background image

Status

Performance

U41840-J-Z125-7-76

 403

Use the 

Fibre Channel

 page to display recent fibre channel activity in dynamic graphs:

The top graph reports data received and the bottom graph reports data sent.

Select the port to monitor in the 

Fibre Channel

 drop-down box, or select 

Avg

 to display 

an average of all ports.

The horizontal axis displays time (0–100 seconds).

The vertical axis displays data throughput (0–500 MB/s).

Values that exceed the maximum value of the vertical axis are shown in lighter green.

Each bar on the graph represents approximately 1 second of time.

Hold the cursor over a bar to display the value of the bar.

CPU

The 

CPU

 page allows you to view CPU usage.

To access the CPU page, on the 

Performance

 page, click the 

CPU

 tab (see 

Figure 244

).

Figure 244: CPU Page

Summary of Contents for ETERNUS CS800 S5

Page 1: ...Edition June 2014 English ETERNUS CS800 S5 V2 3 1 User Guide ...

Page 2: ... standard DIN EN ISO 9001 2008 cognitas Gesellschaft für Technik Dokumentation mbH www cognitas de Copyright and Trademarks This manual is printed on paper treated with chlorine free bleach Copyright Fujitsu Technology Solutions GmbH 2014 All rights reserved Delivery subject to availability right of technical modifications reserved This document includes trademarks and copyrights of Quantum Corpor...

Page 3: ...ment 26 Notes on Transporting the Devices 27 Notes on Installing Devices in the Rack 27 Environmental Protection 28 System Description 31 Overview 31 Disk Based Backup Appliance 31 Advanced Data Deduplication Increasing Disk Retention for Backup Data 32 Remote Replication of Backup Data Providing Automated Disaster Recovery Protection 32 Configurable Storage Presentation 32 Features and Benefits 3...

Page 4: ...iguration 46 Performance Guidelines 46 Hardware Description and Basic Operations 49 Server 49 Front View Features and Indicators 50 Rear View Connectors and Indicators 53 Connecting the server to the mains 55 Notes on connecting disconnecting cables 57 Storage Modules 64 JX40 with Entry Model only 64 DX80 S2 Base Module with Scale model only 67 DX80 S2 Expansion Modules optionally with Scale model...

Page 5: ...ts in the Rack 98 Installation of the Server Module in a PRIMECENTER Rack 98 Installing a Storage Module in the Rack 103 Cabling within the ETERNUS CS800 S5 System 106 Label Sheet 107 Cabling the ETERNUS CS800 S5 System 109 Connecting the System with the Network 112 LAN Cabling 112 VTL and PTT Cabling 114 Further Configurations 115 Initial Configuration Connecting with the Network 117 Switching on...

Page 6: ... 2 Protocol 153 Step 3 Windows 154 Step 4 Share Access 156 Step 5 Add Share 157 Step 6 Confirm 158 VTL Wizard 159 Step 1 About 160 Step 2 Add Partition 160 Step 3 Add Media 162 Step 4 Discover Remote Hosts 164 Step 5 Map Remote Hosts 165 Step 6 Confirm 166 OST Wizard 167 Step 1 About 168 Step 2 Add Storage Servers 168 Step 3 Add LSUs 170 Step 4 Add Users 171 Step 5 Confirm 172 Step 6 Download OST ...

Page 7: ...tion Overview 196 Send Settings Cumulative Statistics 196 Receive Settings Cumulative Statistics 197 Current Activity Overview 198 Configuration 201 NAS 201 NAS Summary 202 Windows Domain 208 Share Access 211 Advanced Setting 216 VTL 218 Partitions 218 Media 227 Remote Host Access 236 Replication Configuration 246 Target Systems List 247 Adding a Replication Target 248 Editing a Replication Target...

Page 8: ...ug In 282 PTT 283 Physical Device Discovery 284 Backup Application Specific 285 FC Initiators and Targets 289 Scheduler 291 System 300 Network 300 Date Time 313 Security 315 Notifications 325 Email 325 SNMP 335 AIS Connect 345 Contacts 351 Company 351 Primary and Secondary 352 Replication 355 Understanding Data Replication 355 Replication 356 Directory File or Cartridge Based Replication 356 OST O...

Page 9: ...ing a Share or Partition 367 Synchronizing a Share or Partition 367 Directory File or Cartridge Based Replication Queue 368 Scheduling a Share or Partition For Replication 370 Target Systems List 370 Receive NAS 371 Received Snapshots 371 Recovery Jobs 377 Failback Jobs 379 Directory File Based 380 Receive VTL 385 Received Snapshots 385 Recovery Jobs 391 Failback Jobs 392 Cartridge Based 394 Actio...

Page 10: ...Logged Activities 429 Enabling or Disabling Activity Logging 431 Deleting Logged Activities 431 Downloading the Activity Log 431 Alerts 433 Admin Alerts 433 Service Tickets 434 Service Ticket Priority 435 Recommended Actions 435 Working With Service Tickets 435 Utilities 443 Diagnostics 443 System Diag File 443 Storage Array Diag File 444 Healthchecks 445 Analyzer 449 Network 449 Disk 451 Space Re...

Page 11: ...olutions 465 Start up Problems 465 Hardware Problems 466 Ethernet Network Problems 467 Replication Problems 468 Temperature Problems 469 Removal and Replacement Procedures for CRUs 471 ETERNUS CS800 S4 S5 Hardware 472 Server PRIMERGY RX300 S7 S8 472 Storage Subsystem 481 Storage Expansion 485 ETERNUS CS800 S5 Entry 485 Procedure of Storage Expansion starting with 4TB 485 Procedure of Storage Expan...

Page 12: ...bit 2 510 Apache License Version 2 0 512 BSD Exhibit 1 517 BSD Exhibit 2 520 BSD Exhibit 3 522 Common Development and Distribution License CDDL 523 CLASSPATH Exception to the GP Version 2 530 Eclipse Public License Version 1 0 531 GNU Library General Public License 537 Creative Commons Attribution 3 0 License 548 GNU General Public License 555 The MIT License 562 GNU GENERAL PUBLIC LICENSE Version...

Page 13: ...Contents U41840 J Z125 7 76 Jetty Web Container Notice 613 Oracle Binary Code License Agreement 614 Original Intaglio License 622 Python 2 4 3 License 623 Index 629 ...

Page 14: ...Contents U41840 J Z125 7 76 ...

Page 15: ...ors I It is useful for the audience to have a basic understanding of Windows Linux and UNIX as well as backup recovery systems Document Organization Following is a brief description of chapter contents Chapter Important Information provides essential information regarding safety when working on your ETERNUS CS800 Chapter System Description provides an overview of the ETERNUS CS800 system Chapter H...

Page 16: ...s Chapter Utilities describe the ETERNUS CS800 system management pages related to the menu items Status Alerts and Utilities Chapter Troubleshooting describes problems you may face and how to resolve them Chapter Removal and Replacement Procedures for CRUs describes how the Customer can exchange Customer Replaceable Units Chapter Storage Expansion describes how additional storage modules are intro...

Page 17: ...ETERNUS CS800 systems Order Number Document Title Document Description A26361 F1452 Z253 6 8N19 Safety Notes and Regulations Lists Fujitsu s general safety and regulatory infor mation U41841 J Z125 7 76 ETERNUS CS800 S5 Command Line Interface Provides information about the command line interface U41848 J Z125 4 76 ETERNUS CS800 S4 Advanced Reporting Provides information about performance data logg...

Page 18: ... fujitsu com fts services If you have an active support agreement you may contact your service provider If you do not have an active support agreement contact your Fujitsu sales representative to purchase a service contract or updates Resource Address Product information and documentation http www fujitsu com fts products computing storage solutions eternus ETERNUS CS800 manuals http manuals ts fu...

Page 19: ...ocate the subject you are addressing Fujitsu Home Page Visit the home page of Fujitsu at http www fujitsu com fts Fujitsu Compliance Link See the compliance link of Fujitsu at https globalsp ts fujitsu com sites certificates default aspx To get information about the storage component select Storage Products ETERNUS CS800 ETERNUS DX80 S2 Storage Products ETERNUS JX ETERNUS JX40 To get information o...

Page 20: ...U41840 J Z125 7 76 Worldwide End User Product Warranty For information the Fujitsu worldwide end user standard limited product warranty look at http support ts fujitsu com warranty index asp lng COM Level1 LNID 1 ...

Page 21: ...RNUS CS800 system may be replaced by the customer if they fail These components are called Customer Replaceable Units CRUs Other units may not be replaced by the customer Please note that unauthorized interference with the system will void the warranty and exempt the manufacturer from all liability Any failure to observe the guidelines in this manual and any improper repairs could expose the user ...

Page 22: ... OFF button or the main power switch if present does not isolate the device from the mains power supply To disconnect it completely from the mains power supply unplug all network power plugs from the grounded shockproof sockets Always connect the system components and the attached peripherals to the same power circuit Otherwise you run the risk of losing data if for example the ETERNUS CS800 serve...

Page 23: ...ged by authorized qualified personnel Exception CRU Customer Replaceable Units components can be replaced The warranty is void if the system is damaged during installation or replacement of system expansions Only set screen resolutions and refresh rates that are specified in the operating manual for the monitor Otherwise you may damage your monitor If you are in any doubt contact your sales outlet...

Page 24: ...e of procedures other than those specified herein may result in hazardous radiation exposure Batteries V CAUTION Incorrect replacement of batteries may lead to a risk of explosion The batteries may only be replaced with identical batteries or with a type recommended by the manufacturer see the technical manual for the system board Do not throw batteries into the trash can They must be disposed of ...

Page 25: ...t be free of electrostatic charge Wear a suitable grounding cable that connects you to the external chassis of the system unit Always hold components with ESDs at the edges or at the points marked green touch points Do not touch any connectors or conduction paths on an ESD Place all the components on a pad which is free of electrostatic charge I For a detailed description of how to handle ESD comp...

Page 26: ... the user may be required to take adequate measures I This equipment has been tested and found to comply with the limits for a Class A digital device pursuant to Part 15 of the FCC rules and meets all requirements of the Canadian Interference Causing Equipment Standard ICES 003 for digital apparatus These limits are designed to provide reasonable protection against harmful interference in a reside...

Page 27: ...quipment to any and all optional peripheral devices Failure to do so may violate FCC and ICES rules Notes on Transporting the Devices V CAUTION Only transport the devices in their original packaging or in packaging that protects them from impacts and jolts Do not unpack the devices until they are at their installation location If you need to lift or transport the ETERNUS CS800 devices ask other pe...

Page 28: ...th the requirements for non industrial power supply networks for the type A connector An ETERNUS CS800 configuration can carry a leakage current 3 5 mA Therefore a ground connection must be established before connecting to the mains Environmental Protection Environmentally friendly Product Design and Development This product has been designed in accordance with the Fujitsu standard for environmen ...

Page 29: ...rts Please avoid sticking your own labels on plastic parts wherever possible since this makes it difficult to recycle them Returns Recycling and Disposal Details regarding the return and recycling of devices and consumables within Europe can also be found in the Returning used devices manual via your local Fujitsu branch or from our recycling center in Paderborn Fujitsu Recycling Center D 33106 Pa...

Page 30: ...Environmental Protection Important Information 28 U41840 J Z125 7 76 ...

Page 31: ...tion technology to connect backup and disaster recovery protection across distributed corporate environments This disk based backup appliance uses data deduplication technology to decrease the typical disk capacity requirements very efficiently and make WAN replication a practical cost effective part of disaster recovery planning The ETERNUS CS800 is designed for departmental and medium business c...

Page 32: ...a background process Configurable Storage Presentation Storage can be presented in the following three ways NAS shares CIFS and NFS OST Logical Storage Units LSUs VTL Virtual Tape Library partitions The NAS and OST presentation are available on all ETERNUS CS800 models The VTL presentation is available on models with FC Fibre Channel option Features and Benefits The ETERNUS CS800 system provides t...

Page 33: ...ic Fulls OST Accent Path to tape PTT support for direct copy of backup data to a physical tape library supported by the following backup applications Symantec NetBackup with VTL and OST presentation Symantec Backup Exec with OST presentation Oracle Secure Backup Atempo Time Navigator EMC Networker before version 8 1 with VTL presentation GUI for monitoring and management Configuration Wizards prov...

Page 34: ...lication for all shares or partitions In addition you can quickly enable or disable replication for one or more shares or partitions see Replication Send on page 348 OST Status Page The enhanced Status OST page provides statistics for recent OST optimized duplication as well as Accent activity see OST Status on page 413 Replication Configuration Page The redesigned Configuration Replication page a...

Page 35: ...gement pages in the remote management console Use the map to quickly locate and jump to any page User Activity Log Use the Activity Log to view a record of all activities performed by administrative and service users in the past 90 days You can view the user who performed the activity the time the activity was performed and other information You can also download the activity log to an XML file se...

Page 36: ...ecurely and permanently erase sensitive data stored on the ETERNUS CS800 To securely erase data first delete files on NAS shares or storage servers or erase tape cartridges on VTL partitions then start secure shred During secure shred all residual data associated with the deleted files or cartridges is securely erased from the disk drives and is overwritten with random patterns see Secure Shred on...

Page 37: ...factory installed option Optionally 2 x 10GbE factory installed option field upgradeable With the Entry model 4 2 5 600 GB SAS hard disk 10 000 rpm are building up RAID 1 disk groups used for the operating system and backup metadata Further 6 or 12 2 5 1TB SATA hard disks 7 200 rpm are building up one or two RAID 6 4 2 disk groups used as the backup storage with a capacity of 4 or 8TB ETERNUS CS80...

Page 38: ...in ETERNUS DX80 S2 factory enabled The 1st storage expansion shelf of the DX80 S2 will be equipped with 12 x Hot Spare disks 2TB 3TB or 4TB This will reduced the max capacity to 144 216 288TB The Scale model uses an DX80 S2 storage array with large capacity highly cost effective Nearline SAS disks Serial Attached SCSI Twelve disks of 3 5 size with a capacity of 2TB 3TB or 4TB each and a speed of 7...

Page 39: ...le Storage Capacity of ETERNUS CS800 S5 Entry Scale Server DX80 S2 base DX80 S2 expansion DX80 S2 expansion Name Disk Size Minimum Capacity Capacity Increment steps Maximum Capacity Entry 1 TB 4 TB 4 TB 24 TB Scale 2 TB 16 TB 16 TB 160 TB 3 TB 24 TB 24 TB 240 TB 4 TB 32 TB 32 TB 320 TB Scale with Hot Spare Disks 2 TB 16 TB 16 TB 144 TB 3 TB 24 TB 24 TB 216 TB 4 TB 32 TB 32 TB 288 TB ...

Page 40: ...ariable length approach to identify redundant blocks in a data stream blocks that have appeared before in the same dataset or in datasets processed at an earlier time When a block appears that has already been stored the ETERNUS CS800 system inserts a reference pointer to the earlier instance of the data segment instead of storing another copy The result is a reduction in the storage capacity need...

Page 41: ...aily at 01 00 pm As best practice it is recommended that this process commences after your backup job has completed on a daily basis It is far more efficient to process a day s worth of new data than a week s worth Remote Replication Today most backup occurs on isolated devices making it difficult to deploy disk backup when disaster recovery protection is required The ETERNUS CS800 solution uses d...

Page 42: ...nterface that appears as a tape library with virtual cartridges virtual drives and a virtual changer mechanism An ETERNUS CS800 can be configured to present multiple VTL interfaces of different sizes and types at once This allows backup applications to recognize and integrate an ETERNUS CS800 system into a data center environment just like one or more physical tape libraries ETERNUS CS800 provides...

Page 43: ... a time in Windows environments This protocol allows users with different platforms to share files without installing additional software Active Directory Support The ETERNUS CS800 supports ADS Active Directory Services as well as ACLs Access Control Lists This provides the following benefits Compatibility with CIFS domains NAS shares are able to join CIFS domains and use domain authentication Pre...

Page 44: ...on the ETERNUS CS800 system presents storage servers to a Symantec NetBackup or Backup Exec media server through a specific Symantec protocol A storage server consists of logical storage units LSUs which are similar to directories in a NAS file system or tape cartridges in a VTL partition The OST presentation requires the Symantec NetBackup 7 x or Backup Exec 2010 R2 or later or Backup Exec 2012 h...

Page 45: ... to tape backup data can be moved directly from the ETERNUS CS800 system to a tape library without the need to travel through a backup host A common use case for PTT is to create removable media for long term storage Path to tape is available on all ETERNUS CS800 models with FC port option PTT is supported by a number of backup applications including Symantec NetBackup Symantec Backup Exec Oracle ...

Page 46: ...k on page 286 I Each configured network interface requires its own set of network settings IP address network mask and gateway V CAUTION For effective bonded network use a properly configured network switch is required A network switch is not supplied with the ETERNUS CS800 The ETERNUS CS800 bonding settings must match the switch settings If the switch settings and the ETERNUS CS800 settings do no...

Page 47: ...of throughput is reached with 16 to 32 Scale or 5 to 16 Entry streams in parallel The given ranges are appropriate for the configuration levels and the presentation layers used in parallel I NAS shares provided by ETERNUS CS800 are optimized for backup Using NAS shares to store many small files may degrade the throughput of the system e g inline throughput replication significantly Contact Fujitsu...

Page 48: ...Network Configuration System Description 46 U41840 J Z125 7 76 ...

Page 49: ... Shutting Down the System Locating the Serial Number I This chapter applies to ETERNUS CS800 S5 hardware only For an ETERNUS CS800 S4 system see ETERNUS CS800 S4 User Guide For an ETERNUS CS800 S2 S3 system see ETERNUS CS800 S3 User Guide Server The ETERNUS CS800 S5 server is a PRIMERGY RX300 S8 that provides control for the ETERNUS CS800 S5 software operating system and software applications All ...

Page 50: ...r containing 16 x 2 5 inch hard disk drives Figure 7 ETERNUS CS800 S5 Front View Server PRIMERGY RX300 S8 Figure 8 shows the indicators buttons and connectors on the right side of the front panel of the server Table 2 describes each item For information about the HDD indicators see Hard Drive Carrier Indicators Figure 8 Front Panel Indicators Buttons and Connector ...

Page 51: ...lights up orange when the server is switched off but mains voltage is present standby mode When the system is switched off it can be switched on again by pressing the ON OFF button When the system is operating pressing the ON OFF button will switch off the system I The ON OFF button does not disconnect the server from the mains voltage To disconnect from the mains completely remove the power plug ...

Page 52: ...dicator orange Fan prefailure or failure event detected 11 Global Error indicator orange Lights up orange if a prefailure event has been detected that requires precautionary service intervention Flashes orange if an error was detected that requires service intervention Does not light up if there is no critical event If the event is still acute after a power failure the indicator is activated after...

Page 53: ... side of the rear panel Table 3 describes each item Figure 9 Connectors on the Server s Rear Panel 16 ID card green You can pull out the ID card as far as it will go and push it back again The ID card contains various system information such as the product name serial number order number MAC addresses and DNS name in the Japanese market only the product name and the serial number 17 Front USB Item...

Page 54: ...s switched on and functioning properly Lights up orange if the power supply unit has failed 2 Depending of the ETERNUS CS800 S5 model 3 VGA video connector blue 4 LAN connectors a LAN port for iRMC service access for field engineers only b LAN port Depending on the ETERNUS CS800 S5 model either for customer LAN Entry or for internal purpose Scale c Service LAN port for field engineers only 5 Globa...

Page 55: ...ly operate the server if its rated voltage range corresponds to the local mains voltage Indicator Status Description 1 LAN link transfer green on LAN connection established off no LAN connection green flashing data transfer in progress 2 LAN speed yellow on traffic a transfer rate of 1 Gbit s green on traffic a transfer rate of 100 Mbit s green flashing traffic a transfer rate of 10 Mbit s 3 Globa...

Page 56: ... power supply of the server can be set up if each of the power supply units is either connected to two different phases or to two separate circuits of the internal power supply network Using the cable clamp You can secure the power cords in a cable clamp to ensure that the insulated connectors cannot be disconnected from the server accidentally Figure 11 Cable clamp Thread the power cord through t...

Page 57: ...bles Turn off all power and equipment switches Disconnect all power plugs from the properly grounded power outlets Connect all cables to the server and peripherals Plug all data communication cables into the utility sockets Plug all power cords into the properly grounded power outlets Disconnecting cables Turn off all power and equipment switches Disconnect all power plugs from the properly ground...

Page 58: ...n of interference and or reduced fault tolerance of the device Indicators on the hot plug power supply unit Figure 12 Indicator on hot plug power supply unit Indicator 1 Indicator on hot plug power supply unit two colors Flashes green when the server is switched off but mains voltage is present standby mode Lights up green when the server is switched on and functioning properly Lights up orange in...

Page 59: ... slots on the rear panel for the Entry System configuration Figure 13 Numbering and Equipping of PCI Slots Entry System No Option Variant Figure 14 Numbering and Equipping of PCI Slots Entry System with 10 Gb s Ethernet Figure 15 Numbering and Equipping of PCI Slots Entry System with 8 Gb s Fibre Channel option 1 2 3 4 5 6 Slot Numbers 1 2 3 4 5 6 Slot Numbers 1 2 3 4 5 6 Slot Numbers ...

Page 60: ...of PCI Slots Entry System Variants Slots 1 2 3 4 5 6 no option external RAID controller 4 x 1 Gb s Ethernet with 10 Gb s Ethernet option external RAID controller 4 x 1 Gb s Ethernet 2 x 10 Gb s Ethernet with 8 Gb s Fibre Channel option 2 x 8 Gb s Fibre Channel external RAID controller 4 x 1 Gb s Ethernet with 10 Gb s Ethernet and 8 Gb s Fibre Channel option 2x8 Gb s Fibre Channel external RAID con...

Page 61: ...Hardware Description and Basic Operations Server U41840 J Z125 7 76 59 Figure 17 Indicators on the PCI Cards a b c d e f g ...

Page 62: ...ights up green in case of input output activity with 100 Mb s Lights up yellow in case of input output activity with 1 Gb s d LED 2 green Link Activity indicator Lights up green if a valid connection exists Does not light up if there is no link Flashes green when a data transfer is in progress e LED 1 yellow Link Activity indicator Lights up yellow if a 8 Gb s link exists Flashes in case of input ...

Page 63: ...ing of PCI Slots Scale System No Option Variant Figure 19 Numbering and Equipping of PCI Slots Scale System with 10 Gb s Ethernet Option Figure 20 Numbering and Equipping of PCI Slots Scale System with 1 Gb s Ethernet Option Table 7 shows the usage of the PCI slots 1 2 3 4 5 6 Slot Numbers 1 2 3 4 5 6 Slot Numbers 1 2 3 4 5 6 Slot Numbers ...

Page 64: ...acity for backup data JX40 with Entry Model only The ETERNUS JX40 storage module contains up to 24 2 5 inch Nearline SAS hard disk drives in the front and one controller module and two power supplies in the rear Front View Panel Features and Indicator Figure 21 Front view of the JX40 Module Variants Slots 1 2 3 4 5 6 no Ethernet option 2 x 8 Gb s Fibre Channel 2 x 8 Gb s Fibre Channel 4 x 1 Gb s E...

