <Character string specification> When a character string is enclosed between double quotations ( ), it can include any characters other than the following. Note that a character string may be recognized without your intention when it is not enclosed correctly between double quotations. tab, line feed, and double quotation (, ) Example: /usr/bin/ls is recognized as /usr/bin/ls. When a character string is not enclosed between double quotations ( ), it can include any characters other than the following: tab, line feed, double quotation (, ), comma (,), space, semicolon (;), left parenthesis ((), right parenthesis ()), equal sign (=), and pound sign (#) <Path specification> Any characters other than the following cannot be specified for a path. A slash (/) can be used only for separating paths. Alphanumeric characters, period (.), hyphen (-), underscore (_), slash (/) <Parameter specification format> Only keyword A parameter consists of only a keyword. Example: nickname_check (no value specified) 16

27 Keyword and one value A parameter consists of a keyword, =, and the value. Example: file_size=1 (numeric value specified) file_directory=/opt/ismsvr/etc/log/ (character string specified) Keyword and multiple values (1) When multiple values can be specified, separate each value by one or more commas (,) or spaces and enclose whole the values by parentheses. A comma is assumed as a space. The order of values is optional. Example: ip=( , ) Keyword and multiple values (2) The description format is the same as Keyword and multiple values (1). In this format, however, the order of values is defined. Also, the number of values is fixed. A comma is assumed as a space. Example: login1=(john, Johnpass, L2) Keyword having a complex type value Within a value enclosed by parentheses, a keyword or a value enclosed by parentheses is specified in addition. Example: diskarray=(ip=( , )) A space, tab, or line feed can be placed before and after the above-described parameter elements (keyword, =, and values). A parameter can be described in two or more lines. Example: ip = ( , ) (c) comment A line starting with # is processed as a comment line. A comment line can be inserted between the section start line and parameter line, and between parameter lines (lines not including any parameter). A pound sign # in any other use is not processed as a comment line mark. Example: ### agent section ### Comment line [agent] Not a comment line 17

28 (4) Setting information of environment definition file (ismsvr.conf) The following explains the information that can be specified in the environment definition file. (a) agent section: Define information about the agent management. When initializing the ism server from the ism client (Web GUI) for a D1 series, D3 series, or D4 series disk array for which initial settings have been specified, monitoring though an IP connection is required, but do not specify an IP address that you intend to use for the disk array in advance, because this address will be specified in the environment definition file on initialization. Only an IP connection is available for a disk array with only iscsi or an E series disk array setting. You must specify the user information for monitoring the E series disk array. The user information is the user name and password for logging in the E series disk array from Storage Manager Express. [agent] [auto_find_spf] [snmp_port = port-number] [remonitoring_interval = remonitoring-check-interval] [lan_path_check_interval = monitoring-path-check-interval] [diskarray[1] = ( { ip = ( IP-address [,IP-address] ) [ type = E monitoring_user = (username, password) ] file = ( special-file-name [, special-file-name]... )} )] [diskarray2 = ( { ip = ( IP-address [,IP-address] ) [ type = E monitoring_user = (username, password) ] file = ( special-file-name [, special-file-name]... )} )] : : [diskarray64 = ( { ip = ( IP-address [,IP-address] ) [ type = E monitoring_user = (username, password) 18

29 ] file = ( special-file-name [, special-file-name]... )} )] Section name/ parameter [agent] Table 1-2 Information to be Set in Environment Definition File (agent Section) Value Agent management section Description Indicates the start of the agent management section. auto_find_spf None A disk array via an FC connection can be detected and monitored automatically by special file automatic detection. To specify this parameter, it is necessary to create a special file, which is described in (2) FC connection in Disk Array Monitoring Method Setting, in advance. If neither this parameter nor the diskarray parameter is specified, the ism server continues to operate, but the function of monitoring disk arrays becomes unavailable. snmp_port SNMP-port-number (Numeric: 162) remonitoring_interval remonitoring-checkinterval (Numeric: 1 to 60) lan_path_check_inter val diskarray[1] diskarray2 : : diskarray64 ip monitoring-path-chec k-interval (Numeric: 3 to 60) disk-arrayinformation IP-address (Character string: up to 255 characters) To receive the SNMP trap, specify 162 as a port number. The SNMP trap is information sent from the disk array to notify information such the state transition of hardware to the ism server. This parameter is available only for disk arrays monitored via TCP/IP connection. Disk arrays can be monitored without receiving the SNMP trap. It is recommended not to receive the SNMP trap because the performance may be degraded if network security is violated. If this parameter is not specified, the SNMP trap is not received. (Note) Specify an interval for checking whether monitoring a disk array can be restarted automatically after monitoring a disk array is stopped due to a trouble Unit: minute Default value: 5 (minutes) Specify an interval for checking the status of the switching path when monitoring by using an IP connection. Unit: minute Default value: 60 (minutes) Specify a disk array to be monitored by the ism server. By specifying a numeric value to n of diskarray(n), two or more disk arrays can be specified. If neither this parameter nor the auto_find_spf parameter is specified, the ism server continues to operate, but the function of monitoring disk arrays becomes unavailable. Specifiable range: 1 to 64 entries Specify an IP address to monitor a disk array via a TCP/IP connection. The ism server connects to the IP address or that specified by the host name (the port number is 2730 for a non-e series disk array or 443 for an E series disk array) to conduct monitoring. For disk arrays with two SVPs (SPs for E series), up to two (main and alternate) IP addresses (or host names) can be specified per entry. For disk arrays with one SVP (SP for E series), only one (main) IP address (or host name) can be specified per entry. 19

30 Section name/ parameter type monitoring_user file Value The type of disk array(e) User information for monitoring the E series disk array user-name (Character string: up to 20 characters) password (Character string: up to 14 characters) Special-file-name (Character string: up to 128 characters) Description Specify the type of disk array. E The E series disk array When using the E series disk array, you must specify it. When using disk array except the E series, do not specify. Specify the user information for monitoring the E series disk array. The user information is the user name and password for logging in the E series disk array. When using the E series disk array, you must specify it. When using disk array except the E series, do not specify. (Note) Specify a user name to monitoring the E series disk array. A user name is case-sensitive. Specify a password of the user to monitoring the E series disk array. A password is case-sensitive. A password encrypted by the ismcipherpw command can be specified. For details, refer to Appendix B Password Cipher Command. A password specification cannot be omitted. Specify this parameter to monitor disk arrays via an FC connection. A special file name must be specified by an absolute path name. For details on how to refer to a special file, refer to (2) FC connection in Disk Array Monitoring Method Setting. Up to eight special file names can be specified per entry. Note: Note that the user information set here has nothing to do with the OS's user account and user information in client section. 1. An IP address included in ismsvr.conf cannot be used for a D1 series, D3 series, or D4 series disk array for which initial settings have not been specified. When specifying the initial settings (including the network setting) from the ism client (Web GUI) after starting the ism server, make sure that ismsvr.conf does not include an IP address intended to be assigned to a disk array. 2. When using an application, which collects SNMP traps, such as Open View Network Node Manager, a port conflict occurs. Therefore, do not specify the SNMP port number. 3. When using disk array except the E series, if [type] or [monitoring_user] is specified, the disk array will cannot be monitored. Only when using the E series disk array, you must specify them. 20

31 (b) server section: Define information about ism server name [server] [ismsvr_name = ism-server-name ] Section name/ parameter Table 1-3 Information to be Set in Environment Definition File (server Section) Value Description [server] server section Indicates the start of the server section. ismsvr_name ism server name(character string: up to 20 characters) Specify an ism server name to be displayed in the Title Bar of ism client(web GUI). An ism server name is case-sensitive. To modify the display of the Title Bar, set here. When multiple ism servers are used, you can identify each of them from the Title Bar. Note that this parameter is available only for [permitted connection type of ism client] in client section is set [web]. 2-byte character, half-size character, control character, the characters (\/:,;*?"<> ) that cannot be used for a file name, and space cannot be used for an ism server name. (c) client section: Define information about the client management. [client] [ismsvr_port = ism-client-connection-port-number] [login[1]= ( user-name, password, {L1 L2 L3} )] : : [login100= ( user-name, password, {L1 L2 L3} )] [client_type = { web win } Section name/ parameter [client] ismsvr_port Table 1-4 Information to be Set in Environment Definition File (client Section) Value Client management section ism-client-connection -port-number (Numeric: 1 to Description Indicates the start of the client management section. Specify the port number of the ism server to which the ism client connects. For details of the ism client, refer to 2.2 Client Start/Stop of the User s Manual (UNIX). Default value:

32 Section name/ parameter login[1] : : login100 client_type Value User information user-name (Character string: up to 20 characters) password (Character string: up to 14 characters) User level (L1, L2, L3) ism client type (web, win) Description Specify user information. User information is used to identify a user who references and manipulates information about disk arrays by connecting from the ism client to the ism server. The users specified here are to be the managers of the whole storage (Storage Manager). If you are planning to use the Virtual Storage Partitioning, specify the manager of the partition (Partition user) from ism client(web GUI). By specifying a numeric value to n of login(n), information about two or more users can be specified. If this parameter is not specified, operation of the ism server continues but the ism client cannot connect to the ism server. syslog indicating this status is output. For the D1 series, D3 series, or D4 series disk array for which the initial setting is made after starting the ism server, it is mandatory to set a user with system administrator privilege (user level: L3). Specifiable range: 1 to 100 entries (Note) Specify a user name. A user name is case-sensitive. Information about two or more users who have the same cannot be specified. A user name specification cannot be omitted. Specify a password of the user. A password is case-sensitive. A password encrypted by the ismcipherpw command can be specified. For details, refer to Appendix B Password Cipher Command. A password specification cannot be omitted. Specify the operation authorization level of the user. The ism server defines the following three user levels to set/refer to disk array information by connecting the ism client to the ism server. An upper level (L3>L2>L1) allows all operations of a lower level. A user level specification cannot be omitted. L1: Standard user Reference such as monitoring and state display of the disk array is authorized. L2: Operator Operations necessary for replication/snapshot/performance monitoring/performance optimization function are authorized. L3: System administrator All operations including configuration setting of disk array are authorized. Sets the ism client type to be permitted to connect to the ism server. When using the D series or E series disk arrays, web must be set. web Only the ism client (Web GUI) is permitted to connect to the ism server. win Only the ism client (Win GUI) is permitted to connect to the ism server. (Default) Note: Note that the user information set here has nothing to do with the OS s user account and user information for monitoring disk array in agent section. 22

33 (d) web section: Define information about the web management. This setting is unnecessary when client_type is not specified or win is specified for client_type in the client section. [web] [web_port_no = Web-browser-destination-port-number] Table 1-5 Information to be Set in Environment Definition File (web Section) Section name/ parameter Value Description [web] Web section Indicates the start of the web section. web_port_no Web-browser -destination-portnumber (Numeric: 1 to 65535) Specify the port number to be used to connect to the ism server via a Web browser. Default value: 8070 (e) resource section: Define information about the state monitoring. [resource] [watch_interval = state-monitoring-interval] [capacity_watch_interval = capacity-monitoring-interval] [nickname_check] Section name/ parameter [resource] watch_interval capacity_watch_interv al Table 1-6 Information to be Set in Environment Definition File (resource Section) Value State monitoring section state-monitoringinterval (Numeric: 1 to 3600) capacity-monitori ng-interval (Numeric: 5 to 1440) Description Indicates the start of the state monitoring section. Specify an interval for monitoring the state of disk arrays. For details on the state monitoring, refer to 1.2 State Monitoring of the User s Manual (UNIX). Unit: second Default value: 15 Specify an interval for monitoring the following information. 1. The thin provisioning function Actual used capacity of the pool and logical disk Actual capacity threshold of the pool Actual capacity threshold (pre) of the pool LD capacity threshold of the logical disk 2. Snapshot function Snapshot used capacity Threshold of the snapshot used capacity For the thin provisioning function, the state monitoring interval (watch_interval) is used to monitor the pool and logical disk for memory shortages and the LD capacity quota of the logical disk. However, if the capacity monitoring interval is shorter than the state monitoring interval, * the capacity monitoring interval can also be used to perform this monitoring. * By default, the capacity monitoring interval is longer than the state 23

34 Section name/ parameter Value Description monitoring interval. Unit: minute Default value: 5 (minutes) nickname_check None Specify this parameter to make a duplication check on identifiers that are assigned to components in the disk arrays to be managed by ism. If this parameter is not specified, a duplication check is not performed. Components to be checked in a duplicated manner are as follows: Disk Array Name Logical Disk Name Port Name If you specify this parameter, all components are checked in a duplicated manner when the ism server starts and when the disk array monitoring is resumed. Duplicating check is not performed if this parameter is not set. (f) log section: Define information about log management. [log] [file_directory = log-file-location] [file_size = log-file-size] [modify_no_measures_msg_to_info] Table 1-7 Information to be Set in Environment Definition File (log Section) Section name/ parameter Value Description [log] Log section Indicates the start of the log section. file_directory file_size modify_no_measures_ msg_to_info log-file-location (Character string: up to 255 characters) log-file-size (Numeric: 1 to 10) None Specify the directory where the operation log file is stored. The existing directory is specified by an absolute path. For the operation log, refer to 1.5 Log Output of the User s Manual (UNIX). Default value: /opt/ismsvr/etc/log/ Specify the maximum operation log file size. Unit: MB Default value: 1 Specify this parameter to switch the classification to INFO for messages with WARNING classification that do not require operational attention. Classification change target messages are ism04040 and ism If this parameter is not specified, classification is not switched. When you specify the modify_no_measures_msg_to_info parameter, link may not be available when the target messages (ism04040 and ism01006) are defined by the event link function, because the message classification is changed. Check the message level setting of the event link definition. 24

35 (g) performance section: Define information about the performance monitoring. [performance] [monitor_file_directory = statistical-information-history-file-location ] [monitor_interval = logging-interval ] [display_refresh_rate = display-refresh-rate ] [threshold_monitor_interval = threshold-monitoring-interval ] [threshold_monitor_iops_border = minimum-i/o-count ] [threshold_monitor_logging_mode] [auto_adjust_monitor_interval [ = { yes no } ] ] [auto_archive_execution] [auto_execution_time = hour:minute ] [auto_start_monitor [ = { yes succeed no } ] ] [auto_deletion_execution = ( [history_file = keep period ][,] [primary_summarized_file = keep period ][,] [secondary_summarized_file = keep period ] ) ] Table 1-8 Information to be Set in Environment Definition File (performance Section) Section name/ parameter Value Description [performance] Performance Indicates the start of the performance monitoring section. monitoring section monitor_file_directory statisticalinformationhistory-filelocation (Character string: up to 255 characters) Specify a directory that saves the statistical information history file with the absolute path. For details, refer to the Performance Monitoring User s Manual. Default value: /opt/ismsvr/etc/mon/ monitor_interval display_refresh_rate threshold_monitor_ interval logginginterval (Numeric: 1 to 60) display-refreshrate (Numeric: 1 to 6) thresholdmonitoringinterval (Numeric: 1 to 60) Specify an interval to collect and output statistical information in the statistical information history file. Unit: minute Default value: 5 For a numeric value table and time series graph, specify how many times per minute the data of the performance monitoring screen is updated. For details, refer to the Performance Monitoring User s Manual. Unit: count/minute Default value: 1 Specify an interval to monitor the threshold. Unit: minute Default value: display-refresh-rate 25

36 Section name/ parameter threshold_monitor_ iops_border threshold_monitor_logging_ mode auto_adjust_monitor_ interval Value minimum- I/O-count (Numeric: 1 to 120) None yes no None Specify the minimum I/O count. Unit: count/minute Default value: 60 Description Set the threshold monitoring interval the same as the logging interval. Threshold monitoring is performed only for disk arrays which are accumulating statistical information. If this parameter is omitted, the interval specified for threshold_monitor_interval is used for threshold monitoring. Specify this parameter to change the interval so that the statistical information is automatically output if it cannot be output at specified intervals because there are too many disk array components. If this parameter is omitted, the operation is the same as that when yes is specified. yes, None Changes the interval so that that the statistical information can be automatically output. no Does not change the interval so that that the statistical information can be automatically output. auto_archive_execution None Specify this parameter to automatically summarize the statistical information. No statistical information is summarized if this parameter is not specified. auto_execution_time hour:minute Time when information is automatically summarized and the file of which keep period expired is deleted. This parameter is valid only when automatic summarization and automatic deletion are performed. hour Specify a value from 00 to 23. You can specify only one digit. minute Specify a value from 00 to 59. Always specify two digits. Default value:00:00 auto_start_monitor yes succeed no None Specifies whether to automatically start accumulating the statistical information of all disk arrays where PerformanceMonitor (the performance monitoring function) can be used when the ism server starts up. If you omit this parameter, statistical information will not start accumulating. yes Starts accumulating the statistical information of all disk arrays where PerformanceMonitor (the performance monitoring function) can be used when the ism server starts up for the first time. For disk arrays for which statistical information was accumulated during the previous operation, the statistical information is accumulated by inheriting the previous status. For disk arrays for which accumulating statistical information was stopped during the previous operation, the status is retained and accumulation is not started. succeed, None Does not start accumulating the statistical information of all disk arrays where PerformanceMonitor (the performance monitoring function) can be used when the ism server starts up for the first time. For disk arrays for which statistical information was 26

37 Section name/ parameter auto_deletion_execution history_file primary_summarized_file secondary_summarized_file Value Automatic deletion execution and keep period Keep period <Numerical value> <Unit> Keep period <Numerical value><unit> Keep period <Numerical value><unit> Description accumulated during the previous operation, the statistical information is accumulated by inheriting the previous status. For disk arrays for which accumulating statistical information was stopped during the previous operation, the status is retained and accumulation is not started. no Does not automatically start accumulating the statistical information. Set the keep period for the statistical information. The file whose keep period expired is automatically deleted. When specifying the keep period for the statistical information history file, primary summarized file and secondary summarized file simultaneously, delimit them with comma (, ). If this parameter is omitted, the statistical information is not automatically deleted. Keep period for the statistical information history file. The file is deleted after a specified period. If this parameter is omitted, the statistical information history files will not be deleted. Unit Indicates the unit. The following options are available. (You can use upper characters as well.) d: date m: month y: year Numerical value The settable values differ depending on the specified unit. d: m: 1-24 y: 1-2 Example: Set 1m to specify the keep period of one month. Keep period for the primary summarized file. The file is deleted after a specified period. If this parameter is omitted, the primary summarized files will not be deleted. Unit Indicates the unit. The following options are available. (You can use upper characters as well.) m: month y: year Numerical value The settable values differ depending on the specified unit. m: 1-24 y: 1-2 Example: Set 1m to specify the keep period of one month. Keep period for the secondary summarized file. The file is deleted after a specified period. If this parameter is omitted, the secondary summarized files will not be deleted. Unit Indicates the unit. The following options are available. 27

38 Section name/ parameter Value Description (You can use upper characters as well.) m: month y: year Numerical value The settable values differ depending on the specified unit. m: 1-24 y: 1-2 Example: Set 1y to specify the keep period of one year. 1. Automatic summarization and deletion of files whose keep period expired are performed for the statistical information files generated by the ism server V4.1 or later. Since these operations are not performed for those generated by the ism server V3.4 or earlier, you should summarize and delete them as needed. 2. Whether the set keep period of the statistical information file expired or not is determined based on the system time of the machine where the ism server operates. Therefore, take extra care when changing the system time. Before changing the system time considerably, stop the ism server. When changing the system time, save the statistical information files as needed. 3. From ism V4.1, the logging interval has been able to automatically be adjusted by default. To disable automatic adjustment of logging interval, change the setting of auto_adjust_monitor_interval in the ism server environment definition to no and restart the ism server. If the monitor_interval is set to an inappropriate value, the statistical information may not be output properly. Therefore, it is recommended to set auto_adjust_monitor_interval to yes as default. When updating ism server V3.4 or earlier, there are compatibility notes related to automatically adjusting the logging interval. For details, refer to the Performance Monitoring User s Manual. (h) config section: Define information about the configuration setting. [config] [no_clock_correction] [allow_virtual_capacity_over_max_pd] Section name/ parameter [config] Table 1-9 Information to be Set in Environment Definition File (config Section) Value Device configuration section Description Indicates the start of the device configuration section. no_clock_correction None Specify this parameter so that the timer of the disk array is not automatically corrected by the server. 28

39 Section name/ parameter allow_virtual_capacity _over_max_pd None Value Description If this parameter is not specified, the timer of the disk array is automatically corrected. Specify this parameter to allow the virtual capacity pool to exceed the maximum physical capacity. If you do not specify this parameter, the virtual capacity pool is limited to the maximum physical capacity. This setting is only enabled if the thin provisioning function is used. (i) optimizer section: Define information about performance optimization. [optimizer] [optlog_directory = performance-optimization-log-file-location] [prog_check_interval = logical-disk-movement-status-check-interval] Section name/ parameter [optimizer] optlog_directory prog_check_interval Table 1-10 Information to be Set in Environment Definition File (optimizer Section) Value Performance optimization section performanceoptimization-logfile-location (Character string: Up to 255 characters) logical-diskmovement-statuscheck-interval (Numeric: 5 to 30) Description Indicates the start of the performance optimization section. Specify the directory containing a performance optimization log file with the absolute path. Default value: /opt/ismsvr/etc/optlog/ Specify an interval to check the movement status of the logical disk. Unit: second Default value: 10 (j) file_transfer section: Define information about the file transfer. This setting is unnecessary when using the ism client (Web GUI). ism transfers files between the ism server and ism client (Win GUI) bi-directionally using FTP through the following operations of the ism client (Win GUI). Therefore, the FTP server environment must be generated on the ism server node before the ism server is operated. When operating the ism server and ism client (Win GUI) on the same computer without using the following functions, it is unnecessary to make settings for the FTP server environment and file transfer. Selecting [Log Collection] on the main screen (ism client (Win GUI)) Selecting [Get Configuration Setting Info.] on the configuration setting screen Selecting [Download statistical information files] on the performance screen Selecting [Busy Ratio Graph] and [Replacement Effect Prediction] on the performance optimization screen When these functions are not used, settings for file transfer are unnecessary. 29

40 [file_transfer] [user = FTP-user-name] [password = FTP-password] [ftp_ip = IP-address-of-FTP-server] [ftp_port = port-number-of-ftp-server] [ftp_root_directory = root-directory-of-ftp-server] [temp_directory = working-file-directory] Section name/ parameter [file_transfer] user password ftp_ip ftp_port ftp_root_directory Table 1-11 Information to be Set in Environment Definition File (file_transfer Section) Value File transfer section FTP-user-name (Character string: up to 32 characters) FTP-password (Character string: up to 58 characters) IP-address-of- FTP-server port-number-of- FTP-server (Numeric: 1 to 65535) root-directory-of- FTP-server (Character string: up to 192 characters) Description Indicates the start of the file transfer section. Specify an FTP user name. You can specify only an FTP user who is permitted to use the FTP and authorized to read from and write to files under the directory specified for temp_directory. A character string including a blank cannot be specified. A user name encrypted by the ismcipherpw command can be specified. For details, refer to Appendix B Password Cipher Command. Default value: ismuser Specify the password of the specified FTP user. If using anonymous or ftp as an FTP user, specify the mail address. A password encrypted by the ismcipherpw command can be specified. For details, refer to Appendix B Password Cipher Command. Specify the IP address to be used as an FTP connection destination from the ism client (Win GUI). If the IP address of the FTP server is not specified, the system automatically obtains the IP address of the ism server node and uses it as the FTP connection destination. When the ism server is used in the cluster environment or the IP address of the ism server node is not specified in the /etc/hosts file, specify the actual IP address of the ism server node. * Do not specify , , or as an IP address. Specify the port number of the FTP server. Default value: 21 Access from this port number must be permitted. When the root directory of the FTP server is not /, specify the FTP root directory with an absolute path. Example: When using anonymous as an FTP user and the FTP root directory is /home/ftp, specify /home/ftp. Default value: / 30

41 Section name/ parameter temp_directory Value working-filedirectory (Character string: up to 192 characters) Description Specify the directory saves temporary (working) files when the ism uses the FTP with an absolute path. This directory needs a free space of 300MB number of files concurrently transferred or more. It must be under the FTP server root directory. The user specified for ftp-user must be given write, read, and execution authorities for the specified directory. Execution authorities for all the directories above this directory must also be given to the user. Default: /opt/ismsvr/etc/temp/ Example: When the working file directory is /opt/ismsvr/etc/temp, execution authorities for /opt, /opt/ismsvr, and /opt/ismsvr/etc are required. Write and read authorities for /opt/ismsvr/etc/temp are also required. The file transfer function of ism is operated with FTP. An FTP command of Windows is used on the ism client (Win GUI) side and an FTP server of each OS is used on the ism server. In this case, only active mode (PORT mode) is used as FTP data transfer function. Therefore, if there is a firewall or NAT in the network between the ism client (Win GUI) and the ism server, the file transfer function may not be available. Before attempting to operate ism, be sure to connect the FTP (and perform get and put processing) through the command prompt on the computer on which the ism client (Win GUI) operates, and confirm that the items in the file_transfer section are set correctly. (k) replication section: Define information about the replication. [replication] [no_state_monitor] [no_replication_info_refresh] [rc_port_no = port-number] Table 1-12 Information to be Set in Environment Definition File (replication Section) Section name/ parameter Value Description [replication] Replication Indicates the start of the replication section. section no_state_monitor None Controls the status change messages issued by the ReplicationControl and SnapControl command operation. no_replication_info_re fresh None Specify this parameter to refresh the replication management window and connection window of the ism client by pressing the F5 key, not by refreshing the windows periodically. If you do not specify this parameter (the default value), these windows are refreshed periodically. If the RDR links between disk arrays are via the best-effort line, 31

42 Section name/ parameter rc_port_no Value port-number (Numeric: 1 to 65535) Description specify this parameter to avoid periodic refreshing. For details, see the low-speed line description in the Data Replication User s Manual (Function Guide). Specify the port number to be used when the ReplicationControl command is issued via ism. Default value: 8030 (l) snapshot section: Define information about the snapshot. [snapshot] [sc_port_no = port-number] Table 1-13 Information to be Set in Environment Definition File (snapshot Section) Section name/ parameter Value Description [snapshot] Snapshot section Indicates the start of the snapshot section. sc_port_no port-number (Numeric: 1 to 65535) Specify the port number to be used when the SnapControl command is issued via ism. Default value: 8060 To use the SnapControl commands via ism, the port numbers of the replication and snapshot sections are used. (m) data_retention section: Define information about the data retention function of the ism server. [data_retention] [protection_check_time = hour:minute ] [expiration_period = period-to-output-expiration-message ] [premonition_period = retention-date-approached-period ] Table 1-14 Information to be Set in Environment Definition File (data_retention Section) Section name/ parameter Value Description [data_retention] Data retention section Indicates the start of data retention section protection_check_time hour:minute Specify the time to check the protection state of the data-protected volume. hour: Specify a value from 00 to 23. You can specify one digit. minute: Specify a value from 00 to 59. Always specify two digits. Default value: 00:10 32

43 Section name/ parameter expiration_period premonition_period Value period-to-outputexpirationmessage (Numeric: 0 to 255) retention-dateapproachedperiod (Numeric: 0 to 255) Description Specify an output period of the expiration notification message when the retention is expired for the data-protected volume. When 0 is specified for the parameter, an expiration message is not output. Unit: day Default value: 1 Example: When three days is specified, the message is output every checking time of the data protection state for three days. Specify the retention date approached period which notifies you that the retention date of the data-protected volume is approaching. The first day of retention date approached period is the day of previous notification of retention date approached. When 0 is specified for the parameter, notification of retention date approached is not performed. Unit: day Default value: 0 Example: When three days is specified, retention date approached message is output three days before the expiration at the checking time of the data protection state. To change the following default port numbers of the environment definition file, specify different numbers. ism client connection port number of the client section (ismsvr_port) Web browser destination port number of the web section (web_port_no) FTP server port number of the file_transfer section (ftp_port) Port number of the replication section (rc_port_no) Port number of the snapshot section (sc_port_no) 33

44 (5) Environment definition file setting example The following is an example of the environment definition file created based on the sample file for the D series disk arrays in which minimum settings are possible. Environment Definition File ############################################################################ # This file is a sample to ease creation of the ism server environment # definition file that is used for D series disk array. The required items # and the confirmation items of the ism server are described here. # When the disk array is S series or A series, please use the # ismsvr.easy-sa-xxxxx.sample (XXXXX:language native code). # When the disk array is E series, please use the # ismsvr.easy-e-xxxxx.sample (XXXXX:language native code). (Only can be # used on Linux) # All the required settings of the ism server are accessible by customizing # and using this sample file. # A line starting with "#" is a comment line. # Remove "#" and use the line if necessary. ############################################################################ ########################## Explanation of Terms ########################### # There are 2 types of GUI supplied by ism client. # 1) GUI based on Web # 2) GUI based on Windows # If it is necessary to distinguish between the two types of the client in # this file, ism client(web GUI) is used for former one. Or, ism client # (Win GUI) is used for latter one. ############################################################################ ############################# agent section ################################ # Set the disk arrays to be monitored. # Monitoring the disk arrays via IP connection is recommended. # To monitor a disk array via IP connection, specify the IP address of SVP # LAN Connectors of the disk array. # To monitor a disk array via FC connection, specify auto_find_spf or file. # To monitor a disk array with only iscsi, must via IP connection. # For D1 series/d3 series/d4 series disk arrays where initialization setup has # not been completed, do not set IP address for monitoring here. The IP address # will be set later. ############################################################################ [agent] ## diskarray(n): Specify a disk array to be monitored by the ism server. ## By specifying a numeric value to n of diskarray(n), two ## or more disk arrays can be specified. If neither this ## parameter nor the auto_find_spf parameter is specified, ## the ism server continues to operate, but the function ## of monitoring disk arrays becomes unavailable. ## Specifiable range: 1 to 64 entries ## ip: Specify an IP address to monitor a disk array via IP ## connection. The ism server connects to the IP address or ## that specified by the host name (port number: 2730) to 34

45 ## conduct monitoring. ## For disk arrays with two SVPs, up to two (main and ## alternate) IP addresses (or host names) can be specified ## per entry. For disk arrays with one SVP, only one (main) ## IP address (or host name) can be specified per entry. ## (Character string: up to 255 characters) # diskarray1 = ( # ip = ( , ) # ) ## auto_find_spf: A disk array via FC connection can be detected and ## monitored automatically by special file automatic ## detection. If neither this parameter nor the diskarray ## parameter is specified, the ism server continues to ## operate, but the function of monitoring disk arrays ## becomes unavailable. # auto_find_spf ## file: Specify this parameter to monitor disk arrays via FC ## connection. A special file name must be specified by an ## absolute path name. ## (Character string: up to 128 characters) # For HP-UX # diskarray2 = ( # file = ( /dev/nec_ism/mkdl/c1t0d0, # /dev/nec_ism/mkdl/c1t0d1, # /dev/nec_ism/mkdl/c1t0d2, # /dev/nec_ism/mkdl/c1t0d3, # /dev/nec_ism/mkdl/c1t0d4, # /dev/nec_ism/mkdl/c1t0d5, # /dev/nec_ism/mkdl/c1t0d6, # /dev/nec_ism/mkdl/c1t0d7 ) # ) # # # For Solaris # diskarray2 = ( # file = ( /dev/rdsk/c1t0d0s2, # /dev/rdsk/c1t0d1s2, # /dev/rdsk/c1t0d2s2, # /dev/rdsk/c1t0d3s2, # /dev/rdsk/c1t0d4s2, # /dev/rdsk/c1t0d5s2, # /dev/rdsk/c1t0d6s2, # /dev/rdsk/c1t0d7s2 ) # ) # # # For Linux # diskarray2 = ( # file = ( /dev/nec_ism/mkdl/sda, 35

46 # /dev/nec_ism/mkdl/sdb, # /dev/nec_ism/mkdl/sdc, # /dev/nec_ism/mkdl/sdd, # /dev/nec_ism/mkdl/sde, # /dev/nec_ism/mkdl/sdf, # /dev/nec_ism/mkdl/sdg, # /dev/nec_ism/mkdl/sdh ) # ) # # ############################## client section ############################## # Define users authorized of the ism server. # Defined the user that is specified in the connection from the ism client. # Please define the user of system administrator (L3). # The user you defined here is user(storage user) which manages all of the # disk arrays. When you are using Virtual Storage Partitioning, please define # the user(partition user) which manages the assigned partitions using # ism client(web GUI). # Note that the user's information has nothing to do with the OS's user # account. ############################################################################ [client] ## login(n): Specify user information. User information is used to ## identify a user who references and manipulates ## information about disk arrays by connecting from the ism ## client to the ism server. ## Specifiable range: 1 to 100 entries ## username: Specify a user name. A user name is case-sensitive. ## (Character string: up to 20 characters) ## password: Specify a password of the user. A password is ## case-sensitive. A password encrypted by the ismcipherpw ## command can be specified. Automatic encryption can be ## performed by executing the [ismsvr check -p] or ## [ismsvr start -p] command. ## (Character string: up to 14 characters) ## L3: Specify the operation authorization level of the user. ## The ism server defines the following three user levels to ## set/refer to disk array information by connecting the ism ## client to the ism server. ## L1 Standard user Authorized for disk array monitoring, ## state display, etc. ## L2 Operator Authorized for operations on ## replication/snapshot/performance ## monitoring/performance optimization ## function. ## L3 System administrator ## Authorized for all operations. login1 = (ism, ism, L1) # login2 = (username, password, L3) ## client_type: Specify the permitted connection type of ism client. 36

47 ## When using D series disk array, please specify [web]. ## web Only permit ism client(web GUI) to connect. ## win Only permit ism client(win GUI) to connect. ## Default value: win client_type = web ############################# web section ################################## # Set the port number used for the Web browser to connect with ism server. # Please change the port number when it conflicts with other applications. ############################################################################ [web] ## web_port_no: Specify the port number used for the Web browser to ## connect with ism server. ## Default value: 8070 ## (Numeric: 1 to 65535) # web_port_no = 8070 ############################### log section ################################ # Set the information about the operation log of the ism server. # The messages of the ism server are output into the operation log. The # default value is recommended for these information, so it is unnecessary # to specify this section in common use. Up to 100 files can be produced # for the operation log, so the capacity of "file size (default value: # 1MB)*100 (MB)" is needed. When free disk space of the OS's disk is # insufficient, it is necessary to change the original setting. # The capacity of the disk can be confirmed by the [ismsvr check] command. ############################################################################ [log] ## file_directory: Specify the directory where the operation log file is ## stored. ## The existing directory is specified by an absolute path. ## Default value: /opt/ismsvr/etc/log/ ## (Character string: up to 255 characters) # file_directory = /opt/ismsvr/etc/log/ ## file_size: Specify the maximum operation log file size. ## Unit: MB ## Default value: 1 ## (Numeric: 1 to 10) # file_size = 1 37

48 1..4 iism Express Connector IInstallllatiion IInsttallllattiion To install the ism Express Connector, use the Linux rpm command and follow the procedure below. (1) Log in using root authority. (2) Insert the CD. When the CD drive is not available, transfer the ismconn.rpm file from another server before installing. (3) Mount the CD. - Create a mount directory (e.g. /cdrom) - Mount the CD with the mount command. /sbin/mount -r /dev/cdrom /cdrom (4) Install the software using the rpm command. /bin/rpm -ivh /cdrom/connector/linux/ismconn.rpm (5) When the following message is output, installation is completed. Installation of ismconn was successful. (6) Unmount the CD. /bin/umount /cdrom Then, refer to 1.5 Environment Settings of ism Express Connector. This section describes the contents to be registered in the environment definition file. If the modification of the file does not need, the ism Express Connector is activated by entering the start command (/sbin/service ismconn start) or by restarting Linux. 38