Page 65: ...ED name LED status Description POWER LED green DC power is supplied to the JX40 Module READY LED green The JX40 Module is available for use FAULT LED amber The JX40 Module is in error status Identify LED Not used with ETERNUS CS800 DC ON Switch Auto Power MODE_SEL The switches should not be used Power LED Ready LED Fault LED Identify LED Power LED Ready LED Fault LED Identify LED CACHE LED not use...

Page 66: ...atus amber The controller is in error status SAS OUT SAS IN Link Fault green SAS link up amber Specifies the SAS cable for exchange Status Fault green The controller is in normal status green blinking Stand by amber Error detected UNIT ID LED Ready Fault LED Debug EXP TTY SAS OUT Widelink SAS OUT Link Fault LED SAS IN Link Fault LED SAS IN Widelink Status Fault LED AC Inlet Ejector levers of a pow...

Page 67: ...ontroller module includes a power supply with fans and an SCU System Capacitor Unit used as backup power source in case of power outage Front View Panel Features and Indicator Figure 25 Front view of the Storage Base Module Figure 26 Operation panel of Storage Base Module Power switch This switch is used to turn on or off the ETERNUS DX Disk storage system FUNCTION button Do not use POWER LED READ...

Page 68: ...e LED status Description POWER LED green DC power is supplied to the Storage Base Module READY LED green The ETERNUS DX Disk storage system is available for use FAULT LED orange The Storage Base Module is in error status blinks orange A part of the ETERNUS DX Disk storage system requires preventive maintenance MAINT ID Not used with ETERNUS CS800 CACHE LED green There is data in the ETERNUS DX Dis...

Page 69: ...ce ports to connect a controller to the server DI OUT port This port is used to connect a controller enclosure to a storage expansion module with a QSFP cable LAN RMT port LAN MNT port These ports are RJ 45 connectors for LAN cables LAN RMT port is not used with ETERNUS CS800 S5 LINK FAULT LEDs Host interface adapter CA 0 DI OUT port LAN RMT port LINK LEDs ACT LEDs LAN MNT port MASTER LED READY FA...

Page 70: ...troller is in error status blinks orange MASTER green The controller is set as a Master CM UNIT ID Not used with ETERNUS CS800 S5 CA FAULT orange The host interface adapter is in error status LINK FAULT green The link between the host interface port and the desti nation has been established orange The host interface port is in error status DI OUT LINKUP green The link between the DI OUT port and t...

Page 71: ... to the power supply unit but the ETERNUS DX Disk storage system DC power is not turned on green off off off The power of the ETERNUS DX Disk storage system DC power is turned on and the power supply unit is operating normally off off off off AC power is not supplied to power supply units off orange orange off or on AC power is not supplied to this power supply unit but AC power is supplied to the...

Page 72: ...es in the front in the same way as the storage base module and two power supplies with fans in the rear Front View Panel Features and Indicator Figure 30 Front view of the Storage Expansion Module Figure 31 LEDs on the front side of the Storage Expansion Module Table 13 Status and meanings of each LED in front of Storage Expansion Module LED name LED status Description LINE LED green AC power is s...

Page 73: ...is a component that controls how the controller and the drives interact Figure 33 I O module Explanation DI OUT port DI IN port These ports are connectors for QSFP cables LEDs The states of LEDs are listed below I O module IOM6 0 I O module IOM6 1 Power supply unit PSU 0 Power supply unit PSU 1 DI IN LINKUP LED DI IN port DI OUT LINKUP LED DI OUT port FAULT LED These are not used ...

Page 74: ...upply unit Explanation Inlet This inlet is used to connect a power cord PSU switch This switch is used to turn on and off the AC power supply LED name LED status Description FAULT blinks orange The I O module is in error status DI OUT LINKUP green The link between the DI OUT port and the desti nation port has been established DI IN LINKUP green The link between the DI IN port and the source port h...

Page 75: ...D indicators for each hard drive carrier see Figure 35 Figure 35 3 5 Hard Drive Carrier Table 16 describes the behavior of the LED indicator LED name Description POWER AC MISSING PSU FAIL FAN FAIL green off off off AC power is supplied to the power supply unit off off off off AC power is not supplied to power supply units off orange orange off or on AC power is not supplied to this power supply un...

Page 76: ... has two LED indicators see Figure 35 which are described in Table 17 Figure 36 2 5 Hard Drive Disk Indicator Table 17 describes the behavior of the LED indicator Item Colour Description 1 Green HDD BUSY Lights up HDD in active phase Does not light HDD inactive drive inactive 2 Orange HDD FAULT Does not light no HDD error Lights up HDD faulty or rebuild stopped drive defective needs replacing a re...

Page 77: ...storage module is installed it is switched on automatically 3 Wait 15 minutes for the system to boot before continuing with the procedure Item Indicator Description 1 LED 1 green HDD BUSY Lights up HDD in active phase Does not light HDD inactive drive inactive 2 LED 2 orange HDD FAULT Does not light no HDD error Lights up HDD Faulty or Rebuild Stopped drive defective needs replacing a rebuild proc...

Page 78: ...nutes before starting any further actions such as configurations via software Shutting Down the System To shut down the ETERNUS CS800 S5 use the remote management pages see Reboot Shutdown on page 447 Shutting down the system can take up to 15 minutes The server is switched off and goes into standby mode The power on indicator lights up orange I If the operating system does not switch the server o...

Page 79: ...he ETERNUS CS800 S5 serial number You can locate the system serial number on the Home page of the remote management console See ETERNUS CS800 System Overview on page 178 You can also locate the serial number by looking at the system ID card on the front panel of the server green to be pulled or as a label on the PRIMERGY RX300 S8 see Figure 37 Figure 37 Serial number ETERNUS CS800 S5 and PRIMERGY ...

Page 80: ...Locating the Serial Number Hardware Description and Basic Operations 78 U41840 J Z125 7 76 ...

Page 81: ...ther manufacturers is also supported To ensure proper ventilation any unused areas in the rack must be sealed using dummy covers Ventilation takes place from the front to the back and may not be obstructed The power is supplied via the multiple socket outlets fitted in the rack ETERNUS CS800 S5 Entry With JX40 storage modules Height 2 HU i e 8 9 cm 4 HU i e 17 8 cm Width side to side 48 26 cm 48 2...

Page 82: ...ure to ensure that they can be adjusted to different rack depths Asymmetrical PRIMECENTER Rack provides an enhanced cable management in the lateral rack area Installation of the cable management is described in detail in the Technical Manual for the respective rack 3rd Party Racks I Installation in most current rack systems from other manufacturers 3rd party racks is also supported For details ple...

Page 83: ...ce of installation has sufficient load bearing capacity Always ensure that the tilting protection is mounted when you set up the rack risk of tipping over Unpacking and Checking the Delivery Unit 1 Unpack all the individual parts of the delivery unit 2 Check the delivery for damage sustained during transport 3 Check whether the delivery matches the specifications in the delivery note V CAUTION Sho...

Page 84: ...ts you need a long Torx screwdriver TX25 or a bit extension Retract the four leveling feet completely using the hexagon key 6 mm When you have removed the retaining brackets and retracted the leveling feets roll the unit off the transport pallet as shown see the Figure 38 Figure 38 Slipping the Unit from the Pallet 6x 6x ...

Page 85: ...tract the four leveling feet completely using the hexagon key I Four people are required to roll the rack off the palette because of its weight When pushing guiding the rack only hold it at the points shown in the diagram Do not press the door closing mechanism of the rear doors 4x ...

Page 86: ...g the Rack 86 U41840 J Z125 7 76 V CAUTION The rack must be rolled down the ramp in a straight line otherwise it may tip over V CAUTION Do not move the rack sideways until it is completely off the ramp with all 4 wheels otherwise it may tip over ...

Page 87: ...zontal Required tools The following tools are required to perform this task Hexagon key 6 mm Spirit level Figure 39 Screwing down the leveling feet Screw down the four leveling feet using a 6 mm hexagon key I The leveling feet are easier to adjust if not carrying the full weight of the rack If necessary please ask another person to tilt the rack slightly in order to relieve the leveling foot in qu...

Page 88: ...nels of the mounted components add up to form a continuous vertical line Installing the tilting protection V CAUTION A tilting protection is mandatory as soon as one component is installed that can be pulled out e g for maintenance reasons via teleskopic rails The tilting protection prevents the rack from tipping over The tilting protection must make firm contact with the ground at the front Make ...

Page 89: ...5 1 x marking template for 600 mm 700 mm wide racks Preparation Screw the leveling feet 1 into the threaded bushings on 2 the underside of the tilting protection Mark the positions of the lozenge nuts 3 on the front and rear of the rack using the supplied template for 600 mm or 700 mm rack widths I Start and end point when applying the template are shown as red bars in see pos 3 in the picture at ...

Page 90: ...e front Position the two front screw holes 1 of the tilting protection so that they are exactly under the lozenge nuts 2 Installing the tilting protection at the front Lift the tilting protection slightly so that the screw holes align with the lozenge nuts Attach the tilting protection to the front of the rack with two supplied M6 x10 mm countersunk screws 1 Torque 5 2 Nm 3 3 1 2 2 1 1 1 ...

Page 91: ...g plate Attach the fixing plate to the slider with two supplied M6 x10 mm countersunk screws 1 Torque 5 2 Nm Lift the tilting protection slightly so that the screw holes align with the lozenge nuts Attach the tilting protection to the rear of the rack with two supplied M6x10 mm countersunk screws 2 Torque 5 2 Nm Using the tilting protection Extracting the tilting protection 1 1 2 2 ...

Page 92: ...ressing against the floor V CAUTION Do not close the rack door when the tilting protection is extracted as the door may be damaged Sliding in the tilting protection V CAUTION Before you slide in the tilting protection screw the leveling feet back up into their original position Follow the procedure described under Extracting the tilting protection in reverse order Connecting the Power Cable Connec...

Page 93: ...system to the network Necessary Tools Provide the following tools for unpacking and installing the ETERNUS CS800 S5 system 2 Phillips and Torx 20 screwdriver Taking ESD Precautions Some components within the ETERNUS CS800 S5 system contain static sensitive parts To avoid damaging these parts while performing installation procedures always observe the following precautions Keep the system turned of...

Page 94: ...cated W WARNING The server weighs 55 lbs 25 0 kg and the storage module weighs 77 lbs 35 0 kg respectively Two people are required to lift either chassis Content of the Server Transport Box on Delivery without Rack RX300 S8 server Rackmount kit 2 power cords Safety Notes and Regulations manual Documentation CD including the User s Guide Quick Start poster Label sheet Content of the Cable Transport...

Page 95: ...e rack It is important for the chassis installation to locate the hole pattern in the rack rails You must allow 2 HU 3 5 of vertical space for the server module and 2 HU 3 5 of vertical space for each storage module installed in the rack It is recommended to position the different components of the ETERNUS CS800 S5 system in the following order Entry The server has to be mounted either immediately...

Page 96: ...le 18 shows the numbering schemes for the storage array s Table 18 Numbering of the Storage Modules for a Scale System Entry Variant 2 Entry Variant 3 Server Server S Se S Se Se Se Se Se Se Se e e e Se e e e e Se Se Se Se e e e e Se e e e e e e Se e e e e e e e e e e e Se e e e e Se e e e e e e e e e e e e e Se e e S S S Se e er rv rv rv rv rv rv r r r rv r r r rv r r r r r rv v r rv r r r r r r r...

Page 97: ...igure 40 Recommended Positions of the Modules in the Rack for Scale Number label on the front Number label on the rear Scale Variant 1 Scale Variant 2 Storage base CE Storage Expansion DE 1 Storage Expansion DE 2 Storage base CE Storage Expansion DE 1 Storage Expansion DE 2 Server Storage base CE Storage Expansion DE 1 Storage Expansion DE 2 Server Se Se Se Se Se Se Se e e e S Se Se Se e Se S Se e...

Page 98: ...U PRIMECENTER Rack as otherwise boards or fans cannot be replaced even with the plug in module fully extended Installation of the Server Module in a PRIMECENTER Rack For installation in a PRIMECENTER rack the following parts are required Support bracket One support system on the left and one on the right I General information is provided in the technical manual for the PRIMECENTER rack Fitting the...

Page 99: ... the rails Figure 42 Removing the Outer Telescopic Rail Start with the left rail To release the locking mechanism press the rear side of the toothed levers together 1 and pull the hook simultaneously as far as it will go 2 If the toothed levers are difficult to access you can use the unlocking tool to release it see delivery pack Put the unlocking tool into the holes of the toothed levers Press th...

Page 100: ...Installing the ETERNUS CS800 S5 Modules 86 U41840 J Z125 7 76 Mounting the rail systems Figure 43 Fit the Left Support System in the PRIMECENTER Rack V CAUTION When using telescopic rails the rack must be protected against tilting 1 2 3 4 5 ...

Page 101: ...ition grid of support upright is reached 3 The black bolts must lock in the corresponding holes 5 Press the bracket backwards until the rail engages 4 V CAUTION The toothed levers must be closed The two black bolts must be flush with the bracket 6 Check if the rail will be fixed by pressing the left rail backwards 7 Repeat this procedure to install the right rail Option Fix each rail with one eart...

Page 102: ...ile pressing the rails inwards to the server sides Ensure that all rack mounting bolts 6 or 8 are properly seated in the mounting points on the telescopic rails and that the locking bars engage 4 Completing installation Figure 45 Sliding the server into the rack 1 Release the locking mechanism of both rails 1 2 Push the server as far as it will go into the rack 2 until the Quick Release Levers QRL...

Page 103: ...engineer if drives that are installed by default need to be uninstalled or moved to another slot Attaching the Slide Rails to the Rack The position of the 1HU support bracket is determined relatively to the base line of the Storage Base Module Locate the positions of the screws and the M5 cage nut with the help of the following figure Figure 46 Locating the mounting position Height of the storage ...

Page 104: ...ine of the storage module 1 For a DX80 storage module push further M5 cage nuts into the 5th holes too 2 Figure 47 Inserting the Cage Nut 3 Attach the support bracket to the left rear rack pillar see Figure 41 4 Insert the pins of the left slide rail in the 1st and 3rd holes from the bottom of the support bracket see 1 in Figure 48 Figure 48 Inserting the Pins of the Left Slide Rail ...

Page 105: ...When installing the storage module to the rack make sure to have the right and left sides and the bottom of the module by two or more people Failure to do so may cause injury 2 Fix the module in the rack Secure the JX40 subsystem within the rack using the knurled thumb screws on each side The left thumb srew is part of the separate bezel the right one is part of the enclosure Figure 49 Fasten the ...

Page 106: ...ck Use four M5 screws to fasten it in the rack Figure 50 Fasten the Storage Module in the Rack Cabling within the ETERNUS CS800 S5 System I The cabling described in this chapter refers to system internal cabling See LAN Cabling on page 98 and VTL and PTT Cabling on page 100 for connecting the ETERNUS CS800 S5 system to the network ...

Page 107: ... 800 LAB SC CE CE DE 3 DE 3 FC Cabling LAN Cabling DE 1 DE 1 DE 2 DE 2 Server Slot3 Port1 Stor CE CM1 Server Slot3 Port1 Stor CE CM1 MNT Server Onboard LAN2 Stor CE CM0 Server Onboard LAN 2 Stor CE CM0 MNT Barcode Serviceport SAP NR DE 6 DE 5 DE 5 DE 4 DE 4 Server Slot1 Port 1 Stor CE CM1 CA0 P0 Server Slot1 Port 1 Stor CE CM1 CA0 P0 Server Slot2 Port 1 Stor CE CM0 CA0 P0 Server Slot2 Port 1 Stor ...

Page 108: ...base and DE 1 DE 2 the sequence of storage expansion modules For an explanation of the labels also see Figure 52 Figure 52 Locations on the ETERNUS CS800 S5 Denoted by Labels The other identifiers on the label sheet have corresponding meanings Take the relevant labels from the label sheet and affix them to the ends of the corresponding cables before connecting the cables P1 P0 P1 MNT P0 P1 MNT Slo...

Page 109: ...ON Ensure that at least one power supply unit of the ETERNUS JX40 storage subsystem and one power supply unit of the server attached to the subsystem are connected with the same phase I In order to set up the mains connection of the storage subsystem with phase redundancy the two power supply units of each module must be connected to two different phases or to two different circuits of the rack in...

Page 110: ...to a separate AC circuit to ensure system availability in case of a power failure 2 Storage base module Connect a power cable to each power supply 2 Storage expansion modules if existent Connect a power cable to each power supply 2 I It is recommended that you connect each expansion module power cord two per module to a separate AC circuit to ensure system availability in case of a power failure 3...

Page 111: ...ase module via 2 FC cables 4 5 Connect the server module with the storage base module via 2 LAN cables for internal management functions 5 V CAUTION The LAN cables must be plugged into the MNT ports of the storage base module and not into the RMT ports Figure 54 Cabling a Scale System 6 5 4 3 2 1 Server DX80 S2 base DX80 S2 expansion DX80 S2 expansion ...

Page 112: ...pends on your ETERNUS CS800 S5 variant as shown in the following sections Entry System Connect the Ethernet cables to the server module as shown in the figures below Figure 55 Entry System Figure 56 Entry System with 10 Gb s Ethernet option 6 5 4 3 2 1 Server 4 x 1 Gb s Eth link 1 Gb s Eth link 6 5 4 3 2 1 Server 4 x 1 Gb s Eth link 1 Gb s Eth link 2 x 10 Gb s Eth link ...

Page 113: ...cale System Figure 58 Scale System with 10 Gb s Ethernet option Figure 59 Scale System with 1 Gb s Ethernet option 6 5 4 3 2 1 Server 3 x 1 Gb s Eth link 6 5 4 3 2 1 Server 3 x 1 Gb s Eth link 2 x 10 Gb s Eth link 2 x 10 Gb s Eth link 6 5 4 3 2 1 Server 3 x 1 Gb s Eth link 4 x 1 Gb s Eth link 4 x 1 Gb s Eth link ...

Page 114: ...port role can be changed on page Configuration PTT FC Initiators Targets of the Remote Management Console Scale System Scale systems are delivered with three dual ports 8 Gb s FC controllers in PCI slot 1 slot 2 and slot 5 The upper ports of the controllers in the PCI slots 1 and 2 are used to connect the storage module Each of the other four ports can be used either for VTL or PTT Connect the FC ...

Page 115: ...ions Before you can begin using the ETERNUS CS800 S5 for backups you must configure the system for VTL NAS or OST See the following chapters in this book for detailed instruc tions for completing each type of configuration especially Chapter Accessing Remote Management for information about how to access the ETERNUS CS800 S5 Web Pages and Chapter Configuration for detailed information about config...

Page 116: ...Further Configurations Installing the ETERNUS CS800 S5 Modules 102 U41840 J Z125 7 76 ...

Page 117: ...ct can occur because each system is configured with the same default IP address 10 1 1 1 To avoid this problem install one system and configure it to use a different IP address before you connect another system to the network Afterwards the ETERNUS CS800 has to be connected with the LAN see Connecting the System with the Network Eventually for an ETERNUS CS800 system with PTT or VTL available the ...

Page 118: ...autonomously on the storage system the server can consequently be rebooted and powered off without any restriction If the storage base module needs to be powered off this can be done using the power switch on the front panel As soon as the storage base is powered on again the Background Initialize process is automatically continued If an additional expansion module is integrated a Background Initi...

Page 119: ...ith the Server 2 Configure the network settings on the notebook I This procedure assumes you are running Windows XP on the computer The steps might be different if you are using another operating system a On the Windows Start menu click Settings Control Panel Network and Internet Connections Network Connections b Right click the network connection that corresponds to the Ethernet port you have con...

Page 120: ...he following IP Address and then enter the following information I Depending on the configuration you may need to reset the network settings to their original state later Therefore keep in mind or write down the current settings before you make any changes IP address 10 1 1 2 Subnet mask 255 255 0 0 e Click OK f Wait for the computer to set the IP addresses on the local computer ...

Page 121: ...d by the ETERNUS CS800 Web GUI Proceed as follows 1 On the notebook a Open a supported Web browser b Type 10 1 1 1 in the Address box c Press Enter The Login page displays see Figure 66 I If the Login page does not display verify that you entered the correct IP address 10 1 1 1 and that the network settings on the computer are correct Wait five minutes then try again If the Login page still does n...

Page 122: ...elect Administrator b Type spcc for the password c Click Login 3 ETERNUS CS800 Welcome page displays see Figure 67 Click Next Figure 67 ETERNUS CS800 Welcome Page 4 ETERNUS CS800 Licence Agreement page displays see Figure 68 Scroll down to the bottom of the page and click I have read and accept this License Agreement see Figure 68 ...

Page 123: ...Initial Configuration Connecting with the Network Running the Getting Started Wizard U41840 J Z125 7 76 109 Figure 68 ETERNUS CS800 Licence Agreement Page The Network Configuration page displays ...

Page 124: ...Running the Getting Started Wizard Initial Configuration Connecting with the Network 110 U41840 J Z125 7 76 Network Configuration Figure 69 Network Configuration ...

Page 125: ...mation for an interface to enable connectivity with devices on different subnets I You can choose to allow any traffic type management replication or data on an interface In this case the routing of different traffic types as well as firewall capability must be controlled using the network infrastructure routers and switches that the ETERNUS CS800 is connected to Configuring the network includes t...

Page 126: ...to For example if the ETERNUS CS800 and its clients are on different subnets you must specify a default gateway DNS Suffix Search List Optional The local domain to search first when resolving domain names Domain Suffix Search List may be either a single domain name or a comma separated list of up to 6 domain names The first domain name listed is used as the local domain Domain names must only cont...

Page 127: ...et ports with a valid MII link Frames are sent in a round robin fashion starting with the first slave device and then the rest of the devices This only applies to the traffic sent from the ETERNUS CS800 The Ethernet switch needs to aggregate the ports so the connected ports are treated as a logical port The ETERNUS CS800 frame reception is completely dependent on the transmission algorithm of the ...

Page 128: ...cessary click the Show link to show the interface details table 2 For each device select the check box to enable VLAN tagging for the device Or clear the check box to disable VLAN tagging for the device VLAN tagging allows you to assign a device to a virtual local area network VLAN With VLAN tagging you can route different traffic types management data and replication over different VLANs making s...

Page 129: ...ly the new network settings to the ETERNUS CS800 Click Undo to revert to all current Interface Details changes to the last update Configuring Interface IP Addresses Under IP Address Configuration IP Address Table configure one or more network interfaces for each port or device physical Ethernet port or bonded device see Figure 73 Figure 73 Network Page IP Address Table 1 Click the Add IP link to a...

Page 130: ...terface for example eth1 400 Statistics are still collected for the base device for example eth1 3 Enter the following network information as provided by your network administrator all fields are required IP Address The IP address of the interface Netmask The network mask of the interface Gateway The IP address of the gateway The gateway IP address must be on the same subnet as the interface IP ad...

Page 131: ...each bonded interface Mgmt Select to allow management traffic Repl Select to allow replication traffic Data Select to allow data traffic Any Select to allow all types of traffic management replication and data 7 Click Update to save the changes you made to the IP Address table Clicking Update does not yet apply the new network settings to the ETERNUS CS800 Click Delete to remove IP address informa...

Page 132: ...st Netmask The network mask for the route Dest Gateway The gateway IP address used for outgoing traffic sent from the interface to a host or client This is usually not the same as the default gateway I In the example shown in Figure 75 to reach a host on the 10 50 50 x subnet you would enter 10 50 50 0 for destination network 255 255 255 0 for the destination netmask and 10 20 20 1 as the destinat...