49 Uniinsttallllattiion To uninstall the ism Express Connector, use the Linux rpm command and follow the procedure below. (1) Log in using root authority. (2) Check that the ism Express Connector is not yet activated. When the ism Express Connector is activated, stop the ism Express Connector using the following command. /sbin/service ismconn stop (3) Uninstall the software using the following command. /sbin/rpm -e ismconn (4) When the following message is output, uninstallation is completed. Removal of ismconn was successful. Even though ism Express Connector has been uninstalled, the environment definition file and log file output during the running are not deleted. When a directory for extracting the package was created on another partition at software installation and symbolic link to /opt/ismconn was made, the symbolic link file for /opt/ismconn is not also deleted Updattiing To update the ism Express Connector, uninstall the existing software before installing the updated one. For the updating procedure, refer to Installation and Uninstallation. 39

50 1..5 Enviironment Settiings of iism Express Connector Enviironmentt Deffiiniittiion Fiille (1) Sample files The ism Express Connector provides a sample file as follows. A sample files are under /etc/ismconn. Create an environment definition file (/etc/ismconn/ismconn.conf) referring to the following sample file in accordance with the operation. When there is no modification, you do not need to create the environment definition file. And sample file is in /etc/ismconn. ismconn.sample (2) Description rules of environment definition file (ismconn.conf) The following explains the description rules of the environment definition file: (a) section The environment definition file contents are divided into multiple blocks by section. Specify the start of section by enclosing the section name between brackets [ (left parenthesis) and ] (right parenthesis). The same section name cannot be specified in the environment definition file twice or more. (b) parameter Specify the definition contents of each section in parameters. A parameter is specified in lines next to the line where the section name is specified. A parameter consists of the keyword identifying the parameter type, =, and the value. And one parameter must be described in single line with alphanumeric characters or special characters up to 1023 bytes. The same keyword can be specified only once in the defined section. <Character string specification> The following characters cannot be used. Tab character, new line character, and (, ) (double quotations) (Example) "/opt/ismconn/etc/log" will be recognized as /opt/ismconn/etc/log. <Path specification> The following characters can be used as path name. Alphanumeric character, \, : (colon), * (asterisk),?, (, ) (double quotations), <, >,,. (period), #, {, }, %, &, ~ (tilde) 40

51 <Parameter specification format> Keyword and one value A parameter consists of a keyword, =, and the value. Example: MaxLogFileSize=1 (numeric value specified) LogFilePath=/opt/iSMConn/etc/log/ (character string specified) (c) comment A line starting with # is processed as a comment line. A comment line can be inserted between the section start line and parameter line, and between parameter lines (lines not including any parameter). A pound sign # in any other use is not processed as a comment line mark. Example: #[FilePath] [FilePath] Comment line Not a comment line (3) Setting information of environment definition file (ismconn.conf) The following explains details of the information that can be set in the environment definition file. If the environment definition file was changed while ism Express Connector was running, restart of ism Express Connector is required. Perform the following procedure to restart (stop and start) it. Stop : /sbin/service ismconn stop Start : /sbin/service ismconn start (a) Section for log file path: Define the information of log file location [FilePath] [LogFilePath = log-file-location] Table 1-15 Information to be Set in Environment Definition File (FilePath Section) Section name/ parameter Value Description [FilePath] FilePath section Indicates the start of the FilePath section. LogFilePath Log-file-location ( parameter=valu e single line string up to 1023 characters) Specify the log file location. It must be the existing directory. Default value: /opt/ismconn/etc/log This value can be described as a relative path name. In this case, specify the relative path name from /opt/ismconn/sbin. 41

52 (b) Section for port number: Define the information of port number Define the port number and port number range used by ism Express Connector. Modify the port number if it conflicts with another application s port number. [Port] [ismexpressconnectormain = port-number] [ismconntimercontrol = port-number] [ismconnlogmanage = port-number] [ismconnismcomm = port-number] [ismconnmconnectstart = start-port-number] [ismconnmconnectend = end-port-number] [ismconnwinterfacestart = start-port-number] [ismconnwinterfaceend = end-port-number] Table 1-16 Information to be Set in Environment Definition File (Port Section) Section name/ parameter Value Description [Port] Port section Indicates the start of the Port section. ismexpressconnector Main ismconntimercontro l ismconnlogmanage ismconnismcomm ismconnmconnectst art ismconnmconnecten d ismconnwinterfacest art Port-number (Numeric: 1 to 65535) Port-number (Numeric: 1 to 65535) Port-number (Numeric: 1 to 65535) Port-number (Numeric: 1 to 65535) Start-port-number (Numeric: 1 to 65535) End-port-number (Numeric: 1 to 65535) Start-port-number (Numeric: 1 to 65535) Specify the port number. Default value: 7000 Specify the port number. Default value: 7001 Specify the port number. Default value: 7002 Specify the port number. Default value: 5555 Specify the beginning number of the port number used. Default value: Everything from the specified beginning port number to the end port number of ismconnmconnectend is used when changing. The range of the port number used must become twice or more the number of the monitored E series disk arrays. Specify the end number of the port number used. Default value: Everything from the beginning port number of ismconnmconnectstart to the specified end port number is used when changing. The range of the port number used must become twice or more the number of the monitored E series disk arrays. Specify the beginning number of the port number used. Default value: Everything from the specified beginning port number to the end port number of ismconnwinterfaceend is used when changing. The range of the port number used must become equal to or more than the number of the monitored E series disk arrays. 42

53 Section name/ parameter ismconnwinterfacee nd Value End-port-number (Numeric: 1 to 65535) Description Specify the end number of the port number used. Default value: Everything from the beginning port number of ismconnwinterfacestart to the specified end port number is used when changing. The range of the port number used must become equal to or more than the number of the monitored E series disk arrays. (c) Section for log file: Define the information of log file [ActionLog] [MaxLogFileSize = file-size] Table 1-17 Information to be Set in Environment Definition File (ActionLog Section) Section name/ parameter Value Description [ActionLog] ActionLog Indicates the start of the ActionLog section. section MaxLogFileSize log-file-size (Numeric: 1 to 10) Specify the maximum operation log file size. Unit: MB Default value: 1 43

54 1..6 Settiing System Parameter System parameters to be set required for ism operation are explained below. For details of system settings, refer to the User s Manual of your OS in use. To change the system parameter, check the current value or default value of the system parameter and set the new value by adding the defined value. (1) Maximum number of files to be opened Perform settings and kernel configuration as follows. Table 1-18 System Parameter (Maximum Number of Files to Be Opened) and Setting Values OS name Parameter name Required files Linux fs.file-max * Refer to the current value since the value differs depending on the system. ism fixed value: 160 or more Every client connection: add 16 files. Every disk array connection: add 19 files. Example: Number of clients to be connected: 32 Number of disk arrays to be connection: 2 Required files = x x 2 = 710 or more When monitoring the E series disk arrays, the following is also needed. ism Express Connector fixed value: 36 Every disk array connection: add 127 files Example: Number of clients to be connected: 32 Number of disk arrays to be connection: 2 Required files = x x x 2 = 1000 or more (2) Other setting items Set the system parameters and configure the kernel as follows if necessary. Table 1-19 Other System Parameters and Setting Values OS name Parameter name Description Linux kernel.msgmnb (Default value: 16384) Maximum size of queued message text per message queue ID ism uses three message queues. Increase the setting value if a message queue transfer error occurs between processes due to a lot of messages output by ism. Numerous messages are output at the same time since the messages related to all the LDs belonging to the pool or RANK are output when the pool or RANK state is changed by a PD failure. Therefore, increase the parameter value enough to output messages in such a case according to the following calculation (Number of LDs of pool or RANK including maximum LDs + 2) x

55 OS name Parameter name Description Linux Linux kernel.shmmax (Default value: ) kernle.shmmni (Default value: 4096) Maximum size of a shared memory segment ism uses the shared memory segment to manage the disk array information. Change the setting value based on the following value. * Set a value fully greater than the following reference value in byte units. Required size = (1,700, ,000 x (maximum number of logical disks of a disk array among disk arrays to be monitored) or more Example: 1,700, ,000 x 8,192 = 9,892,000 or more -> Specify 10,485,760 indicating 10 MB. Maximum number of memory segments shared by the entire system ism uses the shared memory segment to manage the disk array information. Shared memory segments may be insufficient if the number of disk arrays increases. Change the setting value based on the following value. * Set a value fully greater than the following reference value in byte units. [Common] ism fixed value: 12 or more Every disk array connection: add three memory segments. [When using PerformanceMonitor] Every disk array used by PerformanceMonitor: add one memory segment. [When using PerformanceOptimizer] Every disk array used by PerformanceOptimizer: add one memory segment. [When using DynamicSnapVolume] Every disk array used by DynamicSnapVolume (Including RDR-connected disk arrays): add one memory segment. Every 277 volume pairs, add one memory segment. [When using DynamicDataReplication or RemoteDataReplication] Every 4,500 volume pairs: add one memory segment. [When using RemoteDataReplication/DisasterRecovery] Every 900 ATgroups: add one memory segment. Example: Number of connected disk arrays: 2 [When PerformanceMonitor, PerformanceOptimizer, DynamicSnapVolume, DynamicDataReplication, RemoteDataReplication, and RemoteDataReplication/DisasterRecovery are available] Total number of snapshot BVs: 200 Total number of volume pairs: 2,000 Total number of ATgroups: 50 Required number of memory segments: x value rounded up to the nearest value of (200/277) + value rounded up to the nearest value of (2,000/4,500) + value rounded up to the nearest value of (50/900) = add 27 or more memory segments. 45

56 OS name Parameter name Description Linux kernel.shmall (Default value: ) Maximum number of memory pages shared by the entire system ism uses the shared memory segment to manage the disk array information. Change the setting value based on the following value. Required size = (kernel.shmmax value required by ism/4096) x kernel.shmmni value required by ism * Refer to the above calculation formula of kernel.shmmax and kernel.shmmni. The kernel parameter may become insufficient since each system setting sometime uses the kernel memory. Consider the mounted memory size. 46

57 Chapter 2 Storage Manager Setup (Windows) This chapter describes Storage Manager Setup that automatically starts when the ism CD is inserted. Storage Manager Setup is a function to install and set the software stored in the ism CD using the wizard. This function is available only for the software supporting Windows. Storage Manager Setup provides the following two functions. Quick Install Custom Install Quick Install enables to install the software required for the D1 series, D3 series, or D4 series initial installation easily. For details, refer to 2.1 Quick Install. You can configure software in detail by selecting Custom Install. Select this Custom Install setup on the D8 series or E series or S series/a series. For details, refer to 2.2 Custom Install. 1. Log in as a user with administrator privileges. 2. If the terminal service application mode is used, terminate this program. Then start to install ism from [Add or Remove Programs] of [Control Panel] at the installation server. 3. Storage Manager Setup may not start automatically when inserting the ism CD depending on the environment in use. In this case, run the following program in the CD directly. \INSTALL\WINDOWS\ISMSETUP.EXE 4. If you are to setup the disk array including the D1 series/d3 series/d4 series at the same time, do it first for the D1 series/d3 series/d4 series. Set up remaining disk array on Storage Manager Server configuration later. If the E series disk array is included in the remaining disk array, after execute this setup program again, select E series in the Custom Install and install Connector. 5. If you are to setup both a disk array with network established and the E series disk array, firstly perform setup for the E series disk array by the Custom Install. Set up remaining disk array on Storage Manager Server configuration later. 6. If you just want to upgrade the software version in the environment monitoring disk array including the D series, select D1 series/d3 series/d4 series(already initialized) or D8 series. Select E series of the Custom Install when the E series is included. 47

58 2..1 Quiick IInstallll Managementt Server Conffiigurattiion Configure the ism management server following the steps below. The following software programs are installed by these steps. ism server Java Runtime Environment (JRE) * The software that is necessary to use ism client (Web GUI) ism volume list command In addition, connection from the ism client (Web GUI) to the ism server is available. If you use ism for the first time, refer to [Read me first] on the first screen of Storage Manager Setup. Also, configure the server referring to [System configuration examples]. 1. To use the ESMPRO link function, install ESMPRO Agent ahead of the ism server. If Alert Manager Main Service has been started before the ism server is installed, terminate this service once to register the link function securely and then execute the following operations for installation. 2. The ism server creates many files, while it is operating, in the folder where ism itself is installed. If the program is uninstalled, all files and subfolders, not including the ism server setting file, in the folder where the program is installed are deleted. Therefore, default folder setting is recommended to use for installing the program. If you want to install the program into a folder other than the default folder, you have to create a new folder or be sure to install into an existing folder where other files are not installed. In addition, never save important files in the folder. 3. Be sure to use the quota management *1 and file screening *2 appropriately when applying them to the installation disk or folder. In case of misuse of them, a problem may occur during installation or operation. *1 Function to restrict the storage usage and prevent the storage from being used exceeding the restriction. *2 Function to prevent a file with a particular file name (extension) from being saved. 48

59 4. To replace the disk array concurrently with installation of this ism server version, delete the (IP address) setting for the disk array to be replaced from the ism server environment settings before uninstalling the older ism server. When the IP address is not deleted, this IP address will be unusable in the network setting for the D1 series, D3 series, or D4 series disk array. 5. The ism server can monitor more than one disk array simultaneously. However, do not use more than one ism servers to simultaneously monitor a single disk array. If multiple ism servers are used to monitor a single disk array, a repeatedly noticed error or a conflict between their statistical information of performance may cause operation trouble. 6. On environments in which virus scan software has been installed, the virus scan software constantly checks files because the ism server outputs trace files. This increases CPU load and may affect operation. In this case, specify the ism server installation folder (default: C:\Program Files\NEC\iSMsvr (C:\Program Files (x86)\nec\ismsvr for a 64-bit OS) not to be scanned by the virus scan software. 7. The client to be used for configuring or monitoring the D series disk array is the ism client (Web GUI). The client to be available by installing newly or by upgrading the version is the ism client (Web GUI) in this procedure. 8. The D1 series, D3 series, or D4 series which has not been configured initial settings yet should be connected to the same network the ism server installed server connected. 9. If Windows Firewall has been enabled, ism server program will be added to program exception automatically during the installation. The setting will be deleted automatically during the uninstallation. 10. An ism client (Web GUI) cannot be used in a Server Core environment. 49

60 Make the following settings for the Web browser to be used by the ism client (Web GUI). 1. Specify the ism server to connect to [Trusted sites]. The setting procedure is as follows. (1) Select [Control Panel] [Internet Options] [Security] tab. (2) Select [Trusted sites] and click the [Sites] button. Figure 2-1 Internet Options Screen 50

61 (3) In [Add this Web site to the zone:], enter the URL of the ism server to connect (Example: address (or host name) of ism server to connect]) and click [Add]. * Uncheck the [Require server verification ( for all sites in this zone] checkbox. Figure 2-2 Trusted sites Screen (4) Click the [Close] button to close the screen. 51

62 2. Set the security level of [Trusted sites]. The setting procedure is as follows. (1) Select [Control Panel] [Internet Options] [Security] tab. (2) Select [Trusted sites] and click the [Custom Level] button. Figure 2-3 Internet Options Screen 52

63 (3) Set [Run ActiveX controls and plug-ins] of [ActiveX controls and plug-ins] to [Enable]. Figure 2-4 Security Settings Screen (4) Click the [OK] button to close the screen. * When using Internet Explorer Version 7 or 8, do not enable the protected mode of [Trusted sites]. 53

64 When you set up the management server which monitors the disk array, perform the following installation procedure. (1) Log in as a user with administrator privileges. (2) Insert the CD. The Storage Manager Setup program automatically starts. For Windows Vista or later or Windows Server 2008 or later, the [AutoPlay] dialog may be displayed. If this dialog is displayed, select [Run ISMSETUP.EXE]. Since Storage Manager Setup may not start automatically depending on the environment in use, run the following program in the CD directly. Do the same when you insert the CD before login. \INSTALL\WINDOWS\ISMSETUP.EXE For Windows Vista or later or Windows Server 2008 or later, the [User Account Control] dialog may be displayed. Select [Continue] or [Yes] to start the setup. If you use ism for the first time, refer to [Read me first]. (3) Select [Setup the management server] from [Quick Install] and click the [Next] button. In a Server Core environment, [Read me first] and [System configuration examples] are grayed out (disabled). Figure 2-5 Select Setup Method Screen (Quick Install) 54

65 (4) The License Agreement screen is displayed. Be sure to read the entire description. To accept the license agreement, select [I accept terms of the license agreement], and then click the [Next] button. If you do not accept the license agreement, you cannot use this software. Figure 2-6 License Agreement Screen (5) Select a folder to which you want to install software. When you install software to the displayed folder, click the [Next] button. To change the installation folder, click the [Browse] button and select a folder. Figure 2-7 Choose Destination Location Screen 55

66 For a Server Core environment, the screen below is displayed. To install the software in the displayed folder, click the [Next] button. To change the installation folder, click the [Browse] button, and then select a folder. Figure 2-8 Choose Destination Location Screen (in a Server Core environment) 56

67 (6) Start the JRE installer. When JRE has not been installed, the JRE installer contained in CD is started. In a Server Core environment, it is unnecessary to install the JRE. The following screen is displayed if the installed JRE s version is older than JRE contained in CD. Select [Yes] and click the [Next] button to continue to install JRE. * The actual JRE version is displayed for X and Y. Figure 2-9 Install JRE Screen (1) 57

68 The following screen is displayed if the installed JRE s version is newer than JRE contained in CD. Be sure to check the latest information of the supported JRE. In this case, JRE is not installed. * The actual JRE version is displayed for X. Figure 2-10 Install JRE Screen (2) * It is recommended to disable Automatic Update of JRE after JRE installation. If this Automatic Update is available, there might be a possibility that JRE would be come the on that ism client(web GUI) does not support. (7) Install required software. If the older version of the software has been installed, the screen showing the installation status is displayed. Uninstall the installed software following the displayed steps. If the same version of software has been installed, the software is not installed. The following screen is displayed during installation. Figure 2-11 Installation Progress Screen 58

69 (8) Specify users. Users specified here can establish connection from the ism client to the ism server. Be sure to specify the system administrator (L3). When the system administrator has already been specified, the System Administrator screen is not displayed. Figure 2-12 User Setup Screen 59

70 (9) The required software has been installed. Clicking the [Finish] button restarts Windows. If you want to restart Windows later, check [Restart later] and click the [Finish] button. In this case, be sure to restart Windows in subsequent operations. Log in Windows with the same user as last time after restarting. When any required software including JRE is not installed by this procedure because the same version of the software has already been installed, check [Restart later] and finish. In this case, if you restart Windows manually, the Setup complete screen in (10) is not displayed. When ControlCommand, ismvollist-related software, has been installed, ismvollist is not installed. In a Server Core environment, installation completes at this step. Figure 2-13 Installation complete Screen 60

71 (10) Setup is complete. The following screen is displayed after restarting Windows. This screen might not be displayed after restarting depending on your environment. If the screen is not displayed, directly start the following program on the installation CD: \INSTALL\WINDOWS\ISMSETUP.EXE For Windows Vista or later and Windows Server 2008 or later, the [User Account Control] dialog box might be displayed. Select [Continue] or [Yes] to start the setup. Clicking the [Finish] button automatically starts a Web browser. Log in as a user specified in (8). To perform the initial settings for the D1 series, D3 series, or D4 series disk array after login, start the initialization wizard. You can start the initialization wizard by selecting [Initialization Wizard] from the [File] menu of the ism client (Web GUI). For the initialization wizard, refer to the ism client (Web GUI) help. Clicking the [Cancel] button does not start a Web browser. To use the ism client (Web GUI), start a Web browser to connect to the ism server. In the URL field of the Web browser, enter address (or host name) of ism server to connect]:[web browser connection port number] to connect to the ism server. (Example: Make Internet Explorer (32-bit Internet Explorer for a 64-bit OS) the default Web browser. Figure 2-14 Setup complete Screen 61

72 1. When connecting to the ism server without making settings for the trusted sites and security level, connection may fail with the following message displayed. Change the settings according to the procedure described in page 50 and retry connection. Figure 2-15 Web Browser Screen (Without Making Settings) When using the ism client (Web GUI), it is necessary to set [Run ActiveX controls and plug-ins] to [Enable] for the Web browser. Select [Control Panel] [Internet Options] and make the setting in the [Security] tab. 2. The Warning: Security screen may be displayed when connecting to the ism server. In this case, confirm that the issuer is NEC Corporation and click the [Execute] button. 3. The message that the functions of Internet Explorer (or the program name of the Web browser in use) are blocked may be displayed in the Windows Security Alert screen when connecting to the ism server. In this case, unblock the Internet Explorer (or the program name of the Web browser in use) on the displayed screen or unblock it in the firewall setting beforehand. 4. You might fail to connect to ism server if you use a proxy server by setting of Web browser you are using. In this case, create an exception for ism server not to use a proxy server in Web browser. However, it is unnecessary to change proxy server settings when you use the ism client (Web GUI) and ism server on the same computer. Change proxy server settings following the steps below. 1) Select [Control Panel] [Internet Options] [Connections] tab. Then, click the [LAN Settings] button to open the Local Area Network (LAN) Settings dialog. 2) If [Use a proxy server for your LAN] is checked, click the [Advanced] button to open the Proxy Settings dialog; otherwise, you need not execute the following steps. 3) Add both host name and IP address for the server to connect in [Do not use proxy server for addresses beginning with:]. 4) Check the JRE proxy settings according to the steps below. JRE 6 and 5.0 Select [Control Panel] [Java Plug-in] [Proxies]. Then confirm whether [Use Browser Settings] is checked. If not checked, add both host name and IP address for the server to connect in [No Proxy Host]. 62

73 JRE 6 or JRE 5.0 Select [Control Panel] [Java] [Network Settings]. Then confirm whether [Use browser settings] is checked. If not checked, select [Advanced] and add both host name and IP address for the server to connect in [Exceptions]. 5) Close all Web browsers in use and restart a Web browser. 5. When the installer is downloaded from the ism client (Web GUI) and the ism client (Win GUI) is newly installed, the shortcut for starting the ism client is not created in the Start menu or Desktop. This shortcut is created when the overwrite installation is executed or if the ism client (Web GUI) has been installed on the same computer. Since this shortcut is unnecessary for ism client (Web GUI) operation, delete it as necessary. 6. It is recommended to disable Automatic Update of JRE after JRE installation. Select [Java] or [Java Plug-in] from [Control Panel] and change the setting in the displayed Java control panel. If this Automatic Update is available, there might be a possibility that JRE would become the one that ism client(web GUI) does not support. 7. Only a user with administrator privileges can operate the ism client (Web GUI). 63

74 Applliicattiion Server Conffiigurattiion Configure the application server following the steps below. The following software programs are installed by these steps. ism volume list command Perform the following configuration at all servers. If you use ism for the first time, refer to [Read me first]. Perform the server configuration referring to [System configuration examples]. (1) Log in as a user with administrator privileges. (2) Insert the CD. The Storage Manager Setup program automatically starts. For Windows Server 2008 or later, the [AutoPlay] dialog may be displayed. If this dialog is displayed, select [Run ISMSETUP.EXE]. Since Storage Manager Setup may not start automatically depending on the environment in use, run the following program in the CD directly. Do the same when you insert the CD before login. \INSTALL\WINDOWS\ISMSETUP.EXE For Windows Server 2008 or later, the [User Account Control] dialog may be displayed. Select [Continue] or [Yes] to start the setup. If you use ism for the first time, refer to [Read me first]. 64

75 (3) Select [Setup an application server] from [Quick Install] and click the [Next] button. You cannot select this item in the environment where Fibre Channel is unavailable. In a Server Core environment, [Read me first] and [System configuration examples] are grayed out (disabled). Figure 2-16 Select Setup Method Screen (Quick Install) (4) The License Agreement screen is displayed. Be sure to read to the entire description. To accept the license agreement, select [I accept terms of the license agreement], and then click the [Next] button. If you do not accept the license agreement, you cannot use this software. Figure 2-17 License Agreement Screen 65

76 (5) Select a folder to which you want to install software. When you install software to the displayed folder, click the [Next] button. To change the installation folder, click the [Browse] button and select a folder. Figure 2-18 Choose Destination Location Screen For a Server Core environment, the screen below is displayed. To install the software in the displayed folder, click the [Next] button. To change the installation folder, click the [Browse] button, and select a folder. Figure 2-19 Choose Destination Location Screen (in a Server Core environment) 66

77 (6) Install required software. If the older version of the software has been installed, the screen showing the installation status is displayed. Uninstall the installed software following the displayed steps. If the same version of software has been installed, the software is not installed. The following screen is displayed during installation. Figure 2-20 Installation Progress Screen (7) The required software has been installed. Clicking the [Finish] button restarts Windows. If you want to restart Windows later, check [Restart later] and click the [Finish] button. In this case, be sure to restart Windows in subsequent operations. Any required software is not installed by this procedure because the same version of the software has already been installed, check [Restart later] and finish. Figure 2-21 Installation complete Screen After installing ismvollist command, and store the host information and create a volume list. For details, refer to "Host Information collection/storage" and "Volume List Creation". 67

78 2..2 Custom IInstallll Select Custom Install to install and set the following software step-by-step. ism server Java Runtime Environment (JRE) * The software that is necessary to use ism client (Web GUI) ism client (Win GUI) ism volume list command ism Express Connector (Connector) * The software that is necessary to monitor the E series disk arrays Select Custom Install from the following screen. Figure 2-22 Select Setup Method Screen (Custom Install) For the ism server and ism Express Connector, refer to Chapter 3 Server Installation (Windows). For the ism client, refer to Chapter 4 Client Installation. For the ism volume list command, refer to Chapter 6 Volume List Installation (Windows). 68

79 Chapter 3 Server Installation (Windows) 3..1 Operatiing Enviironment Table 3-1 Operating Environment (Windows) Operating systems < D series or E series > Microsoft Windows XP Professional Edition (SP0 to SP3) Microsoft Windows XP Professional x64 Edition (SP0, SP2) Microsoft Windows Vista Business (SP0 to SP2) Microsoft Windows 7 Ultimate Microsoft Windows 7 Ultimate x64 Microsoft Windows 7 Enterprise Microsoft Windows 7 Enterprise x64 Microsoft Windows 7 Professional Microsoft Windows 7 Professional x64 Microsoft Windows Server 2003, Standard Edition (SP0 to SP2) Microsoft Windows Server 2003 R2, Standard Edition (SP0, SP2) Microsoft Windows Server 2003, Standard x64 Edition (SP0, SP2) Microsoft Windows Server 2003 R2, Standard x64 Edition (SP0, SP2) Microsoft Windows Server 2003, Enterprise Edition (SP0 to SP2) Microsoft Windows Server 2003 R2, Enterprise Edition (SP0, SP2) Microsoft Windows Server 2003, Enterprise x64 Edition (SP0, SP2) Microsoft Windows Server 2003 R2, Enterprise x64 Edition (SP0, SP2) Microsoft Windows Server 2003, Enterprise Edition for Itanium-based Systems (SP0 to SP2) Microsoft Windows Server 2008 Standard (SP0, SP2) (*1) (*2) Microsoft Windows Server 2008 R2 Standard (*1) Microsoft Windows Server 2008 Enterprise (SP0, SP2) (*1) (*2) Microsoft Windows Server 2008 R2 Enterprise (*1) Microsoft Windows Server 2008 for Itanium-based Systems (SP0, SP2) < S series or A series > Microsoft Windows 2000 Server (SP2 to SP4) Microsoft Windows 2000 Advanced Server (SP2 to SP4) Microsoft Windows XP Professional Edition (SP0 to SP3) Microsoft Windows XP Professional x64 Edition (SP0, SP2) Microsoft Windows Vista Business (SP0 to SP2) Microsoft Windows 7 Ultimate Microsoft Windows 7 Ultimate x64 Microsoft Windows 7 Enterprise Microsoft Windows 7 Enterprise x64 Microsoft Windows 7 Professional Microsoft Windows 7 Professional x64 Microsoft Windows Server 2003, Standard Edition (SP0 to SP2) 69

80 Microsoft Windows Server 2003 R2, Standard Edition (SP0, SP2) Microsoft Windows Server 2003, Standard x64 Edition (SP0, SP2) Microsoft Windows Server 2003 R2, Standard x64 Edition (SP0, SP2) Microsoft Windows Server 2003, Enterprise Edition (SP0 to SP2) Microsoft Windows Server 2003 R2, Enterprise Edition (SP0, SP2) Microsoft Windows Server 2003, Enterprise x64 Edition (SP0, SP2) Microsoft Windows Server 2003 R2, Enterprise x64 Edition (SP0, SP2) Microsoft Windows Server 2003, Enterprise Edition for Itanium-based Systems (SP0 to SP2) Microsoft Windows Server 2008 Standard (SP0, SP2) (*1) (*2) Microsoft Windows Server 2008 R2 Standard (*1) Microsoft Windows Server 2008 Enterprise (SP0, SP2) (*1) (*2) Microsoft Windows Server 2008 R2 Enterprise (*1) Microsoft Windows Server 2008 for Itanium-based Systems (SP0, SP2) (*1) The product without Hyper-V function is also supported. (*2) The Server Core install option is not supported. Memory OS required memory capacity (370) MB or more <When monitoring the E series disk arrays> OS required memory capacity (495) MB or more Disk capacity (A numeric value shown in parentheses is the required memory capacity to run ism on a 64-bit OS.) Program capacity: 60 MB Required capacity for operation: 90 MB or more Indispensable hardware Indispensable software <When monitoring an E series disk array> Program capacity: 66 MB Required capacity for operation: 106 MB or more NEC Storage series ism Express Connector * This software is required only when monitoring the E series disk arrays * Above are the supported environments for this version at the point of the initial shipment of this product. Microsoft Windows XP Professional Edition, Microsoft Windows XP Professional x64 Edition, Microsoft Windows Vista Business, Microsoft Windows 7 Ultimate, Microsoft Windows 7 Ultimate x64, Microsoft Windows 7 Enterprise, Microsoft Windows 7 Enterprise x64, Microsoft Windows 7 Professional, and Microsoft Windows 7 Professional x64 are available only for PC/AT compatible machines. For these OSs, only one disk array can be monitored via LAN. 70

81 Windows Event Log Storage Manager Operation Log Disk Array Executable file, batch file starting Mail Server ism Client Mail Transmission * When monitoring the E series, ism Express Connector must be installed on the same computer as Storage Manager. Figure 3-1 System Configuration Image (Windows) When managing a disk array via FC, a fibre channel controller, a fibre channel cable and a driver of fibre channel controller are necessary as peripheral equipments. And a fibre channel hub and a fibre channel switch should be installed if necessary. 1. The ism server can monitor more than one disk array simultaneously. However, do not use more than one ism servers to simultaneously monitor a single disk array. If multiple ism servers are used to monitor a single disk array, a repeatedly noticed error or a conflict between their statistical information of performance may cause operation trouble. 2. For environments in which the virus scan software has been installed, the virus scan software constantly checks files because the ism server outputs trace files. This increases CPU load and may affect operation. In this case, specify the ism server installation folder (default: C:\Program Files\NEC\iSMsvr (C:\Program Files (x86)\nec\ismsvr for a 64-bit OS) not to be scanned by the virus scan software. And, when using the E series disk arrays, ism Express Connector is also running. In this case, specify the ism Express Connector installation folder (default: C:\Program Files\NEC\iSMConn (C:\Program Files (x86)\nec\ismconn for a 64-bit OS) not to be scanned by the virus scan software. 71

82 3. It is recommended to use the ism client (Web GUI) when newly installing the ism server. When the ism server is installed using this procedure, the ism client (Web GUI) is set as an available client. However, the available client is the ism client (Win GUI) when upgrading the ism server version except the following case. To use the ism client (Web GUI), change the client to the ism client (Web GUI) in the ism server environment setting. For the ism server environment setting, refer to 3.3 Setup Wizard of ism server or 3.4 Setup Utility of ism server. The ism server environment setting is made by selecting [D1 series/d3 series/d4 series(not initialized)] [Set the required minimum with the wizard]. The ism server environment setting is made by selecting [D1 series/d3 series/ D4 series(already initialized)] [Set the required minimum with the wizard]. The ism server environment setting is made by selecting [D8 series] [Set the required minimum with the wizard]. The ism server environment setting is made by selecting [E series] [Set the required minimum with the wizard]. 4. The D1 series, D3 series, or D4 series which has not been configured initial settings yet should be connected to the same network the ism server installed server connected. 5. When monitoring the E series, you must install ism server and ism Express Connector. Refer to When Using the E Series for the installation of ism Express Connector. 6. When monitoring the E series, you must start ism Express Connector. If ism Express Connector is not started, the E series cannot be monitored. 7. While the E series is monitored, if user information (user name, password) defined in the environment settings of ism server was changed using Storage Manager Express, monitoring of the E series become unavailable. If user information was changed, update the environment settings of ism server (Figure or Figure 3-141) and restart ism server. 72

83 3..2 iism Server and iism Express Connector IInstallllatiion IInsttallllattiion To install the ism server, follow the procedure below. This installation procedure is for when [Custom Install] is selected for Storage Manager Setup. When using the E series disk arrays, you should install ism Express Connector. Refer to When Using the E Series. 1. To use the ESMPRO link function, install ESMPRO Agent ahead of the ism server. If Alert Manager Main Service has been started before the ism server is installed, terminate this service once to register the link function securely and then execute the following operations for installation. 2. When you install the ism server to a server in which ESMPRO Manager is installed, a screen of ESMPRO Link Setting Utility appears. Make setting as needed on the screen. For details, refer to Link between ESMPRO Manager and ESMPRO Alert Manager in the User s Manual. 3. The ism server creates many files, while it is operating, in the folder where ism itself is installed. If the program is uninstalled, all files and subfolders, not including the ism server setting file, in the folder where the program is installed are deleted. Therefore, default folder setting is recommended to use for installing the program. If you want to install the program into a folder other than the default folder, you have to create a new folder or be sure to install into an existing folder where other files are not installed. In addition, never save important files in the folder. 4. The target folder where Win.ini file is stored cannot be selected for a folder where the program is to be installed. 5. Be sure to use the quota management *1 and file screening *2 appropriately when applying them to the installation disk or folder. In case of misuse of them, a problem may occur during installation or operation. *1 Function to restrict the storage usage and prevent the storage from being used exceeding the restriction. *2 Function to prevent a file with a particular file name (extension) from being saved. 6. To replace the disk array concurrently with installation of this ism server version, delete the (IP address) setting for the disk array to be replaced from the ism server environment settings before uninstalling the older ism server. When the IP address is not deleted, this IP address will be unusable in the network setting for the D1 series, D3 series, or D4 series disk array. 73

84 7. If Windows Firewall has been enabled, ism server program will be added to program exception automatically during the installation. The setting will be deleted automatically during the uninstallation. 74

85 When Usiing tthe D1 Serriies//D3 Serriies//D4 Serriies ((Nott IIniittiialliized)) When using the D1 series, D3 series, or D4 series disk arrays with which initial settings are not made, install ism following the procedure described below. When using the disk arrays to which initial settings are made, refer to When Using the D1 Series/D3 Series/D4 series (Already Initialized). Use the ism client (Web GUI) when using the D series disk arrays. (1) Log in as a user with administrator privileges. (2) Insert the CD. The Storage Manager Setup program automatically starts. For Windows Vista or later or Windows Server 2008 or later, the [AutoPlay] dialog may be displayed. If this dialog is displayed, select [Run ISMSETUP.EXE]. Since Storage Manager Setup might not start automatically depending on your environment, directly start the following program on the installation CD. Do the same when you insert the CD before login. \INSTALL\WINDOWS\ISMSETUP.EXE For Windows Vista or later or Windows Server 2008 or later, the [User Account Control] dialog box might be displayed. Select [Continue] or [Yes] to start the setup. If you use ism for the first time, refer to [Read me first]. 75

86 (3) Select [Setup the management server or an application server] of [Custom Install] and click the [Next] button. In a Server Core environment, [Read me first] and [System configuration examples] are grayed out (disabled). Figure 3-2 Select Setup Method Screen (Custom Install) (4) Select [D1 series/d3 series/d4 series(not initialized)] and click the [Next] button. Figure 3-3 Select disk array Screen 76

87 (5) Select [1.Install Storage Manager Server] and click the [Next] button. You cannot select this when the same version of the ism server has already been installed. When installing other software programs on the same computer, select all the software programs to install referring to [System configuration examples]. Figure 3-4 Choice of setups Screen (6) When the older ism is installed, the following message is displayed. Click the [Next] button to uninstall the older ism following the steps displayed on the screen. * The actual ism server program versions are displayed for X.X.XXX and Y.Y.YYY. Figure 3-5 Installation status Screen 77

88 (7) The Install Storage Manager Server screen is displayed. Click the [Next] button to start the ism server setup. Figure 3-6 Install Storage Manager Server Screen (8) The ism server installation starts. Click the [Next] button. Figure 3-7 Installation Start Screen 78

89 (9) The License Agreement screen is displayed. Read the contents, select [I accept the terms of the license agreement] if you agree, and then click the [Next] button. Figure 3-8 License Agreement Screen (10) The information on the ism server is displayed. Read the contents and click the [Next] button. * The actual Storage Manager (Server Function) version and the date (month and year) are displayed for x.x.xxx and mm.yyyy, respectively. Figure 3-9 Information Screen 79

90 (11) Specify the folder in which ism server is installed. To change the installation folder, click the [Browse] button and change the installation folder. Then, click the [Next] button. Otherwise, click the [Next] button. Figure 3-10 Choose Destination Location Screen (12) Specify the program folder name for ism server. To change the program folder name, change Storage Manager Server displayed in [Program Folder] field. Then, click the [Next] button. Otherwise, click the [Next] button. Figure 3-11 Select Program Folder Screen 80

91 (13) Set the ESMPRO link. If ESMPRO Manager was installed before installing ism server, [ESMPRO Link Setting Utility] is started. So, set the ESMPRO link function. Even if the ESMPRO link is not set here, ESMPRO link can be set after the ism server installation. For details, refer to in 1.7 ESMPRO Link in the User s Manual. Click the [Close] button to go to the next screen. Figure 3-12 ESMPRO Link Setting Utility Screen (14) Install the ism server module. Figure 3-13 File Copying Screen 81

92 (15) Set the ism server environment. (i) The following screen is displayed when newly installing the ism server. Figure 3-14 Setup Utility Screen When Newly Installing ism server (ii) The following screen is displayed when upgrading the ism server. Figure 3-15 Setup Utility Screen When Upgrading Storage Manager Server 82

93 Select [Set the required minimum with the wizard] to configure essential settings. The client to be used when upgrading the ism server is the ism client (Web GUI). Select [Set all function by dialog] to configure detailed settings. For details, refer to 3.4 Setup Utility of ism server. To use the ism client (Web GUI) to upgrade the ism server, be sure to change the client to the ism client (Web GUI) in the ism server environment setting. Select [Do it later] or [Succeeds the previous setting] to make the settings afterwards. The installation procedure when selecting [Set the required minimum with the wizard] is described below. (16) Specify users. Be sure to specify the system administrator. After specifying the system administrator, click the [Next] button. When the system administrator has already been specified, the System Administrator screen is not displayed. Figure 3-16 User Setup Screen 83

94 (17) Specify the Web browser destination port number. Change the port number when it conflicts with other applications. Figure 3-17 Web Browser Destination Port Number Setup Screen (18) Set the operation log. Change the setting when the OS disk space is insufficient. Figure 3-18 Log Setup Screen 84

95 (19) The Contents Setting Confirmation screen is displayed. If the displayed contents are correct, click the [Next] button. Figure 3-19 Contents Setting Confirmation Screen (20) The screen to confirm to save the settings is displayed. The settings are saved by clicking the [Yes] button. Figure 3-20 Contents Setting Saving Confirmation Screen 85

96 (21) The Setup Complete screen is displayed. Click the [Finish] button. Figure 3-21 Setup Complete Screen (22) The Storage Manager Server Setup completion screen is displayed. Click the [Finish] button. Figure 3-22 InstallShield Wizard Complete Screen 86

97 (23) The ism server installation is complete. In Figure 3-4, if only [1.Install Storage Manager Server] is selected, or if [1.Install Storage Manager Server] and [3.Install Storage Manager Client] are selected, the following screen is displayed. Windows is restarted by clicking the [Finish] button. If [1.Install Storage Manager Server] and [3.Install Storage Manager Client] are selected, the Storage Manager Client installation starts after Windows restarted. This screen might not be displayed after restarting depending on your environment. If the screen is not displayed, directly start the following program on the installation CD: \INSTALL\WINDOWS\ISMSETUP.EXE For Windows Vista or later and Windows Server 2008 or later, the [User Account Control] dialog box might be displayed. Select [Continue] or [Yes] to start the setup. If you want to restart Windows later, check [Restart later] and click the [Finish] button. In this case, be sure to restart Windows in subsequent operations. Log in Windows with the same user as last time. Figure 3-23 ism server Installation Complete Screen (1) In Figure 3-4, if [1.Install Storage Manager Server] and [2.Install Storage Manager Volume List] are selected, the following screen is displayed. Continue to install ismvollist. 87

98 Figure 3-24 ism server Installation Complete Screen (2) The IP address that has been set in the environment definition cannot be used for the D1 series, D3 series, or D4 series disk array for which the network setting is not performed. To perform the disk array network setting later, ensure that the environment definition does not include the same IP address. 88

99 When Usiing tthe D1 Serriies//D3 Serriies//D4 serriies ((Allrready IIniittiialliized)) When using a D1 series, D3 series, or D4 series disk array for which initial settings have been specified, install ism following the procedure described below. Use the ism client (Web GUI) when using the D series disk arrays. (1) Log in as a user with administrator privileges. (2) Insert the CD. The Storage Manager Setup program automatically starts. For Windows Vista or later or Windows Server 2008 or later, the [AutoPlay] dialog may be displayed. If this dialog is displayed, select [Run ISMSETUP.EXE]. Since Storage Manager Setup may not start automatically depending on your environment, directly start the following program on the installation CD. Do the same when you insert the CD before login. \INSTALL\WINDOWS\ISMSETUP.EXE For Windows Vista or later or Windows Server 2008 or later, the [User Account Control] dialog box might be displayed. Select [Continue] or [Yes] to start the setup. If you use ism for the first time, refer to [Read me first]. (3) Select [Setup the management server or an application server] of [Custom Install] and click the [Next] button. In a Server Core environment, [Read me first] and [System configuration examples] are grayed out (disabled). Figure 3-25 Select Setup Method Screen (Custom Install) 89

100 (4) Select [D1 series/d3 series/d4 series(already initialized)] and click the [Next] button. Figure 3-26 Select disk array Screen (5) Select [1.Install Storage Manager Server] and click the [Next] button. You cannot select this when the same version of the ism server has already been installed. Figure 3-27 Choice of setups Screen 90

101 (6) When the older ism is installed, the following message is displayed. Click the [Next] button to uninstall the older ism following the steps displayed on the screen. * The actual ism server program versions are displayed for X.X.XXX and Y.Y.YYY. Figure 3-28 Installation status Screen (7) The Install Storage Manager Server screen is displayed. Click the [Next] button to start the ism server setup. Figure 3-29 Install Storage Manager Server Screen 91

102 (8) The ism server installation starts. Click the [Next] button. Figure 3-30 Installation Start Screen (9) Read the contents, select [I accept the terms of the license agreement] if you agree, and then click the [Next] button. Figure 3-31 License Agreement Screen 92

103 (10) The information on the ism server is displayed. Read the contents and click the [Next] button. * The actual Storage Manager (Server Function) version and the date (month and year) are displayed for x.x.xxx and mm.yyyy, respectively. Figure 3-32 Information Screen (11) Specify the folder in which ism server is installed. To change the installation folder, click the [Browse] button and change the installation folder. Then, click the [Next] button. Otherwise, click the [Next] button. Figure 3-33 Choose Destination Location Screen 93

104 (12) Specify the program folder name for ism server. To change the program folder name, change Storage Manager Server displayed in [Program Folder] field. Then, click the [Next] button. Otherwise, click the [Next] button. Figure 3-34 Select Program Folder Screen 94

105 (13) Set the ESMPRO link. If ESMPRO Manager was installed before installing ism server, [ESMPRO Link Setting Utility] is started. So, set the ESMPRO link function. Even if the ESMPRO link is not set here, ESMPRO link can be set after the ism server installation. For details, refer to in 1.7 ESMPRO Link in the User s Manual. Click the [Close] button to go to the next screen. Figure 3-35 ESMPRO Link Setting Utility Screen (14) Install the ism server module. Figure 3-36 File Copying Screen 95

106 (15) Set the ism server environment. (i) The following screen is displayed when newly installing the ism server. Figure 3-37 Setup Utility Screen When Newly Installing ism server (ii) The following screen is displayed when upgrading the ism server. Figure 3-38 Setup Utility Screen When Upgrading Storage Manager Server 96

107 Select [Set the required minimum with the wizard] to configure essential settings. The client to be used when upgrading the ism server is the ism client (Web GUI). Select [Set all function by dialog] to configure detailed settings. For details, refer to 3.4 Setup Utility of ism server. To use the ism client (Web GUI) to upgrade the ism server, be sure to change the client to the ism client (Web GUI) in the ism server environment setting. Select [Do it later] or [Succeeds the previous setting] to make the settings afterwards. The installation procedure when selecting [Set the required minimum with the wizard] is described below. (16) Specify disk arrays. Specify IP addresses for disk arrays that the ism server monitors. After configuring, click the [Next] button, if disk arrays have already been configured, The IP Connection Setup window will not come up. Figure 3-39 Disk Array Setup Screen 97

108 (17) Specify users. Be sure to specify the system administrator. After specifying the system administrator, click the [Next] button. When the system administrator has already been specified, the System Administrator screen is not displayed. Figure 3-40 User Setup Screen 98

109 (18) Specify the Web browser destination port number. Change the port number when it conflicts with other applications. Figure 3-41 Web Browser Destination Port Number Setup Screen (19) Set the operation log. Change the setting when the OS disk space is insufficient. Figure 3-42 Log Setup Screen 99

110 (20) The Contents Setting Confirmation screen is displayed. If the displayed contents are correct, click the [Next] button. Figure 3-43 Contents Setting Confirmation Screen (21) The screen to confirm to save the settings is displayed. The settings are saved by clicking the [Yes] button. Figure 3-44 Contents Setting Saving Confirmation Screen 100

111 (22) The Setup Complete screen is displayed. Click the [Finish] button. Figure 3-45 Setup Complete Screen (23) The Storage Manager Server Setup completion screen is displayed. Click the [Finish] button. Figure 3-46 InstallShield Wizard Complete Screen 101

112 (24) Restart the computer. Restart the computer so that the system recognizes the installed ism server program. To prevent ism server from being automatically started due to restarting the computer, refer to 3.1 Server Start/Stop in the User s Manual. Figure 3-47 Restarting Computer Screen 102

113 When Usiing tthe D8 Serriies When using the D8 series, install ism following the procedure described below. Use the ism client (Web GUI) when using the D series disk arrays. (1) Log in as a user with administrator privileges. (2) Insert the CD. The Storage Manager Setup program automatically starts. For Windows Vista or later or Windows Server 2008 or later, the [AutoPlay] dialog may be displayed. If this dialog is displayed, select [Run ISMSETUP.EXE]. Since Storage Manager Setup may not start automatically depending on your environment, directly start the following program on the installation CD. Do the same when you insert the CD before login. \INSTALL\WINDOWS\ISMSETUP.EXE For Windows Vista or later or Windows Server 2008 or later, the [User Account Control] dialog box might be displayed. Select [Continue] or [Yes] to start the setup. If you use ism for the first time, refer to [Read me first]. (3) Select [Setup the management server or an application server] of [Custom Install] and click the [Next] button. In a Server Core environment, [Read me first] and [System configuration examples] are grayed out (disabled). Figure 3-48 Select Setup Method Screen (Custom Install) 103

114 (4) Select [D8 series] and click the [Next] button. Figure 3-49 Select disk array Screen (5) Select [1.Install Storage Manager Server] and click the [Next] button. You cannot select this when the same version of the ism server has already been installed. Figure 3-50 Choice of setups Screen 104

115 (6) When the older ism is installed, the following message is displayed. Click the [Next] button to uninstall the older ism following the steps displayed on the screen. * The actual ism server program versions are displayed for X.X.XXX and Y.Y.YYY. Figure 3-51 Installation status Screen (7) The Install Storage Manager Server screen is displayed. Click the [Next] button to start the ism server setup. Figure 3-52 Install Storage Manager Server Screen 105

116 (8) The ism server installation starts. Click the [Next] button. Figure 3-53 Installation Start Screen (9) The License Agreement screen is displayed. Read the contents, select [I accept the terms of the license agreement] if you agree, and then click the [Next] button. Figure 3-54 License Agreement Screen 106

117 (10) The information on the ism server is displayed. Read the contents and click the [Next] button. * The actual Storage Manager (Server Function) version and the date (month and year) are displayed for x.x.xxx and mm.yyyy, respectively. Figure 3-55 Information Screen (11) Specify the folder in which ism server is installed. To change the installation folder, click the [Browse] button and change the installation folder. Then, click the [Next] button. Otherwise, click the [Next] button. Figure 3-56 Choose Destination Location Screen 107

118 (12) Specify the program folder name for ism server. To change the program folder name, change Storage Manager Server displayed in [Program Folder] field. Then, click the [Next] button. Otherwise, click the [Next] button. Figure 3-57 Select Program Folder Screen 108

119 (13) Set the ESMPRO link. If ESMPRO Manager was installed before installing ism server, [ESMPRO Link Setting Utility] is started. So, set the ESMPRO link function. Even if the ESMPRO link is not set here, ESMPRO link can be set after the ism server installation. For details, refer to 1.7 ESMPRO Link in the User s Manual. Click the [Close] button to go to the next screen. Figure 3-58 ESMPRO Link Setting Utility Screen (14) Install the ism server module. Figure 3-59 File Copying Screen 109

120 (15) Set the ism server environment. (i) The following screen is displayed when newly installing the ism server. Figure 3-60 Setup Utility Screen When Newly Installing ism server (ii) The following screen is displayed when upgrading the ism server. Figure 3-61 Setup Utility Screen When Upgrading Storage Manager Server Select [Set the required minimum with the wizard] to configure essential settings. The client to be used when upgrading the ism server is the ism client (Web GUI). 110

121 Select [Set all function by dialog] to configure detailed settings. For details, refer to 3.4 Setup Utility of ism server. To use the ism client (Web GUI) to upgrade the ism server, be sure to change the client to the ism client (Web GUI) in the ism server environment setting. Select [Do it later] or [Succeeds the previous setting] to make the settings afterwards. The installation procedure when selecting [Set the required minimum with the wizard] is described below. (16) Specify disk arrays. Specify IP addresses for disk arrays that the ism server monitors. After configuring, click the [Next] button, if disk arrays have already been configured, The IP Connection Setup window will not come up. Figure 3-62 Disk Array Setup Screen 111

122 (17) Specify users. Be sure to specify the system administrator. After specifying the system administrator, click the [Next] button. When the system administrator has already been specified, the System Administrator screen is not displayed. Figure 3-63 User Setup Screen 112

123 (18) Specify the Web browser destination port number. Change the port number when it conflicts with other applications. Figure 3-64 Web Browser Destination Port Number Setup Screen (19) Set the operation log. Change the setting when the OS disk space is insufficient. Figure 3-65 Log Setup Screen 113

124 (20) The Contents Setting Confirmation screen is displayed. If the displayed contents are correct, click the [Next] button. Figure 3-66 Contents Setting Confirmation Screen (21) The screen to confirm to save the settings is displayed. The settings are saved by clicking the [Yes] button. Figure 3-67 Contents Setting Saving Confirmation Screen 114

125 (22) The Setup Complete screen is displayed. Click the [Finish] button. Figure 3-68 Setup Complete Screen (23) The Storage Manager Server Setup completion screen is displayed. Click the [Finish] button. Figure 3-69 InstallShield Wizard Complete Screen 115

126 (24) Restart the computer. Restart the computer so that the system recognizes the installed ism server program. To prevent ism server from being automatically started due to restarting the computer, refer to 3.1 Server Start/Stop in the User s Manual. Figure 3-70 Restarting Computer Screen 116

127 When Usiing tthe E Serriies When using the E series, install ism following the procedure described below. Use the ism client (Web GUI) when using the E series disk arrays. (1) Log in as a user with administrator privileges. (2) Insert the CD. The Storage Manager Setup program automatically starts. For Windows Vista or later and Windows Server 2008 or later, the [AutoPlay] dialog may be displayed. If this dialog is displayed, select [Run ISMSETUP.EXE]. Since Storage Manager Setup may not start automatically depending on the environment in use, run the following program in the CD directly. Do the same when you insert the CD before login. \INSTALL\WINDOWS\ISMSETUP.EXE For Windows Vista or later and Windows Server 2008 or later, the [User Account Control] dialog may be displayed. Select [Continue] or [Yes] to start the setup. If you use ism for the first time, refer to [Read me first]. (3) Select [Setup the management server or an application server] of [Custom Install] and click the [Next] button. In a Server Core environment, [Read me first] and [System configuration examples] are grayed out (disabled). Figure 3-71 Select Setup Method Screen (Custom Install) 117

128 (4) Select [E series] and click the [Next] button. Figure 3-72 Select disk array Screen 118

129 (5) Select [1.Install Storage Manager Server and Connector] and click the [Next] button. Install ism server and ism Express Connector which is needed for monitoring the E series disk arrays. When ism server of the same version has already been installed, only ism Express Connector is installed. You cannot select this when the same version of the ism server and ism Express Connector has already been installed. Figure 3-73 Choice of setups Screen ism Express Connector does not support Hyper-V. Therefore, do not install ism Express Connector on a Hyper-V virtual machine. 119

130 (6) When the same version of ism Express Connector has already been installed, the following screen is displayed. After click the [Next] button, ism server is installed. Refer to (10). Figure 3-74 Installation status Screen (1) (7) When the newer version of ism Express Connector has already been installed, the following screen is displayed. After click the [Next] button, ism server is installed. Refer to (10)-. Figure 3-75 Installation status Screen (2) 120

131 (8) When the older version of ism Express Connector has already been installed, the following screen is displayed. After click the [Next] button, the ism Express Connector is uninstalled. During the uninstallation, progress information dialog is displayed. Figure 3-76 Installation status Screen (3) (9) ism Express Connector installation screen is displayed. To change the installation folder, click the [Browse] button and change the installation folder. Then, click the [Next] button. Otherwise, click the [Next] button. After click the [Next] button, the ism Express Connector setup is started. During the installation, progress information dialog is displayed. Figure 3-77 Install Connector Screen (in a Server Core environment) 121

132 For a Server Core environment, the screen below is displayed. To change the installation folder, specify an existing folder, and then click the [Next] button. To install the software in the displayed folder, click the [Next] button. Clicking the [Next] button starts ism Express Connector setup. A dialog box showing the installation progress is displayed during installation. Figure 3-78 Install Connector Screen (in a Server Core environment) 122

133 (10) When the same version of ism server has already been installed, the following screen is displayed. After click the [Next] button, installation is completed. After installation, start [ism Express Connector] from [Services]. Figure 3-79 Installation status Screen (4) Figure 3-80 Installation complete Screen (1) 123

134 (11) When the newer version of ism server has already been installed, the following screen is displayed. After click the [Next] button, installation is completed. After installation, start [ism Express Connector] from [Services]. Figure 3-81 Installation status Screen (5) Figure 3-82 Installation complete Screen (2) 124

135 (12) When the older ism is installed, the following message is displayed. Click the [Next] button to uninstall the older ism following the steps displayed on the screen. * The actual ism server program versions are displayed for X.X.XXX and Y.Y.YYY. Figure 3-83 Installation status Screen (6) (13) The Install Storage Manager Server screen is displayed. Click the [Next] button to start the ism server setup. Figure 3-84 Install Storage Manager Server Screen 125

136 (14) The ism server installation starts. Click the [Next] button. Figure 3-85 Installation Start Screen (15) The License Agreement screen is displayed. Read the contents, select [I accept the terms of the license agreement] if you agree, and then click the [Next] button. Figure 3-86 License Agreement Screen 126

137 (16) The information on the ism server is displayed. Read the contents and click the [Next] button. * The actual Storage Manager (Server Function) version and the date (month and year) are displayed for x.x.xxx and mm.yyyy, respectively. Figure 3-87 Information Screen (17) Specify the folder in which ism server is installed. To change the installation folder, click the [Browse] button and change the installation folder. Then, click the [Next] button. Otherwise, click the [Next] button. Figure 3-88 Choose Destination Location Screen 127

138 (18) Specify the program folder name for ism server. To change the program folder name, change Storage Manager Server displayed in [Program Folder] field. Then, click the [Next] button. Otherwise, click the [Next] button. Figure 3-89 Select Program Folder Screen 128

139 (19) Set the ESMPRO link. If ESMPRO Manager was installed before installing ism server, [ESMPRO Link Setting Utility] is started. So, set the ESMPRO link function. Even if the ESMPRO link is not set here, ESMPRO link can be set after the ism server installation. For details, refer to in 1.7 ESMPRO Link in the User s Manual. Click the [Close] button to go to the next screen. Figure 3-90 ESMPRO Link Setting Utility Screen (20) Install the ism server module. Figure 3-91 File Copying Screen 129

140 (21) Set the ism server environment. (i) The following screen is displayed when newly installing the ism server. Figure 3-92 Setup Utility Screen When Newly Installing ism server (ii) The following screen is displayed when upgrading the ism server. Figure 3-93 Setup Utility Screen When Upgrading Storage Manager Server Select [Set the required minimum with the wizard] to configure essential settings. The client to be used when upgrading the ism server is the ism client (Web GUI). 130

141 Select [Set all function by dialog] to configure detailed settings. For details, refer to 3.4 Setup Utility of ism server. To use the ism client (Web GUI) to upgrade the ism server, be sure to change the client to the ism client (Web GUI) in the ism server environment setting. Select [Do it later] or [Succeeds the previous setting] to make the settings afterwards. The installation procedure when selecting [Set the required minimum with the wizard] is described below. (22) Specify disk arrays. Set IP addresses for disk arrays which ism server monitors. After configuring, click the [Next] button, if disk arrays have been already configured, The IP Connection Setup window will not come up. Figure 3-94 Disk Array Subsystems Setup Screen 131

142 Figure 3-95 Monitoring User Setup Screen (23) Specify users. Be sure to specify the system administrator. After setting the system administrator, click the [Next] button. When the system administrator has already been specified, the System Administrator screen is not displayed. Figure 3-96 User Setup Screen 132

143 (24) Specify the Web browser destination port number. Change the port number when it conflicts with other applications. Figure 3-97 Web Browser Destination Port Number Setup Screen (25) Set the operation log. Change the setting when the OS disk space is insufficient. Figure 3-98 Log Setup Screen 133

144 (26) The Contents Setting Confirmation screen is displayed. If the displayed contents are correct, click the [Next] button. Figure 3-99 Contents Setting Confirmation Screen (27) The screen to confirm to save the settings is displayed. The settings are saved by clicking the [Yes] button. Figure Contents Setting Saving Confirmation Screen 134

145 (28) The Setup Complete screen is displayed. Click the [Finish] button. Figure Setup Complete Screen 135

146 (29) The Setup completion screen is displayed. Restart the computer so that the system recognizes the installed ism server program. To prevent ism server from being automatically started due to restarting the computer, refer to 3.1 Server Start/Stop in the User s Manual. Clicking the [Finish] button restarts Windows. If you want to restart Windows later, check [Restart later] and click the [Finish] button. In this case, be sure to restart Windows in subsequent operations. Log in Windows with the same user as last time after restarting. Figure Installation complete Screen 136

147 When Usiing tthe S Serriies orr A Serriies When using the S series or A series, install ism following the procedure described below. (1) Log in as a user with administrator privileges. (2) Insert the CD. The Storage Manager Setup program automatically starts. For Windows Vista or later or Windows Server 2008 or later, the [AutoPlay] dialog may be displayed. If this dialog is displayed, select [Run ISMSETUP.EXE]. Since Storage Manager Setup might not start automatically depending on your environment, directly start the following program on the installation CD. Do the same when you insert the CD before login. \INSTALL\WINDOWS\ISMSETUP.EXE For Windows Vista or later or Windows Server 2008 or later, the [User Account Control] dialog box might be displayed. Select [Continue] or [Yes] to start the setup. If you use ism for the first time, refer to [Read me first]. (3) Select [Setup the management server or an application server] of [Custom Install] and click the [Next] button. In a Server Core environment, [Read me first] and [System configuration examples] are grayed out (disabled). Figure Select Setup Method Screen (Custom Install) 137

148 (4) Select [S series/a series] and click the [Next] button. Figure Select disk array Screen (5) Select [1.Install Storage Manager Server] and click the [Next] button. You cannot select this when the same version of the ism server has already been installed. Figure Choice of setups Screen 138

149 (6) When the older ism is installed, the following message is displayed. Click the [Next] button to uninstall the older ism following the steps displayed on the screen. * The actual ism server program versions are displayed for X.X.XXX and Y.Y.YYY. Figure Installation status Screen (7) The Install Storage Manager Server screen is displayed. Click the [Next] button to start the ism server setup. Figure Install Storage Manager Server Screen 139

150 (8) The ism server installation starts. Click the [Next] button. Figure Installation Start Screen (9) The License Agreement screen is displayed. Read the contents, select [I accept the terms of the license agreement] if you agree, and then click the [Next] button. Figure License Agreement Screen 140

151 (10) The information on the ism server is displayed. Read the contents and click the [Next] button. * The actual Storage Manager (Server Function) version and the date (month and year) are displayed for x.x.xxx and mm.yyyy, respectively. Figure Information Screen (11) Specify the folder in which ism server is installed. To change the installation folder, click the [Browse] button and change the installation folder. Then, click the [Next] button. Otherwise, click the [Next] button. Figure Choose Destination Location Screen 141

152 (12) Specify the program folder name for ism server. To change the program folder name, change Storage Manager Server displayed in [Program Folder] field. Then, click the [Next] button. Otherwise, click the [Next] button. Figure Select Program Folder Screen 142

153 (13) Set the ESMPRO link. If ESMPRO Manager was installed before installing ism server, [ESMPRO Link Setting Utility] is started. So, set the ESMPRO link function. Even if the ESMPRO link is not set here, ESMPRO link can be set after the ism server installation. For details, refer to in 1.7 ESMPRO Link in the User s Manual. Click the [Close] button to go to the next screen. Figure ESMPRO Link Setting Utility Screen (14) Install the ism server module. Figure File Copying Screen 143

154 (15) Set the ism server environment. (i) The following screen is displayed when newly installing the ism server. Figure Setup Utility Screen When Newly Installing ism server (ii) The following screen is displayed when upgrading the ism server. Figure Setup Utility Screen When Upgrading Storage Manager Server To change the client to be used to the ism client (Web GUI) when upgrading the ism server, change the client type to Web GUI in the setup wizard or in the environment setting. 144

155 - When selecting [Set the required minimum with the wizard] The setup wizard starts up. The environment can be easily set in the setup wizard since only the essential settings are made. The following settings are made in the setup wizard: - Disk array setting - User setting - Client setting - Operation log setting - File transfer function setting *only when using ism client (Win GUI) For details, refer to 3.3 Setup Wizard of ism server. Figure Environment Setup Wizard Screen - When selecting [Set all functions by dialog] The setup utility starts up. In the setup utility, all the function can be set. The following settings are made in the setup utility: - Disk array settings - User settings - State monitoring function settings - Server/client settings - Event link function settings - File transfer function settings - Performance monitoring function settings - Performance optimization function settings 145

156 - Replication/snapshot function settings - Data retention function settings For details, refer to 3.4 Setup Utility of ism server. Figure Environment Setup Utility Screen - When selecting [Do it later] The environment is not set here. - When selecting [Succeeds the previous setting] The environment is not set here. All the previously set information is succeeded. 146

157 (16) The Storage Manager Server Setup is complete. Click the [Finish] button. Figure InstallShield Wizard Complete Screen (17) Restart the computer. Restart the computer so that the system recognizes the installed ism server program. To prevent ism server from being automatically started due to restarting the computer, refer to 3.1 Server Start/Stop in the User s Manual. Figure Restarting Computer Screen 147

158 Uniinsttallllattiion To uninstall the ism server, follow the procedure below. (1) Log in as a user with administrator privileges. (2) Close the [Services] and [Event Viewer]. (3) Uninstall Storage Manager Server by using [Programs and Features] ([Add or Remove Programs] for Windows Server 2003 and Windows XP; [Add/Remove Programs] for Windows 2000) in [Control Panel]. For Windows Vista or later or Windows Server 2008 or later, the [User Account Control] dialog box might be displayed when starting the uninstallation. Select [Continue] or [Yes] to run the uninstallation program. For a Server Core environment, insert the CD of the software version to be uninstalled, and then execute the following at the command prompt: \SERVER\WINDOWS\SETUP.EXE\uninstall When the NEC Storage Manager service is running, it will be automatically stopped. Even after ism has been uninstalled, the environment definition files, operation log files, performance statistical information history files, performance statistical information summary files, performance optimization log files, license-related files, and partition user information files are not deleted. To uninstall the ism Express Connector, follow the procedure below. (1) Log in as a user with administrator privileges. (2) Close the [Services] and [Event Viewer]. (3) Uninstall ism Express Connector by using [Programs and Features] ([Add or Remove Programs] for Windows Server 2003 and Windows XP; [Add/Remove Programs] for Windows 2000) in [Control Panel]. For Windows Vista or later or Windows Server 2008 or later, the [User Account Control] dialog box might be displayed when starting the uninstallation. Select [Continue] or [Yes] to run the uninstallation program. For a Server Core environment, insert the CD of the software version to be uninstalled, and then execute the following at the command prompt: msiexec /x \CONNECTOR\WINDOWS\iSMExpressConnector.msi 148

159 When the ism Express Connector service is running, it will be automatically stopped. Even after ism Express Connector has been uninstalled, the environment definition file and log file output during the running are not deleted. 149

160 Updattiing To update the ism server and ism Express Connector from an older version, uninstall the old ism server and ism Express Connector using Storage Manager Setup installation procedure and install a new version of the ism server. For updating procedure, refer to Installation. To update the same version of the ism server, uninstall the existing ism server and install the updated ism server. For the updating procedure, refer to Installation and Uninstallation. When upgrading OS of the server, where ism server and ism Express Connector are installed, to Windows Vista or later or Windows Server 2008 or later, update ism server and ism Express Connector (only when using the E series disk arrays) by the following procedure. (*) * This procedure is necessary even if the version of installed ism server and the version of ism server after update is the same. And when using the E series disk arrays, this procedure is necessary even if the version of installed ism Express Connector and the version of ism Express Connector after update is the same. (1) Upgrade the OS of the server, which is installed ism server, to Windows Vista or later or Windows Server 2008 or later. (2) After upgrading to Windows Vista or later or Windows Server 2008 or later is complete, uninstall the installed ism server. (Refer to Uninstallation for the uninstallation procedure) And when using the E series disk arrays, uninstall the installed ism Express Connector. (Refer to Uninstallation for the uninstallation procedure) (3) Install ism server again. (Refer to Installation for the installation procedure) And when using the E series disk arrays, install ism Express Connector too. (4) Display the [Properties] of the following 5 executable files which are stored in [installation destination folder\sbin] of ism server. And click to select the [Run this program as an administrator] check box of [Compatibility] tab and then click [OK]. - ismalset.exe - ismprfcom.exe - ismsetenv.exe - ismsetenvwzd.exe - ismsvmnu.exe 150

161 3..3 Setup Wiizard of iism server Environment settings are required to start up the ism server. This section describes how to perform settings using the setup wizard. You can easily set the environment in the setup wizard because this wizard guides you through minimum settings sequentially. You can start the setup wizard during ism server installation. Or, select [Start] [All Programs] ([Programs] for Windows 2000) [Storage Manager Server] [Setup Wizard], or select [Server Menu] [Setup Wizard]. In a Server Core environment, execute an ismsetenvwzd command at the command prompt to start the setup wizard. The settings you perform on each screen are saved when the setup wizard terminates. If having changed the environment setting, restart NEC Storage Manager from the service. For Windows Vista or later or Windows Server 2008 or later, when [Setup Wizard] is started from [Storage Manager Server], the [User Account Control] dialog box might be displayed. Select [Continue] or [Yes] to start [Setup Wizard]. In a Server Core environment, the [Help] button cannot be used. 151

162 Diisk Array Subsysttems Settup Disk arrays that the ism server will monitor are specified in the window below. These settings are required. IP connection is recommended as the disk array settings. An iscsi connection cannot be used to monitor disk arrays. A disk array with only iscsi or an E series disk array can only be monitored via an IP connection. After specifying these settings, click the [Next] button. When ism server is installed before the connection of disk arrays or the IP address and/or disk number of a disk array is unknown, first select [Automatic detection of Disk Array Subsystems connected by FC] in the [FC Connection Setup] button and make the next setting (such as User Setup ). In such a case, change the setting with the IP address and disk number determined. (i) (v) (ii) (iii) (iv) Figure Disk Array Setup Screen 152

163 The following IP Connection Setup screen appears if there are no disk array settings. To monitor disk arrays through FC connection, click [Cancel] and use [FC Connection Setup] for setting. (vi) (vii) (viii) Figure IP Connection Setup Screen (i) [Disk Array Subsystem List] [Disk Array Subsystem List] displays the disk array information currently registered. When a disk array specified by the disk number is selected, the column heading of [Disk Array Subsystem List], [IP Address or Host Name] in the figure above appears as [Disk]. When there is the E series disk array in the registered disk arrays, [Monitoring User Name] is displayed in the column heading. And [Monitoring User Name] is only necessary for the E series disk array. Up to 32 disk arrays can be registered in the [Disk Array Subsystem List]. (ii) [Add] button Displays the Disk Array Subsystem-Add screen (IP address) (Figure 3-123) where you can add a disk array to be monitored through IP connection. To add a disk array to be monitored through FC connection, use the FC Connection Setup screen (Figure 3-125). (iii) [Edit] button Edit the disk array you selected. Select the disk array and click the [Edit] button or double-click the disk array and edit it on the disk array edition screen. For settings, refer to Figure for IP connection and Figure and Figure for FC connection. 153

164 (iv) [Delete] button Delete the disk array you selected. (v) [FC Connection Setup] button Displays the FC Connection Setup screen (Figure 3-125) where you can perform settings to monitor the disk array through FC connection. (vi) (vii) (viii) Figure Disk Array Subsystem-Add (IP Address) Screen (vi) [Main IP Address] Under [Main IP Address], specify an IP address or host name. You can use up to 255 characters for a host name. You cannot use non-ascii code characters, control characters, double quotation marks, or spaces for a host name. The ism server connects to the specified IP address or that specified for the host name (the port number is 2730 for a non-e series disk array or 443 for an E series disk array) to conduct monitoring. (vii) Under [Alternate IP Address], you can specify up to two IP addresses for the disk arrays that have two SVPs (SPs for E series). The ism server connects to the specified IP address or that specified for the host name (the port number is 2730 for a non-e series disk array or 443 for an E series disk array) to conduct monitoring. (viii) [Setting user monitoring E series disk array] button To monitor an E series disk array, select [Setting user monitoring E series disk array] to display the Monitoring User Setup screen (Figure 3-124). You can set the monitoring user which can be used to login the disk array from Storage Manager Express by the Monitoring User Setup screen. When using an E series disk array, you must specify a user. When using a D series, S series, or A series disk array, do not specify a user. 154