Page 133: ...e 1 Segments and Target on Different Subnets Example 2 Segments on the Same Subnet and Target on a Different Subnet Example 1 Segments and Target on Different Subnets In the example below see Figure 75 the ETERNUS CS800 has two segmented inter faces one for management traffic and one for data traffic The management interface is assigned to the 10 30 24 x subnet in the IP Address Table section This...

Page 134: ...NUS CS800 IP address is on a different subnet 192 168 20 x To make sure the replication segment is used when communicating with the target ETERNUS CS800 you must add a network route in the Routing Details section on the source ETERNUS CS800 In this example you would specify the following routing details for the replication interface on the source ETERNUS CS800 Destination Use the subnet of the tar...

Page 135: ... 76 Interface Routing Example 2 Backpanel Locations The Backpanel Locations section at the bottom of the Network page displays a graphical representation of the virtual Ethernet ports as they appear on the rear of the system The diagram indicates the current bonding configuration and connectivity status for all Ethernet ports Ports that are bonded together in an interface are shaded the same color...

Page 136: ...work Time Protocol NTP Server Recommended Select this option to synchronize the ETERNUS CS800 with an NTP timeserver or pool Manual Date Time Settings Select this option to manually set the system date and time Specify the New System Date by clicking the calendar icon Specify the New System Time using the drop down boxes 2 In the Timezone drop down box select the time zone where the ETERNUS CS800 ...

Page 137: ...nning the Getting Started Wizard U41840 J Z125 7 76 123 Confirm Settings Reboot The Confirm Settings Reboot page displays see Figure 78 If the settings below are correct click Finish Otherwise click Previous and change settings Figure 78 Confirm Settings ...

Page 138: ...rd Initial Configuration Connecting with the Network 124 U41840 J Z125 7 76 A message appears that after clicking yes your changes will be applied and the system will reboot automatically see Figure 79 Click Yes Figure 79 Confirm Page ...

Page 139: ...rtant system information at a glance Chapter Replication on page 341 allows you to manage data replication activities Chapter Status on page 389 allows you to view the status of the hardware compo nents and system performance Chapter Alerts on page 419 allows you to view administration alerts and resolve service tickets Chapter Configuration on page 187 allows you to configure storage presentation...

Page 140: ...ernet Explorer 8 9 or 10 I For Microsoft Internet Explorer 10 you must enable Compatibility View I For correct operation of the remote management console disable any pop up blockers and enable JavaScript in your Web browser Logging On to the ETERNUS CS800 To log on to the ETERNUS CS800 remote management console 1 Launch a supported Web browser on a workstation that has network access to the ETERNU...

Page 141: ...s can be changed during installation using the Getting Started Wizard or at a later time on the Network page see Network on page 286 3 Select the login type and enter the corresponding password Monitor Allowed to view information on the ETERNUS CS800 remote management console but cannot make changes The default password is password Administrator Allowed to view and change information on the ETERNU...

Page 142: ...n about specifying a security banner message see Security Notice on page 308 The Home page displays see Figure 81 Figure 81 Home Page If you are unable to log on verify that the password is correct then try again If you are still unable to log on contact your ETERNUS CS800 administrator ...

Page 143: ...end your session I If the ETERNUS CS800 remote management console is idle for more than 30 minutes default setting the system logs off the user The inactivity timeout can be changed on the Login Session page see Login Session on page 308 The Remote Management Console After you log on to the ETERNUS CS800 the remote management console displays The remote management console includes the following fe...

Page 144: ...y on the system banner State Displays the operating state of the ETERNUS CS800 Normal The system is operating correctly Attention Yellow There is a problem with the system I O Write Low Threshold Yellow Ingest rate continues and space reclamation starts Admin Ticket Low Capacity Logout Online Help State System Banner ...

Page 145: ...service tickets see Service Tickets on page 420 Low Capacity The Low Capacity button turns yellow when available disk space falls to a low level Low Capacity Management on page 132 Click the Low Capacity button to view the administration alerts related to low disk capacity see Admin Alerts on page 419 I When disk capacity is low target replication to the system is paused see Replication Service on...

Page 146: ...es 500GB 100GB total usable capacity in TB 10TB 250GB 10GB When the ETERNUS CS800 enters the Low Capacity condition space reclamation is automatically started to free up disk space A space reclamation task is initiated every 10 minutes until space reclamation begins Space reclamation ends when the ETERNUS CS800 exits the Low Capacity condition Any space reclamation tasks running at that time are a...

Page 147: ...des performance data logging and visual reporting and graphing features for ETERNUS Series systems For more information see the Advanced Reporting User s Guide I Clicking Wizards on the main menu replaces the main menu with the wizards menu Click a menu item to begin a wizard or click Exit to return to the main menu see Configuration Wizards on page 137 Table 20 Main Navigation Frame Main Navigati...

Page 148: ...o that page see Figure 84 If you need help as you work click Help in the page s title bar to see online help for that page In addition Quick Tips are available on many pages Click the Quick Tip icon next to a section or field to learn more about that item I Clicking Wizards on the main menu replaces the main menu with the wizards menu Click a menu item to begin a wizard or click Exit to return to ...

Page 149: ...Remote Management The Remote Management Console U41840 J Z125 7 76 135 Figure 84 Remote Management Pages Map ...

Page 150: ...The Remote Management Console Remote Management 136 U41840 J Z125 7 76 ...

Page 151: ...e the ETERNUS CS800 to present its storage as one or more VTL Virtual Tape Library partitions for use with a backup application see VTL Wizard on page 145 OST Helps you configure the ETERNUS CS800 to present its storage as one or more OST Open Storage storage servers for use with a backup application see OST Wizard on page 153 Replication Helps you configure the ETERNUS CS800 to send replicated da...

Page 152: ...cessary helps you join the ETERNUS CS800 to a Windows domain Then the wizard guides you through the process of adding one or more NAS shares to receive backup data I You cannot use the NAS wizard to edit existing shares For more information about working with NAS shares see NAS on page 187 To begin the NAS wizard on the Wizards menu click NAS Step 1 About 1 Read the information about the wizard se...

Page 153: ...800 will present NAS shares to see Figure 87 Windows CIFS All hosts that will interact with the ETERNUS CS800 run Windows UNIX Linux NFS All hosts that will interact with the ETERNUS CS800 run UNIX or Linux Both Windows UNIX Linux Both types of hosts Windows and UNIX Linux will interact with the ETERNUS CS800 2 Click Next to continue ...

Page 154: ...Figure 88 Active Directory Add the ETERNUS CS800 to a Windows network using Active Directory Workgroup Add the ETERNUS CS800 to a workgroup on a Windows network I To disjoin a domain see Windows Domain on page 194 2 In the Domain Workgroup Name box enter the name of the domain or workgroup the ETERNUS CS800 is joining 3 Active Directory only Enter information about the primary domain controller Pr...

Page 155: ...ame Enter Administrator or any user that has the right to join the domain By default any user belonging to the Administrators group or the Domain Admins group has the right to join the domain In addition any user can join the domain if they are specifically delegated this right by a member of the Adminis trators group Administrator Password Enter the password for the user entered above I To config...

Page 156: ...the password again to confirm it Description Optional Enter a brief description of the workgroup user Grant Administrator Privileges Select the check box to add the workgroup user to the Windows Administrators group This allows the workgroup user to override certain permissions settings and prevents the workgroup user from being locked out of shares or directories Active Directory Domain Enter the...

Page 157: ...e data deduplication to optimize disk usage I Data deduplication is enabled by default You cannot enable or disable data deduplication after the share is added Hide from network browsing Windows shares only Select the check box to hide the share from network browsing If selected you cannot see the share when browsing the network Export Protocol Available only if you selected the Both option in Ste...

Page 158: ...lected to make sure they are correct see Figure 91 If necessary click Previous to return to a previous step to make changes 2 To make changes to a NAS share you added first select the share and click Delete to delete the share Then click Previous to return to the previous step and add a new share 3 After you have confirmed all settings click Finish The wizard configures the ETERNUS CS800 with the ...

Page 159: ...artitions for use with a backup application The wizard guides you through the process of adding one or more VTL partitions adding virtual media discovering hosts and mapping partitions to hosts I You cannot use the VTL wizard to edit or add media to existing partitions or to edit existing host access groups For more information about working with VTL partitions see VTL on page 204 To begin the VTL...

Page 160: ...zard Step 2 Add Partition 1 Enter information about the partition see Figure 93 Name Enter the name of the VTL partition V CAUTION Do not use an underscore _ in the name of the VTL partition Library Model Select the library model emulated by the partition The library model determines the inquiry string returned to the host by the ETERNUS CS800 The following library models are available Fujitsu CS ...

Page 161: ... 5 HP LTO 1 LTO 2 LTO 3 LTO 4 or LTO 5 Number of Virtual Tape Drives Accept the default number of tape drives based on system model or enter the number of virtual tape drives in the partition I If all tape drives are currently assigned to other partitions you must remove one or more tape drives from an existing partition to make them available for use in a new partition Enable deduplication Select...

Page 162: ...he initial location For example if 50 I E slots are available you cannot create more than 50 cartridges if the initial location is set to I E Slot Number of Media The number of cartridges to create in the partition Starting Barcode The first barcode number in the cartridge sequence You can enter any alpha numeric string for the starting barcode Subsequent barcodes are incremented accordingly For e...

Page 163: ...edia Capacity The capacity of the cartridges Select an option Native Size The capacity is determined by the selected media type Custom Size The capacity is a custom value Enter the custom cartridge capacity in the box Make sure the value is within the acceptable range displayed next to the box 3 Click Add 4 Optional To add additional media repeat Steps 1 3 5 Click Next to continue Figure 94 VTL Wi...

Page 164: ... port on the ETERNUS CS800 and click Discover Remote Hosts again The Backpanel Locations section displays a graphical representation of the Fibre Channel and Ethernet ports as they appear on the rear of the system I An Active status indicates the host is currently logged on to one or more Fibre Channel target ports 2 Enter information about the host Remote Host Port Name WWPN Enter the World Wide ...

Page 165: ...d target I To change the LUN numbers assigned to a device or to map virtual devices to a host use the Configuration VTL Remote Host Access Remote Host Mapping page see Remote Host Mapping on page 223 2 Optional Select the Use CCL check box to use the Command and Control LUN I The CCL Command and Control LUN is not used in most environments This option is recommended for host access groups that con...

Page 166: ...necessary click Previous to return to a previous step to make changes 2 To make changes to a VTL partition media or host access group you added first select the item and click Delete to delete it Then click Previous to return to the appropriate step and add a new item 3 After you have confirmed all settings click Finish The wizard configures the ETERNUS CS800 with the settings you selected ...

Page 167: ...more OST storage servers configuring LSUs logical storage units and adding OST users The wizard also provides a link for downloading and installing the OST Plug in on your backup host I If you plan to use Concurrent Optimized Duplication you should complete the Replication wizard before beginning the OST wizard see Replication Wizard on page 160 I You cannot use the OST wizard to edit existing sto...

Page 168: ...t to continue I At any time while using the wizard you can click Previous to return to the previous step Figure 98 OST Wizard Step 2 Add Storage Servers 1 Under Add Storage Server enter information about the storage server see Figure 99 Name Enter the name of the storage server V CAUTION Do not use an underscore _ in the name of the storage server Description Optional Enter a brief description of ...

Page 169: ...tion of the required data has already been replicated to the target storage server I To configure the target ETERNUS CS800 see Replication Wizard on page 160 I When Concurrent Optimized Duplication is enabled all data on the storage server is duplicated not just the specified images 2 Select the check box for each optimized duplication target you want to duplicate the storage server to When the st...

Page 170: ...r that already contains an LSU Also if you add an available capacity LSU to a storage server you cannot add additional LSUs to that same storage server I After you add an LSU that uses the Available Capacity option you cannot change the LSU to use the Specific Capacity option Instead you must delete the LSU then add a new LSU and choose the Specific Capacity option Specify Capacity Select this opt...

Page 171: ... 1 Enter information about the authenticated user see Figure 101 Username Enter the name of the authenticated user Password Enter the password for the authenticated user Confirm Password Enter the password again to confirm it Description Optional Enter a brief description of the authenticated user 2 Click Apply The user displays in the Users Added table 3 Optional To add additional users repeat St...

Page 172: ...orage Servers Added LSUs Added and Users Added tables 2 To make changes to storage servers LSUs or users you added click Previous to return to the appropriate step Select the incorrect item and click Delete to remove it and then add a new item 3 After you have confirmed all settings click Finish The wizard configures the ETERNUS CS800 with the settings you selected 4 Click Yes to continue with dow...

Page 173: ...lient Plug in Download see Figure 103 This opens the Fujitsu Technical Support web page with the download area On this page follow the instructions provided at the OST Wizard page Figure 103 and download the correct OST Plug in for your backup application and operating system Follow the included instructions to install the OST Plug in on your media server ...

Page 174: ...and targets receive replicated data A target system can receive data from up to 10 sources However a source system can send data to only a single target Finally one system can act as both a source and a target I For more information about working with data replication see Replication on page 341 I Use the Replication wizard or the Configuration Replication page to configure other systems that this...

Page 175: ...lick Pause to pause replication to the target and then click Delete to remove the target a In the Target Hostname or IP Address box enter the hostname or IP address of the system that will receive the replicated data I When entering IP addresses never use an address that is in a reserved IP address range To see a list of reserved IP address ranges click the quick tip icon located near the IP addre...

Page 176: ...get system is at 2 1 1 Software or higher this field is not required Otherwise you must enter the IP address by which the target system recognizes the source system The default value is 0 0 0 0 2 If data on other systems will be replicated to this ETERNUS CS800 enter the following information under Source System a In the Source Hostnames or IP Addresses box enter the hostname or IP address of the ...

Page 177: ...S Shares section to manage its replication settings see Figure 106 I For help adding NAS shares to the system use the NAS Configuration Wizard see NAS Wizard on page 138 2 To configure the share to replicate its data to another system enter the following infor mation under Send a Select the Enable replication for selected share check box to enable replication for the share ...

Page 178: ... will be sent to all selected targets 3 To configure the share to receive replicated data from another system enter the following information under Receive a Optional Select the Enable Directory File based replication to this System check box to enable Directory File Based Replication for the share and then enter a Sync ID in the box The Sync ID is used to identify the source share that will send ...

Page 179: ...rtitions section to manage its replication settings see Figure 107 I For help adding VTL partitions to the system use the VTL Configuration Wizard see VTL Wizard on page 145 2 To configure the partition to replicate its data to another system enter the following information under Send a Select the Enable replication for selected partition check box to enable repli cation for the partition ...

Page 180: ...t to all selected targets 3 To configure the partition to receive replicated data from another system enter the following information under Receive a Optional Select the Enable Cartridge based replication to this System check box to enable Cartridge Based Replication for the partition and then enter a Sync ID in the box The Sync ID is used to identify the source partition that will send replicated...

Page 181: ...artitions Step 5 Confirm 1 Review the settings you selected to make sure they are correct If necessary click Previous to return to a previous step to make changes see Figure 108 2 After you have confirmed all settings click Finish The wizard configures the ETERNUS CS800 with the settings you selected ...

Page 182: ...ure an outgoing e mail server Then the wizard guides you through the process of specifying e mail recipients and selecting the notifications and reports to send to the recip ients I For more information about sending e mail alerts see Email on page 311 To begin the Email Alerts wizard on the Wizards menu click Email Alerts Step 1 About 1 Read the information about the wizard see Figure 109 2 Click...

Page 183: ...IP address ranges click the quick tip icon located near the IP address field I To use hostname format you must specify at least one DNS IP address on the Network page see Network on page 286 2 In the From Email Address box enter the return e mail address displayed in e mails sent by the ETERNUS CS800 Specify a return address that lets you easily identify the system that generated the e mail for ex...

Page 184: ...e of the ETERNUS CS800 are degraded and there is a risk of system failure or data loss High and Medium Send e mail notifications for High and Medium service tickets Medium service tickets indicate that a serious problem occurred and needs to be resolved but it does not necessarily need to be fixed immediately The operation and performance of the ETERNUS CS800 may be degraded All Send e mail notifi...

Page 185: ...selected to make sure they are correct If necessary click Previous to return to a previous step to make changes see Figure 112 2 To make changes to an e mail recipient you added first select the recipient and click Delete to delete the recipient Then click Previous to return to the previous step and add a new recipient 3 After you have confirmed all settings click Finish The wizard configures the ...

Page 186: ...rd provides guided assistance for configuring and enabling the connection to the AIS server in the Fujitsu Support Centre in order to provide call home and dial in services I Completing the AISConnect Wizard is strongly recommended in order to guarantee fast support actions in case of hardware failures and other system failures ...

Page 187: ... a corporate network to the Internet Please ask your network administrator about what proxy and what proxy authentication to use I To register the ETERNUS CS800 system with the Fujitsu Support Centre please place a service request at the Fujitsu Service Desk http ts fujitsu com support servicedesk html I For more information about AIS Connect see AIS Connect on page 331 To begin the AISConnect wiz...

Page 188: ...r Enter the IP address of the proxy server Port Enter the port number of the proxy server Authentication Enabled Select the check box if the proxy server requires authen tication NTLM Authentication Enabled Select the check box if the proxy server requires NTLM NT LAN Manager authentication Username Enter the username to use for proxy authentication Password Enter the password to use for proxy aut...

Page 189: ...ect U41840 J Z125 7 76 175 Figure 114 AISConnect Wizard Proxy Step 3 Confirm After you have confirmed all settings click OK The wizard configures the ETERNUS CS800 with the settings you selected Figure 115 AISConnect Wizard Confirm ...

Page 190: ...AIS Connect Configuration Wizards 176 U41840 J Z125 7 76 ...

Page 191: ...sk usage data reduction statistics and repli cation activity To return to the Home page at any time click Home on the main menu The Home page contains the following overviews ETERNUS CS800 System Overview Disk Usage Overview Data Reduction Statistics Overview Replication Overview Current Activity Overview I Disk usage statistics data reduction statistics replication statistics and current and sche...

Page 192: ...The ETERNUS CS800 System Overview on the Home page see Figure 117 displays the following information about the system Hostname The hostname of the ETERNUS CS800 Click to change the hostname see Network on page 286 IP Address The IP address of the ETERNUS CS800 Click to change the IP address see Network on page 286 ...

Page 193: ...disk usage see Disk Usage on page 404 Disk Capacity The total usable disk capacity of the ETERNUS CS800 Available Disk Space The disk space available for data storage free space On the disk space meter blue left side of meter indicates used disk space and gray right side of meter indicates available disk space The left side of the meter changes color based on the amount of remaining free disk spac...

Page 194: ...tically compact reclaimable space to create more free space as needed Used Disk Space The disk space that already holds data including deduplicated data system metadata and data not intended for deduplication Deduplicated Data The amount of data that has been deduplicated Data Not Intended for Deduplication The amount of data on shares or partitions that do not have deduplication enabled System Me...

Page 195: ...ion Ratio The total reduction ratio of all data that has been processed by the data deduplication and compression engines Data Size Before Reduction divided by Data Size After Reduction Click Show More to display additional information Incoming Replication The amount of data stored on the ETERNUS CS800 via repli cation from another ETERNUS CS800 This does not include incoming data from Directory F...

Page 196: ...ss Blue A replication job is currently in progress Queued Blue A replication job is queued and will continue when the system is ready Manually Paused Yellow Replication was manually paused To resume replication click Resume System Paused Yellow The system has automatically paused replication due to a problem for example low disk space or a problem on the target system To see more information about...

Page 197: ...rk during replication or failback Actual Data Sent divided by the amount of time required to complete replication or failback Receive Settings Cumulative Statistics The Receive Settings Cumulative Statistics section displays statistics for all data received by the system from all sources since system installation or since Receive cumulative replication statistics were last cleared by clicking Clea...

Page 198: ...atistics for Fibre Channel performance see Fibre Channel on page 402 OST Service The status of the OST service OST settings can be configured in Ready Stopped or Verifying state The OST server is available for backup only in Ready state Inline OpDup The inline data flow throughput in MB s Inline data flow repre sents the original native size of the data protected by the system Ethernet In OpDup Th...

Page 199: ...e Space Reclamation on page 438 Healthchecks The status of healthchecks Not running or Percent complete Click to start or stop space healthchecks see Healthchecks on page 431 To view or modify scheduled system activity click Current Schedules see Scheduler on page 277 I For more detailed information about all system activity see Status on page 389 Figure 121 Current Activity Overview ...

Page 200: ...Current Activity Overview Home Page 186 U41840 J Z125 7 76 ...

Page 201: ... its storage capacity as NAS network attached storage shares that are compatible with standard backup appli cations You can create NAS shares for use with Windows or Linux networks You can also join the ETERNUS CS800 to a Windows domain or workgroup and manage users I The NAS wizard provides guided assistance for configuring NAS shares see Configuration Wizards on page 137 V CAUTION Filenames on N...

Page 202: ...rmation about existing shares add or edit shares and delete shares To access the NAS Summary page on the NAS page click the Summary tab see Figure 122 Figure 122 NAS Summary Use the NAS page to perform the following tasks View information about existing NAS shares see NAS Shares List on page 189 Add a new NAS share to the system see Adding a NAS Share on page 190 Edit properties for an existing NA...

Page 203: ...the commit type of NFS shares see the Command Line Interface CLI Guide Export Path The export path of the share different for CIFS and NFS shares Deduplication The data deduplication state of the share Enabled or Disabled Permissions The permissions in use on the share Read Write or Read Only Access The access type of the share All hosts or specific users Replication The current state of replicati...

Page 204: ...You can add up to 128 shares When you add a share you must specify whether it uses the NFS protocol for Linux networks or the CIFS protocol for Windows networks I If you are adding a CIFS share for use with a Windows network you must configure the Windows domain before adding the new share see Windows Domain on page 194 To add a NAS share 1 Click Add The Add NAS Share page displays see Figure 123 ...

Page 205: ...ion cannot be enabled for the share For information about enabling symlink and hard link support for a share see the Command Line Interface CLI Guide 3 Optional Under Replication Settings specify replication settings For more information about configuring replication for a share or to set up replication for the share at a later time see Replication on page 341 4 Click Apply I When you create a CIF...

Page 206: ...de from network browsing and Allow all users to access this share options can be changed Description Optional Enter a brief description of the share Enforce read only access Select the check box to make the share read only If selected you cannot write to the share Hide from network browsing CIFS shares only Select the check box to hide the share from network browsing If selected you cannot see the...

Page 207: ...missions 3 Click Apply I If you modify a NAS share that uses the CIFS protocol you must restart the CIFS service for the changes to take effect To restart the CIFS service first disjoin the Windows workgroup then join it again see Windows Domain on page 194 Restarting the CIFS service will close all active connections to the share Most Windows workstations will automatically reconnect but some app...

Page 208: ...group or a domain After you join the ETERNUS CS800 to a workgroup or a domain CIFS shares are available for use on the Windows network To access the Windows Domain page on the NAS page click the Windows Domain tab see Figure 125 Figure 125 Windows Domain Page Use the Windows Domain page to perform the following tasks Join the ETERNUS CS800 to a Windows workgroup see Joining a Windows Workgroup on ...

Page 209: ... the share By default when a CIFS share is created the default security setting allows access for all users Any access restrictions on individual users can be managed by editing a share on the NAS Summary page see Editing a NAS Share on page 191 Joining a Windows Domain Join a Windows domain to add the ETERNUS CS800 to a Windows network using Active Directory After you join a domain CIFS shares ar...