165 (ix) (x) Figure Monitoring User Setup Screen (ix) [User Name] In [User Name], specify a user name within 20 characters. User Name is case-sensitive. Non-ASCII code characters, half-size character, control characters, double quotation mark, and space cannot be used for a user name. (x) [Password] In [Password], specify a password of the user within 14 characters. Password is case-sensitive. Enter the same password in [Confirm Password] for confirmation. The character you enter is displayed as a *. Non-ASCII code characters, control characters, and double quotation mark cannot be used for a password. A password cannot consist of all spaces. (xi) (xii) Figure FC Connection Setup Screen 155

166 (xi) [Automatic detection of Disk Array Subsystems connected by FC] When you select [Automatic detection of Disk Array Subsystems connected by FC], disk arrays with the FC connection are automatically detected and monitored. (xii) [Specification by Disk Number] To monitor a disk array in FC connection, select [Specification by Disk Number] to display the disk addition screen (Figure 3-126). Disk number is a number assigned by Windows to manage logical disks. The setting is generally not required since the disk arrays connected by FC are automatically detected by checking [Automatic detection of Disk Array Subsystems connected by FC]. (xiii) Figure Disk Array Subsystem-Add (Disk) Screen (xiii) Disk Number Entry field In an entry field on the screen as shown in the figure above, specify a disk number. A value from 0 to 9999 can be specified for a disk number. Up to eight disks can be registered to a disk array. Check the disk number of the disk array to be monitored, using the volume list command (ismvollist -dl) in advance. For details, refer to 3.6 Volume List Command (ismvollist) in the User s Manual. 156

167 User Settup Define the user specified when connecting from the ism client to the ism server. This setting cannot be omitted. After setting, click the [Next] button. The users specified here are to be the managers of the whole storage (Storage Manager). If you are planning to use the Virtual Storage Partitioning, specify the manager of the partition (Partition user) from ism client(web GUI). The user has the user name, password and user level. Operations that you can perform from the ism client differ depending on the user level. To change the disk array configuration, set the user having the system administrator privileges (L3). (i) (ii) (iii) (iv) Figure User Setup Screen The following System Administrator Setting screen automatically appears when you install the ism server for the first time. 157

168 (v) (vi) Figure System Administrator Setting Screen (i) [User List] Lists the users that can connect to the currently set ism server. [User List] displays the list of users currently registered. This user name is used for obtaining authorization to connect with ism server from the ism client, and display and control the disk array information form the ism client. (ii) [Add] button Displays the User-Add screen where you can add a user (Figure 3-129). (iii) [Edit] button Edit the user you selected. Select the user and click the [Edit] button or double-click the user and edit it on the user edition screen. For details of settings, refer to Figure (iv) [Delete] button Deletes the user you selected. 158

169 (v) (vi) (vii) Figure User-Add Screen (v) [User Name] In [User Name], specify a user name within 20 characters. User Name is case-sensitive. Non-ASCII code characters, control characters, double quotation mark, and space cannot be used for a user name. (vi) [Password] In [Password], specify a password of the user within 14 characters. Password is case-sensitive. Enter the same password in [Confirm Password] for confirmation. The character you enter is displayed as a *. Non-ASCII code characters, control characters, and double quotation mark cannot be used for a password. A password cannot consist of all spaces. (vii) [User Level] In [User Level], specify the operation authorization level of the user. The following three kinds of user levels that set/refer to information of disk arrays by ism client are provided. An upper level (L3>L2>L1) allows all operations of a lower level. Standard user (L1): Authorized for disk array monitoring, state display, etc. Operator (L2): Authorized for operations on replication/ snapshot/ performance monitoring/ performance optimization function. System administrator (L3): Authorized for all operations. 159

170 Sttorage Manager Clliientt Settup The information about Storage Manager Client is set. After setting, click the [Next] button. (i) Figure Storage Manager Client Setup Screen Set the ism client type allowed connecting to the ism server. Specify [Web GUI] when using the D series/e series disk arrays. Web GUI: Only the ism client (Web GUI) can connect to the ism server. Win GUI: Only the ism client (Win GUI) can connect to the ism server. (Default) (i) [Web Browser Destination Port Number] Set the port number to be specified when connecting to the ism server from a Web browser. Change the port number when it conflicts with other applications. The default port number is The port number can be specified in the range 1 to

171 Log Settup The operation log to which ism server messages are output is set in the following screen. It is required to change the settings if the free capacity is not sufficient on OS disk. (i) (ii) (iii) Figure Log Setup Screen (in an environment other than Server Core) (i) (ii) (iii) Figure Log Setup Screen (in a Server Core environment) 161

172 (i) Log File Folder Specify the folder that will contain the file to which the ism server operation log is output. In a Server Core environment, specify an existing folder in this field because the [Browse] button cannot be used. You can specify up to 245 byte data. The default is [installation destination folder]\etc\log. To change the folder, select the [Browse] button and specify a folder that actually exists. For the operation log, refer to 1.5 Log Output in the User s Manual. (ii) Free Disk Space Displays the free space in the drive specified as the log file folder. In a Server Core environment, to change the log file folder, click the [Free Disk Space Refresh] button, and then check the free disk space. (iii) Max Log File Size Set the maximum file size for the operation log that the ism server collects. Up to 100 operation log files are created and sequentially numbered. You can set a value from 1 to 10 (100 MB to 1000 MB). The default is 1 (100 MB). Note that the set size should be smaller than the displayed free disk space. 162

173 Fiille Transffer Functtiion Settup Whether to set the ism server file transfer function is selected in the following screen. This setting is unnecessary when using the ism client (Web GUI). To transfer files between the ism server and ism client (Win GUI) (bi-directionally), the ism internally uses the FTP through the following operations of the ism client (Win GUI). Therefore, the FTP site environment (installation of IIS FTP Publishing Service and building of the FTP site) must be built on the ism server node before the ism server is operated. When you execute the following operations from an ism client (Win GUI), this is mandatory. When these functions are not used, settings for file transfer are unnecessary. - Selecting [Log Collection] on the main screen (ism client (Win GUI)) - Selecting [Get Configuration Setting Info.] on the configuration setting screen - Selecting [Download Statistic information files] on the performance screen - Selecting [Busy Ratio Graph] and [Replacement Effect Prediction] on the performance optimization screen (i) (ii) Figure File Transfer Setup Screen (i) Don t Setup Does not set the file transfer function. (ii) Setup Sets the file transfer function. 163

174 Fiille Transffer Settup ((1//3)) Define the FTP user. (i) (ii) (iii) Figure File Transfer Setup (1/3) Screen (i) FTP User Name Specify the name of an FTP user who is to make FTP connection from the ism client to the ism server node. You can specify only an FTP user who is permitted to use the FTP and authorized to read from and write to the folder specified for [Temporary Folder]. The default user name is ism user. The FTP user name can be specified with up to 32 bytes. (ii) Password Specify the password of the user specified for [FTP User Name]. To use anonymous or ftp as the FTP user, specify the mail address. The FTP user password can be specified with up to 58 bytes. (iii) Confirm Password For confirmation, enter the same value as for [Password]. 164

175 Fiille Transffer Settup ((2//3)) The root and temporary folders for FTP service are set in the following screen. (i) (ii) (iii) Figure File Transfer Setup (2/3) Screen (i) Root Folder of FTP Service Specify the root folder of the FTP site to be used by ism server. On the FTP site used by the ism server, select [Properties] [Home Directory] [FTP Site Directory] [Local Path], in which a path has been specified. The path must be specified here. In a Server Core environment, specify a path in this field because the [Browse] button cannot be used. The default root folder is the drive in which the ism server is installed. The root folder can be specified with up to 192 bytes. *If not specifying a virtual directory path: On the FTP site used by the ism server, select [Properties] [Home Directory] [FTP Site Directory], in which check permission for both read and write. (ii) Temporary Folder Specify the folder (the local directory of the computer on which the ism server operates) that is to be used as a temporary folder when the ism server uses the FTP. Specify a folder under the root folder of FTP service. If a network resource or network directory is specified, the file transfer function may not operate correctly. This folder (drive) needs a free space of 300 MB the number of files concurrently transferred or more. If the drive containing the ism server does not have a free space large enough, specify the folder of a drive having a free space large enough. In a Server Core environment, specify a folder in this field 165

176 because the [Browse] button cannot be used. If not using the default folder, give the group administrators Full Control access authority to the specified folder and the high-level folders. Also authorize the user specified for [FTP User Name] to read from and write to the folder specified here. The default folder is [installation destination folder]\etc\temp. The folder can be specified with up to 192 bytes. *In particular, to operate the FTP service under cluster control in cluster environment, you should place the ism server and the FTP service in the same failover group on the local disk. (iii) Virtual Directory Path Setup If no file in the FTP service root folder is available for temporary folder, set in on the Virtual Directory Path Setup screen (Figure 3-136). (iv) Figure Virtual Directory Path Setup Screen (iv) Virtual Directory Path To use a virtual directory, specify the path for the user, specified for [FTP User Name], to access [Temporary Folder] through the FTP. The path can be specified with up to 192 bytes. If [Root Folder of FTP Service] is at a higher level than [Temporary Folder] (or if the folders are identical), [Virtual Directory Path] need not be specified. The following shows examples: Example 1: Root Folder of FTP Service: C:\ Temporary Folder: C:\Program Files\NEC\iSMsvr\etc\temp In this case, you do not have to specify the virtual directory path because the temporary folder can be accessed through the path /Program Files/NEC/iSMsvr/etc/temp in the FTP. Example 2: Root Folder of FTP Service: C:\Program Files\NEC\iSMsvr\etc\temp Temporary Folder: C:\Program Files\NEC\iSMsvr\etc\temp In this case, you do not have to specify the virtual directory path because the temporary folder can be accessed through the path / that is to the temporary folder. In other cases, a virtual directory needs to be created and a virtual directory path needs to be specified. 166

177 The following shows examples: Example 3: Root Folder of FTP Service: C:\InetPub\FTPRoot Temporary Folder: C:\Program Files\NEC\iSMsvr\etc\temp If a virtual directory is created under the conditions below, specify /ismftp for [Virtual Directory Path]. In this case, the temporary folder is accessed through the path /ismftp in the FTP. Alias: ismftp Path: C:\Program Files\NEC\iSMsvr\etc\temp Example 4: Root Folder of FTP Service: C:\InetPub\FTPRoot Temporary Folder: D:\iSM\temp If a virtual directory is created under the conditions below, specify /ismftp2 for [Virtual Directory Path]. In this case, the temporary folder is accessed through the path /ismftp2 in the FTP. Alias: ismftp2 Path: D:\iSM\temp Example 5: Root Folder of FTP Service: C:\InetPub\FTPRoot Temporary Folder: D:\iSM\temp If a virtual directory is created under the conditions below, specify /ismftp3/temp for [Virtual Directory Path]. In this case, the temporary folder is accessed through the path /ismftp3/temp in the FTP. Alias: ismftp3 Path: D:\iSM *For the path to be specified in creating a virtual directory, be sure to specify the local directory of the computer on which the ism server operates. If a network resource or network drive (or a directory under the drive) is specified, the file transfer function may not operate correctly. *If specifying a virtual directory path (using a virtual directory), give access permission for both read and write during creation of the virtual directory. 167

178 Fiille Transffer Settup ((3//3)) The IP address for FTP service is set in the following screen. (i) (ii) Figure File Transfer Setup (3/3) Screen (i) Get Automatically Select this item if [Properties] [FTP Site] [Identification] [IP Address] is [(All unused IP addresses)] on the FTP site used by the ism server. In this case, the ism server automatically acquires the IP address of ism server node and uses it as the FTP connection destination. (ii) Specify IP address Select this item if an IP address is specified for [Properties] [FTP Site] [Identification] [IP Address] on the FTP site used by the ism server. Set a suitable IP address in the following cases: - The ism server is used in cluster environment. In particular, to operate the FTP service under cluster control in cluster environment, you should place the ism server and the FTP service in the same fail over group on the local disk, and specify a floating (virtual) IP address. To operate the FTP service starting as a service in cluster environment, specify the actual IP address. *Do not specify , , or as an IP address. 168

179 Conttentts Settttiing Conffiirmattiion Confirm the setting contents and click the [Next] button. By clicking the [Yes] button on the screen displaying the message Save the new setup?, the Setup Complete screen is displayed. Figure Contents Setting Confirmation Screen 169

180 Settup Compllette Settings using the setup wizard is complete. Figure Setup Complete Screen 170

181 3..4 Setup Utiilliity of iism server Environment settings are required to start up the ism server. This section describes how to perform settings using the setup utility. You can perform all the settings with the setup utility. You can start the setup utility by selecting [Start] [All Programs] ([Programs] for Windows 2000) [Storage Manager Server] [Setup Utility], or select [Server Menu] [Setup Utility]. In a Server Core environment, execute an ismsetenv command at the command prompt to start the setup utility. The settings you perform on each screen are saved when you click the [OK] button. If having changed the environment setting, restart the ism server. For Windows Vista or later or Windows Server 2008 or later, when [Setup Utility] is started from [Storage Manager Server], the [User Account Control] dialog may be displayed. Select [Continue] or [Yes] to start [Setup Utility]. In a Server Core environment, the [Help] button cannot be used. 171

182 Diisk Array Disk arrays that the ism server will monitor are specified in the window below. These settings are required. IP connection is recommended as the disk array settings. An iscsi connection cannot be used to monitor disk arrays. A disk array with only iscsi or an E series disk array can only be monitored via an IP connection. When ism server is installed before the connection of disk arrays or the IP address and/or disk number of a disk array is unknown, first select [Automatic detection of Disk Array Subsystems connected by FC] in [FC Connection Setup] and make other settings (such as User ). In such a case, change the setting with the IP address and disk number determined. (i) (v) (ii) (iii) (iv) Figure Disk Array Setup Screen The following IP Connection Setup screen appears if there are no disk array settings. For details on the settings, refer to Figure To monitor disk arrays by using an FC connection, click [Cancel] and then use [FC Connection Setup] to specify settings. For a D1 series, D3 series, or D4 series disk array for which initial settings have not been specified, click the [Cancel] button because the settings will be specified later. 172

183 (vi) (vii) (viii) Figure IP Connection Setup Screen (i) [Disk Array Subsystem List] [Disk Array Subsystem List] displays the disk array information currently registered. (When a disk array specified by the disk number is selected, the column heading of [Disk Array Subsystem List], [IP Address or Host Name] in the figure above appears as [Disk].) When there is the E series disk array in the registered disk arrays, [Monitoring User Name] is displayed in the column heading. And [Monitoring User Name] is only necessary for the E series disk array. Up to 32 disk arrays can be registered in the [Disk Array Subsystem List]. (ii) [Add] button Displays the Disk Array Subsystem - Add screen (IP address) (Figure 3-142) where you can add a disk array to be monitored through IP connection. To add a disk array to be monitored through FC connection, use the FC Connection Setup screen (Figure 3-144). (iii) [Edit] button Edit the disk array you selected. Select the disk array and click the [Edit] button or double-click the disk array and edit it on the disk array edition screen. For settings, refer to Figure for IP connection and Figure and Figure for FC connection. (iv) [Delete] button Delete the disk array you selected. (v) [FC Connection Setup] button 173

184 Displays the FC Connection Setup screen (Figure 3-144) where you can perform settings to monitor the disk array through FC connection. (vi) (vii) (viii) Figure Disk Array Subsystem - Add Screen (vi) [Main IP Address] Under [Main IP Address], specify an IP address or host name. You can use up to 255 characters for a host name. You cannot use non-ascii code characters, control characters, double quotation marks, or spaces for a host name. The ism server connects to the specified IP address or that specified for the host name (the port number is 2730 for a non-e series disk array or 443 for an E series disk array) to conduct monitoring. (vii) [Alternate IP Address] Under [Alternate IP Address], you can specify up to two IP addresses for the disk arrays that have two SVPs (SPs for E series). The ism server connects to the specified IP address or that specified for the host name (the port number is 2730 for a non-e series disk array or 443 for an E series disk array) to conduct monitoring. (viii) [Setting user monitoring E series disk array] button To monitor an E series disk array, select [Setting user monitoring E series disk array] to display the Monitoring User Setup screen (Figure 3-143). You can set the monitoring user which can be used to login the disk array from Storage Manager Express by the Monitoring User Setup screen. When using an E series disk array, you must specify a user. When using a D series, S series, or A series disk array, do not specify a user. 174

185 (ix) (x) Figure Monitoring User Setup Screen (ix) [User Name] In [User Name], specify a user name within 20 characters. User Name is case-sensitive. Non-ASCII code characters, half-size character, control characters, double quotation mark, and space cannot be used for a user name. (x) [Password] In [Password], specify a password of the user within 14 characters. Password is case-sensitive. Enter the same password in [Confirm Password] for confirmation. The character you enter is displayed as a *. Non-ASCII code characters, control characters, and double quotation mark cannot be used for a password. A password cannot consist of all spaces. (xi) (xii) Figure FC Connection Setup Screen 175

186 (xi) [Automatic detection of Disk Array Subsystems connected by FC] When you select [Automatic detection of Disk Array Subsystems connected by FC], disk arrays with the FC connection are automatically detected and monitored. (xii) [Specification by Disk Number] To monitor a disk array in FC connection, select [Specification by Disk Number] to display the disk addition screen (Figure 3-145). Disk number is a number assigned by Windows to manage logical disks. The setting is generally not required since the disk arrays connected by FC are automatically detected by checking [Automatic detection of Disk Array Subsystems connected by FC]. (xiii) Figure Disk Array Subsystem - Add (Disk) Screen (xiii) Disk Number Entry field In an entry field on the screen as shown in the figure above, specify a disk number. A value from 0 to 9999 can be specified for a disk number. Up to eight disks can be registered to a disk array. Check the disk number of the disk array to be monitored, using the volume list command (ismvollist -dl) in advance. For details, refer to 3.6 Volume List Command (ismvollist) in the User s Manual. 176

187 User Set the user specified when connecting from the ism client to the ism server. This setting cannot be omitted. The users specified here are to be the managers of the whole storage (Storage Manager). If you are planning to use the Virtual Storage Partitioning, specify the manager of the partition (Partition user) from ism client(web GUI). The user has the user name, password and user level. Operations that you can perform from the ism client differ depending on the user level. If you change the disk array configuration, set the user having system administrator privileges (L3). For the D1 series, D3 series, or D4 series disk arrays for which the initial settings are made after starting the ism server, it is mandatory to set the user with system administrator privileges. (i) (ii) (iii) (iv) Figure Users Screen The following System Administrator Setting screen automatically appears when you install the ism server for the first time. For details of settings, refer to Figure

188 (v) (vi) Figure System Administrator Screen (i) [User List] Lists the users that can connect to the currently set ism server. [User List] displays the list of users currently registered. This user name is used for obtaining authorization to connect with an ism server from an ism client, and display and control the disk array information form the ism client. (ii) [Add] button Displays the User -Add screen where you can add a user (Figure 3-148). (iii) [Edit] button Edit the user you selected. Select the user and click the [Edit] button or double-click the user and edit it on the user edition screen. For details of settings, refer to Figure (iv) [Delete] button Deletes the user you selected. 178

189 (v) (vi) (vii) Figure User-Add Screen (v) [User Name] In [User Name], specify a user name within 20 characters. User Name is case-sensitive. Non-ASCII code characters, control characters, double quotation mark, and space cannot be used for a user name. (vi) [Password] In [Password], specify a password of the user within 14 characters. Password is case-sensitive. Enter the same password in [Confirm Password] for confirmation. The character you enter is displayed as a *. Non-ASCII code characters, control characters, and double quotation mark cannot be used for a password. A password cannot consist of all spaces. (vii) [User Level] In [User Level], specify the operation authorization level of the user. ism defines the three kinds of user levels that set/refer to information of disk arrays by ism client. An upper level (L3>L2>L1) allows all operations of a lower level. Standard user (L1): Authorized for disk array monitoring, state display, etc. Operator (L2): Authorized for operations on replication/ snapshot/ performance monitoring/ performance optimization function. System administrator (L3): Authorized for all operations. 179

190 Sttatte Moniittoriing Specify state monitoring information, operation log information, and configuration information in the Setting Utility screen below. Because the default values are recommended for the information, there is no need to specify settings in this screen during ordinary operation. (i) (ii) (iii) (iv) (v) (vi) (vii) (viii) (ix) (x) (xi) (xii) Figure State Monitoring Screen (in an environment other than Server Core) 180

191 (i) (ii) (iii) (iv) (v) (vi) (vii) (viii) (ix) (x) (xi) (xii) Figure State Monitoring Screen (in a Server Core environment) (i) Monitoring Interval For [Monitoring Interval], specify an interval for monitoring the status of disk arrays. The default value is 15 (seconds). You can specify a value from 1 to For details about status monitoring, refer to 1.2 State Monitoring in the User s Manual. (ii) Remonitoring Check Interval When a trouble occurs in the connection between ism server and the disk arrays, ism server will stop the monitoring of the disk arrays for a time, and later it will restart monitoring automatically. In [Remonitoring Check Interval], specify an interval for checking whether the monitoring of disk arrays can be restarted. The default value is 5 (minutes). A value from 1 to 60 can be specified. (iii) LAN Path Check Interval Specify an interval for checking the status of the switching path when monitoring by using an IP connection. The default value is 60 (minutes). You can specify a value from 3 to 60. (iv) Capacity Watch Interval Specify an interval for monitoring by using an IP connection. The default value is 60 (minutes). You can specify a value from 3 to The thin provisioning function Actual used capacity of the pool and logical disk Actual capacity threshold of the pool 181

192 Actual capacity threshold (pre) of the pool LD capacity threshold of the logical disk 2. Snapshot function Snapshot used capacity Threshold of the snapshot used capacity The default value is 5 (minutes). You can specify a value from 5 to For the thin provisioning function, the state monitoring interval ( Capacity Interval in the state monitoring information) is used to monitor the pool and logical disk for memory shortages and the LD capacity quota of the logical disk. However, if the capacity monitoring interval is shorter than the state monitoring interval, * the capacity monitoring interval can also be used to perform this monitoring. * By default, the capacity monitoring interval is longer than the state monitoring interval. (v) Receive SNMP Trap Select the receiving method in [Receive SNMP Trap]. SNMP trap is information sent from the disk array to notify the ism server of state transition of hardware, etc. It is enabled only for disk arrays monitored by TCP/IP connection. Don t Receive: SNMP trap is not received. Use the SNMP Trap Service: SNMP trap is received via the SNMP trap service. Receive Directly: The ism server receives it by using the port When you select [Use the SNMP Trap Service], SNMP Trap Service must be installed. When you select [Receive Directly], a conflict with application collecting SNMP trap as SNMP Trap Service occurs. In this case, do not select [Receive Directly]. 2. Disk arrays can be monitored even without SNMP trap being received. Performance may be degraded if network security is compromised. Therefore, [Don t Receive] should be selected. (vi) Duplicate Nickname Check Determine whether to make a duplication check on identifiers that are assigned to components in the disk arrays to be managed by ism. If you select [Check], duplication checks are performed on all the identifiers when the ism server starts or when you restart monitoring the disk array. Components to be checked in a duplicated manner are as follows: Disk Array Name Logical Disk Name Port Name Don t Check: Does not execute duplicated check. Check: Executes duplicated check. 182

193 (vii) Log File Folder In [Log File Folder], specify a folder that saves a file for outputting operation logs of ism server. To change the folder, use the [Browse] button to specify an existing folder. Specification uses up to 245 bytes. In a Server Core environment, specify an existing folder in this field because the [Browse] button cannot be used. For operation logs, refer to 1.5 Log Output in the User s Manual. (viii) Free Disk Space Displays the OS free disk space. In a Server Core environment, to change the log file folder, click the [Free Disk Space Refresh] button, and then check the free disk space. (ix) Max Log File Size Set the maximum file size for the operation log that the ism server collects. Up to 100 operation log files are created and sequentially numbered. You can set a value from 1 to 10 (100 MB to 1000 MB). The default is 1 (100 MB). Note that the set size should be smaller than the free disk space. (x) Modify the Type of Messages with No Measures to INFO The classification can be switched to INFO for messages with WARNING classification that do not require operational attention. Classification change target messages are ism04040 and ism The default is [Don t Modify]. [Don t Modify] Classification is WARNING as usual. [Modify] Changes the classification from WARNING to INFO. When the message specification is changed, link may not be available when the target messages (ism04040 and ism01006) are defined by the event link function. Check the message level setting of the event link definition. (xi) Automatically Correct Disk Array Subsystem s Timer For [Automatically Correct Disk Array Subsystem s Timer], specify whether to automatically correct the time for the disk array by using the server. The default value is [Correct]. Correct: Automatically corrects the time for the disk array. Don t Correct: Does not automatically correct the time for the disk array. (xii) Allow Virtual Capacity Pool to Exceed Max. Physical Capacity For [Allow Virtual Capacity Pool to Exceed Max. Physical Capacity], specify whether to allow the virtual capacity pool to exceed the maximum physical capacity. The default value is [Don t Allow]. Don t Allow: Does not allow the virtual capacity pool to exceed the maximum physical capacity. Allow: Allows the virtual capacity pool to exceed the maximum physical capacity. 183

194 Settttiing Up tthe Server and Clliientt The server and client are set up in the window below. (i) (ii) (iii) Figure Server/Client Window (i) Set Storage Manager Server Name To display the ism server name in Title Bar of ism client(web GUI), select [Set] to set the ism server name. When multiple ism servers are used, you can identify each of them from the Title Bar. Default value is [Don t Set]. It s valid when the [Permitted Connection Type of Storage Manager Client] is [Web GUI]. Don t Set : Do not display the ism server name. Set : Set the ism server name (Character string: up to 20 characters) displayed in the Title Bar of ism client(web GUI). An ism server name is case-sensitive. 2-byte character, half-size character, control character, the characters (\ / :, ; *? < > )that cannot be used for a file name, and space cannot be used for an ism server name. (ii) Storage Manager Client Destination Port Number In [Storage Manager Client Destination Port Number], specify the port number of the ism server to which the ism client connects. The default value is A value from 1 to can be specified. When changing the default value, set a value different from the following port numbers: 184

195 - Port Number set for Client Information of the Server/Client screen - Port Number of FTP service set for the File Transfer screen - Port Number set for the Replication Information of the Replication/Snapshot screen - Port Number set for the Snapshot Information of the Replication/Snapshot screen For the ism client (Win GUI), refer to 3.2 Client Start/Stop in the User's Manual. (iii) Permitted Connection Type of Storage Manager Client Set the ism client type allowed connecting to ism server. Specify [Web GUI] when using the D series or E series disk arrays. Web GUI: Only the ism client (Web GUI) can connect to ism server. Win GUI: Only the ism client (Win GUI) can connect to ism server. (Default) (iv) Port Number Set the port number to be specified when connecting to ism server from a Web browser. Change the port number when it conflicts with other applications. The default port number is The port number can be specified in the range 1 to When changing the default value, set a value different from the following port numbers: - ism Client Destination Port Number set for Client Information of the Server/Client screen - Port Number of FTP service set for the File Transfer screen - Port Number set for the Replication Information of the Replication/Snapshot screen - Port Number set for the Snapshot Information of the Replication/Snapshot screen 185

196 Eventt Liink The event link function is set in the following screen. You have to perform settings before using the event link function. (i) (vi) (vii) (viii) (ii) (iii) (iv) (v) Figure Event Link Screen (i) Link List Lists the current event link definitions. - Object Displays the condition of defined event link target message. This item is displayed in the format of (message range) AND (message level). For the message range and levels, refer to Figure Action Definition Displays the event link action of defined event link target message. When two or more actions are specified, they are separated with comma (, ). (ii) [Add] button Displays the Link-Add screen (Figure 3-153) where you can add event link definitions. 186

197 (iii) [Copy] button Defines a copy of the event link definition you selected. Clicking the [Copy] button displays the link copy screen. Change the already defined data and define it as a new definition there. For details of settings, refer to Figure (iv) [Edit] button Edit the event link definition you selected. Select the event link definition and click the [Edit] button or double-click the event link definition and edit it on the event link definition edition screen. For details of settings, refer to Figure (v) [Delete] button Deletes the event link definition you selected. (vi) [Mail Setup] button To send mail, click the [Mail Setup] button and perform settings on the Mail Setup screen (Figure 3-154). (vii) [Upper Limit Setup] button To set the upper limit to the event link action, click the [Upper Limit Setup] button and perform settings on the Upper Limit Setup screen (Figure 3-158). (viii) Update Event Link Operation If you click the [Apply] button, the link event action is changed according to the current even link definition. The event link operation is immediately changed if the ism server is operating. If ism server is not operating, only the information necessary for event link operation is changed. The change takes effect at the next ism server activation. 187

198 (i) (ii) (iii) (iv) (v) (vi) (vii) (viii) (ix) (x) (xi) (xii) Figure Link-Add Screen (i) Object Define the event link target message. Define the message range and message level. The event link targets the message that satisfies both the message range and message level. (ii) Message Range Set the event link target message with its function name and message ID. This setting cannot be omitted. All the set function names and message IDs will be event link targets. For the message ID, refer to the Messages Handbook. 188

199 (iii) Function Name Set the event link target message with its function name. If you specify multiple function names, all the specified functions will be targets. [ALL] Targets all message IDs: ism01xxx, ism02xxx, ism03xxx, ism04xxx, ism07xxx, ism08xxx, ism09xxx, ism10xxx, ism11xxx, ism14xxx, ism15xxx, ism16xxx, ism17xxx, ism18xxx, ism23xxx, ism24xxx, ism28xxx, ism29xxx [BASE] Targets ism01xxx, ism02xxx, ism03xxx, ism07xxx, ism11xxx, ism14xxx, ism15xxx, ism16xxx, ism17xxx, ism23xxx, ism24xxx, ism28xxx and ism29xxx message IDs. [REPLICATION] Targets ism10xxx message IDs. [SNAPSHOT] Targets ism18xxx message IDs. [PERFORMANCE] Targets ism08xxx and ism09xxx message IDs. [MAINTENANCE] Targets message for which ALIVE notification (including ALIVE notifications issued by the disk array device's fault notification mechanism) is performed. Keyword [_ALERT_] is added to the end of message body. (iv) Message ID Set the event link target message with its message ID. The message ID specifies xxxxx in ismxxxxx. Multiple message IDs can be specified using a comma as delimiter. You can also specify a range by using a hyphen (Example: 01001,01002, ). (v) Message Level Set the event link target message level. The message level cannot be omitted. The conditions specified in the message range are narrowed down with the message level. [ALL] Targets all messages with ERROR, WARNING, NOTICE, or INFO level. [ERROR] Targets the ERROR messages. [WARNING] Targets the WARNING messages. [NOTICE] Targets the NOTICE messages. [INFO] Targets the INFO messages. 189

200 (vi) Definition Define the event link action for the defined event link target message. If you specify a receiver s mail address, mail is sent to the specified mail address when a target message is output. If you specify a batch or executable file, the specified file is executed when a target message is output. (vii) Mail Address of Receiver Set the mail address of receiver. Multiple items can be specified using a comma as delimiter. A mail address should be up to 320 characters. (viii) Batch File or Executable File Set a batch or executable file. Specify a file that does not require interaction with screens. To change the file, specify a file that actually exists using the [Browse] button. In a Server Core environment, specify an existing folder in this field because the [Browse] button cannot be used. A file name should be up to 259 characters. (ix) List Lists the current definitions. (x) [Add] button After entering data in [Mail Address of Receiver] or [Batch File or Executable File], press the [Add] button to confirm specification. Once confirmed, the definition is listed in [Action Definition] under [List]. (xi) [Edit] button Edit the definition in [List]. Select one of the definitions in [List] to display it in (vii) or (viii) with the [Edit] button. Edit the displayed data and confirm the change wit the [Add] button. (xii) [Delete] button Deletes the definition in [List]. Select one or more definitions in [List] and delete the selected definition(s) from [List] with the [Delete] button. 190

201 (i) (ii) (iii) (iv) (v) (vi) (vii) (viii) (ix) (x) (xi) (xii) Figure Mail Setup Screen (i) Authentication NONE: POP before SMTP: SMTP-AUTH: Does not perform user authentication. Performs user authentication using POP before SMTP. Performs user authentication using SMTP Authentication. (ii) SMTP Server In [SMTP Server], specify the SMTP server to which mails are sent within 255 characters. (iii) SMTP Port In [SMTP Port], specify the port number of the SMTP server to which mails are sent. A value from 1 to can be specified. The default value is 25. (iv) POP Server In [POP Server], specify the POP server to access for authentication when sending mails within 255 characters. This item is effective if you specify [POP before SMTP] for (i) [Authentication]. 191

202 (v) POP Port In [POP Port], specify the port number of the POP server to access for authentication when sending mails. A value from 1 to can be specified. The default value is 110. This item is effective if you specify [POP before SMTP] for (i) [Authentication]. (vi) User Name In [User Name], specify the user name for authentication within 32 characters. This item is effective if you specify either [POP before SMTP] or [SMTP-AUTH] for (i) [Authentication]. (vii) Password In [Password], specify a password of the user name for authentication within 58 characters. This item is effective if you specify either [POP before SMTP] or [SMTP-AUTH] for (i) [Authentication]. (viii) Confirm Password Enter the same password in [Confirm Password] for confirmation. This item is effective if you specify either [POP before SMTP] or [SMTP-AUTH] for (i) [Authentication]. (ix) Mail Address of Sender Enter the mail address of sender. Mail transmission may fail in SMTP server due to wrong target mail address, etc. In this case, an error message from SMTP server may be sent to a sender s mail address. (x) Mail Template File In [Mail Template File], specify a template file that is to be used for sending a mail within 259 characters. Note that the file size should be up to 1 KB. (xi) [Browse] button Displays the file selection screen on which you can specify an existing mail template file. In a Server Core environment, specify the path for the mail template file in this field because the [Browse] button cannot be used. (xii) [Edit] button Enables the creation of a new mail template file or the editing of an existing mail template file. Enter the path in the [Mail Template File] field and click the [Edit] button. The Mail Template File Setting screen (Figure 3-155) appears. Edit the contents and click the [Save] button or [Save as] button. 192

203 (i) (ii) (iii) (iv) (v) Figure Mail Template File Setting Screen The mail template is used to send actual mail. Set [Subject], [Text] and [Other Template Setup]. (i) Subject Set the mail title. (ii) Text Set the mail text. The text set here is sent as it is. A message including $MSG in text is replaced into a message that is output to an operation log, which triggered the event link. Definition Example: This is the ism server at <domain name, etc.> Error Reporting $MSG A message output to operation log that triggered object linkage is described in this line. Notes: 1. Any contents can be described in the text. 2. One text line must be less than 512 bytes (including blank / tab / carriage return). 193

204 3. When a part of $MSG of a certain line is replaced into the message content, a $MSG which appeared first can be replaced. So even if two or more $MSG s are described in one line, only the first $MSG is replaced. However, if the $MSG s are described in each line, they spread to each message. (iii) [Other Template Setup] button Displays the Other Template Setup screen (Figure 3-157) where you can set other items that can be defined as mail header. (iv) [Save] button Saves the mail template file with the displayed contents and returns to the Mail Setup screen (Figure 3-154). (v) [Save as] button Newly saves the mail template file with the displayed contents, and returns to the Mail Setup screen (Figure 3-154). The path name of a newly created file is entered in the [Mail Template File] field. In a Server Core environment, the Save As screen (Figure 3-156) is displayed. Enter the mail template file name by using an absolute path, and then click [OK]. Figure Save As Screen (in a Serve Core Environment) 194

205 (i) Figure Other Template Setup Screen (i) Template Set the contents that can be defined as mail header (according to RFC822). (i) (ii) Figure Upper Limit Setup Screen (i) Mail Transmission Set the upper limit of mail transmission processes in the unit period (one minute). You can set a value from 15 to The default is 300. When setting the value, consider that this setting can put a load on external resources such as mail server. (ii) Batch File or Executable File Set the upper limit of batch file of file executions in the unit period (one minute). You can set a value from 15 to The default is 30. When setting the value, consider that this setting can put a load on resources such as the server where the ism server operates. 195

206 Fiille Transffer To transfer files between the ism server and ism client (Win GUI) bi-directionally, the ism internally uses the FTP through the following operations of the ism client (Win GUI). Therefore, the FTP site environment (installation of IIS FTP Publishing Service and building of the FTP site) must be built on the ism server node before the ism server is operated. When you execute the following operations from an ism client (Win GUI), this is mandatory. When these functions are not used, settings for file transfer are unnecessary. This setting is unnecessary when using the ism client (Web GUI). - Selecting [Log Collection] on the main screen (ism client (Win GUI)) - Selecting [Get Configuration Setting Info.] on the configuration setting screen - Selecting [Download Statistic information files] on the performance screen - Selecting [Busy Ratio Graph] and [Replacement Effect Prediction] on the performance optimization screen (i) (ii) (iii) (iv) (v) (vi) (vii) (viii) Figure File Transfer Screen 196

207 (i) FTP User Name Specify the name of an FTP user who is to make FTP connection from the ism client (Win GUI) to the ism server node. You can specify only an FTP user who is permitted to use the FTP and authorized to read from and write to the folder specified for [Temporary Folder]. The default user name is ismuser. The FTP user name can be specified with up to 32 bytes. (ii) Password Specify the password of the user specified for [FTP User Name]. To use anonymous or ftp as the FTP user, specify the mail address. The FTP user password can be specified with up to 58 bytes. (iii) Confirm Password For confirmation, enter the same value as for [Password]. (iv) IP Address of FTP Service Get Automatically: Select this item if [Properties] [FTP Site] [Identification] [IP Address] is [(All Unassigned)] on the FTP site used by the ism server. In this case, the ism server automatically acquires the IP address of ism server node and uses it as the FTP connection destination. Specify IP address: Select this item if an IP address is specified for [Properties] [FTP Site] [Identification] [IP Address] on the FTP site used by the ism server. Set a suitable IP address in the following cases: The ism server is used in cluster environment. In particular, to operate the FTP service in cluster environment, place the ism server and the FTP service in the same failover group, and specify a floating (virtual) IP address. To operate the FTP service starting as a service in cluster environment, specify the real IP address. * Do not specify , , or as an IP address. (v) Port Number of FTP Site Specify the port number of the FTP site to be used by the ism server. On the FTP site used by the ism server, select [Properties] [FTP Site] [Identification] [TCP Port], in which a port number has been specified. The port number must be specified here. The default port number is 21. To change the default, specify a port number other than the following: - [Storage Manager Client Destination Port Number], which is specified under [Client Information] in the Server/Client window - [Port Number], which is specified under [Client Information] in the Server/Client window - [Port Number], which is specified under [Replication Information] in the Replication/Snapshot window - [Port Number], which is specified under [Snapshot Information] in the Replication/Snapshot window 197

208 (vi) Root Folder of FTP Service Specify the root folder of the FTP site to be used by the ism server. On the FTP site used by the ism server, select [Properties] [Home Directory] [FTP Site Directory] [Local Path], in which a path has been specified. The path must be specified here. In a Server Core environment, specify the path in this field because the [Browse] button cannot be used. The default root folder is the drive in which the ism server is installed. The root folder can be specified with up to 192 bytes. * If not specifying a virtual directory path: Select [Properties] of the FTP site used by ism [Home Directory] [FTP Site Directory], in which check permission for both read and write. (vii) Temporary Folder Specify the folder (the local directory of the computer on which the ism server operates) that is to be used as a temporary folder when the ism server uses the FTP. Specify a folder under the root folder of FTP service. If a network resource or network directory is specified, the file transfer function may not operate correctly. This folder (drive) needs a free space of 300MB the number of files concurrently transferred or more. If the drive containing the ism server does not have a free space large enough, specify the folder of a drive having a free space large enough. In a Server Core environment, specify the folder in this field because the [Browse] button cannot be used. If not using the default folder, give the group administrators Full Control access authority to the specified folder and the high-level folders. Also authorize the user specified for [FTP User Name] to read from and write to the folder specified here. The default folder is installation destination folder\etc\temp. The folder can be specified with up to 192 bytes. * In particular, to operate the FTP service under cluster control in cluster environment, you should place the ism server and the FTP service in the same fail over group on the local disk. 198

209 (viii) [Virtual Directory Path Setup] button Displays the Virtual Directory Path Setup screen (Figure 3-160) where you can set the virtual directory path. This setting is not required if the folder in [Temporary Folder] is under the folder [Root Folder of FTP Service]. (i) Figure Virtual Directory Path Setup Screen (i) [Virtual Directory Path] To use a virtual directory, specify the path for the user, specified for [FTP User Name], to access [Temporary Folder] through the FTP. The path can be specified with up to 192 bytes. If [Root Folder of FTP Service] is at a higher level than [Temporary Folder] (or if the folders are identical), [Virtual Directory Path] need not be specified. The following shows examples: Example 1: Root Folder of FTP Service: C:\ Temporary Folder: C:\Program Files\NEC\iSMsvr\etc\temp In this case, the temporary folder can be accessed through the path /Program Files/NEC/iSMsvr/etc/temp in the FTP. Thus, a virtual directory path need not be specified. Example 2: Root Folder of FTP Service: C:\Program Files\NEC\iSMsvr\etc\temp Temporary Folder: C:\Program Files\NEC\iSMsvr\etc\temp In this case, the temporary folder can be accessed through the path / that is to the temporary folder. Thus, a virtual directory path need not be specified. In other cases, a virtual directory needs to be created and a virtual directory path needs to be specified. The following shows examples: Example 3: Root Folder of FTP Service: C:\InetPub\FTPRoot Temporary Folder: C:\Program Files\NEC\iSMsvr\etc\temp If a virtual directory is created under the conditions below, specify /ismftp for [Virtual Directory Path]. In this case, the temporary folder is accessed through the path /ismftp in the FTP. Alias: ismftp Path: C:\Program Files\NEC\iSMsvr\etc\temp 199

210 Example 4: Root Folder of FTP Service: C:\InetPub\FTPRoot Temporary Folder: D:\iSM\temp If a virtual directory is created under the conditions below, specify /ismftp2 for [Virtual Directory Path]. In this case, the temporary folder is accessed through the path /ismftp2 in the FTP. Alias: ismftp2 Path: D:\iSM\temp Example 5: Root Folder of FTP Service: C:\InetPub\FTPRoot Temporary Folder: D:\iSM\temp If a virtual directory is created under the conditions below, specify /ismftp3/temp for [Virtual Directory Path]. In this case, the temporary folder is accessed through the path /ismftp3/temp in the FTP. Alias: ismftp3 Path: D:\iSM * For the path to be specified in creating a virtual directory, be sure to specify the local directory of the computer on which the ism server operates. If a network resource or network drive (or a directory under the drive) is specified, the file transfer function may not operate correctly. * If specifying a virtual directory path (using a virtual directory), give access permission for both read and write during creation of the virtual directory. 200

211 Perfformance Moniittoriing The performance monitoring function is set in the following screen. You do not have to perform settings if you do not use the performance monitoring function. If you use this function, perform settings as needed. (i) (ii) (iii) (iv) (v) (vi) (vii) (viii) (ix) (x) (xi) (xii) (xiii) Figure Performance Monitoring Screen (i) Folder Specify the folder for containing the statistical information history file. The default folder is installation destination folder\etc\mon. You can select a folder with the [Browse] button. In a Server Core environment, specify the folder in this field because the [Browse] button cannot be used. Set a folder that actually exists. The path can be specified with up to 210 bytes. Specify the local directory of the computer where the ism server is running. If the network resource or network directory is specified, the performance monitoring function may not work correctly. (ii) Logging Interval Specify the interval at which statistical information is collected and output to the statistical information history file. You can set a value from 1 to 60 (min.). The default is 5 (min.). (iii) Adjustment of Logging Interval statistical information may not be output at the currently specified interval if there are too many disk array components. Specify this item to determine whether to automatically change to an interval at 201

212 which statistical information can be output. Automatic: The current logging interval is adjusted automatically. (default) Manual: The current logging interval is not adjusted automatically (iv) Continue to Output when Storage Manager Server Restarts Determine whether to automatically start the output of statistical information for all the disk arrays that can use PerformanceMonitor when the ism server starts. Output: For disk arrays for which statistical information was accumulated during the previous operation, the statistical information is accumulated by inheriting the previous status. For disk arrays for which accumulating statistical information was stopped during the previous operation, the status is retained and accumulation is not started. If you check [Output all the Disk Array Subsystems when it starts first time], the system starts accumulating the statistical information of all disk arrays where PerformanceMonitor (performance monitoring function) can be used when the ism server starts up for the first time. The accumulated state of the last operation is retained when you update the ism server. Don t Output: Statistical information output is not automatically started. (v) Auto Archive Execution Automatically summarizes the statistical information. Manual: Does not automatically summarize the statistical information (default). Automatic: Automatically summarizes the statistical information (default). (vi) Setting of Preservation Period Sets the keep period for the statistical information. The file whose keep period expired is automatically deleted. (vii) History File Keep period for the statistical information history file. The files are deleted after a specified period. You can specify 1 to 366 (days), 1 to 24 (months) or 1 to 2 (years). The recommended value is one (month). (viii) Primary Summarized File Keep period for the primary summarized file. The files are deleted after a specified period. You can specify 1 to 24 (months) or 1 to 2 (years). The recommended value is one (month). (ix) Secondary Summarized File Keep period for the secondary summarized file. The files are deleted after a specified period. You can specify 1 to 24 (months) or 1 to 2 (years). The recommended value is one (year). (x) Time Time when summarization is automatically performed and the file of which keep period expired is deleted. The default is 00:

213 This setting is valid when [Auto Archive Execution] is set to [Automatic] and the keep period is set in [Setting of Preservation Period]. (xi) Display Refresh Rate Specify the number of times data updated per minute in the numeric value table and the time-series graph on the performance monitoring screen. The default number of times is 1 per minute. If changing the number of times, specify a value from 1 to 6. (xii) Interval Specify the monitoring interval as a threshold monitoring condition. The default is the display refresh value. [Same as Display Refresh Rate] Set the threshold monitoring interval the same as the display refresh rate. [Same as Logging Interval] Set the threshold monitoring interval the same as the logging interval. Threshold monitoring is performed only for disk arrays which are accumulating statistical information. [Value of Interval] Set directly the threshold monitoring interval. A value from 1 to 60 (minute) can be specified. (xiii) Minimum I/O Count Specify the minimum number of I/O operations as a threshold monitoring condition. A value 1 to 120 (the number of times/minute) can be specified. The default minimum I/O count is 60 (times per minute). 1. Automatic execution of summarization and deletion of files whose keep period expired are performed for the statistical information files generated by the ism server V4.1 or later. Since these operations are not performed for those generated by the ism server V3.4 or earlier, summarize and delete them as needed. 2. Whether the keep period set for the statistical information file expired or not is determined based on the system time of the machine where the ism server operates. Therefore, take extra care when changing the system time. When substantially changing the system time, save the statistical information files as needed. 3. From ism V4.1, the logging interval has been able to automatically be adjusted by default. To disable automatic adjustment of logging interval, change the setting of [Adjustment of Logging Interval] in the ism server environment definition to [Manual] and restart the ism server. If the [Logging Interval] is set to an inappropriate value, the statistical information may not be output properly. Therefore, it is recommended to set [Adjustment of Logging Interval] to [Automatic] as default. 203

214 Perfformance Opttiimiizattiion The performance optimization function is set in the following screen. You do not have to perform settings if you do not use the performance optimization function. This setting is not required during normal operation because the default values are recommended here. (i) (ii) Figure Performance Optimization Screen (i) Log File Folder Specify the folder for containing the performance optimization log file. The folder name can be specified with up to 192 bytes. The default folder is [installation destination folder]\etc\optlog. If changing the folder, click the [Browse] button and specify an existing folder. In a Server Core environment, specify the folder in this field because the [Browse] button cannot be used. Specify the local directory of the computer where the ism server is running. If the network resource or network directory is specified, the performance monitoring function may not work correctly. (ii) LD Movement Status Check Interval Specify the interval at which the logical disk moving status is to be checked. The default interval is 10 seconds. If changing the interval, specify a value from 5 to

215 Replliicattiion//Snapshott The replication/snapshot function is set in the following screen. You do not have to perform settings if you do not use the replication/snapshot function. This setting is not required during normal operation because the default values are recommended here. (i) (ii) (iii) (iv) Figure Replication/Snapshot Screen (i) Port Number Specify the port number used to issue the ReplicationControl command through ism. You can set a value from 1 to The default is To change the default, specify a port number other than the following: - [Storage Manager Client Destination Port Number], which is specified under [Client Information] in the Server/Client window - [Port Number of FTP Service], which is specified in the File Transfer window - [Port Number], which is specified under [Snapshot Information] in the Replication/Snapshot window (ii) Periodical Refresh of Replication Screen and Connection Screen Specify whether to refresh the replication management window and connection window of the ism client by pressing the F5 key, not by refreshing the windows periodically. The default value is [Refresh]. If the RDR links between disk arrays are via the best-effort line, specify [Don t refresh] to avoid periodic refreshing. For details, see the low-speed line description in the Data Replication 205

216 User s Manual (Function Guide). Refresh: Executes periodically refresh of the replication management window and connection window Don t Refresh: Does not execute periodically refresh of the replication management window and connection window (iii) Port Number Specify the port number used to issue the SnapControl command through ism. You can set a value from 1 to The default is To change the default, specify a port number other than the following: - [Storage Manager Client Destination Port Number], which is specified under [Client Information] in the Server/Client window - [Port Number], which is specified under [Client Information] in the Server/Client window - [Port Number of FTP Service], which is specified in the File Transfer window - [Port Number], which is specified under [Replication Information] in the Replication/Snapshot window (iv) Control of State Change Message Controls the status change messages issued by the ReplicationControl and SnapControl command operation. Don t Control: Does not control the state change message. Control: Controls the state change message. Use the port numbers in [Replication Information] and [Snapshot Information] when using the SnapControl command through ism. 206

217 Datta Rettenttiion The data retention function is set in the following screen. You do not have to perform the setting if you do not use the data retention function. Even if you use the data retention function, the setting in this section is not required during normal operation because the default values are recommended. (i) (ii) (iii) Figure Data Retention Screen (i) The Time to Check the Status of Data Protection Specify the time to check the protection state of the data-protected volume. The default is 00:10. (ii) The Output Period of the Message of Expiration Specify an output period of the expiration notification message when the retention is expired for the data-protected volume. When 0 is specified for the parameter, expiration message is not output. You can set a value from 0 to 255. The default is 1. (iii) The Day of Previous Notification of Expiration Specify the day of previous notification of retention date approached for the data-protected volume. When 0 is specified for the parameter, notification of retention date approached is not performed. You can set a value from 0 to 255. The default is

218 3..5 Enviironment Settiings of iism Express Connector Enviironmentt Deffiiniittiion Fiille (1) Sample files The ism Express Connector provides a sample file as follows. Create an environment definition file ([installation destination folder]/conf/ismconn/ismconn.conf) referring to the following sample file in accordance with the operation. The default value of [installation destination folder] is [System drive]:\program Files\NEC\iSMConn. (In 64-bit environment, it is [System drive]:\program Files (x86)\nec\ismconn) When there is no modification, you do not need to create the environment definition file. A sample files are under [installation destination folder]/conf/ismconn. ismconn.sample (2) Description rules of environment definition file (ismconn.conf) The following explains the description rules of the environment definition file: (a) section The environment definition file contents are divided into multiple blocks by section. Specify the start of section by enclosing the section name between brackets [ (left parenthesis) and ] (right parenthesis). The same section name cannot be specified in the environment definition file twice or more. (b) parameter Specify the definition contents of each section in parameters. A parameter is specified in lines next to the line where the section name is specified. A parameter consists of the keyword identifying the parameter type, =, and the value. And one parameter must be described in single line with alphanumeric characters or special characters up to 1023 bytes. The same keyword can be specified only once in the defined section. <Character string specification> The following characters cannot be used. Tab character, new line character, and (, ) (double quotations) (Example) C:/temp will be recognized as C:\temp. When a character string is enclosed between double quotations ( ), it can include the following character. (white space) 208

219 <Path specification> Any character other than the following characters can be used as path name. /, \, : (colon), * (asterisk),?, (, ) (double quotations), <, >,, #, {, }, %, &, ~ (tilde) <Parameter specification format> Keyword and one value A parameter consists of a keyword, =, and the value. Example: MaxLogFileSize=1 (numeric value specified) LogFilePath="C:\Program Files\NEC\iSMConn\etc\log" (character string specified) (c) comment A line starting with # is processed as a comment line. A comment line can be inserted between the section start line and parameter line, and between parameter lines (lines not including any parameter). A pound sign # in any other use is not processed as a comment line mark. Example: #[FilePath] [FilePath] Comment line Not a comment line (3) Setting information of environment definition file (ismconn.conf) The following explains details of the information that can be set in the environment definition file. If the environment definition file was changed while ism Express Connector was running, restart of ism Express Connector is required. In this case, restart (or Stop and Start) [ism Express Connector] from [Services]. (a) Section for log file path: Define the information of log file location [FilePath] [LogFilePath = log-file-location] Table 3-2 Information to be Set in Environment Definition File (FilePath Section) Section name/ parameter Value Description [FilePath] FilePath section Indicates the start of the FilePath section. LogFilePath log-file-location ( parameter=valu e single line string up to 1023 characters) Specify the log file location. It must be the existing directory. Default value: [installation destination folder]\etc\log This value can be described as a relative path name. In this case, specify the relative path name from [installation destination folder]\sbin. 209

220 (b) Section for port number: Define the information of port number Define the port number and port number range used by ism Express Connector. Modify the port number if it conflicts with another application's port number. [Port] [ismexpressconnectormain = port-number] [ismconntimercontrol = port-number] [ismconnlogmanage = port-number] [ismconnismcomm = port-number] [ismconnmconnectstart = start-port-number] [ismconnmconnectend = end-port-number] [ismconnwinterfacestart = start-port-number] [ismconnwinterfaceend = end-port-number] Table 3-3 Information to be Set in Environment Definition File (Port Section) Section name/ parameter Value Description [Port] Port section Indicates the start of the Port section. ismexpressconnector Main ismconntimercontro l ismconnlogmanage ismconnismcomm ismconnmconnectst art ismconnmconnecten d ismconnwinterfacest art port-number (Numeric: 1 to 65535) port-number (Numeric: 1 to 65535) port-number (Numeric: 1 to 65535) port-number (Numeric: 1 to 65535) start-port-number (Numeric: 1 to 65535) end-port-number (Numeric: 1 to 65535) start-port-number (Numeric: 1 to 65535) Specify the port number. Default value: 7000 Specify the port number. Default value: 7001 Specify the port number. Default value: 7002 Specify the port number. Default value: 5555 Specify the beginning number of the port number used. Default value: Everything from the specified beginning port number to the end port number of ismconnmconnectend is used when changing. The range of the port number used must become twice or more the number of the monitored E series disk arrays. Specify the end number of the port number used. Default value: Everything from the beginning port number of ismconnmconnectstart to the specified end port number is used when changing. The range of the port number used must become twice or more the number of the monitored E series disk arrays. Specify the beginning number of the port number used. Default value: Everything from the specified beginning port number to the end port number of ismconnwinterfaceend is used when changing. The range of the port number used must become equal to or more than the number of the monitored E series disk arrays. 210

221 Section name/ parameter ismconnwinterfacee nd Value end-port-number (Numeric: 1 to 65535) Description Specify the end number of the port number used. Default value: Everything from the beginning port number of ismconnwinterfacestart to the specified end port number is used when changing. The range of the port number used must become equal to or more than the number of the monitored E series disk arrays. (c) Section for log file: Define the information of log file [ActionLog] [MaxLogFileSize = file-size] Section name/ parameter [ActionLog] MaxLogFileSize Table 3-4 Information to be Set in Environment Definition File (ActionLog Section) Value ActionLog section log-file-size (Numeric: 1 to 10) Description Indicates the start of the ActionLog section. Specify the maximum operation log file size. Unit: MB Default value: 1 211

222 Chapter 4 Client Installation 4..1 Supported iism Clliient Types The client function operates on a PC connected with the management server through a LAN, and provides the user with the monitoring and operation functions through the GUI. The client function provides the following two GUIs: GUI based on the Web GUI based on Windows This guide describes the installation methods of both GUIs. In this guide, to distinguish between these two GUIs, ism client (Web GUI) is used to describe the former GUI, and ism client (Win GUI) is used to describe the latter GUI. The ism client (Win GUI) also indicates the ism client that was provided in V4.3 or before. 212

223 4..2 Operatiing Enviironment (1) Network Environment Settings Because TCP/IP socket communication is used between the ism server and ism client, TCP/IP connection environment with the concerned server should be bound for network environment definitions of personal computer. (2) Operating Environment Table 4-1 Operating Environment (ism client (Web GUI)) Operating systems < D series or E series > Microsoft Windows XP Professional Edition (SP0 to SP3) Microsoft Windows XP Professional x64 Edition (SP0, SP2) Microsoft Windows Vista Business (SP0 to SP2) Microsoft Windows 7 Ultimate Microsoft Windows 7 Ultimate x64 Microsoft Windows 7 Enterprise Microsoft Windows 7 Enterprise x64 Microsoft Windows 7 Professional Microsoft Windows 7 Professional x64 Microsoft Windows Server 2003, Standard Edition (SP0 to SP2) Microsoft Windows Server 2003 R2, Standard Edition (SP0, SP2) Microsoft Windows Server 2003, Standard x64 Edition (SP0, SP2) Microsoft Windows Server 2003 R2, Standard x64 Edition (SP0, SP2) Microsoft Windows Server 2003, Enterprise Edition (SP0 to SP2) Microsoft Windows Server 2003 R2, Enterprise Edition (SP0, SP2) Microsoft Windows Server 2003, Enterprise x64 Edition (SP0, SP2) Microsoft Windows Server 2003 R2, Enterprise x64 Edition (SP0, SP2) Microsoft Windows Server 2008 Standard (SP0, SP2) (*1) Microsoft Windows Server 2008 R2 Standard (*1) Microsoft Windows Server 2008 Enterprise (SP0, SP2) (*1) Microsoft Windows Server 2008 R2 Enterprise (*1) < S series or A series > Microsoft Windows 2000 Professional (SP2 to SP4) Microsoft Windows 2000 Server (SP2 to SP4) Microsoft Windows 2000 Advanced Server (SP2 to SP4) Microsoft Windows XP Professional Edition (SP0 to SP3) Microsoft Windows XP Professional x64 Edition (SP0, SP2) Microsoft Windows Vista Business (SP0 to SP2) Microsoft Windows 7 Ultimate Microsoft Windows 7 Ultimate x64 Microsoft Windows 7 Enterprise Microsoft Windows 7 Enterprise x64 213

224 Microsoft Windows 7 Professional Microsoft Windows 7 Professional x64 Microsoft Windows Server 2003, Standard Edition (SP0 to SP2) Microsoft Windows Server 2003 R2, Standard Edition (SP0, SP2) Microsoft Windows Server 2003, Standard x64 Edition (SP0, SP2) Microsoft Windows Server 2003 R2, Standard x64 Edition (SP0, SP2) Microsoft Windows Server 2003, Enterprise Edition (SP0 to SP2) Microsoft Windows Server 2003 R2, Enterprise Edition (SP0, SP2) Microsoft Windows Server 2003, Enterprise x64 Edition (SP0, SP2) Microsoft Windows Server 2003 R2, Enterprise x64 Edition (SP0, SP2) Microsoft Windows Server 2008 Standard (SP0, SP2) (*1) Microsoft Windows Server 2008 R2 Standard (*1) Microsoft Windows Server 2008 Enterprise (SP0, SP2) (*1) Microsoft Windows Server 2008 R2 Enterprise (*1) (*1) The product without Hyper-V function is also supported. However, The Server Core install option is not supported. Web browser Microsoft Internet Explorer Version 6, 7, or 8 * Windows Vista and Windows Server 2008 support only Internet Explorer Version 7 and 8. * Windows 7 and Windows Server 2008 R2 support only Internet Explorer Version 8. * When using Internet Explorer Version 8, use JRE6 Update 11 or later. JRE (Java2 Runtime Either of the following JRE (32-bit version) is required. Environment) 5.0 Update 8 to 19 6 Update 3 to 7, 10 to 14 Refer to Table 4-2 for the combination of supported JRE and OS. JRE is in the ism CD. For the JRE installation method, refer to When Using ism Client (Web GUI). Memory Refer to Table 4-4. Display XGA (resolution 1024*768) or more. * Above are the supported environments for this version at the point of the initial shipment of this product. Table 4-2 Operating Environment (Combination of JRE and OS) OS JRE5.0 (32-bit version) Update 8 to 19 JRE6 (32-bit version) - 6 Update 3 to 7, 10 to 14 Windows 2000 Professional Windows 2000 Server Windows 2000 Advanced Server Windows XP Professional Windows XP Professional x64 Edition Windows Vista Business (Update11 or later) Windows 7 Ultimate - (Update13 or later) 214

225 OS JRE5.0 (32-bit version) Update 8 to 19 JRE6 (32-bit version) - 6 Update 3 to 7, 10 to 14 Windows 7 Enterprise - (Update13 or later) Windows 7 Professional - (Update13 or later) Windows 7 Ultimate x64 - (Update13 or later) Windows 7 Enterprise x64 - (Update13 or later) Windows 7 Professional x64 - (Update13 or later) Windows Server 2003, Standard Edition Windows Server 2003 R2, Standard Edition Windows Server 2003, Standard x64 Edition Windows Server 2003 R2, Standard x64 Edition Windows Server 2003, Enterprise Edition Windows Server 2003 R2, Enterprise Edition Windows Server 2003, Enterprise x64 Edition Windows Server 2003 R2, Enterprise x64 Edition Windows Server 2008 Standard - (Update4 or later Windows Server 2008 R2 Standard - (Update13 or later Windows Server 2008 Enterprise - (Update4 or later Windows Server 2008 R2 Enterprise - (Update13 or later : Supported by OS -: Not supported by OS Windows Vista is supported by JRE6 and JRE 5.0 Update11 or later. Windows Server 2008 is supported by JRE6 Update 4 or later. Windows 7 and Windows Server 2008 R2 are supported by JRE6 Update 13 or later. 1. If the software product using JRE for operation has already been installed in the environment where you want to run the ism client (Web GUI), you can run the software and ism client (Web GUI) together only when the following condition is satisfied. The latest version of JRE that has been installed in the environment is supported by the software and ism client (Web GUI). When this condition is not satisfied, either the software or ism client (Web GUI) must be run on another machine. 215

226 2. Supported JRE may includes versions reported some security vulnerabilities. Therefore, it is recommended to use the latest version in these JRE. Refer to the following websites for security vulnerabilities in detail; - US-CERT ( -SunSolve Online ( Table 4-3 Operating Environment (ism client (Win GUI)) Operating systems < S series or A series > Microsoft Windows 2000 Professional (SP2 to SP4) Microsoft Windows 2000 Server (SP2 to SP4) Microsoft Windows Advanced Server (SP2 to SP4) Microsoft Windows XP Professional Edition (SP0 to SP3) Microsoft Windows XP Professional x64 Edition (SP0, SP2) Microsoft Windows Vista Business (SP0 to SP2) Microsoft Windows 7 Ultimate Microsoft Windows 7 Ultimate x64 Microsoft Windows 7 Enterprise Microsoft Windows 7 Enterprise x64 Microsoft Windows 7 Professional Microsoft Windows 7 Professional x64 Microsoft Windows Server 2003, Standard Edition (SP0 to SP2) Microsoft Windows Server 2003 R2, Standard Edition (SP0, SP2) Microsoft Windows Server 2003, Standard x64 Edition (SP0, SP2) Microsoft Windows Server 2003 R2, Standard x64 Edition (SP0, SP2) Microsoft Windows Server 2003, Enterprise Edition (SP0 to SP2) Microsoft Windows Server 2003 R2, Enterprise Edition (SP0, SP2) Microsoft Windows Server 2003, Enterprise x64 Edition (SP0, SP2) Microsoft Windows Server 2003 R2, Enterprise x64 Edition (SP0, SP2) Microsoft Windows Server 2003, Enterprise Edition for Itanium-based Systems (SP0 to SP2) Microsoft Windows Server 2008 Standard (SP0, SP2) (*1) Microsoft Windows Server 2008 R2 Standard (*1) Microsoft Windows Server 2008 Enterprise (SP0, SP2) (*1) Microsoft Windows Server 2008 R2 Enterprise (*1) Microsoft Windows Server 2008 for Itanium-based Systems (SP0, SP2) (*1) (*1) The product without Hyper-V function is also supported. However, The Server Core install option is not supported. Memory Refer to Table 4-4. Disk capacity Capacity for program: 23 MB Required capacity for operation: 51 MB or more * The capacity for files such as CSV output is not included. 216

227 * Above are the supported environments for this version at the point of the initial shipment of this product. Table 4-4 Required Memory Capacity Main screen (Web GUI) 28 (30) MB or more Main screen (Win GUI) 32 (32) MB or more Configuration setting screen (Web 2 (2) MB or more GUI) Configuration setting screen (Win GUI) Replication screen Performance monitoring screen Performance optimization screen Fault information gathering screen Snapshot screen Data Retention screen Partition setting screen Cache segment setting screen iscsi setting screen 7 (7) MB or more 13 (14) MB or more 15 (16) MB or more 12 (13) MB or more 5 (10) MB or more 14 (15) MB or more 14 (14) MB or more 6 (7) MB or more 3 (5) MB or more 11 (12) MB or more * This memory capacity is the minimum required memory capacity when operating the ism client. The ism client (Web GUI) and ism client (Win GUI) require the same memory capacity for windows other than the main window and configuration setting window. The memory capacity required for the main window must be added to the memory required for windows other than the main window at operation. Values in parentheses indicate the memory capacity required if the ism client operates in a 64-bit operating system. 217

228 4..3 IInstallllatiion and Settiing iism Clliientt IInsttallllattiion This section describes the installation methods of the ism client (Web GUI) and ism client (Win GUI). If you use ism for the first time, refer to [Read me first] on the first screen of Storage Manager Setup. This installation procedure is for when [Custom Install] is selected for Storage Manager Setup. 218

229 When Usiing iism Clliientt ((Web GUII)) The ism client (Web GUI) connects to the ism server with starting the Web browser. The ism client (Web GUI) is necessary to use the D series disk arrays. Make the following settings for the Web browser to be used by the ism client (Web GUI). 1. Specify the ism server to connect to [Trusted sites]. The setting procedure is as follows. (1) Select [Control Panel] [Internet Options] [Security] tab. (2) Select [Trusted sites] and click the [Sites] button. Figure 4-1 Internet Options Screen 219

230 (3) In [Add this Web site to the zone:], enter the URL of the ism server to connect (Example: address (or host name) of ism server to connect]) and click [Add]. * Uncheck the [Require server verification ( for all sites in this zone] checkbox. Figure 4-2 Trusted sites Screen (4) Click the [OK] button to close the screen. 220

231 2. Set the security level of [Trusted sites]. The setting procedure is as follows. (1) Select [Control Panel] [Internet Options] [Security] tab. (2) Select [Trusted sites] and click the [Custom Level] button. Figure 4-3 Internet Options Screen 221

232 (3) Set [Run ActiveX controls and plug-ins] of [ActiveX controls and plug-ins] to [Enable]. Figure 4-4 Security Settings Screen (4) Click the [OK] button to close the screen. * When using Internet Explorer Version 7 or 8, do not enable the protected mode of [Trusted sites]. 222

233 When using ism client (Web GUI), perform installation according to the following procedure. (1) Log in as a user with administrator privileges. (2) Insert the CD. The Storage Manager Setup program automatically starts. For Windows Vista or later or Windows Server 2008 or later, the [AutoPlay] dialog may be displayed. If this dialog is displayed, select [Run ISMSETUP.EXE]. Since Storage Manager Setup may not start automatically depending on the environment in use, run the following program in the CD directly. Do the same when you insert the CD before login. \INSTALL\WINDOWS\ISMSETUP.EXE For Windows Vista or later or Windows Server 2008 or later, the [User Account Control] dialog may be displayed. Select [Continue] or [Yes] to start the setup. If you use ism for the first time, refer to [Read me first]. (3) Select [Setup the management server or an application server] of [Custom Install] and click the [Next] button. Figure 4-5 Select Setup Method Screen (Custom Install) 223

234 (4) Select the disk array using and click the [Next] button. Below is the explanation for [D1 series/d3 series/d4 series(not initialized)]. Figure 4-6 Select disk array Screen (5) Select [3.Install Storage Manager Client] and click the [Next] button. In case of [D1 series/d3 series/d4 series(not initialized)], you can choose multiple software programs at the same time. When installing other software programs on the same computer, select all the software programs to install referring to [System configuration examples]. Figure 4-7 Choice of setups Screen 224

235 (6) Confirm that the displayed installation procedures have been completed. Check the completed procedures and click the [Next] button. Ensure that the ism server has been successfully installed and started. In case of [D1 series/d3 series/d4 series(not initialized)], the contents depend on the selection of Figure 4-7. Figure 4-8 Install Storage Manager Client Screen (1) When [E series] was selected, the following is displayed. ism server and ism Express Connector must be installed. And, confirm that the both ism server and ism Express Connector are running. Figure 4-9 Install Storage Manager Client Screen (2) 225

236 (7) Start the JRE installer. The following screen is displayed if JRE is not installed. Click the [Next] button to continue to install JRE. * The actual JRE version is displayed for X. Figure 4-10 Install JRE Screen (1) The following screen is displayed if the installed JRE s version is older than JRE contained in CD. To install the new JRE, select [Yes] and click the [Next] button. The JRE installation starts. * The actual JRE version is displayed for X and Y. Figure 4-11 Install JRE Screen (2) 226

237 The following screen is displayed if the installed JRE s version is newer than JRE contained in CD. Be sure to check the latest information of the supported JRE. In this case, JRE is not installed. * The actual JRE version is displayed for X. Figure 4-12 Install JRE Screen (3) When JRE of the same version is already installed, the above screen is not displayed. * It is recommended to disable Automatic Update of JRE after JRE installation. If this Automatic Update is available, there might be a possibility that JRE would become the one that ism client (Web GUI) does not support. 227

238 (8) Enter the information required to connect to the ism server. Enter the IP address (host name) of the ism server to be connected. When the Web browser destination port number is changed in the ism server environment setting, enter the port number after change. If ism server has already been installed on the same computer, is pre-entered as the IP address (host name). Figure 4-13 Connection to Storage Manager Server Screen 228

239 (9) The ism client installation is complete. Clicking the [Finish] button starts the Web browser. Enter the user name at the login screen and connect to the ism server. To perform the initial settings for the D1 series, D3 series, or D4 series disk array after login, start the initialization wizard. You can start the initialization wizard by selecting [Initialization Wizard] from the [File] menu of the ism client (Web GUI). For the initialization wizard, refer to the ism client (Web GUI) help. In case of the D8 series or E series or S series/a series, the initialization wizard is not available. Clicking the [Cancel] button does not start a Web browser. To use the ism client (Web GUI), start a Web browser to connect to the ism server. In the URL field of the Web browser, enter address (or host name) of ism server to connect]:[web browser connection port number] to connect to the ism server. (Example: Make Internet Explorer (32-bit Internet Explorer for a 64-bit OS) the default Web browser. Figure 4-14 Storage Manager Client installation complete Screen When connecting the ism client (Web GUI) to the ism server succeeds, if the ism client (Win GUI) is not installed on the PC or an older version of the ism client (Win GUI) is installed, the screen for downloading the ism client (Win GUI) installer file is displayed. To operate the ism client (Web GUI), the ism client (Win GUI) must be installed. Click the [Run] button to start the installer directly or the [Save] button to download the installer on the PC and execute it after the completion of the downloading. (For Windows Vista or later or Windows Server 2008 or later, the [User Account Control] dialog may be displayed when the installation program is started. Select [Continue] or [Yes] to execute the installation program.) 229