Page 210: ...user can join the domain if they are specifically delegated this right by a member of the Adminis trators group Administrator Password Enter the password for the user entered above 2 Click Apply I When the system is joined to the Active Directory domain share security is managed by the MMC Microsoft Management Console that is running on the domain controller By default when a CIFS share is created...

Page 211: ...user privileges and delete users or administrators Available users or administrators can be granted access to NAS shares configured for the CIFS protocol I You must join a Windows workgroup or domain before you can add workgroup users or share administrators see Network on page 286 The Share Access page is different depending on whether the system is joined to a workgroup or domain To access the S...

Page 212: ... a Workgroup User or Share Administrator on page 202 Workgroup Users or Share Administrators If the ETERNUS CS800 is joined to a Windows workgroup the Workgroup Users section displays the following information about workgroup users Username The name of the workgroup user Administrator Privileges The privileges of the workgroup user Yes if the user has administrator privileges No if they do not Des...

Page 213: ...rkgroup User Page 2 Enter information about the workgroup user User Name Enter the name of the workgroup user Password Enter the password for the workgroup user Confirm Password Enter the password again to confirm it Description Optional Enter a brief description of the workgroup user Grant Administrator Privileges Select the check box to add the workgroup user to the Windows Administrators group ...

Page 214: ...Enter the Fully Qualified User or Group Name of the share administrator 3 Click Apply Use the MMC Microsoft Management Console to manage users see ADS Share Permis sions on page 202 Editing a Workgroup User Edit a workgroup user to change the user s password or description or to change the user s administrator privileges I You cannot edit a share administrator Instead delete the share administrato...

Page 215: ...Password Enter the password for the workgroup user Confirm Password Enter the password again to confirm it Description Optional Enter a brief description of the workgroup user Grant Administrator Privileges Select the check box to add the workgroup user to the Windows Administrators group This allows the workgroup user to override certain permissions settings and prevents the workgroup user from b...

Page 216: ... Windows system you will not see the user and group information Instead you will see the SID security ID which appears as a series of numbers This occurs when you move files for example using a backup utility or DOS xcopy from one system to another system and the user and group from the source system do not exist on the target system Often users and groups are unique to a particular scope such as ...

Page 217: ...nce for many file operations but it may decrease performance in other operations because the server that grants the opportunistic lock must manage the breaking of that lock when another user requests access to the file I System performance may decrease if Opportunistic Locking is disabled Enable SMB Server signing Disabled by default SMB server signing improves security on Windows networks by requ...

Page 218: ...hen click the VTL tab The VTL page contains the following tabs Partitions Media Remote Host Access Partitions The Partitions page allows you to manage VTL partitions on the ETERNUS CS800 Use partitions to allocate the ETERNUS CS800 virtual tape drives and storage elements to separate partitions that can be accessed by different host systems To access the Partitions page on the VTL page click the P...

Page 219: ...dit properties for an existing VTL partition see Editing a VTL Partition on page 209 Delete a VTL partition from the system see Deleting a VTL Partition on page 211 Change the mode of a partition see Changing Partition Mode on page 211 Partition List The Partition List section displays the following information for all VTL partitions on the ETERNUS CS800 Available Partitions The number of partitio...

Page 220: ...e been created click Create to add media see Media Add on page 213 Slots The number of storage slots in the partition Deduplication The data deduplication state of the partition Enabled or Disabled Replication The current state of replication for the partition Enabled Replication is enabled Send Receive Sync ID Cartridge Based Replication is enabled Configure Click to configure replication for the...

Page 221: ...ape drive is considered active if a cartridge is loaded in the VTD Make sure to configure the backup application software so that the maximum number of active VTDs is not exceeded at any time Exceeding the maximum number of active VTDs may cause backup jobs to time out V CAUTION Make sure the backup application on the host is configured for the correct number of tape drives and storage slots emula...

Page 222: ...The library model determines the inquiry string returned to the host by the ETERNUS CS800 The library model does not restrict the number of slots or drives in a partition because library emulation is not a representation of a physical library The following library models are available Fujitsu CS TL ADIC Scalar 100 ADIC Scalar i2000 or ADIC Scalar i500 ADIC Pathlight VX Number of Storage Slots Ente...

Page 223: ...imize disk usage I Data deduplication is enabled by default You cannot enable or disable data deduplication after the partition is added If data duplication is disabled then data compression is also disabled 3 Optional Under Replication Settings specify replication settings For more information about configuring replication for a partition or to set up replication for the partition at a later time...

Page 224: ...l Tape Drives options can be changed Library Model Select the library model emulated by the partition The library model determines the inquiry string returned to the host by the ETERNUS CS800 The following library models are available Fujitsu CS TL ADIC Scalar 100 ADIC Scalar i2000 or ADIC Scalar i500 ADIC Pathlight VX Number of Storage Slots Enter the number of storage slots in the partition up t...

Page 225: ...tition is online select the partition and click Offline to take the partition offline To delete a partition it must be offline 2 If there are tape cartridges in any of the tape drives in the partition move the cartridges to storage slots see Media Move on page 218 To delete a partition all drives must be empty 3 Select the partition and click Delete I You can select multiple partitions to delete a...

Page 226: ...ccurs Default If Auto Export is enabled the media is removed from the virtual I E slot If Auto Export is disabled the media remains in the virtual I E slot To access the Partitions General page on the Partitions page click the General tab see Figure 135 Figure 135 Partitions General Page To configure Auto Export 1 Select the Enable Auto Export check box to enable Auto Export Or clear the Enable Au...

Page 227: ...ng tabs Media Add Media Actions Media Move Media Unload Media Add Use the Media Add page to add a contiguous range of virtual tape cartridges to a VTL partition You can specify the initial location starting barcode media type and media capacity After the cartridges are created they are available for backing up data I It is possible to oversubscribe space on the ETERNUS CS800 In this case the total...

Page 228: ...ia enter information about the media Initial Location The initial location for cartridges after they are created Storage Slot or I E Slot I You cannot create more cartridges than the number of available slots in the initial location For example if 50 I E slots are available you cannot create more than 50 cartridges if the initial location is set to I E Slot Number of Media The number of cartridges...

Page 229: ...by the type of tape drive selected when the partition was created see Adding a VTL Partition on page 207 Media Capacity The capacity of the cartridges Select an option Native Size The capacity is determined by the selected media type Custom Size The capacity is a custom value Enter the custom cartridge capacity in the box Make sure the value is within the acceptable range displayed next to the box...

Page 230: ...to work with I Select UNASSIGNED to work with cartridges that are not assigned to any partition The table displays the following information for all virtual tape cartridges in the partition Barcode The barcode number of the cartridge Type The cartridge type LTO or SDLT Partition The partition where the cartridge is located WP The write protect status of the cartridge Write Enabled or Write Protect...

Page 231: ...he media is mounted Because of this the displayed Used value may be different from the real value for mounted media Capacity The total capacity of the tape cartridge I Click a column heading to sort the rows in the table by that column Click the column heading again to reverse the sort order I Click the Information button i next to a partition to display detailed information about the cartridge 2 ...

Page 232: ...d range Click the Quick Tip icon for additional examples 4 Select the cartridges to perform the action on The action is performed only for selected cartridges on the current page Or select the check box in the table heading row to perform the action on all cartridges in the partition I If necessary use the controls at the bottom of the table to navigate between multiple pages of results Select the...

Page 233: ...tridge from a drive select the Force Unload Virtual Tape Drives check box to force the drive to unload the cartridge before ejecting it 5 Optional To reduce the number of cartridges displayed in the table enter a barcode or barcode range in the Barcode Filter box and click Apply Filter Use a hyphen to indicate a range and use an asterisk to indicate a wildcard Separate multiple entries with commas...

Page 234: ... be offline if it has not been mapped to a host see Remote Host Access on page 222 9 Click Apply 10 Return the partition to an online state see Changing Partition Mode on page 211 Media Unload Use the Media Unload page to perform a bulk unload of virtual tape cartridges from drives or I E slots I If you do not create and associate a host access group with a partition the virtual devices are not vi...

Page 235: ...artition is online click Offline to take the partition offline To unload media the partition must be offline 3 In the Show Location drop down box select the type of location you want to unload cartridges from Drive Storage Slot I E Slot 4 Optional If you are unloading cartridges from a drive select the Force Unload Virtual Tape Drives check box to force drives to unload the cartridges before eject...

Page 236: ...lay in the Show drop down box 7 Click Apply Cartridges are moved to a previous storage slot if available Otherwise they are moved to the first available storage slot 8 Return the partition to an online state see Changing Partition Mode on page 211 Remote Host Access The Remote Host Access page allows you to configure virtual media changers and tape drives on the ETERNUS CS800 to communicate with F...

Page 237: ...on the port To allow multiple hosts to access devices that belong to the same partition you must create separate host access groups for each host To access the Remote Host Mapping page on the Remote Host Access page click the Remote Host Mapping tab see Figure 140 Figure 140 Host Mapping Page Use the Remote Host Mapping page to perform the following tasks View information about existing host acces...

Page 238: ...e The VTL partition associated with the group Devices The number of virtual media changers VMCs and virtual tape drives VTDs associated with the group I Click a column heading to sort the rows in the table by that column Click the column heading again to reverse the sort order Adding a Remote Host Access Group Add a host access group to associate a VTL partition with a host a Fibre Channel initiat...

Page 239: ...ailable in the Host drop down box see Remote Hosts on page 228 Target Select the target port to associate with the group The Backpanel Locations section displays a graphical representation of the Fibre Channel and Ethernet ports as they appear on the rear of the system A dark border displays around the currently selected target I If a target is directly connected to the system only the directly co...

Page 240: ... Fujitsu Customer Support before you enable this option 4 Select the check boxes for the media changer and tape drives to add to the host access group The LUN assignment displays next to the device 5 Click Apply Editing a Remote Host Access Group Edit a host access group to change the CCL setting You can also add or remove virtual media changers or tape drives To edit a host access group 1 Select ...

Page 241: ...access groups that contain an HP UX host It can also be used if hosts that are not assigned to any host access group exist in the SAN The CCL is accessible to hosts only through LUN 0 V CAUTION If you are not sure if you should use CCL contact Fujitsu Customer Support before you enable this option 3 Select the check boxes for the media changer and tape drives to add to the host access group The LU...

Page 242: ... can assign it to a new host access group see Adding a Remote Host Access Group on page 224 V CAUTION If you are connecting the ETERNUS CS800 directly to a host without using a Fibre Channel switch you must know the WWPN connecting to each ETERNUS CS800 port If you do not specify this information the virtual medium changer and tape drives will not display on the device manager To access the Remote...

Page 243: ...e sure the host is connected to a Fibre Channel port on the ETERNUS CS800 and click Discover Remote Hosts again The Backpanel Locations section displays a graphical representation of the Fibre Channel and Ethernet ports as they appear on the rear of the system 2 Optionally enter a descriptive alias for the host s 3 Click Apply I To delete a host that is no longer needed click Delete next to the ho...

Page 244: ...green status indicates that a host is currently logged on to the appropriate Fibre Channel target port Select one or more targets and click Reset Target s to initiate a Fibre Channel reset on the selected ports A reset causes the ports to go through LIP Loop Initialization Protocol Target Usage Use the Target Usage page to view current target and device mappings for the ETERNUS CS800 To access the...

Page 245: ...n of the Fibre Channel and Ethernet ports as they appear on the rear of the system I A mapped green status indicates that a host is currently logged on to the appropriate Fibre Channel target port Each target Fibre Channel port is displayed along with the partition and virtual media changer and tape drives VMC and VTDs mapped to the port ...

Page 246: ...rce and replication is performed across a public network with the source and target located behind NAT enabled routers you must specify a NAT IP address for the ETERNUS CS800 on the Network page see Configuring Interface IP Addresses on page 292 To access the Replication Configuration page click the Configuration menu and then click the Replication tab see Figure 146 Figure 146 Replication Configu...

Page 247: ...ge 182 Source IP The IP address that is used to uniquely identify the source system to the target Encryption The type of encryption used when sending replicated data to the target system None 128 bit or 256 bit Original Data Size The original native size of data sent during replication or failback This value does not represent the amount of data actually sent over the network during replication or...

Page 248: ...ion When replication is enabled for a share or partition replicated data is sent to the target system during scheduled or manual replication I For more information about enabling and scheduling replication for a share or partition see Replication Send on page 348 To add a replication target 1 Under Target systems click Add The Add Target Host window displays see Figure 147 Figure 147 Add Target Ho...

Page 249: ...e target system is at ETERNUS CS800 2 0 1 x Software or below then you must enter the IP address by which the target system recognizes the source system The default value is 0 0 0 0 I The Source IP field does not accept fully qualified domain names You must enter a valid IP address Make sure this IP address is configured in the allowable sources list on the target system I When configuring segment...

Page 250: ... than the actual network IP address of the source system If the target system is at ETERNUS CS800 2 1 Software or higher the Source IP Address field is not required If the target system is at ETERNUS CS800 2 0 1 x Software or below then you must enter the IP address by which the target system recognizes the source system The default value is 0 0 0 0 I The Source IP Address field does not accept fu...

Page 251: ...ication select a target under Target systems and click Resume The system resumes sending replicated data to the selected target Enabling System Throttling Enable system throttling to limit the network bandwidth used for replication to all targets When a constant throttle is enabled the system limits the amount of data it sends during source replication so that it does not exceed the specified band...

Page 252: ...In the box enter the maximum allowed bandwidth The lowest value you can set is 32 KB s The highest value you can set is 125 MB s 4 Click Apply V CAUTION Do not set the maximum allowed bandwidth to a value that is lower than necessary If the maximum allowed bandwidth is set to the lowest value large replication jobs may fail Source System List The Source System list displays the following informati...

Page 253: ...ce system rather than a cumulative total for all sources as is displayed on the Home page Adding a Replication Source Add a system to the list of replication sources to allow it to send replicated data to the ETERNUS CS800 You must add a source system to the list of allowed replication sources on the target ETERNUS CS800 before you configure the source system to send replicated data to the target ...

Page 254: ...s on the Network page see Network on page 286 3 Click Apply Deleting a Replication Source Delete a system from the list of replication sources if it will no longer send replicated data to the ETERNUS CS800 After the source system is deleted the ETERNUS CS800 will no longer accept replicated data from that system To delete a replication source 1 Under Source Systems select one or more sources to de...

Page 255: ...he default value is 10 The maximum value is 32 OST The OST page allows you to configure the ETERNUS CS800 to present its storage capacity as storage servers using OpenStorage OST technology You can also add one or more Logical Storage Units LSUs to a storage server Storage servers and LSUs are compatible with backup applications that support OST such as Symantec NetBackup and Symantec Backup Exec ...

Page 256: ...figured in NetBackup With AIR you can specify a single replication target Concurrent Optimized Duplication For both optimized duplication and Automatic Image Replication you can optionally enable Concurrent Optimized Duplication If enabled as data is written to the storage server it is simultaneously replicated to the target ETERNUS CS800 When optimized duplication or Automatic Image Replication s...

Page 257: ... server and LSU to receive the replicated OST data see Adding a Storage Server on page 246 I Fujitsu recommends selecting the Available Capacity option when creating an LSU for use with Automatic Image Replication 4 On the source system specify the target system that will receive the replicated data see Adding a Replication Target on page 234 5 On the source system create a remote OST user with th...

Page 258: ...fy replication target Create remote OST user Create storage server and LSU with AIR enabled 3 Create storage lifecycle policies SLPs on the NetBackup server in each domain to control when duplication occurs and images are imported Storage Servers The Storage Servers page allows you to manage OST storage servers on the ETERNUS CS800 You can view information about existing storage servers add or edi...

Page 259: ... existing storage servers see Storage Server List on page 245 Add a new storage server to the system see Adding a Storage Server on page 246 Edit properties for an existing storage server see Editing a Storage Server on page 249 Delete a storage server from the system see Deleting a Storage Server on page 251 Storage Server List The Storage Server List displays the following information for all st...

Page 260: ... A brief description of the storage server if available I Click a column heading to sort the rows in the table by that column Click the column heading again to reverse the sort order I The connections of a storage server that are used equals the data streams plus one for each LSU polling A backup job may generate more than one data stream if the data can be read in parallel For example a policy th...

Page 261: ...erver Name Enter the name of the storage server V CAUTION Do not use an underscore _ in the name of the storage server Description Optional Enter a brief description of the storage server Max Connections Enter the maximum number of connections allowed to the storage server 3 to 65536 I Fujitsu recommends setting Max Connections to 300 ...

Page 262: ...ll selected targets 4 Under Logical Storage Unit select the type of LSU to add to the new storage server Available Capacity Recommended for best performance Select this option to add an LSU that uses the available capacity on the system You cannot add an available capacity LSU to a storage server that already contains an LSU Also if you add an available capacity LSU to a storage server you cannot ...

Page 263: ...replicate images to You can select only a single target When images are replicated data will be sent to the selected target 8 If Automatic Image Replication is enabled specify the following information Remote Storage Server Name The name of the remote storage server on the target ETERNUS CS800 to replicate data to The source ETERNUS CS800 and target ETERNUS CS800 must reside in different NetBackup...

Page 264: ... List on page 245 I Fujitsu recommends setting Max Connections to 300 Enable Concurrent Optimized Duplication Select the check box to enable optimized duplication during OST ingest Concurrent Optimized Duplication is disabled by default If enabled as data is written to the storage server it is simultaneously replicated to the target ETERNUS CS800 When optimized duplication or Automatic Image Repli...

Page 265: ... cannot delete a storage server if it has more than zero currently active connections The number of active connections is displayed on the OST page see Storage Server List on page 245 Also you cannot delete a storage server if it contains LSUs Before deleting the storage server you must first delete any LSUs it contains see Deleting an LSU on page 257 I You can select multiple storage servers to d...

Page 266: ... List The Logical Storage Unit List displays the following information for all LSUs on the ETERNUS CS800 LSU Name The name of the LSU Storage Server The storage server that contains the LSU Physical Capacity The physical storage capacity of the LSU Automatic Image Replication That status of Automatic Image Replication AIR for the LSU Enabled or Disabled as well as the configured targets if any I T...

Page 267: ...to present the storage capacity of the ETERNUS CS800 as an LSU that is compatible with backup applications that support OST You can add an LSU with a specific capacity or you can add an LSU that uses the available capacity of the ETERNUS CS800 I You must create a storage server before you can add an LSU see Adding a Storage Server on page 246 To add an LSU to a storage server 1 Click Add The Add L...

Page 268: ...ption of the LSU 4 Optional Select the Enable Automatic Image Replication check box to automatically replicate duplicate data on the LSU to a remote LSU on another ETERNUS CS800 Automatic Image Replication AIR is disabled by default If enabled data on an LSU is automatically replicated to a remote LSU that resides on a ETERNUS CS800 in a different NetBackup domain The timing of the duplication as ...

Page 269: ...use for authentication on the remote target ETERNUS CS800 The selected remote user must match a local user on the Configuration OST Manage Users page on the target ETERNUS CS800 see Manage Users on page 257 7 Click Apply Editing an LSU Edit an LSU to change its capacity description or automatic image replication settings To edit an LSU 1 Select the LSU and click Edit The Edit Logical Storage Unit ...

Page 270: ...requires NetBackup 7 1 or higher For information about configuring NetBackup for Automatic Image Replication see the ETERNUS CS800 OST Guide I You must configure at least one remote user before you can enable Automatic Image Replication see Manage Remote Users on page 260 4 If Automatic Image Replication is enabled select the replication target you want to replicate images to You can select only a...

Page 271: ...lect the Force Delete LSU check box to delete LSUs that are not empty Normally you cannot delete an LSU if it contains existing backup images If for some reason you cannot remove files from the LSU selecting the Force Delete LSU check box allows you to delete the LSU even though it is not empty 3 Click Delete Manage Users The Manage Users page allows you to create and manage authenticated users fo...

Page 272: ...User on page 259 Edit an authenticated user see Editing an Authenticated User on page 259 Delete an authenticated user see Deleting an Authenticated User on page 260 Manage Local Users List The Manage Local Users list displays the following information for all local authenticated users Name The name of the authenticated user Description A brief description of the local authenticated user if availa...

Page 273: ...ure 159 Figure 159 Add Authenticated User Page 2 Enter information about the authenticated user User Name Enter the name of the authenticated user New Password Enter the password for the authenticated user Confirm New Password Enter the password again to confirm it Description Optional Enter a brief description of the authenticated user 3 Click Apply Editing an Authenticated User Edit an authentic...

Page 274: ...ger needed to authen ticate OST devices on a media server To delete an authenticated user select the user and click Delete I You can select multiple users to delete at once Manage Remote Users The Manage Remote Users page allows you to create and manage remote users for use with OST Automatic Image Replication AIR You must configure at least one remote user before you can enable Automatic Image Re...

Page 275: ...ser see Adding a Remote User on page 262 Edit a remote user see Editing a Remote User on page 262 Delete a remote user see Deleting a Remote User on page 263 Manage Remote Users List The Manage Remote Users list displays the following information for all remote users Name The name of the remote user Description A brief description of the remote user if available I To update the list with the lates...

Page 276: ... The Add Remote AIR Credential window displays see Figure 162 Figure 162 Add Remote AIR Credential 2 Enter information about the remote user User name Enter the name of the remote user New Password Enter the password for the remote user Confirm New Password Enter the password again to confirm it Description Optional Enter a brief description of the remote user 3 Click Apply Editing a Remote User E...

Page 277: ...age Replication To delete a remote user select the user and click Delete I You can select multiple users to delete at once Target IP Mapping The Target IP Mapping page allows you to associate a data IP address with a replication IP address on a target ETERNUS CS800 This can be necessary if the target ETERNUS CS800 is configured with different network interfaces and therefore different IP addresses...

Page 278: ...outing is not working try removing the additional data IP addresses and map only a single data IP address To access the Target IP Mapping page on the OST page click the Target IP Mapping tab see Figure 164 Figure 164 Target IP Mapping Page Use the Target IP Mapping page to perform the following tasks View information about mapped data and replication IP addresses see Target IP Mapping List on page...

Page 279: ... list are grouped by target replication IP address I To update the list with the latest information click Refresh Mapping a Target IP Address Add mapping for a target data IP address to route all network traffic sent to the address to the specified replication IP address instead To map a target IP address 1 Click Add The Add Target Data IP Mapping window displays see Figure 165 Figure 165 Add Targ...

Page 280: ...ress 6 Click Apply Deleting a Mapped IP Address Delete a mapped IP address if traffic sent to the target data IP address no longer needs to be routed to a replication IP address To delete a mapped IP address select the IP address and click Delete I You can select multiple mapped IP addresses to delete at once Accent Use the Accent page to enable or disable Accent Fujitsu Accent software accelerate...

Page 281: ...OST data is not encrypted Default AES 128 OST data is encrypted using AES 128 bit encryption Default AES 256 OST data is encrypted using AES 256 bit encryption TLS with AES 256 OST data is encrypted using AES 256 bit encryption with Transport Layer Security TLS I Using 256 bit encryption provides a stronger level of security but may have an impact on system performance in some situations 3 If you ...