240 Figure 4-15 File Download Screen Click the [Cancel] button when downloading the installer is not executed immediately. The ism client (Web GUI) main screen is displayed without downloading the installer. In this case, only the state monitoring screen of the main screen can be used. (Other screens including the configuration setting screen and performance monitoring screen cannot be used.) For details on the ism client (Win GUI) installation, refer to the description from (8) to (16) in When Using ism Client (Win GUI). (The environment setting described in (17) is unnecessary.) If ism Client update modules exist, file names of the update module will be added on the window above. The module updater will start automatically after the installation completes if the [Run] button is clicked. As the installer and the module updater will be ready for download if [Save] button is clicked, execute both of these after getting these files. (Execute the installer before the module updater.) 1. When connecting to the ism server without making settings for the trusted sites and security level, connection may fail with the following message displayed. Change the settings according to the procedure described in When Using ism Client (Web GUI) and retry connection. Figure 4-16 Web Browser Screen (Without Making Settings) 2. The Warning: Security screen may be displayed when connecting to the ism server. In this case, confirm that the issuer is NEC Corporation and click the [Execute] button. 3. The message that the functions of Internet Explorer (or the program name of the Web browser in use) are blocked may be displayed in the Windows Security Alert screen when connecting to the ism server. In this case, unblock the Internet Explorer (or the program name of the Web browser in use) on the displayed screen or unblock it in the firewall setting beforehand. 230

241 4. You might fail to connect to ism server if you use a proxy server by setting of Web browser you are using. In this case, create an exception for ism server not to use a proxy server in Web browser. However, it is unnecessary to change proxy server settings when you use the ism client (Web GUI) and ism server on the same computer. Change proxy server settings following the steps below. 1) Select [Control Panel] [Internet Options] [Connections] tab. Then, click the [LAN Settings] button to open the Local Area Network (LAN) Settings dialog. 2) If [Use a proxy server for your LAN] is checked, click the [Advanced] button to open the Proxy Settings dialog; otherwise, you need not execute the following steps. 3) Add both host name and IP address for the server to connect in [Do not use proxy server for addresses beginning with:]. 4) Check the JRE proxy settings according to the steps below. JRE6 or JRE 5.0 Select [Control Panel] [Java] [Network Settings]. Then confirm whether [Use browser settings] is checked. If not checked, select [Advanced] and add both host name and IP address for the server to connect in [Exceptions]. 5) Close all Web browsers in use and restart a Web browser. 5. When the installer is downloaded from the ism client (Web GUI) and the ism client (Win GUI) is newly installed, the shortcut for starting the ism client is not created in the Start menu or Desktop. This shortcut is created when the overwrite installation is executed or if the ism client (Web GUI) has been installed on the same computer. Since this shortcut is unnecessary for ism client (Web GUI) operation, delete it as necessary. 6. It is recommended to disable automatic updating of JRE after JRE installation. Select [Java] or [Java Plug-in] from [Control Panel] and change the setting in the displayed Java control panel. 7. To use JRE6 update 10 or later, disable the next-generation Java Plug-in by performing the following procedure: (1) Select Control Panel. (2) Double-click the Java icon. (3) Select the [Advanced] tab. (4) Expand [Java plug-in]. (5) Clear [Enable the next-generation Java Plug-in (requires browser restart)]. 8. Only a user with administrator privileges can operate the ism client (Web GUI). Because the ism client might start an installer, run a web browser as a user with administrator privileges. 231

242 When Usiing iism Clliientt ((Wiin GUII)) The ism client (Win GUI) should be pre-installed on the personal computer. To install the ism client, follow the procedure below. When using the D series or E series disk arrays, use the ism client (Web GUI). 1. Be sure to use the quota management*1 and file screening*2 appropriately when applying them to the installation disk or folder. In case of misuse of them, a problem may occur during installation or operation. *1: Function to restrict the storage usage and prevent the storage from being used exceeding the restriction. *2: Function to prevent a file with a particular file name (extension) from being saved. 2. The default client to be used by the ism server is the ism client (Web GUI). Therefore, it is necessary to change the environment setting to use the ism client (Win GU). For the ism server environment setting, refer to the ism server environment setting of the OS in use. It is recommended to use the ism client (Web GUI) from ism V5.1. (1) Log in as a user with administrator privileges. (2) Insert the CD. The Storage Manager Setup program automatically starts. For Windows Vista or later or Windows Server 2008 or later, the [AutoPlay] dialog may be displayed. If this dialog is displayed, select [Run ISMSETUP.EXE]. Since Storage Manager Setup may not start automatically depending on your environment, directly start the following program on the installation CD. Do the same when you insert the CD before login. \INSTALL\WINDOWS\ISMSETUP.EXE For Windows Vista or later or Windows Server 2008 or later, the [User Account Control] dialog box might be displayed. Select [Continue] or [Yes] to start the setup. If you use ism for the first time, refer to [Read me first]. 232

243 (3) Select [Setup the management server or an application server] of [Custom Install] and click the [Next] button. Figure 4-17 Select Setup Method Screen (Custom Install) (4) Select [S series/a series] and click the [Next] button. Figure 4-18 Select disk array Screen 233

244 (5) Select [3.Install Storage Manager Client] and click the [Next] button. Figure 4-19 Choice of setups Screen (6) Select [Storage Manager Client (Win GUI)] and click the [Next] button. You cannot select this item when the same version of the ism client (Win GUI) has already been installed. Figure 4-20 Selection the Storage Manager Client type Screen 234

245 (7) Click the [Next] button to start the ism client (Win GUI) setup. Figure 4-21 Install Storage Manager Client (Win GUI) Screen (8) If an older version of the ism client (Win GUI) is installed, the following screen is displayed. Click the [OK] button to overwrite and install a new version of the ism client (Win GUI) to the folder where an older version of the ism client (Win GUI) exists. It takes some time to complete the installation. (The screens in (9) and the following are not displayed.) All the setting information is inherited. Figure 4-22 Overwrite Installation Confirmation Screen 235

246 (9) The ism client (Win GUI) installation starts. Click the [Next] button. Figure 4-23 Installation Start Screen (10) The License Agreement screen is displayed. Read the contents, select [I accept the terms of the license agreement] if you agree, and then click the [Next] button. If you do not accept the license agreement, you cannot use this software. Figure 4-24 License Agreement Screen 236

247 (11) Display the information on the ism client (Win GUI). Read the contents and click the [Next] button. * The actual ism client (Win GUI) version and the date (month and year) are displayed for x.x.xxx and mm.yyyy, respectively. Figure 4-25 Information Screen 237

248 (12) Specify the installation location for the ism client (Win GUI). If the ism client (Win GUI) of V4.2 or later has been installed and installation information was saved at ism client (Win GUI) uninstallation, the saved installation destination folder information is displayed as default. If the ism client (Win GUI) is installed for the first time or the installation information was not saved, the default program folder will be as follows: For 32-bit OS: [system drive]:\program Files\NEC\iSMClient For 64-bit OS: [system drive]:\program Files (x86)\nec\ismclient If you wish to change the installation destination folder, click the [Browse] button and change the installation destination folder. After changing it, click the [Next] button. If you do not change the installation destination folder, directly click the [Next] button. Figure 4-26 Choose Destination Location Screen 238

249 (13) Specify the program folder name for the ism client (Win GUI). If the ism client (Win GUI) of V4.2 or later has been installed and installation information was saved at ism client (Win GUI) uninstallation, the saved program folder information is displayed as default. If the ism client (Win GUI) is installed for the first time or the installation information was not saved, the default program folder will be as follows: Storage Manager Client If you wish to change the program folder name, change the Storage Manager Client in [Program Folder]. After changing it, click the [Next] button. If you do not change the program folder name, directly click the [Next] button. Figure 4-27 Select Program Folder Screen 239

250 (14) Install the ism client (Win GUI) module. If the ism client (Win GUI) of V4.2 or later has been installed; installation information was saved at ism client (Win GUI) uninstallation; and the installation destination folder is different from the one set before, various setting information is copied from the previous to the current installation destination folder. Figure 4-28 File Copying Screen 240

251 (15) Set the ESMPRO link. If ESMPRO Manager was installed before installing the ism client (Win GUI), the [ESMPRO Link Setting Utility] is started. So set the ESMPRO link function. Even if the ESMPRO link is not set here, ESMPRO link can be set later. For details, refer to 1.7 ESMPRO Link in the User s Manual. Click the [Close] button to go to the next screen. Figure 4-29 ESMPRO Link Setting Utility Screen (16) Complete installing the ism client (Win GUI). Click the [Finish] button. Figure 4-30 InstallShield Wizard Complete Screen 241

252 (17) Set the environment. After installing the ism client (Win GUI), you have to perform a variety of settings on the Setting Utility screen. For details on the environment setting, refer to Client Start in the User s Manual and the ism client (Win GUI) help. 1. Only a single ism client (Win GUI) can be installed into one OS instance. Multiple clients, however, can be activated simultaneously by defining an environment for each ism server to be connected. For details, refer to Client Start in the User s Manual and ism client (Win GUI) help. 2. Only a user with administrator privileges can operate the ism client (Win GUI). 242

253 iism Clliientt Uniinsttallllattiion To uninstall the ism client (Win GUI), follow the procedure below. (1) Log in as a user with administrator privileges. (2) Remove Storage Manager Client by using [Programs and Features] ([Add or Remove Programs] for Windows XP and Windows Server 2003, [Add/Remove Programs] for Windows 2000) in [Control Panel]. Because setting information in the installation destination folder etc. is not deleted, reinstallation is easy. For Windows Vista or later or Windows Server 2008 or later, the [User Account Control] dialog box might be displayed at uninstallation. Select [Continue] or [Yes] to execute the uninstallation program. (3) [Confirm the installer s information Record] message box is displayed during uninstallation. To inherit various setting information at reinstallation, click the [Yes] button. If it is not necessary to inherit the information, click the [No] button. Figure 4-31 Confirm the installer s information Record Screen Uninstalling the ism client (Win GUI) deletes all of the icons on the desktop and the menu items. Deleted items are restored by reinstalling the ism client (Win GUI) to the same folder as before or reinstalling it after saving the installation information at uninstallation. 243

254 iism Clliientt Updattiing To update the ism client (Win GUI), execute the installer of the newer ism client (Win GUI). The installer overwrites and installs the newer ism client (Win GUI) to the folder including the previous ism client (Win GUI). All the setting information is inherited. Be sure to update the ism client (Win GUI) following the procedure below only when upgrading the OS of the PC where the ism client (Win GUI) is running to Windows Vista or later or Windows Server 2008 or later. For the PC where ism client (Web GUI) is running, it is unnecessary to update the ism client (Win GUI). * It is necessary to update the ism client (Win GUI) even if the versions of the existing ism client (Win GUI) and the one after updating are the same. (1) Upgrade the OS of the PC to which the ism client (Win GUI) has been installed to Windows Vista or later and Windows Server 2008 or later. (2) After upgrading to Windows Vista or later or Windows Server 2008 or later is complete, uninstall the existing ism client (Win GUI). (For the uninstallation procedure, refer to ism Client Uninstallation.) (3) Re-install the ism client (Win GUI). (For installation procedure, refer to When Using ism Client (Win GUI).) (4) Display the properties of the ism client (Win GUI) shortcut created on Desktop or the properties of ismcl.exe in the ism client (Win GUI) installation folder. 244

255 (5) Check the [Run this program as an administrator] checkbox and click the [OK] button. Figure 4-32 Confirm the installer s information Record Screen (6) Use the ism client (Win GUI) as usual. The [User Account Control] dialog may be displayed by starting the ism client (Win GUI). Select [Continue] to execute the ism client (Win GUI). 1. Though the Windows XP installer displayed the confirmation dialog asking whether to uninstall the pervious version of the ism client (Win GUI) if it was installed, the installer just performs the overwrite installation in V5.1 or later. 2. Though the installer of ism V4.1 to V4.3 displays the confirmation dialog asking whether to uninstall the previous version of the ism client (Win GUI) or that requesting to uninstall it, the installer just performs the overwrite installation in V5.1 or later. 245

256 4..4 Rellatiionshiip between Server and Clliient Versiions In general, connecting the ism client and ism server in different versions is not allowed. (The value of x.y of x.y.z. of a version is compared here. z should be disregarded.) However, you may tentatively use the ism server and ism client in different versions in special circumstances such as when upgrading of the ism client is preceded to the ism server because the machine on the ism server side cannot be stopped. In this case, the following conditions must be met: - The version of the ism client is later than that of the ism server - The version of the ism server is V1.5 or later. The functions which can be used are limited to the functional range of the version of the ism server. 246

257 Chapter 5 Volume List Installation (Linux) 5..1 Operatiing Enviironment Table 5-1 Operating Environment (Linux) Operating systems < D series > Red Hat Enterprise Linux Version 3 Red Hat Enterprise Linux ES 3 Update8 and 3.9 (IA32) Red Hat Enterprise Linux AS 3 Update8 and 3.9 (IA32) Red Hat Enterprise Linux AS 3 Update8 and 3.9 (EMT64) Red Hat Enterprise Linux Version 4 Red Hat Enterprise Linux ES 4 Update4 and 4.5 to 4.8 (IA32/EM64T) Red Hat Enterprise Linux AS 4 Update4 and 4.5 to 4.8 (IA32/EM64T) Red Hat Enterprise Linux AS 4 Update4 and 4.5 to 4.6 (IA64) Red Hat Enterprise Linux Version 5 Red Hat Enterprise Linux 5.1, 5.2, 5.3 (IA32/EM64T) Red Hat Enterprise Linux 5.1, 5.2, 5.3 Advanced Platform (IA32/EM64T) Memory Disk capacity Indispensable hardware < S series or A series > Red Hat Enterprise Linux Version 2.1 Red Hat Enterprise Linux AS 2.1 Update2 (IA32) Red Hat Enterprise Linux Version 3 Red Hat Enterprise Linux ES 3 Update2 and Update4 to Update8 and 3.9 (IA32) Red Hat Enterprise Linux AS 3 Update2 and Update4 to Update8 and 3.9 (IA32) Red Hat Enterprise Linux AS 3 Update3 to Update8 and 3.9 (EM64T) Red Hat Enterprise Linux Version 4 Red Hat Enterprise Linux ES 4 Update2 to Update4 and 4.5 to 4.8 (IA32/EM64T) Red Hat Enterprise Linux AS 4 Update2 to Update4 and 4.5 to 4.8 (IA32/EM64T) Red Hat Enterprise Linux AS 4 Update2 to Update4 and 4.5 to 4.6 (IA64) Red Hat Enterprise Linux Version 5 Red Hat Enterprise Linux 5.1, 5.2, 5.3 (IA32/EM64T) Red Hat Enterprise Linux 5.1, 5.2, 5.3 Advanced Platform (IA32/EM64T) OS required memory capacity + 5 MB or more (IA32 server/em64t server) OS required memory capacity + 10 MB or more (IA64 server) 12 MB or more NEC Storage series * The host information collection function included in the ism volume list command is available only for D series disk arrays with FC. * The E series is not supported. * Above are the supported environments for this version at the point of the initial shipment of this product. 247

258 5..2 Vollume Liist IInstallllatiion The ismvollist command is a tool for reporting disk information such as the name of disk array connected to a server or the name of logical disk in the array. This command can be operated independently, even on a server where ism has not been installed. The version of the software to be installed should support the disk array connected to the server as well as the disk array that has the RemoteDataReplication relationship with the server-connected disk array IInsttallllattiion To install the ismvollist command, use the Linux rpm command and follow the procedure below. The ismvollist command is 32-bit software. When using ismvollist in an IA64 server environment, the following packages provided by the OS, such as the 32-bit emulator and 32-bit compatible library, must be installed in advance for the 32-bit software to operate. ia32el-xxxx.ia64.rpm glibc-xxxx.i686.rpm libtermcap-xxxx.i386.rpm bash-xxxx.i386.rpm e2fsprogs-xxxx.i386.rpm * XXXX indicates the version of the package. These packages are included in the following OS installation media. Install these packages in the order described above since they are dependent on each other. 32-bit Compatibility Layer Common Binaries CD Extras CD 248

259 If any of the following software products are installed, uninstall before installing ismvollist. When ismccs (ControlCommand) is installed, ismvollist is also installed. In this case, it is unnecessary to install ismvollist individually. ReplicationControl (ismrc) ReplicationControl/DisasterRecovery (ismrcd) SnapControl (ismsc) ControlCommand (ismccs) Volume list command (ismvol) If ReplicationControl/DisasterRecovery is installed, you must uninstall it before uninstalling ReplicationControl. (1) Log in using root authority. (2) Insert the CD. When the CD drive is not available, transfer the ismvol.rpm file from another server before installing. (3) Mount the CD. - Create a mount directory (e.g. /cdrom) - Mount the media with the mount command. /bin/mount -r /dev/cdrom /cdrom (4) Check that ismccs (ControlCommand) is not yet installed. /bin/rpm -q ismrpl /bin/rpm -q ismsc (5) Install the software using the rpm command. /bin/rpm -ivh /cdrom/vollist/linux/ismvol/ismvol.rpm (6) When the following message is output, installation is completed. Installation completed. (7) Unmount the CD. /bin/umount /cdrom After installing the ismvollist command, collect and store Host Information (only for a D series disk array with FC) and create a volume list. For details, refer to Host Information collection/storage and Volume List Creation. 249

260 When ismvollist is installed, symbolic link files for each command are created in /usr/sbin. When you execute a command of ismvollist, you need to either execute the command with /usr/sbin included to the command search path, or execute the command by specifying the symbolic link file name (absolute path name) of /usr/sbin Uniinsttallllattiion To uninstall ismvollist, use the Linux rpm command and follow the procedure below. (1) Log in using root authority. (2) Check that the ismvollist command has not been started. If the command is being executed, wait for termination or forcibly terminate the command. (3) Uninstall the software using the following command. /bin/rpm -e ismvol (4) When the following message is output, uninstallation is completed. Uninstallation completed. If there are files under the /etc/ismrpl and /opt/ismvol/etc directories, neither directories nor files are deleted Updattiing To update the ismvollist software, uninstall the existing software before installing the updated one. For the updating procedure, refer to Installation and Uninstallation. 250

261 Hostt IInfformattiion Collllecttiion//Sttorage When using a D series disk array with FC, collect the host information by using ismcc_hostinfo (Host Information collection command), which is included in the ismvollist command, and then store the host information to the ism server. For details, refer to Appendix G Host Information collection/storage. This procedure is not required. However, if the host information is collected and stored, the following operation becomes possible: - The following disk array configuration settings can easily be specified by using the host information. - LD Quick Configuration (only for the D1 series/d3 series/d4 series) - LD Set Setting of Access Control - Connected host information can be displayed in the connected host list screen of the ism client (Web GUI) Vollume Liistt Creattiion A volume list is created by the ismvollist command with an option -r. Execute ismvollist command by an appropriate user privilege. You must create a volume list in the condition that a logical disk bound on the disk array is recognized as a disk device by a server. When ism is running on the server where the volume list is created or updated, it is necessary to terminate ism. ismvollist -r Upon successful creation of volume list, the following message appears: ism11100: Command has completed successfully. 251

262 If creation of a volume list fails, troubleshoot in accordance with an error message and create a volume list again. For details on error messages, refer to the electronic manual Messages Handbook. After create a volume list, confirm that logical disk information and corresponding special file information is stored correctly by display the volume list information. To display the volume list information, execute ismvollist command with -l option. ismvollist -l Even after a volume list is normally created, the volume list must be recreated and updated in the following cases. Change of disk array settings (disk array name, logical disk name, OS type) Setting/change of Access Control Adding/change/deleting of logical disk Adding/deleting of snapshot generation (SV) Binding of link-volume (LV) Adding/change/deleting of control volume (Only when control volume is used) Addition/deletion of disk array which is connected using RemoteDataReplication Change of the connection composition (path) between disk array and server Re-create and update the volume list also when you have changed settings (disk array name, logical disk name, and OS type) of the other disk array on the remote side, which configures a pair of RemoteDataReplication. Create and update volume lists with the link path between disk arrays in normal state. The volume list is created or updated automatically when the server starts up, as set at installation. To change the setting in order not to create/update the volume list when the server starts up, change the rc file name created at installation as shown below and then perform operation. Run level 2: File name at installation: /etc/rc.d/rc2.d/s90rplvol File name for not creating a volume list automatically: /etc/rc.d/rc2.d/s90rplvol Run level 3: File name at installation: /etc/rc.d/rc3.d/s90rplvol File name for not creating a volume list automatically: /etc/rc.d/rc3.d/s90rplvol 252

263 Run level 4: File name at installation: File name for not creating a volume list automatically: Run level 5: File name at installation: File name for not creating a volume list automatically: /etc/rc.d/rc4.d/s90rplvol /etc/rc.d/rc4.d/s90rplvol /etc/rc.d/rc5.d/s90rplvol /etc/rc.d/rc5.d/s90rplvol 253

264 Chapter 6 Volume List Installation (Windows) 6..1 Operatiing Enviironment Table 6-1 Operating Environment (Windows) Operating systems < D series > Microsoft Windows Server 2003, Standard Edition (SP0 to SP2) (*2) Microsoft Windows Server 2003 R2, Standard Edition (SP0, SP2) Microsoft Windows Server 2003, Standard x64 Edition (SP0, SP2) Microsoft Windows Server 2003 R2, Standard x64 Edition (SP0, SP2) Microsoft Windows Server 2003, Enterprise Edition (SP0 to SP2) (*2) Microsoft Windows Server 2003 R2, Enterprise Edition (SP0, SP2) Microsoft Windows Server 2003, Enterprise x64 Edition (SP0, SP2) Microsoft Windows Server 2003 R2, Enterprise x64 Edition (SP0, SP2) Microsoft Windows Server 2003, Enterprise Edition for Itanium-based Systems (SP0 to SP2) (*2) Microsoft Windows Server 2008 Standard (SP0, SP2) (*3) (*4) Microsoft Windows Server 2008 R2 Standard (*3) Microsoft Windows Server 2008 Enterprise (SP0, SP2) (*3) (*4) Microsoft Windows Server 2008 R2 Standard (*3) Microsoft Windows Server 2008 for Itanium-based Systems (SP0, SP2) < S series or A series > Microsoft Windows 2000 Server (SP2 to SP4) (*1) Microsoft Windows 2000 Advanced Server (SP2 to SP4) (*1) Microsoft Windows Server 2003, Standard Edition (SP0 to SP2) (*2) Microsoft Windows Server 2003 R2, Standard Edition (SP0, SP2) Microsoft Windows Server 2003, Standard x64 Edition (SP0, SP2) Microsoft Windows Server 2003 R2, Standard x64 Edition (SP0, SP2) Microsoft Windows Server 2003, Enterprise Edition (SP0 to SP2) (*2) Microsoft Windows Server 2003 R2, Enterprise Edition (SP0, SP2) Microsoft Windows Server 2003, Enterprise x64 Edition (SP0, SP2) Microsoft Windows Server 2003 R2, Enterprise x64 Edition (SP0, SP2) Microsoft Windows Server 2003, Enterprise Edition for Itanium-based Systems (SP0 to SP2) (*2) Microsoft Windows Server 2008 Standard (SP0, SP2) (*3) (*4) Microsoft Windows Server 2008 R2 Standard (*3) Microsoft Windows Server 2008 Enterprise (SP0, SP2) (*3) (*4) Microsoft Windows Server 2008 R2 Standard (*3) Microsoft Windows Server 2008 for Itanium-based Systems (SP0, SP2) (*1) The host information collection function included in ismvollist does not support this OS. (*2) To use the host information collection function included in ismvollist, SP1 or SP2 254

265 must be applied on this OS. (*3) The product without Hyper-V function is also supported. (*4) The Server Core install option is not supported. Memory Microsoft Windows 2000 Server OS required memory + 10 MB or more Microsoft Windows 2000 Advanced Server OS required memory + 10 MB or more Microsoft Windows Server 2003, Standard Edition OS required memory + 10 MB or more Microsoft Windows Server 2003 R2, Standard Edition OS required memory + 10 MB or more Microsoft Windows Server 2003, Standard x64 Edition OS required memory + 12 MB or more Microsoft Windows Server 2003 R2, Standard x64 Edition OS required memory + 12 MB or more Microsoft Windows Server 2003, Enterprise Edition OS required memory + 10 MB or more Microsoft Windows Server 2003 R2, Enterprise Edition OS required memory + 10 MB or more Microsoft Windows Server 2003, Enterprise x64 Edition OS required memory + 12 MB or more Microsoft Windows Server 2003 R2, Enterprise x64 Edition OS required memory + 12 MB or more Microsoft Windows Server 2003, Enterprise Edition for Itanium-based Systems OS required memory + 37 MB or more Microsoft Windows Server 2008 Standard OS required memory + 10 MB or more Microsoft Windows Server 2008 Enterprise OS required memory + 10 MB or more Microsoft Windows Server 2008 for Itanium-based Systems OS required memory + 37 MB or more Disk capacity Indispensable hardware 20 MB or more NEC Storage series * The host information collection function included in the volume list command is available only for the D series disk arrays with FC. * The E series is not supported. * Above are the supported environments for this version at the point of the initial shipment of this product. 255

266 6..2 Vollume Liist IInstallllatiion and Uniinstallllatiion The ismvollist command is a tool for reporting disk information such as the name of disk array connected to a server or the name of logical disk in the array. This command can be operated independently, even on a server where ism has not been installed. 1. The version of the software to be installed should support the disk array connected to the server as well as the disk array that has the RemoteDataReplication relationship with the server-connected disk array. 2. Be sure to use the quota management *1 and file screening *2 appropriately when applying them to the installation disk or folder. In case of misuse of them, a problem may occur during installation or operation. *1: Function to restrict the storage usage and prevent the storage from being used exceeding the restriction. *2: Function to prevent a file with a particular file name (extension) from being saved. 3. It is necessary to restart the system after installing ismvollist to start the ism host agent service. On Windows Server 2008 or later, after the installation of ismvollist, the following operation must be operated after elevation to Administrator privileges. When you execute the function of ismvollist command. When you execute the command of this software using command prompt, select Run as administrator at the launch of command prompt. When you edit the operation option setting file of ismvollist using text editor etc. 256

267 IInsttallllattiion To install ismvollist, follow the procedure below. This installation procedure is for when [Custom Install] is selected for Storage Manager Setup. If any of the following software products is installed, uninstall before installing ismvollist. When ismccs (ControlCommand) is installed, ismvollist is also installed. In this case, it is unnecessary to install ismvollist individually. ReplicationControl (ismrc) ReplicationControl/DisasterRecovery (ismrcd) SnapControl (ismsc) ControlCommand (ismccs) Volume list command (ismvol) If ReplicationControl/DisasterRecovery is installed, you must uninstall it before uninstalling ReplicationControl. 257

268 When Usiing tthe D Serriies When using the D1 series, D3 series, or D4 series disk arrays or D8 series disk arrays, install the ismvollist command following the procedure described below. If you use ism for the first time, refer to [Read me first]. (1) Log in as a user with administrator privileges. (2) Insert the CD. The Storage Manager Setup program automatically starts. For Windows Server 2008 or later, the [AutoPlay] dialog may be displayed. If this dialog is displayed, select [Run ISMSETUP.EXE]. Since Storage Manager Setup may not start automatically depending on the environment in use, run the following program in the CD directly. Do the same when you insert the CD before login. \INSTALL\WINDOWS\ISMSETUP.EXE For Windows Server 2008 or later, the [User Account Control] dialog box might be displayed. Select [Continue] or [Yes] to start the setup. If you use ism for the first time, refer to [Read me first]. (3) Select [Setup the management server or an application server] of [Custom Install] and click the [Next] button. In a Server Core environment, [Read me first] and [System configuration examples] are grayed out (disabled). Figure 6-1 Select Setup Method Screen (Custom Install) 258

269 (4) Select [D1 series/d3 series/d4 series(not initialized)] or [D8 series] and click the [Next] button. Below is the explanation for [D1 series/d3 series/d4 series(not initialized)]. Figure 6-2 Select disk array Screen 259

270 (5) Select [2.Install Storage Manager Volume List] and click the [Next] button. When installing other software programs on the same computer, select all the software programs to install referring to [System configuration examples]. In case of [D8 series], you can select only [Install Storage Manager Volume List]. You cannot select [2.Install Storage Manager Volume List] when the same version of ismvollist has been installed, when ControlCommand, ismvollist-related software, has been installed, or when the environment is not available for ismvollist. Figure 6-3 Choice of setups Screen 260

271 (6) When the older version of ismvollist is installed, the following message is displayed. Click the [Next] button to uninstall the older version of ismvollist following the steps displayed on the ismvollist screen. * The actual ismvollist versions are displayed for X.X.XXX and Y.Y.YYY. Figure 6-4 Installation status Screen (7) Click the [Next] button to start the ismvollist setup. Figure 6-5 Install Storage Manager Volume List Screen 261

272 (8) Start installing the volume list command. Click the [Next] button. Figure 6-6 Installation Start Screen (9) Display the license agreement. Read the contents, select [I accept the terms of the license agreement] if you agree, and then click the [Next] button. Figure 6-7 License Agreement Screen 262

273 (10) Display the information on the ismvollist command. Read the contents and click the [Next] button. * The actual ismvollist version and the date (month and year) are displayed for x.x.xxx and mm yyyy, respectively. Figure 6-8 Information Screen (11) Specify the installation location for the volume list command. If you wish to change the installation destination folder, click the [Browse] button and change the installation destination folder. After changing it, click the [Next] button. If you do not change the installation destination folder, directly click the [Next] button. Figure 6-9 Choose Destination Location Screen 263

274 (12) Specify the program folder name for the volume list command. If you wish to change the program folder name, change the Storage Manager Volume List in [Program Folder]. After changing it, click the [Next] button. If you do not change the program folder name, directly click the [Next] button. Figure 6-10 Select Program Folder Screen (13) Install the volume list command module. Figure 6-11 File Copying Screen 264

275 (14) Complete installing the ismvollist command. Click the [Finish] button. Figure 6-12 InstallShield Wizard Complete Screen (15) The ismvollist installation is complete. If [3.Install Storage Manager Client] is selected in Figure 6-3, the Storage Manager Client installation starts after Windows restarted. This screen might not be displayed after restarting depending on your environment. If the screen is not displayed, directly start the following program on the installation CD: \INSTALL\WINDOWS\ISMSETUP.EXE For Windows Vista or later and Windows Server 2008 or later, the [User Account Control] dialog box might be displayed. Select [Continue] or [Yes] to start the setup. Log in Windows with the same user as last time. In case of [D8 series], this window will NOT come up. 265

276 Figure 6-13 Storage Manager Volume List installation complete Screen After installing ismvollist command, collect and store Host Information and create a volume list. For details, refer to "Host Information collection/storage" and "Volume List Creation". 266

277 When Usiing tthe S Serriies orr A Serriies When using the S series or A series disk arrays, install the ismvollist command following the procedure described below. (1) Log in as a user with administrator privileges. (2) Insert the CD. The Storage Manager Setup program automatically starts. For Windows Server 2008 or later, the [AutoPlay] dialog may be displayed. If this dialog is displayed, select [Run ISMSETUP.EXE]. Since Storage Manager Setup may not start automatically depending on the environment in use, run the following program in the CD directly. Do the same when you insert the CD before login. \INSTALL\WINDOWS\ISMSETUP.EXE For Windows Server 2008 or later, the [User Account Control] dialog box might be displayed. Select [Continue] or [Yes] to start the setup. If you use ism for the first time, refer to [Read me first]. (3) Select [Setup the management server or an application server] of [Custom Install] and click the [Next] button. In a Server Core environment, [Read me first] and [System configuration examples] are grayed out (disabled). Figure 6-14 Select Setup Method Screen (Custom Install) 267

278 (4) Select [S series/a series] and click the [Next] button. Figure 6-15 Select disk array Screen (5) Select [2.Install Storage Manager Volume List] and click the [Next] button. You cannot select this item when the same version of ismvollist has been installed, when ControlCommand, ismvollist-related software, has been installed, or when the environment is not available for ismvollist. Figure 6-16 Choice of setups Screen 268

279 (6) When the older version of ismvollist is installed, the following message is displayed. Click the [Next] button to uninstall the older version of ismvollist following the steps displayed on the screen. * The actual ismvollist versions are displayed for X.X.XXX and Y.Y.YYY. Figure 6-17 Installation status Screen (7) Click the [Next] button to start the ismvollist setup. Figure 6-18 Install Storage Manager Volume List Screen 269

280 (8) Start installing the volume list command. Click the [Next] button. Figure 6-19 Installation Start Screen (9) Display the license agreement. Read the contents, select [I accept the terms of the license agreement] if you agree, and then click the [Next] button. Figure 6-20 License Agreement Screen 270

281 (10) Display the information on the ismvollist command. Read the contents and click the [Next] button. * The actual ismvollist version is displayed for x.x.xxx. Figure 6-21 Information Screen (11) Specify the installation location for the volume list command. If you wish to change the installation destination folder, click the [Browse] button and change the installation destination folder. After changing it, click the [Next] button. If you do not change the installation destination folder, directly click the [Next] button. Figure 6-22 Choose Destination Location Screen 271

282 (12) Specify the program folder name for the volume list command. If you wish to change the program folder name, change the Storage Manager Volume List in [Program Folder]. After changing it, click the [Next] button. If you do not change the program folder name, directly click the [Next] button. Figure 6-23 Select Program Folder Screen (13) Install the volume list command module. Figure 6-24 File Copying Screen 272

283 (14) Complete installing the ismvollist command. Click the [Finish] button. Figure 6-25 InstallShield Wizard Complete Screen After installing ismvollist command, create a volume list. For details, refer to "Volume List Creation". 273

284 Uniinsttallllattiion To uninstall ismvollist, follow the procedure below. (1) Log in as a user with administrator privileges. (2) If the ismvollist command and/or [Volume List Display] have been started, terminate all. If [Event Viewer] is open, close it. (3) Uninstall Storage Manager Volume List by using [Programs and Features] ([Add or Remove Programs] for Windows Server 2003; [Add/Remove Programs] for Windows 2000) in [Control Panel]. For Windows Server 2008 or later, the [User Account Control] dialog may be displayed when starting the uninstallation. Select [Continue] or [Yes] to run the uninstallation program. For a Server Core environment, insert the CD of the software version to be uninstalled, and then execute the following at the command prompt: \VOLLIST\WINDOWS\iSMVOL\SETUP.EXE\uninstall If you uninstall ismvollist while ismvollist and/or [Volume List Display] have been started, a message prompting to restart the system may appear. In this case, follow the instruction and be sure to restart the system. 274

285 Updattiing To update the ismvollist software from an older version, uninstall the old ismvollist using Storage Manager Setup installation procedure and install a new version of ismvollist. For updating procedure, refer to Installation. To update the same version of ismvollist, uninstall the existing ismvollist and install the updated ismvollist. For the updating procedure, refer to Installation and Uninstallation. When you upgrade OS of the server, which is installed ismvollist, to Windows Server 2008 or later, you must update ismvollist by the following procedure. This procedure is necessary even if the version of installed ismvollist and the version of ismvollist after update is the same. 1. Upgrade the OS of the server, which is installed ismvollist, to Windows Server 2008 or later. 2. After upgrading to Windows Server 2008 or later is complete, uninstall the installed ismvollist. Refer to Uninstallation for the uninstallation procedure. 3. Install ismvollist again. Refer to Installation for the installation procedure. 4. Display the [Properties] of the following executable file which is stored in the folder of installation destination. ismvollistgui.exe ismvolmnu_gather.exe 5. At the [Properties] of each executable file, click to select the [Run this program as an administrator] check box at [Privilege Level] of [Compatibility] tab and then click [OK]. When updating the ismvollist software from a version older than Ver3.3, re-create the volume list after performing the update; otherwise, the property information of the volume list will not be displayed when using the following functions: Specifying the -p or -ax option for the ismvollist command to display information Selecting [File] [Properties] on the Volume List Display screen to display information The volume list property information can be used when the volume list is created with ismvollist software Ver3.3 or later. 275