Page 282: ... ETERNUS CS800 OST Guide OST Client Plug In Use the OST Client Plug In page to download the Fujitsu OST Plug in OST OpenStorage technology allows Symantec NetBackup and Backup Exec to seamlessly integrate with the ETERNUS CS800 Using OST NetBackup and Backup Exec can manage backups through the ETERNUS CS800 and can take advantage of the system s capabilities such as data deduplication and replicat...

Page 283: ...ary using an NDMP Network Data Management Protocol connection The ETERNUS CS800 supports NDMP V4 OST path to tape also called Direct To Tape allows you to use Symantec NetBackup to copy LSUs from a storage server on the ETERNUS CS800 to a physical tape library For information about working with storage servers and LSUs see OST on page 241 For detailed information about configuring and using OST pa...

Page 284: ...ou discover and configure the libraries and drives you can use them for path to tape data movement To access the Physical Device Discovery page on the PTT page click the Physical Device Discovery tab see Figure 169 Figure 169 Physical Device Discovery Page The Physical Device Discovery page displays the following information for all discovered physical libraries and tape drives Last scan time The ...

Page 285: ...rives in an attached library select the library in the list All drives in the selected library display below To enable or disable tape drives select one or more drives in the list and then click Enable or Disable You can also right click a drive to enable or disable it I To use a tape drive it must be enabled To enable a drive the parent library must be enabled To remove a physical library from th...

Page 286: ...h to tape functionality To access the Backup Application Specific page on the PTT page click the Backup Application Specific tab see Figure 170 Figure 170 Backup Application Specific Use the Backup Application Specific page to perform the following tasks View information about backup application specific users see Backup Application Specific User List on page 273 Add a backup application specific ...

Page 287: ... application specific user Description A brief description of the backup application specific user if available I To update the list with the latest information click Refresh Adding a Backup Application Specific User Add a backup application specific user to create user credentials The user credentials are required to authenticate devices on a media server To add a backup application specific user...

Page 288: ...iption of the backup application specific user 3 Click Apply Editing a Backup Application Specific User Edit a backup application specific user to change the user s password or description To edit a backup application specific user 1 Select the user and click Edit The Edit Backup Application Specific User page displays see Figure 172 Figure 172 Edit Backup Application Specific User Page 2 Enter in...

Page 289: ...tion specific user if the user credentials are no longer needed to authenticate devices on a media server To delete a backup application specific user select the user and click Delete I You can select multiple users to delete at once FC Initiators and Targets The FC Initiators Targets page allows you to see all path to tape initiator and target ports and their associated World Wide Port Numbers WW...

Page 290: ...kpanel Locations section displays a graphical representation of the Fibre Channel ports as they appear on the rear of the system The diagram shows the status of each Fibre Channel port Mapped Target green Unmapped Target yellow Active Initiator blue or Inactive Initiator orange Editing the Fibre Channel Port Type Edit the port type to change the mode of a Fibre Channel port to initiator or target ...

Page 291: ...ime Events can be one time only or they can reoccur at defined intervals To access the Scheduler page click the Configuration menu and then click the Scheduler tab see Figure 174 Figure 174 Scheduler Page Use the Scheduler page to perform the following tasks View currently scheduled events see Viewing Scheduled Events on page 278 Add a new scheduled event or edit an existing event see Adding or Ed...

Page 292: ...artitions click the arrow next to the folder to display all shares or partitions Use the following controls to adjust the schedule view see Figure 174 To show or hide all shares or partitions click the plus or minus icons To filter shares or partitions based on name begin typing in the Filter box Click the x to clear the filter To view the schedule for a specific day select it in the Goto pop up c...

Page 293: ...the arrow next to the folder to display all shares or partitions Then click and drag in the row for the share or partition to schedule I The new event must begin after the current time which is indicated by the dotted vertical line To edit an existing event double click the event If the event is recurring select Open this occurrence to edit only the one instance of the event or select Open the ser...

Page 294: ... drag the event to change when it occurs You can also drag the left or right edge of the event to adjust the start or end time 3 Enter a brief description of the event in the Description box This description will display on the schedule view 4 Specify options specific to the type of event See the following sections Scheduling a Share or Partition for Replication on page 281 Scheduling Replication ...

Page 295: ... share or partition does not delete any scheduled replication events for that share or partition If you no longer want to schedule the share or partition for replication manually delete the schedule see Deleting a Scheduled Event on page 285 To configure a replication schedule for a share or partition 1 On the Scheduler page add or edit an event in the NAS Replication or VTL Repli cation row see A...

Page 296: ...dwidth to a value that is lower than necessary If the maximum allowed bandwidth is set to the lowest value large replication jobs may fail During the replication throttle event the ETERNUS CS800 will limit the amount of data it sends during source replication so that it does not exceed the specified bandwidth After the replication throttle event ends the ETERNUS CS800 will no longer throttle the s...

Page 297: ...es in the bonded interface to calculate the overall outgoing traffic rate The replication throttle bandwidth maximum is specified in KB s MB s or GB s so depending on the statistic or report you are observing you may need to convert the bandwidth maximum to Kb s Mb s or Gb s in order to correctly compare it to the observed values Scheduling E mail Reports The ETERNUS CS800 can automatically genera...

Page 298: ...y when and how often the event reoccurs see Setting Recurrence for a Scheduled Event on page 285 3 Click Apply Scheduling Space Reclamation During space reclamation the ETERNUS CS800 deletes unneeded tags from the blockpool to free up disk space Schedule space reclamation regularly to make sure there is enough disk space to store data V CAUTION Space reclamation may affect system performance Avoid...

Page 299: ...e 1st day of each month or the third Friday of each month Yearly Specify the recurrence interval in years and specify the date and month the event occurs on for example the 15th day of March or the first Monday in May 3 For recurring events specify how long the recurrence continues forever for a certain number of occurrences or until a specific date 4 Click Apply Deleting a Scheduled Event To dele...

Page 300: ...00 You should consult your network administrator before making any changes to the network settings V CAUTION Changing the network configuration requires a system reboot to allow all system services to function correctly Changing the network configuration requires a system reboot immediately after the changes are applied I Rebooting the system can take several minutes After the new network configur...

Page 301: ...Configuration System U41840 J Z125 7 76 287 Figure 177 Network Configuration ...

Page 302: ...e connectivity with devices on different subnets I You can choose to allow any traffic type management replication or data on an interface In this case the routing of different traffic types as well as firewall capability must be controlled using the network infrastructure routers and switches that the ETERNUS CS800 is connected to Configuring the network includes the following major steps I Befor...

Page 303: ...S800 and its clients are on different subnets you must specify a default gateway DNS Suffix Search List Optional The local domain to search first when resolving domain names Domain Suffix Search List may be either a single domain name or a comma separated list of up to 6 domain names The first domain name listed is used as the local domain Domain names must only contain letters A Z a z numbers 0 9...

Page 304: ...gether in the bond0 interface A bonded interface can contain two or more ports I All ports associated with a bond must have the same link speed 1GbE or 10GbE 3 For each bonded interface specify the bonding mode I To maintain network connectivity the switch connected to the ETERNUS CS800 must be configured to use the same bonding mode except bonding mode Active Backup shall be used The best time to...

Page 305: ...lancing and performance as other bonding modes Only one port in the bond is active at a time If the active port fails another port becomes active to take its place Because only the MAC address of the active port is visible to the Ethernet switch the switch does not require additional configuration 4 Click Update to save the changes you made to the Bonding Details table Clicking Update does not yet...

Page 306: ...e Details changes to the last update Configuring Interface IP Addresses Under IP Address Configuration IP Address Table configure one or more network interfaces for each port or device physical virtual Ethernet port or bonded device see Figure 181 Figure 181 Network Page IP Address Table 1 Click the Add IP link to add a network interface to a device Or select an interface to edit the IP address ne...

Page 307: ...llected for the base device for example eth1 3 Enter the following network information as provided by your network administrator all fields are required IP Address The IP address of the interface Netmask The network mask of the interface Gateway The gateway of the ETERNUS CS800 This is usually not the same as the default gateway 4 If necessary specify NAT Network Address Translation settings for t...

Page 308: ...ply the new network settings to the ETERNUS CS800 Click Delete to remove IP address information for the selected interface Or click Undo to revert all current IP Address Table changes to the last update I When you add a network interface a default route via the default gateway is automatically created for the interface after network settings are applied and the ETERNUS CS800 reboots For example if...

Page 309: ...face Or select a route to edit its settings 4 Enter the following network information as provided by your network administrator Destination The destination network for the route Dest Netmask The network mask for the route Dest Gateway The gateway IP address used for outgoing traffic sent from the interface to a host or client This is usually not the same as the default gateway I In the example sho...

Page 310: ...00 using the gateway specified for the interface in the IP Address Table section In addition when configuring segmented network interfaces if the source ETERNUS CS800 replication data and management interfaces are on the same subnet you must add a host route on the source ETERNUS CS800 to make sure the replication interface is correctly selected when replicating data to the target ETERNUS CS800 Se...

Page 311: ...nterface The gateway specified in the Routing Details section is for outgoing traffic from the interface Figure 183 Interface Routing Example 1 Example 2 Segments on the Same Subnet and Target on a Different Subnet In the example below see Figure 184 the ETERNUS CS800 has two segmented inter faces one for data and management traffic and one for replication traffic The source ETERNUS CS800 manageme...

Page 312: ...ample you would specify a second set of routing details for the replication interface on the source ETERNUS CS800 Destination Use the IP address of the gateway 192 168 10 1 Dest Netmask Use 255 255 255 255 Dest Gateway Use the replication IP address of the source ETERNUS CS800 192 168 10 100 Figure 184 Interface Routing Example 2 Backpanel Locations The Backpanel Locations section at the bottom of...

Page 313: ...ol NTP server to synchronize the system time with or you can manually enter the date and time V CAUTION Changing the date and time settings requires a system reboot immediately after the changes are applied Wait for at least 15 minutes before logging back in I If you intend to join the ETERNUS CS800 to a Windows network using Active Directory for NAS storage Fujitsu recommends using an NTP Server ...

Page 314: ...work on page 286 Otherwise you must specify the IP address of the timeserver pool Specify a Timeserver or Pool Type the name or IP address of the NTP server or pool See http support ntp org for information about publicly available NTP servers To verify that the ETERNUS CS800 can communicate with the NTP server or pool click Test NTP Manual Date Time Settings Select this option to manually set the ...

Page 315: ...I Passwords The Web CLI Passwords page allows you to change the account passwords for the remote management console Web and the command line interface CLI You can also enable or disable the CLI account The ETERNUS CS800 has two access levels for logging onto the remote management console or the CLI Monitor Allowed to view information on the ETERNUS CS800 remote management console or the CLI but ca...

Page 316: ...assword for Web access see Changing Web Passwords on page 303 Enable or disable CLI access for the administrator or monitor account see Enabling CLI Accounts on page 303 Change the administrator or monitor password for CLI access see Changing CLI Passwords on page 304 Reset the CLI administrator or monitor password to the factory default see Resetting CLI Passwords on page 304 ...

Page 317: ...assword is spcc The default Web Monitor password is password I Passwords are limited to 15 characters All alphanumeric characters are allowed as well as underscores _ and hyphens 2 Click Apply Enabling CLI Accounts The CLI accounts provide access to the ETERNUS CS800 command line interface as an administrator or monitor I For more information about using the CLI see the ETERNUS CS800 S5 Command Li...

Page 318: ... Monitor account is password I Passwords are limited to 15 characters All alphanumeric characters are allowed as well as underscores _ and hyphens 3 Click Apply Resetting CLI Passwords The default password for the CLI Administrator account is spcc The default password for the CLI Monitor account is password To reset the CLI account passwords to their default values 1 Under CLI Administrator Login ...

Page 319: ...n page 306 Enabling SSL SSL Secure Sockets Layer is a protocol that provides security and privacy over the Internet by negotiating encryption keys before transmitting data between a client and a server To establish a secure connection the ETERNUS CS800 must have an encryption key assigned to it by a Certification Authority in the form of a certificate file private key file and pass phrase After yo...

Page 320: ...hentication in addition to encrypted communication To suppress server authentication warnings for the default certificate Internet Explorer If a dialog box displays warning you of a possible certificate error add the IP address for the ETERNUS CS800 to the Trusted Sites list Tools Internet Options Security Trusted Sites If subsequent warning pages display along with an option to close your Web bro...

Page 321: ... Browse to browse the system and locate the SSL certificate file The SSL certif icate file must be named server crt 3 Click Upload 4 Type your SSL private key and press Enter 5 Type your SSL pass phrase and press Enter A Successful Upload page displays stating that the SSL certificate file has been installed on the system 6 Click OK The certificate displays in the Certificate section ...

Page 322: ...ity page click Login Session see Figure 189 Figure 189 Login Session Page To specify the inactivity timeout 1 In the Inactivity Timeout box enter the number of minutes of inactivity before a user is automatically logged off 1 60 minutes 2 Click Apply Security Notice The Security Notice page allows you to specify a message that will appear to all users when logging on to the remote management conso...

Page 323: ... stored user data I Data encryption for stored user data is only available with ETERNUS CS800 Scale models Encrypting data as it is being written to the drive prevents information leakage caused by fraudulent decoding Even if a drive is removed and stolen by malicious third parties data cannot be decoded The encryption function only encrypts the data stored on the drives so server access results i...

Page 324: ... Enable Storage Encryption To enable the Storage Encryption 1 select a encryption type AES or Fujitsu from the pull down list AES Advanced Encryption Standard AES Standard encryption used for infor mation processing by the US federal government is a standardized encryption method The ETERNUS CS800 adopt the AES 128 bit encryption Fujitsu Fujitsu is an encryption method which uses a Fujitsu proprie...

Page 325: ...figuration menu and then click the Notifi cations tab The Notifications page contains the following tabs Email SNMP AIS Connect Email The Email page allows you to specify the Recipients to notify by e mail when adminis tration alerts or service tickets occur You can specify e mail recipients notification levels and information about the e mail server to use You can also configure the receipients f...

Page 326: ...must specify an outgoing e mail server see Server on page 316 To access the Recipients page on the Email page click the Recipients tab see Figure 192 Figure 192 Recipients Page Use the Recipients page to perform the following tasks View information about e mail recipients see Email Recipient List on page 313 Add an e mail recipient see Adding an E mail Recipient on page 313 Edit an e mail recipien...

Page 327: ... Type The types of notifications sent to the recipient High High and Medium or All Notification Status The status of e mail notifications for the recipient Enabled or Disabled Adding an E mail Recipient Add an e mail recipient to send notifications about administration alerts or service tickets to the recipient by e mail To add an e mail recipient 1 Click Add The Add Email Recipient page displays ...

Page 328: ...ot necessarily need to be fixed immediately The operation and performance of the ETERNUS CS800 may be degraded All Send e mail notifications for High Middle and Low service tickets as well as any administration alerts Low service tickets indicate that a minor problem occurred and needs to be resolved but the operation and performance of the ETERNUS CS800 are not significantly affected 3 Select the...

Page 329: ...ecipient High Send e mail notifications for High service tickets High service tickets indicate that a critical problem has occurred and needs to be resolved immediately The operation and performance of the ETERNUS CS800 are degraded and there is a risk of system failure or data loss High and Medium Send e mail notifications for High and Medium service tickets Medium service tickets indicate that a...

Page 330: ...r clear the Enable notification check box to disable sending of notifications to the recipient 4 Click Apply Deleting an E mail Recipient Delete an e mail recipient if you no longer want the ETERNUS CS800 to send e mail notifi cations to the recipient To delete an e mail recipient select the recipient and click Delete I You can select multiple recipients to delete at once Server The Server page al...

Page 331: ...specify at least one DNS IP address on the Network page see Network on page 286 In the From Email Address box enter the return e mail address displayed in e mails sent by the ETERNUS CS800 Specify a return address that lets you easily identify the system that generated the e mail for example systemname any domain com The return address must contain an symbol and a valid domain name including a per...

Page 332: ...s The Email Reports page allows you to specify the e mail recipients for automatically generated reports You can also generate reports on demand The system can generate a report with system status data or with configuration data Each report also includes the system serial number date and time and a message that informs the recipient that the e mail is automated and they should not respond to it I ...

Page 333: ...data reports I To configure the schedule when e mail reports are sent use the Configuration Scheduler page see Scheduling E mail Reports on page 283 To access the Recipients page on the Email Reports page click the Recipients tab see Figure 197 Figure 197 Recipients Page Enter the e mail addresses of up to four recipients in the boxes and then click Apply When the ETERNUS CS800 generates scheduled...

Page 334: ... the On Demand tab see Figure 198 Figure 198 On Demand Page Use the On Demand page to perform the following tasks Manually send a status data or configuration data report see Sending a Report on page 320 View a configuration data report see Viewing Configuration Data on page 321 Sending a Report To manually send a status data or configuration data report 1 Under Email Type select the type of repor...

Page 335: ... a network or communities SNMP compliant devices called agents store data about themselves in Management Information Bases MIBs and return this data to the SNMP requesters You can configure the ETERNUS CS800 to act as an agent and send traps to a specified destination You can also add SNMP community information To access the SNMP page on the Notifications page click the SNMP tab The SNMP page cont...

Page 336: ...ion on page 324 Delete an SNMP destination see Deleting a Destination on page 325 Trap Destination List The Trap Destination List displays the following information about SNMP destinations IP Address The IP address of the destination Name The name of the destination Selected Traps The traps the ETERNUS CS800 sends to the destination Failure Warning Informational Available or Unavailable Adding a D...

Page 337: ... that will receive the traps generated by the ETERNUS CS800 I When entering IP addresses never use an address that is in a reserved IP address range To see a list of reserved IP address ranges click the quick tip icon located near the IP address field I To use hostname format you must specify at least one DNS IP address on the Network page see Network on page 286 Name Enter the name of the destina...

Page 338: ...ailable to an available state Unavailable Sends a trap when the system transitions from an available to an unavailable state 4 Click Apply Editing a Destination Edit an SNMP destination to change the name of the destination or the types of traps the ETERNUS CS800 sends to the destination To edit a destination 1 Click Edit The Edit Trap Destination page displays see Figure 201 Figure 201 Edit Trap ...

Page 339: ...ailable Sends a trap when the system transitions from an unavailable to an available state Unavailable Sends a trap when the system transitions from an available to an unavailable state 4 Click Apply Deleting a Destination Delete an SNMP destination if you no longer want the ETERNUS CS800 to send traps to the destination To delete a destination select the destination and click Delete I You can sel...

Page 340: ...Adding a Community on page 327 Edit an SNMP community see Editing a Community on page 328 Delete an SNMP community see Deleting a Community on page 330 SNMP Community List The SNMP Community List displays the following information about SNMP communities Name The name of the community IP Address The IP address of the community Network Mask The network mask of the community Access Type The access ty...

Page 341: ...e SNMP agent is not accessible To add a community 1 Click Add The Add SNMP Community page displays see Figure 203 Figure 203 Add SNMP Community Page 2 In the Name box enter a unique Name for the community up to 20 characters Valid characters are letters numbers hyphens and underscores 3 Enter a valid IP Address and Network Mask pair A pair is valid if performing a logical bitwise AND operation on ...

Page 342: ...e Community status check box to enable the community Or clear the Community status check box to disable the community 6 Click Apply Editing a Community Edit an SNMP community to change the IP address or access type for the community You can also enable or disable the community To edit a community 1 Click Edit The Edit SNMP Community page displays see Figure 204 IP Address Network Mask Result 10 40...

Page 343: ...he IP address See the table below for examples IP Address Network Mask Result 10 40 166 87 255 255 255 255 Allows access only from 10 40 166 87 10 40 166 87 10 40 166 87 Allows access only from 10 40 166 87 10 40 166 87 10 40 166 0 Invalid because the logical bitwise operation address AND mask is not equal to the address 10 40 166 87 255 255 0 0 Invalid because the logical bitwise operation addres...

Page 344: ...r the community Get Allows SNMP get operations Get Set Allows both SNMP get and put operations 5 Select the Community status check box to enable the community Or clear the Community status check box to disable the community 6 Click Apply Deleting a Community Delete an SNMP community if you no longer want the ETERNUS CS800 to belong to a group of devices that are monitored by a common management st...

Page 345: ...d Infrastructure Solutions Connect has the following functions Call home Provides system monitoring Service tickets which indicate hardware failures are automatically sent to the Fujitsu Service Centre Dial in Provides remote access Allows Fujitsu support specialists to remotely connect to the system Remote access is only possible if it has been enabled on the ETERNUS CS800 system The setup of AIS...

Page 346: ...nternet Please ask your network administrator about what proxy and what proxy authentication to use I To register the ETERNUS CS800 system with the Fujitsu Support Centre please place a service request at the Fujitsu Service Desk http ts fujitsu com support servicedesk html The AISConnect page consists of 4 tabs Proxy Control Remote Access Policies Smart Poll To access the AISConnect page from the...

Page 347: ...e AIS Connect To specify proxy server information 1 AISConnect From the Notifications menu click the AISConnect tab The AISConnect Proxy page displays see Figure 206 Figure 206 AISConnect Proxy 2 Edit the required information see Table 21 for a description of the fields 3 Click Apply I In order to set up the configuration of AISConnect you have to click Apply even if you do not use a Proxy This ac...

Page 348: ...IP address of the HTTP proxy to be used to contact the AIS server at the Fujitsu Service Centre Port Enter the port number of the HTTP proxy Authentication Enabled Activate the checkbox if the HTTP proxy requires authenti cation NTML Authentication Enabled Activate the checkbox if the HTTP proxy requires NTLM NT LAN Manager authentication Username Enter the user name for proxy authentication Passw...

Page 349: ...access policies see Figure 208 Figure 208 AIS Remote Access Policies Remote access policies must be enabled for a Fujitsu support specialist to remotely connect to the system using SSH or HTTP If remote access policies are disabled remote connection using SSH or HTTP is not possible To enable or disable remote access policies 1 From the AISConnect page click the Remote Access Policies tab The Remo...

Page 350: ...ntre This allows a support specialist to remotely access the ETERNUS CS800 to diagnose a problem Figure 209 AIS Smart Poll Page I Activate Smart Poll only if you are instructed to do so by a Fujitsu support specialist To activate Smart Poll 1 From the AISConnect page click the Smart Poll tab 2 When instructed to do so by a Fujitsu support specialist click Smart Poll ...

Page 351: ...contacts To access the Contacts page click the Configuration menu and then click the Contacts tab The Contacts page contains the following tabs Company Primary and Secondary Company The Company page allows you to enter information about the company and location of the ETERNUS CS800 To access the Company page on the Contacts page click the Company tab see Figure 210 Figure 210 Company Page ...

Page 352: ... physical location of the ETERNUS CS800 for example data center Support Contract View or edit the Solution Identifier serial number This number is needed if you contact Fujitsu support See Locating the Serial Number on page 77 in order to get the Solution Identifier Serial Number 2 Click Apply Primary and Secondary The Primary and Secondary pages allow you to enter information about the primary an...

Page 353: ...Configuration Contacts U41840 J Z125 7 76 339 Figure 211 Primary and Secondary Pages ...

Page 354: ...act name Email Address Enter the contact e mail address Phone Enter the contact phone number Fax Enter the contact fax number Pager Enter the contact pager number Street Enter the contact street address City Enter the contact city State Enter the contact state Postal Code Enter the contact postal code Country Enter the contact country 2 Click Apply ...