286 Hostt IInfformattiion Collllecttiion//Sttorage When using a D series disk array with FC, collect and store the host information by using ism Host Agent Service, or collect the host information by using ismcc_hostinfo (Host Information collection command), which is included in the ismvollist command, and then store the host information to the ism server. For details, refer to Appendix G "Host Information collection/storage". This procedure is not required. However, if the host information is collected and stored, the following operation becomes possible: - The following disk array configuration settings can easily be specified by using the host information. - LD Quick Configuration (only for the D1 series/d3 series/d4 series) - LD Set Setting of Access Control - Connected host information can be displayed in the connected host list screen of the ism client (Web GUI) Vollume Liistt Creattiion A volume list is created by activating the Volume List Display screen and selecting [File] [Create/Update Volume List], or by executing the ismvollist command with the -cr option. Execute the ismvollist command with a user belonging to the Administrators group. The following is an example of creating the volume list using the ismvollist command. ismvollist -cr You must create a volume list under the condition that a logical disk bound on the disk array is recognized as a disk device by a server. Upon successful creation of the volume list, the following message is displayed: ism11701: Volume list is created successfully. 276

287 If creation of a volume list fails, troubleshoot in accordance with error messages and create a volume list again. For details on error messages, refer to the electronic manual Messages Handbook. After create a volume list, confirm that logical disk information and corresponding Windows physical disk information is stored correctly by display the volume list information. If partitions were created, or mount point (drive letter or NTFS folder name) setting was performed, confirm that volume information (mount point volume name) and mount point is stored correctly. To display the volume list information, launch the Volume List Display function or execute ismvollist command with -a option. ismvollist -a Even after a volume list is created correctly, the volume list must be recreated and updated in the following cases. Change of disk array settings (disk array name, logical disk name, OS type) Setting/change of Access Control Addition/change/deletion of logical disk Addition/deletion of snapshot generation (SV) Binding of link-volume (LV) Addition/change/deletion of partition Addition/change/deletion of drive name on partition and drive path mounted on NTFS folder Addition/change/deletion of control volume (Only when control volume is used) Addition/deletion of disk array which is connected using RemoteDataReplication Change of the connection composition (path) between disk array and server Also re-create and update the volume list if settings have been changed (disk array name, logical disk name, and OS type) on the remote side disk array of the disk arrays configured with a RemoteDataReplication pair. Create and update volume lists with the link path between disk arrays under normal conditions. 277

288 iism Hostt Agentt Serviice After install ismvollist and restart the system, ism host agent service (NEC Storage Manager Host Agent) is started as Windows service automatically. After restart the system, confirm that [NEC Storage Manager Host Agent] is started. This can be executed by using [Service] of [Management tool] that exists in [Control panel] of Windows. And, the ism host agent service starts and stops automatically when the system starts and stops. If you want to prevent the ism host agent service from automatically starting during reboot of the system, start [Service] of [Management tool] that exists in [Control panel] of Windows, select [NEC Storage Manager Host Agent], and change the startup type from [Automatic] to [Manual]. The ism host agent service collects the host information at the following times and stores it in a disk array connected using FC cable: When the ism host agent service starts When OS detects and recognize a logical disk assigned to a server * A logical disk might not be recognized by an OS if you only allocate the logical disk to the server or connecting the disk array and server using FC cable. In this case, to recognize a logical disk allocated to the OS, you must use the function such as Windows Disk Management or restart the server. You may use the ism volume list command while the ism host agent service is stopped if it is unnecessary to collect and store the host information in a disk array automatically. 278

289 Otther Settttiings To use the ism volume list command functions from a virtual machine where Windows Server 2008 R2 Hyper-V or later is running, execute ismpassthrough_enabler once on a host before using the virtual machine. Also execute ismpassthrough_enabler when a virtual machine is added. For details about ismpassthrough_enabler, refer to the Data Replication User s Manual (Function Guide). ismpassthrough_enabler can be run in environments where.net Framework is installed. In environments where Windows Server 2008 R2 ServerCore is installed, install.net Framework by using the following commands: start /w ocsetup NetFx2-ServerCore start /w ocsetup NetFx2-ServerCore WOW64 279

290 Appendix A Special File Creation Command (Linux) (1) Syntax ismmknod (2) Description ismmknod command creates the special files (device files) that are dedicated for ism/server, and creates a disk array list file that contains the disk array information of the special files. When the disk array is managed via FC connection, it is necessary to execute this command. The created special files are stored in /dev/nec_ism/mkdl. When the disk array is managed via FC connection, the special file name in the disk array list file can be written in the ism/server environment definition file as an entry. The owner of the special files (in /dev/nec_ism/mkdl) is set to root and the mode access permissions are set to 644 for security. The special files are made by ismmknod command or ismvollist command. (3) Diagnosis The following messages are shown on the standard output. (a) Execution message ismmknod command reports the execution messages shown below. 101:INFO:Creating internal device files... [Explanation] The special files are being presently created. 102:INFO:Creating device list file... [Explanation] The disk array list file is being presently created. 103:INFO:iSMmknod ended normally. [Explanation] ismmknod command ended normally. 280

291 (b) Warning messages ismmknod command reports the warning messages shown below. After ismmknod command is executed, the disk array list file will be created. If no special file name of a disk array for management can be found, measure should be taken. 230:WARNING:Cannot make perfect device list file. [Explanation] The disk array list file is imperfect because the memory is insufficient. [Action] If needed, a perfect disk array list file is created by changing the value of limitations (ulimit(1)) on the system resources and executing ismmknod command again. 231:WARNING:Cannot recognize some special files. [Explanation] Some special files cannot be recognized normally. In this case, the line of the special file that becomes an error is outputted to the disk array list file. [Action] A normal disk array list file is created by executing ismmknod command again. (c) Error message ismmknod command reports the error messages shown below, when abnormal termination occurs. 301:ERROR:You are not super-user. [Explanation] The present user is not root authority. [Action] Execute ismmknod command again by root authority. 302:ERROR:iSM/Server is starting. [Explanation] ism server is starting. [Action] Execute ismmknod command again after ism server is ended. 306:ERROR:Cannot make [directory name] directory. [Explanation] Error occurs when making the directory. [Action] Refer to the message outputted immediately before. 307:ERROR:No target device in this machine. [Explanation] The special file of disk arrays that are the management objects of ism/server is not found. [Action] Check the state of the disk array, and take a measure for it. If it will be in a normal state, execute the ismmknod command again. 310:ERROR:Cannot make character device file [special file name]. [Explanation] Error occurs when creating special files. [Action] Refer to the message outputted immediately before. 281

292 311:ERROR:Cannot get minor number of special file. [Explanation] The minor number of the special file cannot be gotten. [Action] Check the state of the disk array, and take a measure for it. If it will be in a normal state, execute the ismmknod command again. 313:ERROR:Necessary file doesn t exist in spite of the execution of ismmknod. [Explanation] The file that is necessary for ismmknod command does not exist. ism server is not installed normally. [Action] Check ism server installation, and execute the ismmknod command again if it will be in a normal state. 317:ERROR:iSMmknod or ismvollist is already starting. [Explanation] ismmknod or ismvollist command is already starting. [Action] If needed, execute ismmknod command again after the above command is executed. 318:ERROR:ControlCommand command is already starting. [Explanation] ControlCommand command is already starting. [Action] If needed, execute ismmknod command again after ReplicationControl command is executed. 316:ERROR:SnapControl command is already starting. [Explanation] SnapControl command is already starting. [Action] If needed, execute ismmknod command again after the above command is executed. 325:ERROR:OS name is unknown. [Explanation] OS name is not Linux. [Action] Execute ismmknod command again on the Linux OS server of which the kernel release is at least :ERROR:Cannot open device list file. errno=[error number]. [Explanation] Error occurs when opening the device list file. [Action] Execute ismmknod command again after inquiring the cause from the error number. 331:ERROR:Cannot open /proc/scsi/scsi. errno=[error number]. [Explanation] Error occurs when opening the SCSI file. [Action] Execute the ismmknod command again after inquiring the cause from the error number. 332:ERROR:Cannot open temporary file. errno=[error number]. [Explanation] Error occurs when opening the temporary file. [Action] Execute ismmknod command again after inquiring the cause from the error number. 282

293 333:ERROR:Cannot read temporary file. errno=[error number]. [Explanation] Error occurs when reading the temporary file. [Action] Execute ismmknod command again after inquiring the cause from the error number. 334:ERROR:Out of memory. process=[nnnnnnnn]. [Explanation] Since the shortage of the memory has occurred, the processing cannot be continued nnnnnnnn: Additional information. [Action] Change the value of limitations (ulimit(1)) on the system resources, and execute ismmknod command again. 335:ERROR:Cannot read device list file. errno=[error number]. [Explanation] Error occurs when reading the disk array list file (fgets). [Action] Execute ismmknod command again after inquiring the cause from the error number. 336:ERROR:Cannot open device directory. errno=[error number]. [Explanation] Error occurs when opening the device directory. [Action] Execute ismmknod command again after inquiring the cause from the error number. 337:ERROR:Cannot read device directory. errno=[error number]. [Explanation] Error occurs when reading the device directory. [Action] Execute ismmknod command again after inquiring the cause from the error number. (4) Restriction The processing shown below is forbidden in ismmknod command execution. Re-naming of the special file that is installed in device directory. The execution after ism server starting. The execution after ismvollist command starting. The execution after ControlCommand command starting. Dual starting of ismmknod command. (5) Files /etc/ismsvr/ism_diskarray.devlist /etc/ismsvr/ismsvr.conf... Disk array list file... ism/server environment definition file (6) Reference proc(5), scsi_info(8), sd(4), ismsvr(8) 283

294 Appendix B Password Cipher Command Users of the ism client are defined in the client section of the environment definition file. Only a defined user can connect the ism client to the ism server and reference/manipulate the information regarding the disk array. The cipher value can be set to a user password when defining a user. In the file_transfer section, a user name and password of the ftp user who uses the file transfer function are set. The cipher value can also be set to these user name and password. When using the E series disk array, the cipher value can be set to the password of user information that monitoring the E series disk array. It is recommended to use the cipher value for security. The cipher value of the password value is derived by executing the password cipher command, ismcipherpw. (1) Name ismcipherpw - It creates the cipher value from the password. (2) Syntax ismcipherpw password_value. (3) Description ismcipherpw command returns the cipher value of the password value that is specified as a parameter to the standard output. The cipher value that is returned can be transferred to the user information's password of client section, monitoring user s password of agent section and the ftp user's name and password of file_transfer section in the ismsvr.conf. In addition, the values that can be set up as the password value are the following values of less than 58 characters. You can use alphanumeric characters or a signs (except the double quotation marks), blanks as the password value. But if signs and spaces are used, sometimes the password is recognized as the shell's wild card. So, avoiding the use it or the arrangement of surrounding the password value by quotation marks or double quotation marks is required. (4) Return value 0: The case it ends normally. 1: The case an error is in password value specification. That is reported to the standard output. (5) Usage example >ismcipherpw ism Accepted password is ism. Return value is CGGKCMDCEACBGB. It specifies the password value ism. The password that is accepted by the command. This value that is reported is the cipher value. This value is transferred to the password of login information in the ismsvr.conf. 284

295 login = ( ism, CGGKCMDCEACBGB, L1) (6) Diagnosis ismcipherpw reports the error message as follows by the standard output when an error is in the specification of the password value. 101: ERROR: There is no password. [Explanation] There is no specification of the password value. [Action] Specify the password value. 102: ERROR: There are too many arguments. [Explanation] The arguments are too much. [Action] Specify a single password value for the argument. When a blank character is used, it requires the arrangement of surrounding the password value by quotation marks or double quotation marks. 103: ERROR: The length of the password is too long. [Explanation] The password value is too long. [Action] Specify the password value with 58 or less characters. 104: ERROR: Inappropriate character is used for password. [Explanation] Inappropriate character is used for the password value. [Action] Use the appropriate character as the password value. 105: ERROR: As password, it is inappropriate. [Explanation] It is not appropriate as the password value. [Action] Specify the appropriate password value. 106: ERROR: System call error occurred. function=fff errno=eee. [Explanation] The error has occurred by the system function. fff: The system function name eee: The error number [Action] Cope with it by checking the system function name and the error number, and executes ismcipherpw command again. (7) Reference /etc/ismsvr/ismsvr.conf 285

296 Appendix C Event Link Definition File This section describes the information that can be set in the link definition file (/etc/ismsvr/msgdrv.conf). (1) Link Definition File [SERVER] [SERVER] SMTP=mail.xxx.com SMTP_PORT=25 POP=pop.xxx.com POP_PORT=110 AUTH=POP_before_SMTP USER=username PASSWORD=password MAIL_TEMPLATE=/etc/iSMsvr/mail.tpl [LIMIT] MAIL=300 SHELL=30 [LINK00] MSGID=ALL LEVEL=ERR MAIL=a@xxx.com SHELL=/usr/bin/err (2) Parameter details [SERVER] Common definition SMTP Defines the SMTP server that sends mails (specify only one server). SMTP_PORT Defines the SMTP port number with a value from 1 to This item can be omitted. (The default 25 is used when omitted.) POP Defines the POP server used for the POP before SMTP authentication. (You can specify no more than one server.) This item can be omitted if AUTH=NONE or AUTH=SMTP-AUTH. POP_PORT Defines the POP port number with a value from 1 to This item can be omitted. (The default 110 is used when omitted.) AUTH Defines the authentication method (NONE, POP_before_SMTP or SMTP_AUTH). USER Defines the account for authentication. This item can be omitted if AUTH=NONE. PASSWORD Defines the password (encrypted) for authentication. This item can be omitted if AUTH=NONE. MAIL_TEMPLATE Specifies the mail template file. (The first line is fixed to FROM:.) [LIMIT] Upper limit definition of the link processing MAIL Sets the upper limit of the processing count per unit time (one minute) for mail transmission in the range of 15 to This parameter can be omitted. (If omitted, 286

297 300 is assumed by default.) SHELL Sets the upper limit of the processing count per unit time (one minute) for shell activation in the range if 15 to (If omitted, 30 is assumed by default.) [LINKxx] Defines a link group (xx: 00 to 99). MSGID Defines a message to be linked. LEVEL Defines a message level to be linked. MAIL Defines a receiver s mail address for link actions. SHELL Defines a shell file name for link actions. 1. One line must be 512 bytes or less (including blank / tab / carriage return). 2. Use uppercase characters for the left side items such as section name ([SERVER], [LEVEL], and [LIMIT]) and LEVEL name and lower characters for the right side items such as mail and shell. 3. Input the [SERVER] section on the first line. 4. Define a link group in the [LINKxx] section (xx: 00 to 99). Specify the message to be linked (MSGID), its level (LEVEL) and the link action (SHELL and MAIL). A link action is executed if the received message has the message number specified for the message to be linked and the level specified in the message level. 5. Define the link target message in [MSGID] in [LINKxx]. You can specify message numbers (five-digit number such as 02040) or message number range (range linking message numbers with a hyphen such as ) by function. The following can be specified by function. Table C-1 Link Target Messages on a Function Base Function Unit Function Name Link Target Messages BASE Basic control ism ism04999 ism ism07999 ism ism11999 ism ism17999 ism ism23999 ism ism24999 ism ism28999 ism ism29999 PERFORMANCE Performance ism ism09999 REPLICATION Replication ism ism10999 SNAPSHOT Snapshot ism ism18999 ALL All functions All messages ALERT Messages Target messages for which ALIVE notification (including ALIVE notifications issued by the disk array device's fault notification mechanism) is performed. Keyword [_ALERT_] is added to the end of message body. 6. Define a level in [LEVEL] in [LINKxx] section. You can specify ERR, WARNING, NOTICE, INFO or ALL (all levels). 287

298 7. Define the mail receiver s mail address in case you receive a link target message in [MAIL] in the [LINKxx] section. You can define multiple mail addresses. The mail addresses can be defined on the same line or multiple lines. Write the complete mail address including the domain name. 8. Define the shell file name activated in case you receive a link target message in [SHELL] in the [LINKxx] section. You can define multiple file names. The file names can be defined on the same line or multiple lines. Specify the file name with the absolute path name. You can also define a file name containing special symbols by enclosing it with double quotations. However, the file containing a double quotation ( ) or comma (,) cannot be defined. 9. You can define up to ten mail addresses and shell file names for link actions within the same link group. 10. When specifying multiple items on the right side of MSGID, LEVEL, MAIL and SHELL in the [LINKxx] section, delimit them with comma (,). You can define these items on multiple items. The lines do not have to be consecutive. However, the left side specification cannot be omitted even if the lines are consecutive. 11. If the same message is specified for multiple link groups, the link actions in the specified link groups are executed. However, if the same link action is defined for the same message multiple times, that action is executed only once. 12. ALL cannot be defined both for MSGID and LEVEL in the same link group to avoid linking all messages. 13. Define the file name where the mail header information and mail body are saved in MAIL_TEMPLATE. Use the absolute path to specify a file name in MAIL_TEMPLATE. You can also define file names including special symbols by putting them between double quotations. However, note that brackets ( (, ) ), double quotations ( ) and comma (, ) cannot be used to define the file name. 14. You do not have to create any definition file if you do not need linked operations. 15. You can define the [LEVEL] section and HEADER definition defined before V3.4 in the link control file. As this is the function to support the existing users, normally use the [LINKxx] section and MAIL_TEMPLATE definition. Note the following points when they are used: - The [LEVEL] section cannot be defined at the same time as the [LINKxx] section. - HEADER cannot be specified at the same time as MAIL_TEMPLATE. 288

299 (3) Mail template file The mail template file is the template of the actual mail to transmit, and mainly describes the header part of the mail. Input FROM: on the first line, and write the sender s mail address. If mail transmission fails in SMTP server due to wrong target mail address, etc., an error message from SMTP server may be sent to a sender s mail address. The contents of the mail text after the second line are sent as it is, the part above the blank line is the header, and subsequent part is the body of the mail. A message including $MSG in body is replaced into a message that is output to an operation log, which triggered the event link. FROM: ismserver@xxx.com Describe sender s mail address. SUBJECT: ismserver error report. Header blank line This is the ismserver at XXXX(domain name etc.) Error Reporting. $MSG A message output to operation log that triggered object linkage is described in this line. Body 1. Mail address to input on the FROM: line must be a complete one that includes domain name. 2. Various header lines in accordance with RFC822 can be written in the header part. 3. Any contents can be described in the body part. 4. The size of the whole mail template file must be less than 1KB. Also, one line must be less than 512 bytes (including blank / tab / carriage return). 5. When a part of $MSG of a certain line is replaced into the message content, a $MSG which appeared first can be replaced. So even if two or more $MSG s are described in one line, only the first $MSG is replaced. However, if the $MSG s are described in each line, they spread to each message. (4) Definition example In the following example, ERR messages are mailed to Mr. a, starting the shell (err). Maintenance messages are mailed to Mr. a and b, starting the shell (alert). Client connection and disconnection messages (ism02040 and ism 02041) are mailed to Mr. a. 289

300 Link definition example (/etc/ismsvr/msgdrv.conf) [SERVER] SMTP=mail.xxx.com DNS name or IP address of SMTP server SMTP_PORT=25 Port number of SMTP server POP=pop.xxx.com DNS name or IP address of POP server POP_PORT=110 Port number of POP server AUTH=POP_before_SMTP Authentication method (NONE, POP_before_SMTP or SMTP-AUTH) USER=username Account for authentication PASSWORD=password Password for authentication MAIL_TEMPLATE=/etc/iSMsvr/mail.tpl Mail template (Can be specified anywhere.) [LIMIT] MAIL=300 Upper limit of mail transmissions (times/minute) SHELL=30 Upper limit of shell activations (times/minute) [LINK00] Definition for ERR MSGID=ALL LEVEL=ERR SHELL=/usr/bin/err Execution right required [LINK01] Definition for maintenance message MSGID=ALERT LEVEL=ALL Multiple addresses can be specified on multiple lines. SHELL=/usr/bin/alert [LINK02] Definition for client connection and disconnection messages MSGID=02040,02041 You can specify this with LEVEL=ALL Mail template file (/etc/ismsvr/mail.tpl) FROM: Sender s mail address SUBJECT: ismserver error report. Title (any) Blank line This is the ismserver at ismsystem.xxx.com. Mail text (any contents) Error Reporting. Mail text (any lines up to 1 KB in total.) $MSG The actual message is inserted in this line and mailed. Pay attention if you receive this mail. Mail text 290

301 Appendix D Performance Analysis Supporting Tool and Graph Making Tool (1) Operating Environment The operating environment for the performance analysis supporting tool (including Performance Analysis Supporting Tool screen, Archiver, CSV Conversion Tool, and Edit Tool) is the same as that for the ism client. The Performance Analysis Supporting Tool can be operated on the PC where the ism client and Microsoft Excel 2000/2002/2003 are installed. For details on how to use this tool, refer to 3.3 Support for Analysis of Statistic Information in the Performance Monitoring User s Manual. The memory size required for the Performance Analysis Supporting Tool screen is as follows. Table D-1 Required Memory Capacity Performance Analysis Supporting Tool 35 (31) MB or more * The value in parentheses indicates the memory capacity required if the ism client operates in a 64-bit operating system. (2) Installation To use the Performance Analysis Supporting Tool and Graph Making Tool, it is necessary to copy all the files stored in the following folder of the CD to an arbitrary folder of the PC where these tools are used. CD drive: \PERTOOL\WINDOWS Save all the files to be copied in the same folder. Among the files stored in the above-mentioned folder, the files related to the Performance Analysis Supporting Tool and Graph Making Tool are as follows. Performance Analysis Supporting Tool screen: Archiver: CSV Conversion Tool: Edit Tool: Graph Making Tool: ismprfcom.exe ismprfarc.exe ismprfext.exe SMprfedit.exe ismprfview.xls * When the ism server for Windows is installed, the Performance Analysis Supporting Tool is also installed in the same folder that the ism server is installed. 291

302 Appendix E Backup File By backing up the files used by the ism server and ism client, even if it becomes necessary to reinstall them due to a machine failure, their operating environments can be recovered immediately using the backup files. This appendix explains the files related to the ism server and ism client to be backed up (1) ism server The following files related to the ism server are required to be backed up. It is recommended to periodically back up the files to be updated while the ism server is running, including the performance related files. [1] Environment definition file For Linux All the files under /etc/ismsvr/ For Windows All the files under installation-folder\conf\ismsvr\ [2] Operation log file (optional) For Linux All the files under /opt/ismsvr/etc/log/ For Windows All the files under installation-folder\etc\log\ *1: Even if the above files do not exist, the ism server operation is not affected. However, you cannot refer to the previous log. *2: The storage folder can be changed in the ism server environment setting. If changed, back up the files in the folder after change. [3] License information file For Linux All the files under /opt/ismsvr/etc/config/ For Windows All the files under installation-folder\etc\config\ [4] Event link file For Linux template file described in the msgdrv.conf file under /etc/ismsvr and shell file For Windows template file described in the msgdrv.conf file under installation-folder\conf\ismsvr\, and batch file or executable file 292

303 [5] Performance-related file For Linux All the files under /opt/ismsvr/etc/mon/ For Windows All the files under installation-folder\etc\mon\ *1: Even if the above files do not exist, the ism server operation is not affected. However, you cannot refer to the previous log. [6] Performance optimization related file For Linux All the files under /opt/ismsvr/etc/optlog/ For Windows All the files under installation-folder\etc\optlog\ *1: Even if the above files do not exist, the ism server operation is not affected. However, you cannot refer to the previous log. [7] Partition users information file (When setting Partition users) For Linux All the files under /opt/ismsvr/etc/main/ For Windows All the files under installation-folder\etc\main\ The way to confirm the installation folder in the case of Windows is as follows. (a) Select [Start] [All Programs] ([Programs] for Windows 2000) [Storage Manager Server], right-click [Read Me], and select [Properties]. (b) Check the installation folder described in the [Target] field. Example: C:\Prgram Files\NEC\iSMsvr\help\readme.txt The installation folder is C:\Prgram Files\NEC\iSMsvr. Some files cannot be backed up in some instances while the ism server is running. In this case, the file can be backed up once the ism server is terminated. The recovery procedure using the backup files is as follows. (1) Install the ism server. (For Windows, install the ism server in the same folder as last time.) (2) Perform the recovery operation using the backup files. Copy the backup files at the same paths that the files backed up. 293

304 (2) ism client (Web GUI) The following files related to the ism client (Web GUI) are required to be backed up. Stop the ism client (Web GUI) if running. [1] ism client (Web GUI) environment definition information The environment information is created in the following folder. <system-drive>:\documents and Settings\<user-name>\Application Data\NEC\iSMClient (with hidden attributes) * For Windows Vista or later and Windows Server 2008 or later, the environment information is created in the following folder. <system-drive>:\users\<user-name>\appdata\roaming\nec\ismclient (with hidden attributes) Save this folder and all the files stored in it. The recovery procedure using the backup files is as follows. (1) Recover the ism client (Web GUI) environment definition information. Copy the environment definition information to the same folder as the information backed up. (3) ism client (Win GUI) The following files related to the ism client (Win GUI) are required to be backed up. Stop the ism client (Win GUI) if running. [1] ism client (Win GUI) desktop icon The desktop icon is created in the following folder. <system-drive>:\documents and Settings\All Users\Desktop * For Windows Vista or later and Windows Server 2008 or later, the desktop icon is created in the following folder. <system-drive>:\users\public\desktop (with hidden attributes) [2] ism client (Win GUI) menu icons The menu icons are created in the following folder. <system-drive>:\documents and Settings\All Users\Start Menu\Programs\[iSM Client] * For Windows Vista or later and Windows Server 2008 or later, the menu icons are created in the following folder. <system-drive>:\programdata\microsoft\windows\start Menu\Programs\[iSM Client] (with hidden attributes) 294

305 Save this folder and all the files stored in it. * The program folder name specified at installation is displayed in [ism Client]. (Default program folder name: ism Client) [3] ism client (Win GUI) environment definition information When multiple connections are created for the setting file (*.ini) in the folder where the ism client (Win GUI) is installed, the folder named [SGn] (n: number) is created in the installation folder. Save this folder and all the files saved in it. The recovery procedure using the backup files is as follows. (1) Install the ism client (Win GUI). (Install the ism client (Win GUI) in the same folder as last time.) (2) Recover the ism client (Win GUI) environment definition information. Copy the environment definition information and the [SGn] folder to the ism client (Win GUI) installation folder. If the message comes up asking whether to overwrite, overwrite the existing files. (3) Recover the ism client (Win GUI) menu icons. Copy the menu icons in the following folder. <system-drive>:\documents and Settings\All Users\Start Menu\Programs\[iSM Client] * For Windows Vista or later and Windows Server 2008 or later, copy them in the following folder. <system-drive>:\programdata\microsoft\windows\start Menu\Programs\[iSM Client] (with hidden attributes) * The program folder name specified at installation is displayed in [ism Client]. (Default program folder name: ism Client) (4) Recover the ism client (Win GUI) desktop icon. Copy the desktop icon in the following folder. If the message comes up asking whether to overwrite, overwrite the existing files. <system-drive>:\documents and Settings\All Users\Desktop * For Windows Vista or later and Windows Server 2008 or later, copy it in the following folder. <system-drive>:\users\public\desktop (with hidden attributes) 295

306 Appendix F Environment with Firewall Introduced For environments in which firewalls have been introduced, it is necessary to open the following ports. Between ism client (Web GUI) and ism server SOURCE DESTINATION ism client (Web GUI) ism server ANY 8020/TCP 8070/TCP * Port numbers 8020 and 8070 are used to establish connection from the ism client (Web GUI) to the ism server. The port number can be changed in the ism server environment setting. Between ism client (Win GUI) and ism server SOURCE DESTINATION ism client (Win GUI) ism server ANY 8020/TCP 20/TCP 21/TCP * Port number 8020 is used to establish a connection from the ism client (Win GUI) to the ism server. The port number can be changed in the ism server environment setting. * Port numbers 20 and 21 are used when the ism client (Win GUI) uses the file transfer function. Port number 21 can be changed in the ism server environment setting. These port numbers are not used when the file transfer function is not used or when the ism server and ism client (Win GUI) are running on the same computer. Between ism server and disk array SOURCE DESTINATION ism server Disk array ANY 443/TCP (for the E series) 2730/TCP (for a series other than the E series) Disk array ism server ANY 2730/UDP * When monitoring a disk array via TCP/IP, port 443 (for the E series) or port 2730 (for a series other than the E series) of the disk array must be opened. Port 443 or port 2730 is used to establish a connection from the ism server to the disk array. This port number cannot be changed. * To perform the initial settings for a D1 series, D3 series, or D4 series disk array for which these settings have not been specified, port 2730 (UDP) must be opened. This port number cannot be changed. 296

307 Between ism server and mail server SOURCE DESTINATION ism server SMTP server ANY 25/TCP ism server POP server ANY 110/TCP * These ports are necessary to use the mail link function; otherwise, 25/TCP and 110/TCP are unnecessary. The port number can be changed in the ism server environment setting. * 110/TCP is unnecessary when the POP server authentication (POP before SMTP) is not used. 297

308 Appendix G Host Information collection/storage The procedure below is used for collecting and storing host information. (1) Collecting host information Collect the host information on the application server. For details, refer to (1) Collecting host information. (2) Storing and checking host information Store and check the host information. For details, refer to (2) Storing and checking host information. (1) Collecting host information Collect host information from an application server. There are two methods for collecting host information, and they differ depending on the system configuration. Automatic collection of host information When the disk array is newly introduced and all new servers of Windows (server that does not begin operating) are introduced as a server connected with the FC cable, automatic collection of host information that uses the ism host agent service and FC connection between the disk array and servers of Windows is possible. Refer to the methods shown in (1)-[1] Automatic collection of host information in new Windows server. But, if collect the host information without connect Fibre Channel cable in this composition, refer to the methods shown in (1)-[2] Host Information collection using host information file. New disk array New Windows server SAN New Windows server Figure G-1 Configuration for which automatic collection of host information is possible 298

309 Host information collection using file output from host information collection command If setting up a disk array unit in a system that has already begun operation, or if an application server connected by Fibre Channel cable contains OS other than Windows, or if collect the host information without connect Fibre Channel cable between disk array and server, collect host information by using file output from host information collection command (ismcc_hostinfo). Refer to the methods shown in (1)-[2] Host Information collection using host information file. New disk array New non-windows server New disk array New Windows server SAN SAN New non-windows server New non-windows server New disk array New server New disk array Existing server SAN SAN Existing server Existing server Existing disk array New server SAN Existing server Figure G-2 Configuration for which collection of host information using file output is needed (1) - [1] Automatic collection of host information in new Windows server Confirm the FC connection between new disk array and new Windows server. Then, carry out the procedure shown below. Execute only the following 2) when a logical disk in the new disk array has already been recognized from a new Windows server. 299

310 1) Enable the Host Recognize Volume Launch the configuration setting (Setting Mode) using ism client (Web GUI), select Setting Disk Array, and select Special 2 screen. Then, enable Enable Host Recognize Volume mode. check box and click Apply button. Refer to Configuration Setting Tool User s Manual (GUI) regarding configuration setting. 2) Restart ism Host Agent Service Restart ism Host Agent Service (NEC Storage Manager Host Agent), and wait for at least three minutes or more. Restart of the service can be executed by using [Service] of [Management tool] that exists in [Control panel] of Windows. 3) Disable the Host Recognize Volume Launch the configuration setting (Setting Mode) using ism client (Web GUI), select Setting Disk Array, and select Special 2 screen. Then, clear Enable Host Recognize Volume mode. check box and click Apply button. Refer to Configuration Setting Tool User s Manual (GUI) regarding configuration setting. (1) - [2] Host Information collection using host information file Carry out the procedure shown below using host information collection command (ismcc_hostinfo). 1) Execute the host information collection command (ismcc_hostinfo command). Execute the host information collection command (ismcc_hostinfo command) from the command prompt (on Windows) or command line (on Linux) in the application server for host information collection. In the -export option, specify the file that is the output destination of the host information (host information file). Execute the host information collection command (ismcc_hostinfo command) as a user with administrator privileges (on Windows) or super user (on Linux). Execution example when the application server is Windows server D:\> ismcc_hostinfo -export \ServerName ismcc_hostinfo: Info: ism11700: Please wait a minute. ismcc_hostinfo: Info: ism11770: Host Information was exported successfully. (code=aaaa-bbbb-bbbb-bbbb) ismcc_hostinfo: Info: ism11100: Command has completed successfully. Execution example when the application server is Linux server # ismcc_hostinfo -export /tmp/servername ismcc_hostinfo: Info: ism11700: Please wait a minute. ismcc_hostinfo: Info: ism11770: Host Information was exported successfully. (code=aaaa-bbbb-bbbb-bbbb) ismcc_hostinfo: Info: ism11100: Command has completed successfully. After executing the host information collection command (ismcc_hostinfo command), confirm that message ism11770 is output and that host information collection succeeded. The process number is output in aaaa in the message and an internal code for maintenance is output in bbbb. 300

311 2) Transfer the host information file. Transfer the host information file that is output by executing the host information collection command (ismcc_hostinfo command) to the management server by using file transfer or USB memory, etc. (2) Storing and checking host information According to the method of host information collection, perform the procedures below. If automatic collection of host information was performed Refer to (2)-[2] Confirmation of stored Host Information and confirm that host information has been stored correctly. If host information has not been stored, refer to (1)-[2] Host Information collection using host information file, (2)-[1] Host Information storage using host information file and after performing host information collection and storage using file output, refer to (2)-[2] Confirmation of stored Host Information and confirm that host information has been stored correctly. If collection of host information using host information file was performed If a host information file was output by using host information collection command (ismcc_hostinfo), refer to (2)-[1] Host Information storage using host information file and perform host information storage. Afterwards, refer to (2)-[2] Confirmation of stored Host Information and confirm that host information has been stored correctly. (2) - [1] Host Information storage using host information file Carry out the procedure shown below using host information store command (ismhoststore). 1) Store host information Execute the host information store command (ismhoststore command) from the command prompt (in a Windows environment) or the command line (in a Linux environment) on the management server on which the Storage Manager server is operating. In the -import option, specify the host information file that was transferred from the application server. And in the -arrayname option, specify the nickname of the disk array to which the operation applies. Execute the host information store command (ismhoststore) as a user with administrator privileges in a Windows environment or as a super user in a Linux environment. Moreover, when performing host information storage, the target disk array that is the storage destination must be being monitored normally from the Storage Manager server. Execution example when the Storage Manager server is operating in a Windows environment D:\> ismhoststore -import \ServerName -arrayname StorageName ismhoststore: 002 Host Information was imported successfully. (Disk Array=StorageName) ismhoststore: 001 Command completed successfully. 301

312 Execution example when the Storage Manager server is operating in a Linux environment # ismhoststore -import /tmp/servername -arrayname StorageName ismhoststore: 002 Host Information was imported successfully. (Disk Array=StorageName) ismhoststore: 001 Command completed successfully. After execute the host information store command, message 002 is output. Check this to confirm that host information storage succeeded. (2) - [2] Confirmation of stored Host Information Carry out the procedure shown below using ism client (Web GUI). 1) Confirmation of connected host list screen Select the target disk array in the main window of the Storage Manager client (Web GUI) and select [Connected Host] to display a list of connected hosts. Confirm that this contains host information that has the host name of the relevant application server. Figure G-3 Example of Confirmation of Connected Host List Screen 2) Confirmation of connected host detail information screen (HBA list) Right-click the host information that you confirmed in the connected host list screen and select [Properties] to open the connected host detail information screen. In the connected host detail information screen, confirm that HBA information (WWNN, WWPN) of the relevant application server is displayed in [HBA List]. 3) Confirmation of connected host detail information screen (Diskarray Port) Confirm that port information of the connected disk array is displayed in [Diskarray Port] when a WWNN/WWPN of FC port connected to the disk array is selected in [HBA List] of the connected host detail information screen. 302

313 Figure G-4 Example of Connected Host Detail Information Screen Confirmation The following causes are thought if the [Diskarray Port] information is not displayed in the connected host detail information screen. When host information was collected by using host information collection command (ismcc_hostinfo), - Fibre Channel cable between disk array and application server was not connected correctly. - The application server did not recognize the logical disks of disk array. In this case, after the Fibre Channel cable between disk array and application server is connected and the application server recognizes the logical disks of disk array, carry out the procedure shown below to store host information again. 1) Execute host information collection command (ismcc_hostinfo) to collect host information using host information file. Refer to (1)-[2] Host Information collection using host information file for details. 2) Execute host information store command (ismhoststore) to store the host information of host information file. Refer to (2)-[1] Host Information storage using host information file for details. 3) Confirm that the [Diskarray Port] information is displayed in the connected host detail information screen. 303

Thin Provisioning User s Manual

Thin Provisioning User s Manual NEC Storage Software Thin Provisioning User s Manual IS044-16E NEC Corporation 2009-2017 No part of the contents of this book may be reproduced or transmitted in any form without permission of NEC Corporation.