Page 355: ...page see Scheduling a Share or Partition for Replication on page 281 To limit the amount of network bandwidth used for replication enable a constant throttle see Enabling System Throttling on page 237 or schedule replication throttling see Scheduling Replication Throttling on page 282 Understanding Data Replication During data replication data is sent from one system the source to another system u...

Page 356: ...just as it was at the point in time when the snapshot was created V CAUTION A saved snapshot is necessary to recover your data at a later time For this reason it is not enough to simply enable replication for a share or partition You must also configure a replication schedule recommended or perform manual replication on a regular basis to send snapshots of the share or partition to the target syst...

Page 357: ... access its data Deletions are automatically propagated from the source system to the target system in order to free up space on the target In addition you can manually initiate a synchroni zation from the source system at any time Synchronizing ensures that the contents of the source share or partition are exactly the same as the target share or partition V CAUTION Cartridge barcodes for all sour...

Page 358: ...ediately available see Task Overview Setting Up and Performing Directory File or Cartridge Based Replication on page 345 Recover data from a lost or damaged share or partition see Task Overview Recov ering a Replicated Share or Partition on page 346 Restore a lost or damaged share or partition back to its original location see Task Overview Performing a Share or Partition Failback on page 347 I Th...

Page 359: ...nt to the target system You can use the snapshot to recover the replicated share or partition on the target system see Task Overview Recov ering a Replicated Share or Partition on page 346 or restore the share or partition to its original location on the source system see Task Overview Performing a Share or Partition Failback on page 347 V CAUTION If you do not configure a replication schedule or ...

Page 360: ...n for the new share or partition and specify the Sync ID see Configuring Directory File or Cartridge Based Repli cation on page 351 A file is automatically replicated when it is closed or a period of time after it is modified A cartridge is automatically replicated after it is unmounted After replication the replicated directories and files or cartridges are immediately available on the target sys...

Page 361: ...urce system is now the target and the original target system is now the source Task Overview Performing a Share or Partition Failback If a NAS share or VTL partition is lost or damaged on the source system you can failback the share or partition to the source system using a received snapshot on the target system When you failback a share or partition it is restored on the source system just as it ...

Page 362: ...the Replication menu and then click the Send tab see Figure 212 Figure 212 Replication Send Page Use the Replication Send page to perform the following tasks View replication information for shares or partitions see Replication Jobs List on page 349 Enable or disable replication for a share or partition see Enabling Replication For a Share or Partition on page 350 Configure Directory File or Cartr...

Page 363: ...rtitions in the list If multiple targets are configured for a share or partition click the arrow next to the share or partition to view all targets NAS VTL The name of the share or partition Hold the cursor over the name to display detailed information about the share or partition Replication The replication state On or Off Click the toggle switch to turn replication on or off for the share or par...

Page 364: ...In Progress The replication job is in progress Queued The replication job is queued and will continue when the system is ready Success The replication job was completed successfully Failed The replication job was not completed A synchronization job can have one of the following statuses Queued The synchronization job is queued and will continue when the system is ready Success The synchronization ...

Page 365: ...age 356 If you do not enable scheduled replication replication will only occur if you manually replicate a share or partition see Replicating a Share or Partition on page 353 or if you configure Directory File Based Replication see Configuring Directory File or Cartridge Based Replication on page 351 I Disabling replication for a share or partition does not delete any scheduled replication events ...

Page 366: ...e target system see Configuring a Target Share for Directory File Based Replication on page 368 or Configuring a Target Partition for Cartridge Based Replication on page 381 2 On the source system select the source share or partition and click Configure The Share or Partition Configure window displays see Figure 214 Figure 214 Share or Partition Configure Window 3 If it is not already selected sel...

Page 367: ... V CAUTION Do not replicate a partition containing media in an Exported state To replicate a share or partition 1 Select the share or partition to replicate If multiple targets are configured click the arrow next to the share or partition to display all targets and then select the desired target 2 Click Replicate Now The status of the replication job displays in the Job Status column To cancel the...

Page 368: ...n for Cartridge Based Replication on page 381 To synchronize a share or partition 1 Select the share or partition to synchronize If multiple targets are configured click the arrow next to the share or partition to display all targets and then select the desired target 2 Click Synchronize Now The status of the synchronization job displays in the Job Status column To cancel the synchronization job s...

Page 369: ...omplete for replication of the file directory or cartridge Estimated Duration The estimated time it will take to complete replication for the file directory or cartridge I The estimated duration may display as unknown if replication has been very recently initiated After the system has enough information to calculate a value the estimated duration will display To update the statistics with the lat...

Page 370: ...or replication click Scheduler The Scheduler Calendar windows displays see Figure 216 For details about using the Scheduler Calendar to add or edit a replication schedule see Scheduling a Share or Partition for Replication on page 281 Figure 216 Scheduler Calendar Window Target Systems List The Target Systems list allows you to configure and manage replication targets on the ETERNUS CS800 Click th...

Page 371: ...e the Receive NAS page to perform the following tasks View received snapshots and recover failback or delete snapshots see Received Snapshots on page 357 Manage recovery jobs see Recovery Jobs on page 363 Manage failback jobs see Failback Jobs on page 365 Manage shares configured for Directory File Based Replication see Directory File Based on page 366 Received Snapshots The Received Snapshots pag...

Page 372: ...ilback a share to the source system see Performing a Failback for a Share on page 360 Delete a received snapshot see Deleting a Snapshot on page 363 I The target system will retain up to 10 replication snapshots default setting for each replicated share Once 10 snapshots have been saved the oldest snapshot is deleted to make room for each new snapshot that is received To change the maximum number ...

Page 373: ...information about the most recent replication job I Click a column heading to sort the rows in the table by that column Click the column heading again to reverse the sort order Recovering a Share Recover a NAS share if the source system is unavailable and you need to access the share for example to continue performing backups When you recover a share you select a received snapshot The ETERNUS CS80...

Page 374: ...nal export protocol of the share NFS or CIFS is retained in the recovery process I After you recover a share if you want to continue backing up data to the share you must remap your backup application to point to the target system instead of the source system Performing a Failback for a Share Perform a failback of a NAS share if a source system that was previously unavailable becomes available aga...

Page 375: ...a snapshot to the original source To perform a share failback 1 On the target system select a snapshot in the Snapshots List and click Failback The Failback Target page displays see Figure 219 Figure 219 Failback Target Page 2 Optional In the Failback Destination System box type the hostname or IP address of a new destination system to failback the share to The default destination is the original ...

Page 376: ... performance if your data network is already secured you should clear the Use Encryption check box 4 Click Apply The snapshot is sent to the source system 5 On the source system in the Snapshots List select the snapshot that was sent during the failback operation and click Recover The Recovered Share Name page displays see Figure 218 6 Optional In the Recovered Share Name box type a new name for t...

Page 377: ...share associated with the snapshot see Enabling Replication For a Share or Partition on page 350 On the target system delete the source system associated with the snapshot from the list of allowed replication sources see Deleting a Replication Source on page 240 2 On the target system select a snapshot in the Snapshots List and click Delete I You cannot delete a snapshot if it is the last received...

Page 378: ... created from New Share Name The name of the share the snapshot was recovered to Source System The hostname of the system that the snapshot was received from Started The time the recovery job was started Finished The time the recovery job finished Status The status of the recovery job Success In Progress or Failed To delete information for a recovery job select it in the Snapshot Recovery Jobs lis...

Page 379: ...he Receive NAS page click the Failback Jobs tab see Figure 221 Figure 221 Failback Jobs Page The Snapshot Failback Jobs section displays the following information about failback jobs Share Name The name of the share the snapshot was created from Destination System The hostname of the system that the snapshot was sent to Started The time the failback job was started Finished The time the failback j...

Page 380: ... Jobs section and click Abort Directory File Based The Directory File Based page allows you to manage Directory File Based Replication on the target system You can configure a NAS share to receive Directory File Based Repli cation data sent from a source system and view replication statistics for the share I For information about creating NAS shares see Adding a NAS Share on page 190 To access the...

Page 381: ...ligible to receive Directory File Based data see Shares Eligible to Receive Directory File Based Data on page 368 Configure a share to receive Directory File Based Replication data see Configuring a Target Share for Directory File Based Replication on page 368 View statistics for shares configured for Directory File Based Replication see Unpack Queue on page 370 ...

Page 382: ... the share Access The selected access option for the share Locked or Unlocked I Click the Information button i next to a share to display detailed information about the share and recent replication activity Configuring a Target Share for Directory File Based Replication Configuring a NAS share for Directory File Based Replication enables the automatic repli cation of files and directories on the s...

Page 383: ...check box to disable Directory File Based Replication for the share 3 Enter a Sync ID in the box The Sync ID is used to identify the source share that will send replicated data to the target share The Sync ID must be identical to the Sync ID of the source share on the source system 4 Select an Access option Locked The share is not allowed to receive new Directory File Based Replication data Unlock...

Page 384: ...To view the Unpack Queue select a share and click View Unpack Queue see Figure 224 Figure 224 Unpack Queue The Unpack Queue displays the following information File Directory The file or directory to be replicated State The replication state of the file or directory Click Refresh to update the statistics in the Unpack Queue Click OK to return to the Directory File Based page ...

Page 385: ...L tab Use the Receive VTL page to perform the following tasks View received snapshots and recover failback or delete snapshots see Received Snapshots on page 371 Manage recovery jobs see Recovery Jobs on page 377 Manage failback jobs see Failback Jobs on page 378 Manage partitions configured for Cartridge Based Replication see Cartridge Based on page 380 Received Snapshots The Received Snapshots p...

Page 386: ...ck a partition to the source system see Performing a Failback for a Partition on page 375 Delete a received snapshot see Deleting a Snapshot on page 377 I The target system will retain up to 10 replication snapshots default setting for each replicated partition Once 10 snapshots have been saved the oldest snapshot is deleted to make room for each new snapshot that is received To change the maximum...

Page 387: ...led information about the most recent replication job I Click a column heading to sort the rows in the table by that column Click the column heading again to reverse the sort order Recovering a Partition Recover a VTL partition if the source system is unavailable and you need to access the partition for example to continue performing backups When you recover a partition you select a received snaps...

Page 388: ... to the original partition so that the media is compatible In addition you must map the devices before the VTL partition is accessible If the partition contains media you will only be able to select the highest capacity tape drive for that media type For example if the partition contains SDLT600 tape cartridges you will only be able to select DLT S4 tape drives when mapping devices to the recovere...

Page 389: ...e system you must add the original target system to the list of allowed replication sources see Adding a Replication Source on page 239 This is because during failback the original target is acting as a source when it sends a snapshot to the original source To perform a partition failback 1 On the target system select a snapshot in the Snapshots List and click Failback The Failback Target page dis...

Page 390: ...lback operation and click Recover The Recovered Partition Name page displays see Figure 226 6 Optional In the Recovered Partition Name box type a new name for the recovered partition The default name is the original partition name 7 Click Apply The partition and its cartridges are recovered on the source system All data stored on the partition at the time the snapshot was saved is available After ...

Page 391: ...rtition associated with the snapshot see Enabling Replication For a Share or Partition on page 350 On the target system delete the source system associated with the snapshot from the list of allowed replication sources see Deleting a Replication Source on page 240 2 On the target system select a snapshot in the Snapshots List and click Delete I You cannot delete a snapshot if it is the last receiv...

Page 392: ...ystem The hostname of the system that the snapshot was received from Started The time the recovery job was started Finished The time the recovery job finished Status The status of the recovery job Success In Progress or Failed To delete information for a recovery job select it in the Snapshot Recovery Jobs list and click Delete Job Info Failback Jobs The Failback Jobs page allows you to view infor...

Page 393: ...created from Destination System The hostname of the system that the snapshot was sent to Started The time the failback job was started Finished The time the failback job finished Status The status of the failback job Success In Progress or Failed Use the Failback Jobs page to perform the following tasks To delete information for a failback job select it in the Snapshot Failback Jobs section and cl...

Page 394: ...ion on page 207 To access the Cartridge Based page on the Receive VTL page click the Cartridge Based tab see Figure 230 Figure 230 Cartridge Based Page Use the Cartridge Based page to perform the following tasks View partitions eligible to receive Cartridge Based data see Partitions Eligible to Receive Cartridge Based Data on page 381 Configure a partition to receive Cartridge Based Replication da...

Page 395: ...he partition Access The selected access option for the partition Locked or Unlocked I Click the Information button i next to a partition to display detailed information about the partition and recent replication activity Configuring a Target Partition for Cartridge Based Replication Configuring a VTL partition for Cartridge Based Replication enables the automatic repli cation of cartridges on the ...

Page 396: ...x to disable Cartridge Based Replication for the partition 3 Enter a Sync ID in the box The Sync ID is used to identify the source partition that will send replicated data to the target partition The Sync ID must be identical to the Sync ID of the source partition on the source system 4 Select an Access option Locked The partition is not allowed to receive new Cartridge Based Replication data Unlo...

Page 397: ...lowing information Barcode The barcode of the cartridge to be replicated State The replication state of the cartridge Click Refresh to update the statistics in the Unpack Queue Click OK to return to the Cartridge Based page Actions The Actions page allows you to manage replication activity on the ETERNUS CS800 You can pause the replication service enable the replication state and clear performance...

Page 398: ...e Actions page to perform the following tasks Pause or resume the replication service see Replication Service on page 385 Enable or disable the replication state see Replication State on page 385 Clear cumulative replication statistics see Replication Performance on page 386 ...

Page 399: ...eplication job continues Replication State The replication state applies to all NAS shares or VTL partitions on the ETERNUS CS800 that are eligible for replication that is all deduplicated shares or partitions I The Replication Actions page may appear busy for a few moments when enabling or disabling the replication state Wait for the process to complete before performing other actions Click Enabl...

Page 400: ... click Clear To clear send statistics first select one or more targets to clear statistics for and then click Clear Send This resets cumulative performance statistics gathered while repli cating shares or partitions to the selected target systems or when sending a snapshot during a failback operation To clear receive statistics click Clear Receive This resets cumulative performance statistics gath...

Page 401: ...and then click the Reports tab see Figure 234 Figure 234 Reports Page Use the Reports page to perform the following tasks To generate a new replication report click Generate New To download the most recently generated replication report click Download Current Save the replication report to your local workstation and then unzip the downloaded file The report consists of a ZIP file that contains mul...

Page 402: ...Reports Replication 388 U41840 J Z125 7 76 ...

Page 403: ... the following tabs Hardware Performance Disk Usage VTL OST Status Activity Log Hardware The Hardware page allows you to view information about the hardware components of the ETERNUS CS800 You can view the overall status of the node as well as detailed status information for components such as the system board host bus adapters network ports and storage arrays To access the Hardware page click the...

Page 404: ... page on the Hardware page click the Summary tab see Figure 235 Figure 235 Hardware Summary Page The Hardware Summary page displays the following information Available System Memory RAM The total amount of memory RAM installed in the system Free System Memory RAM The amount of system memory RAM that is currently free State The status of the system Status The overall status of all components in the...

Page 405: ...lick the Details tab Use the Details page to view information for the following components System Board Host Bus Adapters Network Ports Storage Arrays System Board The System Board page allows you to view information reported by the main system board such as temperature voltage fan and power supply information To access the System Board page on the Details page click the System Board tab see Figur...

Page 406: ...Hardware Status 392 U41840 J Z125 7 76 Figure 236 System Board Page ...

Page 407: ...ponent Status The status of the component Normal The component is operating correctly Attention Yellow There is a problem with the component Failed Red The component has failed Host Bus Adapters The Host Bus Adapters page allows you to view information about installed Fibre Channel or SAS cards and their ports To access the Host Bus Adapters page on the Details page click the Host Bus Adapters tab...

Page 408: ...as failed The Fibre Channel Controller SAS HBA section displays the following information about the ports in the selected Fibre Channel or SAS controller Component The number of Fibre Channel port or SAS card Value The throughput capacity of the port if connected Status The status of the Fibre Channel port Up Green The port is connected Down Green The port is not connected Network Ports The Networ...

Page 409: ...alue The speed of the port in Mb s Status The status of the Ethernet port Up Green The port is connected Down Green The port is not connected Storage Arrays The Storage Arrays page allows you to view information about storage arrays and controllers in the ETERNUS CS800 To access the Storage Arrays page on the Details page click the Storage Arrays tab see Figure 239 ...

Page 410: ...t each storage array Component The name of the storage array Click the name of the storage array to view detailed information for the array in the Component section Status The status of the storage array Normal The component is operating correctly Attention Yellow There is a problem with the component Failed Red The component has failed ...

Page 411: ...omponent Normal The component is operating correctly Attention Yellow There is a problem with the component Failed Red The component has failed The subcomponent section displays the following information about the subcomponents in the selected component Component The name of the subcomponent Location The location of the subcomponent within the system Value The value reported by the subcomponent St...

Page 412: ...lick the Status menu and then click the Performance tab The Performance page contains the following tabs Inline Ethernet RAID Fibre Channel CPU Inline The Inline page allows you to view throughput performance for inline data flow Inline data flow includes deduplicated and non deduplicated backup data as well as received repli cation data To access the Inline page on the Performance page click the ...

Page 413: ... inline throughput 0 200 MB s I The range represented by the Y axis changes based on the maximum value increasing in 200 MB increments as needed Each bar on the graph represents approximately 1 minute of time Hold the cursor over a bar to display the value of the bar Ethernet The Ethernet page allows you to view throughput performance for network send and receive activity To access the Ethernet pa...

Page 414: ...h reports data received and the bottom graph reports data sent Select the port to monitor in the Ethernet drop down box or select Avg to display an average of all ports The horizontal axis displays time 0 100 seconds The vertical axis displays data throughput 0 125 MB s Values that exceed the maximum value of the vertical axis are shown in lighter green ...

Page 415: ...ut performance for RAID read and write activity To access the RAID page on the Performance page click the RAID tab see Figure 242 Figure 242 RAID Page Use the RAID page to display recent RAID activity in dynamic graphs The top graph reports data reads and the bottom graph reports data writes The horizontal axis displays time 0 100 seconds The vertical axis displays the amount of data read or writt...

Page 416: ...epresents approximately 1 second of time Hold the cursor over a bar to display the value of the bar Fibre Channel The Fibre Channel page allows you to view throughput performance for Fibre Channel send and receive activity To access the Fibre Channel page on the Performance page click the Fibre Channel tab see Figure 243 Figure 243 Fibre Channel Page ...

Page 417: ...splay an average of all ports The horizontal axis displays time 0 100 seconds The vertical axis displays data throughput 0 500 MB s Values that exceed the maximum value of the vertical axis are shown in lighter green Each bar on the graph represents approximately 1 second of time Hold the cursor over a bar to display the value of the bar CPU The CPU page allows you to view CPU usage To access the ...

Page 418: ...ounts as two threads The horizontal axis displays time 0 100 seconds The vertical axis displays CPU usage 0 100 Each bar on the graph represents approximately 1 second of time Hold the cursor over a bar to display the value of the bar Disk Usage The Disk Usage page allows you to view information about free and used disk space on the system You can also view data reduction statistics To access the ...

Page 419: ...Status Disk Usage U41840 J Z125 7 76 405 Figure 245 Disk Usage Page Use the Disk Usage page to view the following information Available Used Data Before Reduction Data After Reduction ...

Page 420: ...pace is divided into the following categories I The value for each category is displayed as an amount and as a percentage of the total capacity in the system Deduplicated Data The amount of data that has been deduplicated Data Not Intended For Deduplication The amount of data that will not be dedupli cated data on shares or partitions that do not have deduplication enabled System Metadata The amou...

Page 421: ...ta reduction performance for the system Data reduction is divided into the following categories Data Size Before Reduction The original native size of all data that has been processed by the data deduplication and compression engines Data Size After Reduction The final reduced size of all data that has been processed by the data deduplication and compression engines Total Reduction Ratio The total...

Page 422: ...t creating VTLs see Adding a VTL Partition on page 207 To access the VTL page click the Status menu and then click the VTL tab The VTL page contains the following tabs Physical View Logical View Performance View Physical View The Physical View page allows you to view a physical representation of the virtual compo nents in a VTL You can view information about virtual tapes drives storage slots and ...

Page 423: ...t the information to display Select the VTL to display in the Partition drop down box Click Hide Drives or Show Drives to hide or show the virtual tape drives in the VTL see Tape Drives on page 410 Click Hide Storage Slots or Show Storage Slots to hide or show the virtual storage slots in the VTL see Storage and I E Slots on page 410 ...

Page 424: ...tridge WP The write protect status of the cartridge Capacity The capacity of the cartridge Used The amount of space on the cartridge currently used to store data Used Percent The amount of currently used space on the cartridge expressed as a percentage of the total capacity Used Capacity x 100 V CAUTION The Used value is not updated while the media is mounted Because of this the displayed Used val...

Page 425: ...ber of virtual tape drives in the partition Capacity The storage capacity of the partition Used The amount of space on all cartridges in the partition currently used to store data Used Percent The amount of currently used space on all cartridges in the partition expressed as a percentage of the total capacity Used Capacity x 100 V CAUTION The Used value is not updated while the media is mounted Be...

Page 426: ...se the Performance View page to view information about the throughput of VTL parti tions You can also view performance for virtual tape drives To access the Performance View page on the VTL page click the Performance View tab see Figure 248 Figure 248 Logical View Page The Partition Throughput section displays the following information about VTL partitions ...

Page 427: ... a partition to display detailed information about the partition Click a tape drive to view detailed information about the drive OST Status Use the OST Status page to view statistics for OST optimized duplication and Accent activity that occurred in the previous minute I ETERNUS CS800 Accent statistics display only if Accent is currently enabled or was previously enabled see ETERNUS CS800 Accent o...

Page 428: ...Accent Media Server The IP address of the media server Inline The inline data flow throughput in MB s Inline data flow represents the original native size of the data protected by the system Ethernet In The amount of data received by all Ethernet ports in MB s This amount represents the reduced size of the data protected by the system after deduplication and compression on the media server Bandwid...

Page 429: ...nloading the Activity Log on page 417 Viewing Logged Activities The Administrative Activity Log list displays the following information for each entry User The user that performed the activity Administrator Monitor Service Engineering cliadmin or root Date Time The date and time the activity was performed Origin The interface where the activity originated Possible origins are the GUI remote manage...

Page 430: ...t or right To show or hide columns click the arrow to the right of a column heading In the pop up menu point to Columns then select the name of a column to show or hide it Navigating in the Activity Log Use the controls at the bottom of the Administrative Activity Log list to adjust the activity log view see Figure 251 To navigate between pages in the list use the left and right arrows To view a s...

Page 431: ...vity Log View Controls Deleting Logged Activities Use the toolbar above the Administrative Activity Log list to delete one or more entries in the activity log see Figure 252 To delete a log entry select the entry and click Delete To delete all entries in the activity log click Delete All Downloading the Activity Log Use the toolbar above the Administrative Activity Log list to save the activity lo...

Page 432: ...Activity Log Status 418 U41840 J Z125 7 76 ...

Page 433: ...ickets Admin Alerts The Admin Alerts page allows you to view and work with administration alerts The ETERNUS CS800 generates an administration alert when the condition of the system has changed such as going from the offline state to the online state I In addition to viewing administration alerts on the Admin Alerts page you can configure the system to send alerts to an e mail address see Recipien...

Page 434: ...ry section To delete an administration alert select it and click Delete I You can select multiple recipients to delete at once Service Tickets The ETERNUS CS800 has the capability to automatically detect and resolve problems encountered by the system during operation If a problem cannot be resolved automatically and requires user intervention or servicing the system generates a service ticket A se...