More information

Thin Provisioning User s Manual

Thin Provisioning User s Manual NEC Storage Software Thin Provisioning User s Manual IS044-2E NEC Corporation 2009-2010 No part of the contents of this book may be reproduced or transmitted in any form without permission of NEC Corporation.

More information

Cache Partitioning User s Manual

Cache Partitioning User s Manual NEC Storage Software Cache Partitioning User s Manual IS038-10E NEC Corporation 2004-2010 No part of the contents of this book may be reproduced or transmitted in any form without permission of NEC Corporation.

More information

Configuration Setting Tool User s Manual (GUI) for the M Series

Configuration Setting Tool User s Manual (GUI) for the M Series NEC Storage Software Configuration Setting Tool User s Manual (GUI) for the M Series IS051-19E NEC Corporation 2011-2017 No part of the contents of this book may be reproduced or transmitted in any form

More information

Partitioning User s Manual

Partitioning User s Manual NEC Storage Software Partitioning User s Manual IS043-4E NEC Corporation 2007-2010 No part of the contents of this book may be reproduced or transmitted in any form without permission of NEC Corporation.

More information

NEC Storage Manager Manual Guide

NEC Storage Manager Manual Guide NEC Storage Manager Manual Guide NEC Corporation 2001-2003 No part of the contents of this book may be reproduced or transmitted in any form without permission of NEC Corporation. The contents of this

More information

ISRXM64LE93-1. NEC Storage ReplicationControl FileSystem Option on Linux Ver9.3 Installation Guide

ISRXM64LE93-1. NEC Storage ReplicationControl FileSystem Option on Linux Ver9.3 Installation Guide NEC Storage ReplicationControl FileSystem Option on Linux Ver9.3 Installation Guide Preface This document describes the installation of the program products in the CD labeled as: NEC Storage ReplicationControl

More information

NEC Storage Software. Manual Guide IS901-21E

NEC Storage Software. Manual Guide IS901-21E NEC Storage Software Manual Guide IS901-21E NEC Corporation 2003-2010 No part of the contents of this book may be reproduced or transmitted in any form without permission of NEC Corporation. The contents

More information

NEC Storage Software. Manual Guide IS901-42E

NEC Storage Software. Manual Guide IS901-42E NEC Storage Software Manual Guide IS901-42E NEC Corporation 2003-2017 No part of the contents of this book may be reproduced or transmitted in any form without permission of NEC Corporation. The contents

More information

Data Replication User s Manual (Installation and Operation Guide for Windows)

Data Replication User s Manual (Installation and Operation Guide for Windows) NEC Storage Software Data Replication User s Manual (Installation and Operation Guide for Windows) IS016-22E NEC Corporation 2003-2013 No part of the contents of this book may be reproduced or transmitted

More information

NEC Storage Software VMware vsphere Web Client Plug-in Installation Guide

NEC Storage Software VMware vsphere Web Client Plug-in Installation Guide NEC Storage Software VMware vsphere Web Client Plug-in Installation Guide This page is intentionally left blank. Preface This guidebook describes how to install NEC Storage VMware vsphere Web Client Plug-in.

More information

Performance Monitoring User s Manual

Performance Monitoring User s Manual NEC Storage Software Performance Monitoring User s Manual IS025-32E NEC Corporation 2003-2017 No part of the contents of this book may be reproduced or transmitted in any form without permission of NEC

More information

Power Saving User s Manual

Power Saving User s Manual NEC Storage Software Power Saving User s Manual IS042-6E NEC Corporation 2007-2010 No part of the contents of this book may be reproduced or transmitted in any form without permission of NEC Corporation.

More information

ReplicationControl FileSystem Option User s Manual (Linux)

ReplicationControl FileSystem Option User s Manual (Linux) NEC Storage Software ReplicationControl FileSystem Option User s Manual (Linux) IS028-15E NEC Corporation 2005-2015 No part of the contents of this book may be reproduced or transmitted in any form without

More information

NEC Storage Manager User s Manual (UNIX)

NEC Storage Manager User s Manual (UNIX) NEC Storage Software NEC Storage Manager User s Manual (UNIX) IS001-11E NEC Corporation 2005-2010 No part of the contents of this book may be reproduced or transmitted in any form without permission of

More information

ExpressCluster X 2.0 for Linux

ExpressCluster X 2.0 for Linux ExpressCluster X 2.0 for Linux Installation and Configuration Guide 03/31/2009 3rd Edition Revision History Edition Revised Date Description First 2008/04/25 New manual Second 2008/10/15 This manual has

More information

iscsi Storage Appliance Getting Started Guide

iscsi Storage Appliance Getting Started Guide iscsi Storage Appliance Getting Started Guide 2 Copyright 2007 Adaptec, Inc. All rights reserved. No part of this publication may be reproduced, stored in a retrieval system, or transmitted in any form

More information

HP Storage Manager User Guide. May 2005 (First Edition) Part Number

HP Storage Manager User Guide. May 2005 (First Edition) Part Number HP Storage Manager User Guide May 2005 (First Edition) Part Number 394897-001 Copyright 2005 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.

More information

ReplicationControl SQL Option User s Manual

ReplicationControl SQL Option User s Manual NEC Storage Software ReplicationControl SQL Option User s Manual IS006-17E NEC Corporation 2002-2016 No part of the contents of this book may be reproduced or transmitted in any form without permission

More information

This guide consists of the following two chapters and an appendix. Chapter 1 Installing ETERNUSmgr This chapter describes how to install ETERNUSmgr.

This guide consists of the following two chapters and an appendix. Chapter 1 Installing ETERNUSmgr This chapter describes how to install ETERNUSmgr. Preface This installation guide explains how to install the "ETERNUSmgr for Linux" storage system management software on an ETERNUS DX400 series, ETERNUS DX8000 series, ETERNUS2000, ETERNUS4000, ETERNUS8000,

More information

ExpressCluster X 3.2 for Linux

ExpressCluster X 3.2 for Linux ExpressCluster X 3.2 for Linux Installation and Configuration Guide 5/23/2014 2nd Edition Revision History Edition Revised Date Description 1st 2/19/2014 New manual 2nd 5/23/2014 Corresponds to the internal

More information

ExpressCluster X 3.0 for Windows

ExpressCluster X 3.0 for Windows ExpressCluster X 3.0 for Windows Installation and Configuration Guide 10/01/2010 First Edition Revision History Edition Revised Date Description First 10/01/2010 New manual Copyright NEC Corporation 2010.

More information

Data Replication User s Manual (Disaster Recovery System Installation and Operation Guide)

Data Replication User s Manual (Disaster Recovery System Installation and Operation Guide) NEC Storage Software Data Replication User s Manual (Disaster Recovery System Installation and Operation Guide) IS027-34E NEC Corporation 2004-2017 No part of the contents of this book may be reproduced

More information

NEC ESMPRO Agent Extension

NEC ESMPRO Agent Extension Front Cover Installation Guide Express5800 Series NEC ESMPRO Agent Extension Chapter 1 Summary Chapter 2 System Requirements Chapter 3 Installation Chapter 4 Precautions for Use Rev.2.11 NEC Corporation

More information

ExpressCluster X 3.1 for Linux

ExpressCluster X 3.1 for Linux ExpressCluster X 3.1 for Linux Installation and Configuration Guide 10/11/2011 First Edition Revision History Edition Revised Date Description First 10/11/2011 New manual Copyright NEC Corporation 2011.

More information

EXPRESSCLUSTER X SingleServerSafe 3.3 for Windows. Installation Guide. 01/29/2016 3rd Edition

EXPRESSCLUSTER X SingleServerSafe 3.3 for Windows. Installation Guide. 01/29/2016 3rd Edition EXPRESSCLUSTER X SingleServerSafe 3.3 for Windows Installation Guide 01/29/2016 3rd Edition Revision History Edition Revised Date Description 1st 02/09/2015 New manual 2nd 04/20/2015 Corresponds to the

More information

ControlCommand Command Reference

ControlCommand Command Reference NEC Storage Software ControlCommand Command Reference IS041-25E NEC Corporation 2005-2017 No part of the contents of this book may be reproduced or transmitted in any form without permission of NEC Corporation.

More information

ETERNUS SF AdvancedCopy Manager Operator's Guide for Tape Server Option

ETERNUS SF AdvancedCopy Manager Operator's Guide for Tape Server Option ETERNUS SF AdvancedCopy Manager 14.0 Operator's Guide for Tape Server Option J2X1-7453-01ENZ0(00) July 2009 Preface Purpose This manual describes the functionality of ETERNUS SF AdvancedCopy Manager for

More information

NEC ESMPRO Agent Extension Installation Guide

NEC ESMPRO Agent Extension Installation Guide Front Cover NEC ESMPRO Agent Extension Installation Guide Chapter 1 Summary Chapter 2 System Requirements Chapter 3 Installation Chapter 4 Precautions for Use Rev.2.02 NEC Corporation 2012 1 Contents Front

More information

EXPRESSCLUSTER X 3.3 for Windows

EXPRESSCLUSTER X 3.3 for Windows EXPRESSCLUSTER X 3.3 for Windows Installation and Configuration Guide 04/10/2017 5th Edition Revision History Edition Revised Date Description 1st 02/09/2015 New manual 2nd 04/20/2015 Corresponds to the

More information

System Monitor - Performance Monitoring Services 5.8 User's Guide

System Monitor - Performance Monitoring Services 5.8 User's Guide System Monitor - Performance Monitoring Services 5.8 User's Guide - First Edition - Copyright (C) NEC Corporation 2004-2017. Disclaimer of Warranty All the information, text, graphics, links or other items

More information

ETERNUS SF Express V15.0. Operation Guide. Windows/Linux

ETERNUS SF Express V15.0. Operation Guide. Windows/Linux ETERNUS SF Express V15.0 Operation Guide Windows/Linux B1FW-5962-01ENZ0(02) March 2012 Preface Purpose This manual gives an overview of ETERNUS SF Express. ETERNUS SF Express is part of the following Storage

More information

Enhanced Support Facility User's Guide For REMCS

Enhanced Support Facility User's Guide For REMCS C112-B067-06ENZ2(A) Enhanced Support Facility User's Guide For REMCS Preface Preface Purpose of This Guide This guide explains the setup and operation procedures for using the REMote Customer Support system

More information

ETERNUS SF AdvancedCopy Manager Operator's Guide for Cluster Environment

ETERNUS SF AdvancedCopy Manager Operator's Guide for Cluster Environment ETERNUS SF AdvancedCopy Manager 14.2 Operator's Guide for Cluster Environment J2X1-7452-04ENZ0(00) June 2011 Preface Purpose This manual explains the installation and customization of ETERNUS SF AdvancedCopy

More information

ExpressCluster X R3 WAN Edition for Windows

ExpressCluster X R3 WAN Edition for Windows ExpressCluster X R3 WAN Edition for Windows Installation and Configuration Guide v2.1.0na Copyright NEC Corporation 2014. All rights reserved. Copyright NEC Corporation of America 2011-2014. All rights

More information

FUJITSU Software Systemwalker Service Catalog Manager V Installation Guide. Windows/Linux

FUJITSU Software Systemwalker Service Catalog Manager V Installation Guide. Windows/Linux FUJITSU Software Systemwalker Service Catalog Manager V15.3.2 Installation Guide Windows/Linux B1WS-1054-06ENZ0(00) January 2015 Preface Purpose of This Document This document explains the installation

More information

QConvergeConsole. Table of Contents

QConvergeConsole. Table of Contents QConvergeConsole QLogic Corporation All rights reserved Table of Contents 1 Package Contents 2 Requirements 2.1 Hardware Requirements 2.2 Software Requirements 3 OS Support 4 Supported Features 5 Using

More information

EXPRESSCLUSTER X SingleServerSafe 3.3 for Windows. Installation Guide. 10/02/2017 6th Edition

EXPRESSCLUSTER X SingleServerSafe 3.3 for Windows. Installation Guide. 10/02/2017 6th Edition EXPRESSCLUSTER X SingleServerSafe 3.3 for Windows Installation Guide 10/02/2017 6th Edition Revision History Edition Revised Date Description 1st 02/09/2015 New manual 2nd 04/20/2015 Corresponds to the

More information

NEC Express5800 Series. StorView Ver. 3. Installation Guide for N F. [Linux Server Edition] A

NEC Express5800 Series. StorView Ver. 3. Installation Guide for N F. [Linux Server Edition] A NEC Express5800 Series StorView Ver. 3 Installation Guide for N8190-121F [Linux Server Edition] Trademarks NEC ESMPRO is the registered trademark of NEC Corporation. Linux is the registered trademark of

More information

DeploymentManager Ver6.5

DeploymentManager Ver6.5 DeploymentManager Ver6.5 Installation Guide -First Edition- Rev.001 Contents Introduction... 4 Target Audience and Purpose... 4 Document Structure... 4 Documentation Guidelines for DeploymentManager Manuals...

More information

ExpressCluster X SingleServerSafe 3.2 for Windows. Installation Guide. 2/19/2014 1st Edition

ExpressCluster X SingleServerSafe 3.2 for Windows. Installation Guide. 2/19/2014 1st Edition ExpressCluster X SingleServerSafe 3.2 for Windows Installation Guide 2/19/2014 1st Edition Revision History Edition Revised Date Description First 2/19/2014 New manual Copyright NEC Corporation 2014. All

More information

Before Reading This Manual This section explains the notes for your safety and conventions used in this manual.

Before Reading This Manual This section explains the notes for your safety and conventions used in this manual. Integrated Mirroring SAS User s Guide Areas Covered Before Reading This Manual Chapter 1 Chapter 2 Chapter 3 This section explains the notes for your safety and conventions used in this manual. Overview

More information

Express5800/R120d-1M, R120d-2M

Express5800/R120d-1M, R120d-2M NEC Express Server Express5800 Series Express5800/R120d-1M, R120d-2M EXP291, EXP292 Installation Guide (Windows) Model Number: R120d-1M N8100-1794F R120d-2M N8100-1793F Chapter 1 Installing Windows Chapter

More information

Virtual Volume User s Manual

Virtual Volume User s Manual NEC Storage Software Virtual Volume User s Manual IS069-5E NEC Corporation 2015-2017 No part of the contents of this book may be reproduced or transmitted in any form without permission of NEC Corporation.

More information

EMC NetWorker Module for SnapImage Release 2.0 Microsoft Windows Version

EMC NetWorker Module for SnapImage Release 2.0 Microsoft Windows Version EMC NetWorker Module for SnapImage Release 2.0 Microsoft Windows Version Installation and Administration Guide P/N 300-007-130 REV A01 EMC Corporation Corporate Headquarters: Hopkinton, MA 01748-9103 1-508-435-1000

More information

Before Reading This Manual This section explains the notes for your safety and conventions used in this manual.

Before Reading This Manual This section explains the notes for your safety and conventions used in this manual. ServerView User's Guide Areas Covered Before Reading This Manual This section explains the notes for your safety and conventions used in this manual. Chapter 1 Overview of ServerView This chapter explains

More information

ExpressCluster X 1.0 for Linux

ExpressCluster X 1.0 for Linux ExpressCluster X 1.0 for Linux Installation and Configuration Guide 10/12/2007 Fifth Edition Revision History Edition Revised Date Description First 2006/09/08 New manual Second 2006/12/12 EXPRESSCLUSTER

More information

Before Reading This Manual This section explains the notes for your safety and conventions used in this manual.

Before Reading This Manual This section explains the notes for your safety and conventions used in this manual. Onboard SCSI RAID User s Guide Areas Covered Before Reading This Manual This section explains the notes for your safety and conventions used in this manual. Chapter 1 Overview This chapter explains an

More information

ETERNUS SF AdvancedCopy Manager V13.1 GUI User s Guide

ETERNUS SF AdvancedCopy Manager V13.1 GUI User s Guide B1WW-8871-02ENZ0(00) ETERNUS SF AdvancedCopy Manager V13.1 GUI User s Guide Preface ++ Purpose This manual explains how to operate the Web-GUI with ETERNUS SF AdvancedCopy Manager. ++ Reader This manual

More information

Cluster Configuration Design Guide (Linux/PRIMECLUSTER)

Cluster Configuration Design Guide (Linux/PRIMECLUSTER) C122-A007-04EN PRIMEQUEST 1000 Series Cluster Configuration Design Guide (Linux/PRIMECLUSTER) FUJITSU LIMITED Preface This manual describes the network and shared I/O unit information and configuration

More information

Installation Guide. EventTracker Enterprise. Install Guide Centre Park Drive Publication Date: Aug 03, U.S. Toll Free:

Installation Guide. EventTracker Enterprise. Install Guide Centre Park Drive Publication Date: Aug 03, U.S. Toll Free: EventTracker Enterprise Install Guide 8815 Centre Park Drive Publication Date: Aug 03, 2010 Columbia MD 21045 U.S. Toll Free: 877.333.1433 Abstract The purpose of this document is to help users install

More information

Installation Guide (Windows)

Installation Guide (Windows) Installation Guide (Windows) NEC Express Server Express5800 Series Express5800/R310e-E4 Express5800/R320e-E4 Express5800/R320e-M4 Express5800/R310f-E4 Express5800/R320f-E4 Express5800/R320f-M4 EXP320R,

More information

This guide consists of the following two chapters and an appendix. Chapter 1 Installing ETERNUSmgr This chapter describes how to install ETERNUSmgr.

This guide consists of the following two chapters and an appendix. Chapter 1 Installing ETERNUSmgr This chapter describes how to install ETERNUSmgr. Preface This installation guide explains how to install the "ETERNUSmgr for HP-UX" storage system management software on an ETERNUS DX400 series, ETERNUS DX8000 series, ETERNUS2000, ETERNUS4000, ETERNUS8000,

More information

ETERNUS SF AdvancedCopy Manager V13.2 GUI User s Guide

ETERNUS SF AdvancedCopy Manager V13.2 GUI User s Guide B1WW-8871-03ENZ0(00) ETERNUS SF AdvancedCopy Manager V13.2 GUI User s Guide ii Preface ++ Purpose This manual explains how to operate the Web-GUI with ETERNUS SF AdvancedCopy Manager. ++ Reader This manual

More information

ETERNUS SF AdvancedCopy Manager V13.3 Message Guide

ETERNUS SF AdvancedCopy Manager V13.3 Message Guide B1WW-8881-05ENZ0 (00) ETERNUS SF AdvancedCopy Manager V13.3 Message Guide ii Preface About This Manual This manual explains the messages output by ETERNUS SF AdvancedCopy Manager. Intended Reader This

More information

Backup App V7. Quick Start Guide for Windows

Backup App V7. Quick Start Guide for Windows Backup App V7 Quick Start Guide for Windows Revision History Date Descriptions Type of modification 30 Jun 2016 First Draft New 25 Nov 2016 Added Restore Options to Ch 8 Restoring Data; Combined Technical

More information

ExpressCluster X File Server Agent 1.0 for Linux

ExpressCluster X File Server Agent 1.0 for Linux ExpressCluster X File Server Agent 1.0 for Linux Administrator s Guide 8/31/2007 Fourth Edition Revision History Edition Revised Date Description First 2006/09/08 New manual Second 2006/12/12 EXPRESSCLUSTER

More information

Hitachi File Services Manager Release Notes

Hitachi File Services Manager Release Notes Hitachi File Services Manager Release Notes Copyright 2011, 2015, Hitachi, Ltd., Hitachi Data Systems Corporation, ALL RIGHTS RESERVED Notice: No part of this publication may be reproduced or transmitted

More information

ExpressCluster X LAN V1 for Linux

ExpressCluster X LAN V1 for Linux ExpressCluster X LAN V1 for Linux Installation and Configuration Guide Revision 1NA Copyright NEC Corporation of America 2006-2007. All rights reserved. Copyright NEC Corporation 2006-2007. All rights

More information

EXPRESSCLUSTER X 3.3 for Linux

EXPRESSCLUSTER X 3.3 for Linux EXPRESSCLUSTER X 3.3 for Linux Installation and Configuration Guide 04/10/2017 5th Edition Revision History Edition Revised Date Description 1st 02/09/2015 New manual. 2nd 06/30/2015 Corresponds to the

More information

ExpressCluster X SingleServerSafe 3.2 for Windows. Configuration Guide. 2/19/2014 1st Edition

ExpressCluster X SingleServerSafe 3.2 for Windows. Configuration Guide. 2/19/2014 1st Edition ExpressCluster X SingleServerSafe 3.2 for Windows Configuration Guide 2/19/2014 1st Edition Revision History Edition Revised Date Description First 2/19/2014 New manual Copyright NEC Corporation 2014.

More information

Interstage Business Process Manager Analytics V11.1. Installation Guide. Windows/Solaris/Linux

Interstage Business Process Manager Analytics V11.1. Installation Guide. Windows/Solaris/Linux Interstage Business Process Manager Analytics V11.1 Installation Guide Windows/Solaris/Linux J2U3-0052-02(00) July 2010 About this Manual This document describes how to install Interstage Business Process

More information

Microsoft Windows NT Microsoft Windows Softek AdvancedCopy Manager Operator's Guide V10.0L30

Microsoft Windows NT Microsoft Windows Softek AdvancedCopy Manager Operator's Guide V10.0L30 Microsoft Windows NT Microsoft Windows 2000 Softek AdvancedCopy Manager Operator's Guide V10.0L30 Preface ++ Purpose This manual describes the operations on Softek AdvancedCopy Manager. ++ Intended Readers

More information

Integrated Mirroring SAS User s Guide for Windows Server 2008

Integrated Mirroring SAS User s Guide for Windows Server 2008 CA97232-0006-01EN Integrated Mirroring SAS User s Guide for Windows Server 2008 1 / 8 Contents Before reading this manual...3 Product Names (page 3)...3 3.1 Updating Device Driver (page 50)...4 Updating

More information

BACKUP APP V7 MICROSOFT SYSTEM BACKUP AND RESTORE GUIDE

BACKUP APP V7 MICROSOFT SYSTEM BACKUP AND RESTORE GUIDE V7 MICROSOFT SYSTEM BACKUP AND RESTORE GUIDE Revision History Date Descriptions Type of modification 27 July 2016 First Draft New 3 Feb 2017 Added instructions and screen shots for Encryption New key handling

More information

EXPRESSCLUSTER X 4.0 for Windows

EXPRESSCLUSTER X 4.0 for Windows EXPRESSCLUSTER X 4.0 for Windows Installation and Configuration Guide April 17, 2018 1st Edition Revision History Edition Revised Date Description 1st Apr 17, 2018 New manual Copyright NEC Corporation

More information

ExpressCluster X Integrated WebManager

ExpressCluster X Integrated WebManager ExpressCluster X Integrated WebManager Administrator s Guide 09/30/2009 Second Edition Revision History Edition Revised Date Description First 06/15/2009 New manual Second 09/30/2009 This manual has been

More information

ControlCommand Command Reference

ControlCommand Command Reference NEC Storage Software ControlCommand Command Reference IS041-9E NEC Corporation 2005-2010 No part of the contents of this book may be reproduced or transmitted in any form without permission of NEC Corporation.

More information

EXPRESSCLUSTER X 4.0 for Linux

EXPRESSCLUSTER X 4.0 for Linux EXPRESSCLUSTER X 4.0 for Linux Installation and Configuration Guide April 17, 2018 1st Edition Revision History Edition Revised Date Description 1st Apr 17, 2018 New manual. Copyright NEC Corporation 2018.

More information

Security Guide. Connection Broker. Advanced Connection and Capacity Management for Hybrid Clouds

Security Guide. Connection Broker. Advanced Connection and Capacity Management for Hybrid Clouds Security Guide Connection Broker Advanced Connection and Capacity Management for Hybrid Clouds Version 9.0 June 2018 Contacting Leostream Leostream Corporation http://www.leostream.com 271 Waverley Oaks

More information

ETERNUS SF AdvancedCopy Manager V13.2 Operator's Guide (Linux)

ETERNUS SF AdvancedCopy Manager V13.2 Operator's Guide (Linux) J2UZ-8170-03ENZ0(A) ETERNUS SF AdvancedCopy Manager V13.2 Operator's Guide (Linux) ii Preface ++ Purpose This manual describes the operations available on ETERNUS SF AdvancedCopy Manager. ++ Intended Readers

More information

C122-E159-02EN PRIMEQUEST 1000 Series Notices for ServerView Suite

C122-E159-02EN PRIMEQUEST 1000 Series Notices for ServerView Suite PRIMEQUEST 1000 Series Notices for ServerView Suite 2012 January FUJITSU LIMITED Contents I. Preface... 3 II. Notices for ServerView Suite V10.11.07... 4 1. Notices for ServerView Operations Manager (SVOM)...

More information

Parallels Containers for Windows 6.0

Parallels Containers for Windows 6.0 Parallels Containers for Windows 6.0 Deploying Microsoft Clusters June 10, 2014 Copyright 1999-2014 Parallels IP Holdings GmbH and its affiliates. All rights reserved. Parallels IP Holdings GmbH Vordergasse

More information

Systemwalker Service Quality Coordinator. Technical Guide. Windows/Solaris/Linux

Systemwalker Service Quality Coordinator. Technical Guide. Windows/Solaris/Linux Systemwalker Service Quality Coordinator Technical Guide Windows/Solaris/Linux J2X1-6800-03ENZ0(00) May 2011 Preface Purpose of this manual This manual explains the functions and usage of Systemwalker

More information

FC SAN Boot Configuration Guide

FC SAN Boot Configuration Guide White Paper R120d-2M, R120d-1M R120d-2E, R120d-1E FC SAN Boot Configuration Guide Windows Server 2008 (Hyper-V) Windows Server 2008 R2 (Hyper-V 2.0) Red Hat Enterprise Linux 5 Red Hat Enterprise Linux

More information

EMC Ionix Network Configuration Manager Version 4.1.1

EMC Ionix Network Configuration Manager Version 4.1.1 EMC Ionix Network Configuration Manager Version 4.1.1 RSA Token Service Installation Guide 300-013-088 REVA01 EMC Corporation Corporate Headquarters: Hopkinton, MA 01748-9103 1-508-435-1000 www.emc.com

More information

Virtual Volume User s Manual

Virtual Volume User s Manual NEC Storage Software Virtual Volume User s Manual IS069-7E NEC Corporation 2015-2018 No part of the contents of this book may be reproduced or transmitted in any form without permission of NEC Corporation.

More information

Introduction. Introduction

Introduction. Introduction Introduction Introduction This manual describes the outline of SSCom and the operation method of SSCom Client. It also describes the manual that you need to refer to when using the SSCom. Target Readers

More information

Express Report Service Setup Guide (Linux/VMware)

Express Report Service Setup Guide (Linux/VMware) Express Report Service Setup Guide (Linux/VMware) Chapter 1 Setup Chapter 2 Routing of Report 10.111.01-119.04 NEC Corporation 2016 Contents Contents... 2 Notations... 4 Notations used in the text... 4

More information

LE840/LE850. Network Tool Manual Technical Reference

LE840/LE850. Network Tool Manual Technical Reference LE840/LE850 Network Tool Manual Technical Reference Table of Contents INTRODUCTION 1 SUPPORTED PRINTERS... 1 FEATURES... 1 NOTATION... 1 USAGE LIMITATION OF THE PRODUCT... 2 SCREENS USED IN THIS DOCUMENT...

More information

NEC ESMPRO AlertManager User's Guide

NEC ESMPRO AlertManager User's Guide NEC ESMPRO AlertManager User's Guide Chapter 1 General Description Chapter 2 Installation Chapter 3 Setting Chapter 4 Appendix AM_E-UG-W-001-01-004 NEC Corporation 2014 Contents Contents... 2 Notations

More information

EXPRESSCLUSTER X Integrated WebManager

EXPRESSCLUSTER X Integrated WebManager EXPRESSCLUSTER X Integrated WebManager Administrator s Guide 10/02/2017 12th Edition Revision History Edition Revised Date Description 1st 06/15/2009 New manual 2nd 09/30/2009 This manual has been updated

More information

User's Guide (Systemwalker User Management and Single Sign-On Edition)

User's Guide (Systemwalker User Management and Single Sign-On Edition) Systemwalker Service Quality Coordinator User's Guide (Systemwalker User Management and Single Sign-On Edition) Windows/Solaris/Linux J2X1-7665-02ENZ0(00) January 2013 Preface Purpose of this manual This

More information

DeploymentManager - product introduction - Aug 30,2016 NEC Corporation

DeploymentManager - product introduction - Aug 30,2016 NEC Corporation DeploymentManager - product introduction - Aug 30,2016 NEC Corporation Operations Management Is Time Consuming Does operations management cost you time and effort with increasing numbers of machines? Would

More information

Troubleshooting the Installation

Troubleshooting the Installation APPENDIX A Troubleshooting the Installation This appendix provides troubleshooting information for Essentials installation and setup, and contains the following sections: If the Installer Window Does Not

More information

Systemwalker Service Quality Coordinator. Technical Guide. Windows/Solaris/Linux

Systemwalker Service Quality Coordinator. Technical Guide. Windows/Solaris/Linux Systemwalker Service Quality Coordinator Technical Guide Windows/Solaris/Linux J2X1-6800-02ENZ0(00) November 2010 Preface Purpose of this manual This manual explains the functions and usage of Systemwalker

More information

SANsurfer iscsi HBA Application User s Guide

SANsurfer iscsi HBA Application User s Guide Q Simplify SANsurfer iscsi HBA Application User s Guide Management Application for SANsurfer iscsi Host Bus Adapters IS0054602-00 A Page i SANsurfer iscsi HBA Application User s Guide Management Application

More information

Systemwalker Desktop Patrol V14g. Installation Guide. Windows

Systemwalker Desktop Patrol V14g. Installation Guide. Windows Systemwalker Desktop Patrol V14g Installation Guide Windows B1WD-2704-04ENZ0(00) March 2012 Preface Purpose of this Guide This guide describes necessary setting and operating procedures to install the

More information

ISRX119E22-1. NEC Storage Replication Navigator ControlCommand for Oracle Ver2.2 Installation Guide

ISRX119E22-1. NEC Storage Replication Navigator ControlCommand for Oracle Ver2.2 Installation Guide NEC Storage Replication Navigator ControlCommand for Oracle Ver2.2 Installation Guide Preface Thank you for purchasing NEC Storage Replication Navigator ControlCommand for Oracle. This installation guide

More information

PRIMECLUSTER GDS Snapshot 4.3A20. Installation Guide. Linux

PRIMECLUSTER GDS Snapshot 4.3A20. Installation Guide. Linux R GDS Snapshot 4.3A20 Installation Guide Linux J2UL-1393-02ENZ0(00) December 2012 Preface Purpose This manual explains how to install R GDS Snapshot. Target Readers This manual is written for people who

More information

ETERNUS SF AdvancedCopy Manager V13.1 Operator's Guide for Tape Backup Option

ETERNUS SF AdvancedCopy Manager V13.1 Operator's Guide for Tape Backup Option J2S2-0560-02ENZ0(A) ETERNUS SF AdvancedCopy Manager V13.1 Operator's Guide for Tape Backup Option Preface ++ Purpose This manual describes the functionality of ETERNUS SF AdvancedCopy Manager for Tape

More information

Artix Orchestration Installation Guide. Version 4.2, March 2007

Artix Orchestration Installation Guide. Version 4.2, March 2007 Artix Orchestration Installation Guide Version 4.2, March 2007 IONA Technologies PLC and/or its subsidiaries may have patents, patent applications, trademarks, copyrights, or other intellectual property

More information

ExpressCluster X 1.0 for Linux

ExpressCluster X 1.0 for Linux ExpressCluster X 1.0 for Linux Installation and Configuration Guide 12/12/2006 Second Edition Revision History Edition Revised Date Description First 2006/09/08 New manual Second 2006/12/12 EXPRESSCLUSTER

More information

Installation Guide Install Guide Centre Park Drive Publication Date: Feb 11, 2010

Installation Guide Install Guide Centre Park Drive Publication Date: Feb 11, 2010 EventTracker Install Guide 8815 Centre Park Drive Publication Date: Feb 11, 2010 Columbia MD 21045 U.S. Toll Free: 877.333.1433 Abstract The purpose of this document is to help users install and configure

More information

Hitachi File Services Manager Release Notes

Hitachi File Services Manager Release Notes Hitachi File Services Manager 5.3.0-00 Release Notes Copyright 2011, 2015, Hitachi, Ltd., Hitachi Data Systems Corporation, ALL RIGHTS RESERVED Notice: No part of this publication may be reproduced or

More information

ExpressCluster for Linux Ver3.0

ExpressCluster for Linux Ver3.0 ExpressCluster for Linux Ver3.0 Cluster Installation and Configuration Guide (Shared Disk) 2004.06.30 1st Revision Revision History Revision Revision date Descriptions 1 2004/06/30 New manual 2 EXPRESSCLUSTER

More information

Chapter 2 Using WebBIOS This chapter explains the WebBIOS setup procedures. WebBIOS is a basic utility to set up and manage the array controller.

Chapter 2 Using WebBIOS This chapter explains the WebBIOS setup procedures. WebBIOS is a basic utility to set up and manage the array controller. MegaRAID SAS User s Guide Areas Covered Before Reading This Manual This section explains the notes for your safety and conventions used in this manual. Chapter 1 Overview This chapter provides an overview

More information

Perceptive Matching Engine

Perceptive Matching Engine Perceptive Matching Engine Advanced Design and Setup Guide Version: 1.0.x Written by: Product Development, R&D Date: January 2018 2018 Hyland Software, Inc. and its affiliates. Table of Contents Overview...

More information

ServerView Resource Coordinator VE. Command Reference. Windows

ServerView Resource Coordinator VE. Command Reference. Windows ServerView Resource Coordinator VE Command Reference Windows B1WD-2751-01ENZ0(01) August 2009 Preface Purpose This manual explains the commands available in ServerView Resource Coordinator VE (hereinafter

More information

Command Line Interface User's Guide for NEC ExpressUpdate

Command Line Interface User's Guide for NEC ExpressUpdate Command Line Interface User's Guide for NEC ExpressUpdate Chapter1 About Command Line Interface Chapter2 Component management Chapter3 Group management Chapter4 NEC ExpressUpdate Chapter5 Log management

More information