Page 435: ...ed immediately The operation and performance of the ETERNUS CS800 are degraded and there is a risk of system failure or data loss Recommended Actions If appropriate a service ticket includes recommended actions The recommended actions provide instructions for resolving the problem that caused the system to generate the ticket Perform the recommended actions to try to resolve the problem before con...

Page 436: ...ket Close All Click to close all open service tickets Show Tickets Select an option to display Open tickets Closed tickets or All tickets Get individual ticket To display a specific ticket in the list enter a ticket number and click Apply I Click a column heading to sort the rows in the table by that column Click the column heading again to reverse the sort order Use the Service Tickets page to pe...

Page 437: ...he ticket and to view recommended actions To view a service ticket 1 In the list of service tickets click the ticket number The Ticket Details section at the bottom of the page displays information about the service ticket including the time the ticket was opened and closed the ticket status and detailed information about the problem see Figure 255 I The time indicated in the service ticket may no...

Page 438: ... 256 Recommended Actions Modifying a Service Ticket Modify a service ticket to add additional information to the ticket for example trouble shooting steps you have taken or a record of calls made to Fujitsu customer support The additional information is saved with the service ticket and remains associated with the ticket even after it is closed To modify a service ticket 1 In the list of service t...

Page 439: ...Alerts Service Tickets U41840 J Z125 7 76 425 Figure 257 Ticket Analysis 3 In the Analysis Information box enter all relevant information about actions taken to resolve the issue 4 Click Apply ...

Page 440: ...il server see Server on page 316 To send a service ticket 1 In the list of service tickets click the ticket number 2 Click Email at the bottom of the page The Email Ticket Information section displays at the bottom of the page see Figure 258 Figure 258 Email Ticket Information 3 In the Email Recipient box enter the e mail address where you want to send the ticket details 4 Optional In the Comment ...

Page 441: ... I You can still view and modify a ticket after it has been closed To close all service tickets that are currently open below the list of service tickets click Close All To close a single service ticket 1 In the list of service tickets click the ticket number 2 Click Analysis at the bottom of the page The Ticket Analysis section displays at the bottom of the page see Figure 257 3 Select the Close ...

Page 442: ...Service Tickets Alerts 428 U41840 J Z125 7 76 ...

Page 443: ...gnostics The Diagnostics page allows you to generate and download diagnostic files You can also perform healthchecks to verify the health and integrity of the data deduplication blockpool The diagnostic files are helpful when troubleshooting problems on the ETERNUS CS800 Generate and download the diagnostic files before contacting Fujitsu customer support To access the Diagnostics page click the U...

Page 444: ...fter the file finishes generating refresh the Web browser to enable the Download Current button 3 To download the generated diagnostics file click Download Current A dialog box displays asking if you want to open or save the file 4 Click Save or OK to download the file Storage Array Diag File The Storage Array Diag File page allows you to generate and download a storage array diagnostics file This...

Page 445: ...e click Download Current A dialog box displays asking if you want to open or save the file 4 Click Save or OK to download the file Healthchecks The Healthchecks page allows you to perform tests that verify the health and integrity of the data deduplication blockpool You can also configure the ETERNUS CS800 to automat ically run the healthchecks at specified intervals I To configure the ETERNUS CS8...

Page 446: ... 433 To access the General page on the Healthchecks page click the General tab see Figure 261 Figure 261 General Page The General page displays the following information about the most recently run health checks Status The status of the healthchecks In Progress Success Failed or Inter rupted Progress The percentage complete of the healthchecks Start Time The time the healthchecks started End Time ...

Page 447: ...and the data tags in the blockpool are correctly in sync Integrity Checks the integrity of data in the blockpool This healthcheck examines a sample of data tags in the blockpool and verifies that the data has been properly stored without errors or corruption To access the Status page on the Healthchecks page click the Status tab see Figure 262 Figure 262 Status Page The Status page displays the fo...

Page 448: ...s see Figure 263 Figure 263 Edit Healthcheck Page 2 Select the check box to enable the healthcheck Or clear the check box to disable the healthcheck 3 Click Apply I When healthchecks are run manually or scheduled only enabled healthchecks are run V CAUTION If a healthcheck fails when it is run there may be a problem in the blockpool that could cause replication or restore operations to fail Contac...

Page 449: ...e network performance by measuring network throughput between the ETERNUS CS800 and another system such as another ETERNUS CS800 To access the Network Analyzer page on the Analyzer page click the Network tab The Network Analyzer page contains the following tabs Performance Settings Performance The Performance page allows you to perform network analysis with another system the target You can also v...

Page 450: ...on page 436 2 Click Start The throughput result is displayed under Result From Last Run in MB s I It takes approximately 5 seconds to refresh the results Settings The Settings page allows you to enable or disable NetServer on the ETERNUS CS800 NetServer must be enabled on the target system to perform network analysis with the system see Performance on page 435 To access the Settings page on the Ne...

Page 451: ...erver Or select Disable NetServer to disable NetServer 2 Click Apply I You should disable NetServer on the target system when you are done analyzing network performance Disk The Disk Analyzer page allows you to analyze disk performance by measuring disk read and write throughput To access the Disk Analyzer page on the Analyzer page click the Disk tab see Figure 266 ...

Page 452: ...ce reclamation activity on the ETERNUS CS800 You can start space reclamation You can also monitor the progress of space reclamation activity During space reclamation the ETERNUS CS800 searches the blockpool for tags that are no longer referenced and then deletes the unneeded tags to free up space V CAUTION Space reclamation may affect system performance Avoid running space reclamation during known...

Page 453: ...on is automatically started to free up disk space In this case all four stages of space reclamation are run I The blockpool automatically reuses free bytes when ingesting data To access the Space Reclamation page click the Utilities menu and then click the Space Reclamation tab see Figure 267 Figure 267 Space Reclamation Page The Space Reclamation page displays the following information about the ...

Page 454: ...n Interrupted Space reclamation was interrupted and must be restarted Reclamation Interrupted by User Space reclamation was interrupted by a user and must be restarted Reclamation Interrupted Error Encountered Space reclamation was interrupted because an error was encountered and must be restarted Reclamation Interrupt by User Cannot be interrupted at this time Because the system is in a Low Space...

Page 455: ... from the disk drives and is overwritten with random patterns While secure shred is running the ETERNUS CS800 operates in limited mode This means you cannot perform backups or restores all scheduled jobs including replication jobs are stopped and you cannot access or use any other features of the ETERNUS CS800 If necessary you can cancel secure shred at any time and return the ETERNUS CS800 to nor...

Page 456: ...cation and backup jobs are completed see Replication on page 341 4 On the Secure Shred page click Start Shred A warning message displays 5 Click Yes The system reboots and begins the secure shred process This process can take multiple days to complete 6 To check the status of secure shred log onto the ETERNUS CS800 to view the limited Secure Shred Mode interface see Figure 269 The Secure File Shre...

Page 457: ...U41840 J Z125 7 76 443 Figure 269 Secure Shred Mode Interface 7 Click Reboot to finalize the secure shred process and reboot the ETERNUS CS800 After the ETERNUS CS800 finishes rebooting you can resume normal system operation ...

Page 458: ... Software Image page allows you to upload a software image to update the software on the ETERNUS CS800 Before you begin download the software image on a computer connected to the Internet and then copy the software image fw file to the computer you will use to access the ETERNUS CS800 remote management console To access the Software Upgrade page click the Utilities menu and then click the Software...

Page 459: ...cking process is complete An Information message displays stating the software image was uploaded successfully 4 Click OK 5 Click Install I If necessary click the link to delete any outstanding administration alerts before proceeding The Software Upgrade Utility displays see Figure 271 Figure 271 Software Upgrade Utility Software Image Uploaded ...

Page 460: ...le on page 429 The system diagnostics file can help in resolving problems if they occur 7 After you have completed all pre flight checks confirm that you are ready to continue by selecting the Confirmation check box 8 To begin the upgrade process click Install Read the onscreen information to learn what to expect during the upgrade The bottom status bar displays installation progress and a message...

Page 461: ...Action select an option Reboot Reboots the ETERNUS CS800 Rebooting the system closes the Web browser connection You must log on again after the system has rebooted Shutdown Shuts down the ETERNUS CS800 Reset from diagnostic state Only available when the system is in degraded mode Restarts the services on the ETERNUS CS800 without rebooting the system 2 Click Apply I Shutting down the system can ta...

Page 462: ...Reboot Shutdown Utilities 448 U41840 J Z125 7 76 ...

Page 463: ... Reporting To maintain system health and help you identify and correct problems that occur the ETERNUS CS800 constantly performs the following actions Monitors the system software and hardware components Detects system problems Attempts to isolate each problem to a specific field replaceable component Attempts to recover from the problem Logs the problem If the problem requires service the system ...

Page 464: ...roblem in an existing service ticket associated with the component To access the Service Tickets page click the Alerts menu and then click the Service Tickets tab For more information about working with service tickets see Service Tickets on page 420 Checking Hardware Status The Hardware page allows you to view information about the hardware components of the ETERNUS CS800 You can view the overall...

Page 465: ...tion Problems Temperature Problems Start up Problems Table 22 describes problems that can occur during system start up Table 22 Start up Problems Problem Corrective Action FATAL ERROR Unable to start SNFS Message displays Contact your Fujitsu Customer Support representative see Support and Help on page 18 FATAL ERROR Unable to start blockpool Message displays Contact your Fujitsu Customer Support ...

Page 466: ...tsu Customer Support representative to arrange for service see Support and Help on page 18 One fan is not operating Determine which fan has failed by reading the service ticket generated by the system Contact your Fujitsu Customer Support representative to arrange for service see Support and Help on page 18 Multiple fans are not operating V CAUTION Turn the system off immediately The system will o...

Page 467: ...epartment see Support and Help on page 18 ETERNUS CS800 system is not visible on the Ethernet network Try to ping the ETERNUS CS800 system IP address from a host on the same network If the ping reports round trip times the ETERNUS CS800 system is active If not check the cables switches or hubs for damaged compo nents If everything checks out contact the Fujitsu Customer Support department see Supp...

Page 468: ...s generated on the Replication Events page They system will continue the repli cation when you click Resume Replication was disabled while a replication was in process and the replication completed If you click Disable during a replication in process the system will complete the entire replication and then disable replication on the system The system will be unable to replicate until you click Ena...

Page 469: ...the ambient temperature of the room containing the ETERNUS CS800 system to verify that the temperature falls within the specified range 2 Inspect for adequate air circulation inside the rack Some racks may provide additional fans to improve air circulations Check the fan for proper operation Clean or replace any air filter as necessary 3 If a component reports a temperature problem verify that the...

Page 470: ...Common Problems and Solutions Troubleshooting 456 U41840 J Z125 7 76 ...

Page 471: ...ustomer The CRUs are hot plug components which can be expanded or replaced during operation The hot plug procedure increases the availability of system operation and guarantees a high degree of data integrity and failsafe performance I Please note that unauthorized interference with the system will void the warranty and exempt the manufacturer from all liability V CAUTION Follow the safety instruc...

Page 472: ... Hardware Server PRIMERGY RX300 S7 S8 Replacing PSU modules 1 Removing the defective PSU module Figure 290 Removing the PSU Press in on the green locking latch 1 Fold up the handle on the PSU module 2 While keeping the green locking latch pressed pull the PSU module out of its slot 3 2 Installing the new PSU module ...

Page 473: ... during transportation If applicable fold down the handle on the PSU module 3 Connecting the server to the mains In its basic configuration level the server has a hot plug power supply unit A second hot plug power supply unit can be added to ensure a redundant power supply If one power supply unit is defective the other then guarantees unimpaired operation Each hot plug power supply unit can be re...

Page 474: ...25 7 76 Connect the power cord to the power supply unit 1 Connect the mains plug to a grounded mains outlet in the in house power supply network or a power outlet of the rack socket strip 2 see also PRIMECENTER Rack System assembly guide Figure 292 Connecting the Server to the Mains Server ...

Page 475: ...le clamp 1 Pull the cable clamp up 2 Press the cable clamp down until it engages to secure the cable 3 Hard Disk Drive The hard disk drives which can be ordered for the ETERNUS CS800 server are supplied already mounted in an installation frame so that defective hard disk drives can be replaced during operation The hard disk drive and installation frame together make up the HDD module ...

Page 476: ...ms occurring Only store and transport HDD modules within the limits stipulated in the specification When transporting HDD modules even over short distances always use the original packaging ESD label Never expose HDD modules to a temperature shock Avoid the formation of conden sation inside and on the outside of the hard disk drive V CAUTION The HDD module must be acclimatized in its operating env...

Page 477: ... HDD Numbering For the numbering of the HDD slots see Figure 295 Note that this is the numbering used by the CS800 software e g in Tickets and at the Storage Array Status page of the Remote Management Console Figure 295 2 5 inch HDD Numbering Temperature Difference C Operating Environment Outside Minimum Acclimatization Time Hours 5 3 10 5 15 7 20 8 25 9 30 10 Table 26 Acclimatization Times for HD...

Page 478: ...HDD Module 1 Release the locking mechanism by pressing the locking button 1 2 Push the handle of the HDD module fully in the direction of the arrow 2 The HDD module is now unlocked 3 Wait about 30 seconds to allow the hard disk drive to spin down 4 Pull the HDD module completely out of its bay see Figure 298 Figure 297 Disconnecting a 2 5 inch HDD 1 1 2 ...

Page 479: ... 2 5 inch HDD 1 Unlock the HDD module as described above 2 Insert the HDD module into a drive bay and carefully push back as far as it will go 1 3 Close the locking lever to lock the hard disk drive in place 2 4 If the status of the HDD remains unknown after rebuild has finished contact Fujitsu Customer Support see Support and Help on page 18 ...

Page 480: ...efective HDD Modules V CAUTION If you need to remove non defective HDD modules consider the following Do never remove a non defective HDD module during operation of the ETERNUS CS800 All HDD modules drives must be uniquely identified so that they can be reinstalled in their original mounting locations later If this is not done existing data can be lost ...

Page 481: ...e JX40 storage module is a 2 5 NL SAS HDD with 7200 rpm Removing 1 Press the latch of the disk drive and open the lock lever 1 see Figure 300 2 Hold the lock lever and pull the disk drive partway 3 Take the hard disk drive out of the bay while supporting its bottom 2 Figure 300 Removing Installing hard disk drive Installing 1 Insert the HDD module into a drive bay and carefully push back as far as...

Page 482: ...ce work should be finished within 5 minutes for preventing temper ature rise I This component can be replaced during operation of the system Hot Maintenance The component cannot be replaced when the system is powered off When replacing the HDD unit it is possible that the error log will display multiple errors due to a temporary disarray of the transmission route within the separation connection o...

Page 483: ... a 3 5 inch HDD module 2 While pressing down on the locking button 1 fold up the lever 2 I Thereby the HDD module is pushed out of its drive bay by about 1 cm and disconnected from the SAS SATA backplane 3 Wait about 30 seconds to allow the hard disk drive to spin down 4 Pull the HDD module completely out of its bay ...

Page 484: ...t Procedures for CRUs 516 U41840 J Z125 7 76 Installing Figure 303 Inserting the 3 5 inch HDD module 1 Insert the HDD module into a drive bay and carefully push back as far as it will go 1 2 Close the locking lever to lock the hard disk drive in place 2 ...

Page 485: ...ing with 4TB To enhance the capacity from 4TB to 8TB six additional 2 5 1TB SATA 7 200 rpm hard disks must be added to the bays 11 to 16 of the server Figure 394 Disk bays in server used for storage expansion from 4TB to 8TB or more Proceed as follows 1 Starting with slot 11 see Figure 394 replace the six blank inserts one after the other by 2 5 1TB SATA 7 200 rpm hard disks V CAUTION If the syste...

Page 486: ...hin the ETERNUS CS800 S5 System on page 92 2 If the ETERNUS JX40 storage module is not already connected to the server Connect it to SAS RAID controller in PCI slot 2 of the server see section Entry Connecting JX40 and server on page 95 3 If the disks are not already inserted to the ETERNUS JX40 Starting with the leftmost unused bay from the left to the right replace the blank inserts one after th...

Page 487: ...m Figure 396 Mounting Positions in the Rack Scale Storage Modules Denotation DX80 base CE 1 DX80 expansion module on the DX80 base DE 1 2 DX80 expansion module on the DX80 base DE 2 3 DX80 expansion module on the DX80 base DE 3 4 DX80 expansion module on the DX80 base DE 4 Scale Variant 1 Scale Variant 2 Storage base CE Storage Expansion DE 1 Storage Expansion DE 2 Storage base CE Storage Expansio...

Page 488: ...cribed below and let the ETERNUS CS800 S5 software perform all steps necessary W WARNING DO NOT run the Add new enclosure function provided by the ETERNUS DX80 S2 Procedure for Installing and Commissioning New Expansion Modules If there is enough space in the rack for the new expansion modules and the existing modules have not to be rearranged in the rack proceed as follows 1 Shutdown the server v...

Page 489: ...t a power cord to each power supply of the new storage expansion module I It is recommended to connect each power cord two per module to a separate AC circuit in order to ensure system availability in case of a power failure 5 Turn on both PSU switches of the module and wait until the STS aka READY FAULT LED of both CMs glows green 6 If further modules should be integrated repeat the steps 3 to 5 ...

Page 490: ...les and power cords as shown by Figure 396 b Turn on the PSU switches at the rear of these storages modules c Check that the LINE LEDs of all connected storage expansion modules are green d Power on the storage base module by pressing its power ON OFF button e Wait until the READY LED of the storage base module glows green EPROM two minutes 6 Connect a new storage expansion module only one at a ti...

Page 491: ... ETERNUS CS800 S5 product The characteristics and specifications are categorized as follows System Related Specifications Additional Specifications for Entry Model Additional Specifications for Scale Mode System Related Specifications The following tables provide characteristics of the ETERNUS CS800 S5 system ...

Page 492: ...ity and value Optionally shares or partitions without deduplication enabled can be used to store data not suitable for deduplication Replication Support for remote replication Replication is asynchronous one to one or multiple to one configurations shares in the same unit act as replication source or target units with shares acting as replication targets can also support local backup Usable Capaci...

Page 493: ...rt either PTT or VTL target Fibre Channel to VTL Target Physical Characteristics Height Entry 2 HU 4 HU 8 9 cm 17 8 cm Scale 4 HU 22 HU 17 8 cm 97 8 cm Width side to side 48 26 cm Depth front to back 77 cm Weight stand alone Entry system 25 kg 60 kg Scale system 60 375 kg Power Requirements Voltage AC 100 120 V 200 240 V Frequency 50 Hz 60 Hz Power Consumption Min 160 W max 6390 W Power Phases Dua...

Page 494: ...HS compliant Restriction of Hazardous Substances WEEE compliant Waste Electrical and Electronically Equipment Compliance Notes There is general compliance with the safety requirements of all European countries and North America National approvals required in order to satisfy statutory regulations or for other reasons can be applied for on request Compliance Link http globalsp ts fujitsu com sites ...

Page 495: ...sks 7 200 rpm Interface to Server SAS RAID Level 1 to 4 x RAID 6 4 2 Selected Server Specifications for Scale Weight Approx 25 kg Disks 16 2 5 900 GB SAS hard disks 10 000 rpm including 2 Hot Spare Interface to DX80 S2 Storage Base Module 2 x 8 GbFC Service Port 1 GbE iRMC Port Console Device 1 GbE Internal RAID Controller LSI GEN 3 SAS 6G RAID Level RAID 1 1 1 for Operating System RAID 1 1 1 for ...

Page 496: ...Additional Specifications for Scale Mode System Specifications S5 626 U41840 J Z125 7 76 ...

Page 497: ...nt traffic 22 SSH 80 HTTP 161 SNMP 162 SNMP trap 443 HTTPS 1311 OpenManage 8406 HTTP jettyd 8407 HTTP thriftd TCP ports opened for replication traffic 22 Replication 80 Replication OST 1062 Replication OST UDP ports opened for data traffic 111 RPC portmap 628 NFS statd 682 NFS rquotad 880 NFS mountd 2049 NFS nfsd 10000 NDMP 32000 NFS lockd TCP ports opened for data traffic 111 RPC portmap ...

Page 498: ...wall Environments 640 U41840 J Z125 7 76 139 CIFS 445 CIFS 628 NFS statd 682 NFS rquotad 880 NFS mountd 2049 NFS nfsd 3095 OST 3096 OST 3097 OST 3098 OST 3099 OST 3100 OST 3101 OST 3102 OST 10000 NDMP 10001 OST 10002 OST 32000 NFS lockd ...

Page 499: ... and the additional packages listed here ETERNUS CS800 Component Open Source License Agreement Apache Portable Runtime Apache License Version 2 0 with others APL Exhibit 1 AS3 Commons Lang Apache License Version 2 0 AS3 Commons Reflect Apache License Version 2 0 bwm ng GNU General Public License version 2 Bloom Filter Eclipse Public License Version 1 0 Cairngorm BSD Exhibit 3 Castor Apache License...

Page 500: ...neral Public License version 2 makedumpfile GNU General Public License version 2 mdadm GNU General Public License version 2 Mimepull Common Development And Distribution License Open SSL Open SSL License Perl DBD SQLite 1 31 Perl DBD SQLite 1 31 1 of e15 procps GNU Lesser General Public License version 2 1 Python 2 4 3 Python 2 4 3 License raphaeljs The MIT License samba3 GNU GENERAL PUBLIC LICENSE...

Page 501: ...d by or are under common control with that entity For the purposes of this definition control means i the power direct or indirect to cause the direction or management of such entity whether by contract or otherwise or ii ownership of fifty percent 50 or more of the outstanding shares or iii beneficial ownership of such entity You or Your shall mean an individual or Legal Entity exercising permiss...

Page 502: ...he Work by the copyright owner or by an individual or Legal Entity authorized to submit on behalf of the copyright owner For the purposes of this definition submitted means any form of electronic verbal or written communication sent to the Licensor or its representatives including but not limited to communication on electronic mailing lists source code control systems and issue tracking systems th...

Page 503: ... is filed 4 Redistribution You may reproduce and distribute copies of the Work or Derivative Works thereof in any medium with or without modifications and in Source or Object form provided that You meet the following conditions a You must give any other recipients of the Work or Derivative Works a copy of this License and b You must cause any modified files to carry prominent notices stating that ...

Page 504: ...erms and conditions of this License without any additional terms or conditions Notwithstanding the above nothing herein shall supersede or modify the terms of any separate license agreement you may have executed with Licensor regarding such Contributions 6 Trademarks This License does not grant permission to use the trade names trademarks service marks or product names of the Licensor except as re...

Page 505: ... accepting such obligations You may act only on Your own behalf and on Your sole responsibility not on behalf of any other Contributor and only if You agree to indemnify defend and hold each Contributor harmless for any liability incurred by or claims asserted against such Contributor by reason of your accepting any such warranty or additional liability END OF TERMS AND CONDITIONS APPENDIX How to ...

Page 506: ... of the source code for the these subcomponents is subject to the terms and conditions of the following licenses From strings apr_fnmatch c include apr_fnmatch h misc unix getopt c file_io unix mktemp c strings apr_strings c Copyright c 1987 1993 1994 The Regents of the University of California All rights reserved Redistribution and use in source and binary forms with or without modification are p...

Page 507: ...OSE ARE DISCLAIMED IN NO EVENT SHALL THE REGENTS OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT INDIRECT INCIDENTAL SPECIAL EXEMPLARY OR CONSEQUENTIAL DAMAGES INCLUDING BUT NOT LIMITED TO PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES LOSS OF USE DATA OR PROFITS OR BUSINESS INTERRUPTION HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY WHETHER IN CONTRACT STRICT LIABILITY OR TORT INCLUDING NEGLIGENCE OR OTHERW...

Page 508: ...ed on libdl dlfcn c dlfcn h which is Copyright c 1992 1993 1995 1996 1997 1988 Jens Uwe Mager Helios Software GmbH Hannover Germany Not derived from licensed software Permission is granted to freely use copy modify and redistribute this software provided that the author is not construed to be liable for any results of using the software alterations are clearly marked as such and this notice is not...

Page 509: ...nted as being the original software 3 This notice may not be removed or altered from any source distribution From strings apr_snprintf c cvt IEEE floating point formatting routines Derived from UNIX V7 Copyright C Caldera International Inc Copyright C Caldera International Inc 2001 2002 All rights reserved Redistribution and use in source and binary forms with or without modification are permitted...

Page 510: ... THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED IN NO EVENT SHALL CALDERA INTERNATIONAL INC BE LIABLE FOR ANY DIRECT INDIRECT INCIDENTAL SPECIAL EXEMPLARY OR CONSEQUENTIAL DAMAGES INCLUDING BUT NOT LIMITED TO PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES LOSS OF USE DATA OR PROFITS OR BUSINESS INTERRUPTION HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY W...

Page 511: ...permission please contact apache apache org 5 Products derived from this software may not be called Apache nor may Apache appear in their name without prior written permission of the Apache Software Foundation THIS SOFTWARE IS PROVIDED AS IS AND ANY EXPRESSED OR IMPLIED WARRANTIES INCLUDING BUT NOT LIMITED TO THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLA...

Page 512: ...rolled by or are under common control with that entity For the purposes of this definition control means i the power direct or indirect to cause the direction or management of such entity whether by contract or otherwise or ii ownership of fifty percent 50 or more of the outstanding shares or iii beneficial ownership of such entity You or Your shall mean an individual or Legal Entity exercising pe...

Page 513: ...on in the Work by the copyright owner or by an individual or Legal Entity authorized to submit on behalf of the copyright owner For the purposes of this definition submitted means any form of electronic verbal or written communication sent to the Licensor or its representatives including but not limited to communication on electronic mailing lists source code control systems and issue tracking sys...

Page 514: ...difications and in Source or Object form provided that You meet the following conditions a You must give any other recipients of the Work or Derivative Works a copy of this License and b You must cause any modified files to carry prominent notices stating that You changed the files and c You must retain in the Source form of any Derivative Works that You distribute all copyright patent trademark a...

Page 515: ...names trademarks service marks or product names of the Licensor except as required for reasonable and customary use in describing the origin of the Work and reproducing the content of the NOTICE file 7 Disclaimer of Warranty Unless required by applicable law or agreed to in writing Licensor provides the Work and each Contributor provides its Contributions on an AS IS BASIS WITHOUT WARRANTIES OR CO...

Page 516: ...utor harmless for any liability incurred by or claims asserted against such Contributor by reason of your accepting any such warranty or additional liability END OF TERMS AND CONDITIONS APPENDIX How to apply the Apache License to your work To apply the Apache License to your work attach the following boilerplate notice with the fields enclosed by brackets replaced with your own identifying informa...

Page 517: ... shall prevail COPYRIGHT NOTICE DISCLAIMER and LICENSE If you modify libpng you may insert additional notices immediately following this sentence libpng versions 1 2 6 August 15 2004 through 1 2 37 June 4 2009 are Copyright c 2004 2006 2009 Glenn Randers Pehrson and are distributed according to the same disclaimer and license as libpng 1 2 5 with the following individual added to the list of Contr...

Page 518: ...are distributed according to the same disclaimer and license as libpng 0 96 with the following individuals added to the list of Contributing Authors Tom Lane Glenn Randers Pehrson Willem van Schaik libpng versions 0 89 June 1996 through 0 96 May 1997 are Copyright c 1996 1997 Andreas Dilger Distributed according to the same disclaimer and license as libpng 0 88 with the following individuals added...

Page 519: ...ion is hereby granted to use copy modify and distribute this source code or portions hereof for any purpose without fee subject to the following restrictions 1 The origin of this source code must not be misrepresented 2 Altered versions must be plainly marked as such and must not be misrepresented as being the original source 3 This Copyright notice may not be removed or altered from any source or...

Page 520: ... ballen at gravity dot phys dot uwm dot edu Peter Allworth linsol at zeta dot org dot au James Bottomley jejb at parisc linux dot org Lars Marowsky Bree lmb at suse dot de Kurt Garloff garloff at suse dot de Grant Grundler grundler at parisc linux dot org Christophe Varoqui christophe dot varoqui at free dot fr Michael Weller eowmob at exp math dot uni essen dot de Eric Youngdale eric at andante d...

Page 521: ...stributions of source code must retain the above copyright notice this list of conditions and the following disclaimer 2 Redistributions in binary form must reproduce the above copyright notice this list of conditions and the following disclaimer in the documentation and or other materials provided with the distribution 3 The name of the author may not be used to endorse or promote products derive...

Page 522: ...aimer in the documentation and or other materials provided with the distribution Neither the name of Adobe Systems Incorporated nor the names of its contributors may be used to en dorse or promote products derived from this software without specific prior written permission THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS AS IS AND ANY EXPRESS OR IMPLIED WARRANTIES INCLUDING BUT...

Page 523: ...loper means the individual or entity that first makes Original Software available under this License 1 6 Larger Work means a work which combines Covered Software or portions thereof with code not governed by the terms of this License 1 7 License means this document 1 8 Licensable means having the right to grant to the maximum extent possible whether at the time of the initial grant or subsequently...

Page 524: ...r Grant Conditioned upon Your compliance with Section 3 1 below and subject to third party intellectual property claims the Initial Developer hereby grants You a world wide royalty free non exclusive license a under intellectual property rights other than patent or trademark Licensable by Initial Developer to use reproduce modify display perform sublicense and distribute the Original Software or p...

Page 525: ...ses granted in Sections 2 2 a and 2 2 b are effective on the date Contributor first distributes or otherwise makes the Modifications available to a third party d Notwithstanding Section 2 2 b above no patent license is granted 1 for any code that Contributor has deleted from the Contributor Version 2 for infringements caused by i third party modifications of Contributor Version or ii the combinati...

Page 526: ... must make it absolutely clear that any such warranty support indemnity or liability obligation is offered by You alone and You hereby agree to indemnify the Initial Developer and every Contributor for any liability incurred by the Initial Developer or such Contributor as a result of warranty support indemnity or liability terms You offer 3 5 Distribution of Executable Versions You may distribute ...

Page 527: ...nder which You originally received the Covered Software Otherwise You may also choose to use distribute or otherwise make the Covered Software available under the terms of any subsequent version of the License published by the license steward 4 3 Modified Versions When You are an Initial Developer and You want to create a new license for Your Original Software You may create and use a modified ver...

Page 528: ...indirectly to You by such Participant the Initial Developer if the Initial Developer is not the Participant and all Contributors under Sections 2 1 and or 2 2 of this License shall upon 60 days notice from Participant terminate prospectively and automatically at the expiration of such 60 day notice period unless if within such 60 day period You withdraw Your claim with respect to the Participant S...

Page 529: ...F R 2 101 Oct 1995 consisting of commercial computer software as that term is defined at 48 C F R 252 227 7014 a 1 and commercial computer software documentation as such terms are used in 48 C F R 12 212 Sept 1995 Consistent with 48 C F R 12 212 and 48 C F R 227 7202 1 through 227 7202 4 June 1995 all U S Government End Users acquire Covered Software with only those rights set forth herein This U ...

Page 530: ...tly out of its utilization of rights under this License and You agree to work with Initial Developer and Contributors to distribute such responsibility on an equitable basis Nothing herein is intended or shall be deemed to constitute any admission of liability NOTICE PURSUANT TO SECTION 9 OF THE COMMON DEVELOPMENT AND DISTRIBUTION LICENSE CDDL The code released under the CDDL shall be governed by ...

Page 531: ...able under terms of your choice provided that you also meet for each linked independent module the terms and conditions of the license of that module An independent module is a module which is not derived from or based on this library If you modify this library you may extend this exception to your version of the library but you are not obligated to do so If you do not wish to do so delete this ex...

Page 532: ...nsed Patents mean patent claims licensable by a Contributor which are necessarily infringed by the use or sale of its Contribution alone or when combined with the Program Program means the Contributions distributed in accordance with this Agreement Recipient means anyone who receives the Program under this Agreement including all Contributors 2 GRANT OF RIGHTS a Subject to the terms of this Agreem...

Page 533: ...aims any liability to Recipient for claims brought by any other entity based on infringement of intellectual property rights or otherwise As a condition to exercising the rights and licenses granted hereunder each Recipient hereby assumes sole responsibility to secure any other intellectual property rights needed if any For example if a third party patent license is required to allow Recipient to ...

Page 534: ...tomarily used for software exchange When the Program is made available in source code form a it must be made available under this Agreement and b a copy of this Agreement must be included with each copy of the Program Contributors may not remove or alter any copyright notices contained within the Program Each Contributor must identify itself as the originator of its Contribution if any in a manner...

Page 535: ...ense For example a Contributor might include the Program in a commercial product offering Product X That Contributor is then a Commercial Contributor If that Commercial Contributor then makes performance claims or offers warranties related to Product X those performance claims and warranties are such Commercial Contributor s responsibility alone Under this section the Commercial Contributor would ...

Page 536: ...h provision valid and enforceable If Recipient institutes patent litigation against any entity including a cross claim or counterclaim in a lawsuit alleging that the Program itself excluding combinations of the Program with other software or hardware infringes such Recipient s patent s then such Recipient s rights granted under Section 2 b shall terminate as of the date such litigation is filed Al...

Page 537: ... or licenses to the intellectual property of any Contributor under this Agreement whether expressly by implication estoppel or otherwise All rights in the Program not expressly granted under this Agreement are reserved This Agreement is governed by the laws of the State of New York and the intellectual property laws of the United States of America No party to this Agreement will bring a legal acti...

Page 538: ...or can get the source code If you link a program with the library you must provide complete object files to the recipients so that they can relink them with the library after making changes to the library and recompiling it And you must show them these terms so they know their rights Our method of protecting your rights has two steps 1 copyright the library and 2 offer you this license which gives...

Page 539: ...aries while preserving your freedom as a user of such programs to change the free libraries that are incorporated in them We have not seen how to achieve this as regards changes in header files but we have achieved it as regards changes in the actual functions of the Library The hope is that this will lead to faster development of free libraries The precise terms and conditions for copying distrib...

Page 540: ...opy and distribute verbatim copies of the Library s complete source code as you receive it in any medium provided that you conspicuously and appropriately publish on each copy an appropriate copyright notice and disclaimer of warranty keep intact all the notices that refer to this License and to the absence of any warranty and distribute a copy of this License along with the Library You may charge...

Page 541: ...ritten entirely by you rather the intent is to exercise the right to control the distribution of derivative or collective works based on the Library In addition mere aggregation of another work not based on the Library with the Library or with a work based on the Library on a volume of a storage or distribution medium does not bring the other work under the scope of this License 3 You may opt to a...

Page 542: ...bject code for the work may be a derivative work of the Library even though the source code is not Whether this is true is especially significant if the work can be linked without the Library or if the work is itself a library The threshold for this to be true is not precisely defined by law If such an object file uses only numerical parameters data structure layouts and accessors and small macros...

Page 543: ...distribution c If distribution of the work is made by offering access to copy from a designated place offer equivalent access to copy the above specified materials from the same place d Verify that the user has already received a copy of these materials or that you have already sent this user a copy For an executable the required form of the work that uses the Library must include any data and uti...

Page 544: ...g the Library or any work based on the Library you indicate your acceptance of this License to do so and all its terms and conditions for copying distributing or modifying the Library or works based on it 10 Each time you redistribute the Library or any work based on the Library the recipient automatically receives a license from the original licensor to copy distribute link with or modify the Lib...

Page 545: ... may add an explicit geographical distribution limitation excluding those countries so that distribution is permitted only in or among countries not thus excluded In such case this License incorporates the limitation as if written in the body of this License 13 The Free Software Foundation may publish revised and or new versions of the Library General Public License from time to time Such new vers...

Page 546: ...ABLE TO YOU FOR DAMAGES INCLUDING ANY GENERAL SPECIAL INCIDENTAL OR CONSEQUENTIAL DAMAGES ARISING OUT OF THE USE OR INABILITY TO USE THE LIBRARY INCLUDING BUT NOT LIMITED TO LOSS OF DATA OR DATA BEING RENDERED INACCURATE OR LOSSES SUSTAINED BY YOU OR THIRD PARTIES OR A FAILURE OF THE LIBRARY TO OPERATE WITH ANY OTHER SOFTWARE EVEN IF SUCH HOLDER OR OTHER PARTY HAS BEEN ADVISED OF THE POSSIBILITY O...

Page 547: ... Library General Public License as published by the Free Software Foundation either version 2 of the License or at your option any later version This library is distributed in the hope that it will be useful but WITHOUT ANY WARRANTY without even the implied warranty of MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE See the GNU Library General Public License for more details You should have re...

Page 548: ...re existing works such as a translation adaptation derivative work arrangement of music or other alterations of a literary or artistic work or phonogram or performance and includes cinematographic adaptations or any other form in which the Work may be recast transformed or adapted including in any form recognizably derived from the original except that a work that constitutes a Collection will not...

Page 549: ...r other work of the same nature a dramatic or dramatico musical work a choreographic work or entertainment in dumb show a musical composition with or without words a cinematographic work to which are assimilated works expressed by a process analogous to cinematography a work of drawing painting architecture sculpture engraving or lithography a photographic work to which are assimilated works expre...

Page 550: ...o Reproduce the Work to incorporate the Work into one or more Collections and to Reproduce the Work as incorporated in the Collections to create and Reproduce Adaptations provided that any such Adaptation including any translation in any medium takes reasonable steps to clearly label demarcate or otherwise identify that changes were made to the original Work For example a translation could be mark...

Page 551: ...blicense the Work You must keep intact all notices that refer to this License and to the disclaimer of warranties with every copy of the Work You Distribute or Publicly Perform When You Distribute or Publicly Perform the Work You may not impose any effective technological measures on the Work that restrict the ability of a recipient of the Work from You to exercise the rights granted to that recip...

Page 552: ...appropriate of You or Your use of the Work without the separate express prior written permission of the Original Author Licensor and or Attribution Parties Except as otherwise agreed in writing by the Licensor or as may be otherwise permitted by applicable law if You Reproduce Distribute or Publicly Perform the Work either by itself or as part of any Adaptations or Collections You must not distort...

Page 553: ...sor reserves the right to release the Work under different license terms or to stop distributing the Work at any time provided however that any such election will not serve to withdraw this License or any other license that has been or is required to be granted under the terms of this License and this License will continue in full force and effect unless terminated as stated above 8 Miscellaneous ...

Page 554: ...cable copyright law includes additional rights not granted under this License such additional rights are deemed to be included in the License this License is not intended to restrict the license of any rights under applicable law Creative Commons Notice Creative Commons is not a party to this License and makes no warranty whatsoever in connection with the Work Creative Commons will not be liable t...

Page 555: ...at you can change the software or use pieces of it in new free programs and that you know you can do these things To protect your rights we need to make restrictions that forbid anyone to deny you these rights or to ask you to surrender the rights These restrictions translate to certain responsibilities for you if you distribute copies of the software or if you modify it For example if you distrib...

Page 556: ... of it either verbatim or with modifications and or translated into another language Hereinafter translation is included without limitation in the term modification Each licensee is addressed as you Activities other than copying distribution and modification are not covered by this License they are outside its scope The act of running the Program is not restricted and the output from the Program i...

Page 557: ...nd separate works in themselves then this License and its terms do not apply to those sections when you distribute them as separate works But when you distribute the same sections as part of a whole which is a work based on the Program the distribution of the whole must be on the terms of this License whose permissions for other licensees extend to the entire whole and thus to each and every part ...

Page 558: ...ade by offering access to copy from a designated place then offering equivalent access to copy the source code from the same place counts as distribution of the source code even though third parties are not compelled to copy the source along with the object code 4 You may not copy modify sublicense or distribute the Program except as expressly provided under this License Any attempt otherwise to c...

Page 559: ...e purpose of this section to induce you to infringe any patents or other property right claims or to contest validity of any such claims this section has the sole purpose of protecting the integrity of the free software distribution system which is implemented by public license practices Many people have made generous contributions to the wide range of software distributed through that system in r...

Page 560: ... OR OTHER PARTIES PROVIDE THE PROGRAM AS IS WITHOUT WARRANTY OF ANY KIND EITHER EXPRESSED OR IMPLIED INCLUDING BUT NOT LIMITED TO THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE THE ENTIRE RISK AS TO THE QUALITY AND PERFORMANCE OF THE PROGRAM IS WITH YOU SHOULD THE PROGRAM PROVE DEFECTIVE YOU ASSUME THE COST OF ALL NECESSARY SERVICING REPAIR OR CORRECTION 12 IN NO EV...

Page 561: ...es Copyright C yyyy name of author This program is free software you can redistribute it and or modify it under the terms of the GNU General Public License as published by the Free Software Foundation either version 2 of the License or at your option any later version This program is distributed in the hope that it will be useful but WITHOUT ANY WARRANTY without even the implied warranty of MERCHA...

Page 562: ...ing without limitation the rights to use copy modify merge publish distribute sublicense and or sell copies of the Software and to permit persons to whom the Software is furnished to do so subject to the following conditions The above copyright notice and this permission notice shall be included in all copies or substantial portions of the Software The software is provided as is without warranty o...

Page 563: ...dation use the GNU General Public License for most of our software it applies also to any other work released this way by its authors You can apply it to your programs too When we speak of free software we are referring to freedom not price Our General Public Licenses are designed to make sure that you have the freedom to distribute copies of free software and charge for them if you wish that you ...

Page 564: ...lthough the manufacturer can do so This is fundamentally incompatible with the aim of protecting users freedom to change the software The systematic pattern of such abuse occurs in the area of products for individuals to use which is precisely where it is most unacceptable Therefore we have designed this version of the GPL to prohibit the practice for those products If such problems arise substant...

Page 565: ...a work based on the Program To propagate a work means to do anything with it that without permission would make you directly or secondarily liable for infringement under applicable copyright law except executing it on a computer or modifying a private copy Propagation includes copying distribution with or without modification making available to the public and in some countries other activities as...

Page 566: ... or to implement a Standard Interface for which an implementation is available to the public in source code form A Major Component in this context means a major essential component kernel window system and so on of the specific operating system if any on which the executable work runs or a compiler used to produce the work or an object code interpreter used to run it The Corresponding Source for a...

Page 567: ... conditions so long as your license otherwise remains in force You may convey covered works to others for the sole purpose of having them make modifications exclusively for you or provide you with facilities for running those works provided that you comply with the terms of this License in conveying all material for which you do not control copyright Those thus making or running the covered works ...

Page 568: ...e and any non permissive terms added in accord with section 7 apply to the code keep intact all notices of the absence of any warranty and give all recipients a copy of this License along with the Program You may charge any price or no price for each copy that you convey and you may offer support or warranty protection for a fee 5 Conveying Modified Source Versions You may convey a work based on t...

Page 569: ...rks permit Inclusion of a covered work in an aggregate does not cause this License to apply to the other parts of the aggregate 6 Conveying Non Source Forms You may convey a covered work in object code form under the terms of sections 4 and 5 provided that you also convey the machine readable Corresponding Source under the terms of this License in one of these ways a Convey the object code in or e...

Page 570: ...t is available for as long as needed to satisfy these requirements e Convey the object code using peer to peer transmission provided you inform other peers where the object code and Corresponding Source of the work are being offered to the general public at no charge under subsection 6d A separable portion of the object code whose source code is excluded from the Corresponding Source as a System L...

Page 571: ...ject code on the User Product for example the work has been installed in ROM The requirement to provide Installation Information does not include a requirement to continue to provide support service warranty or updates for a work that has been modified or installed by the recipient or for the User Product in which it has been modified or installed Access to a network may be denied when the modific...

Page 572: ...e with terms a Disclaiming warranty or limiting liability differently from the terms of sections 15 and 16 of this License or b Requiring preservation of specified reasonable legal notices or author attributions in that material or in the Appropriate Legal Notices displayed by works containing it or c Prohibiting misrepresentation of the origin of that material or requiring that modified versions ...

Page 573: ...issive may be stated in the form of a separately written license or stated as exceptions the above requirements apply either way 8 Termination You may not propagate or modify a covered work except as expressly provided under this License Any attempt otherwise to propagate or modify it is void and will automatically terminate your rights under this License including any patent licenses granted unde...

Page 574: ...cceptance of this License to do so 10 Automatic Licensing of Downstream Recipients Each time you convey a covered work the recipient automatically receives a license from the original licensors to run modify and propagate that work subject to this License You are not responsible for enforcing compliance by third parties with this License An entity transaction is a transaction transferring control ...

Page 575: ...rsion For purposes of this definition control includes the right to grant patent sublicenses in a manner consistent with the requirements of this License Each contributor grants you a non exclusive worldwide royalty free patent license under the contributor s essential patent claims to make use sell offer for sale import and otherwise run modify and propagate the contents of its contributor versio...

Page 576: ...ope of its coverage prohibits the exercise of or is conditioned on the non exercise of one or more of the rights that are specifically granted under this License You may not convey a covered work if you are a party to an arrangement with a third party that is in the business of distributing software under which you make payment to the third party based on the extent of your activity of conveying t...

Page 577: ...NU Affero General Public License section 13 concerning interaction through a network will apply to the combination as such 14 Revised Versions of this License The Free Software Foundation may publish revised and or new versions of the GNU General Public License from time to time Such new versions will be similar in spirit to the present version but may differ in detail to address new problems or c...

Page 578: ...CTION 16 Limitation of Liability IN NO EVENT UNLESS REQUIRED BY APPLICABLE LAW OR AGREED TO IN WRITING WILL ANY COPYRIGHT HOLDER OR ANY OTHER PARTY WHO MODIFIES AND OR CONVEYS THE PROGRAM AS PERMITTED ABOVE BE LIABLE TO YOU FOR DAMAGES INCLUDING ANY GENERAL SPECIAL INCIDENTAL OR CONSEQUENTIAL DAMAGES ARISING OUT OF THE USE OR INABILITY TO USE THE PROGRAM INCLUDING BUT NOT LIMITED TO LOSS OF DATA O...

Page 579: ...ief idea of what it does Copyright C year name of author This program is free software you can redistribute it and or modify it under the terms of the GNU General Public License as published by the Free Software Foundation either version 3 of the License or at your option any later version This program is distributed in the hope that it will be useful but WITHOUT ANY WARRANTY without even the impl...

Page 580: ...Public License does not permit incorporating your program into proprietary programs If your program is a subroutine library you may consider it more useful to permit linking proprietary applications with the library If this is what you want to do use the GNU Lesser General Public License instead of this License But first please read http www gnu org philosophy why not lgpl html Common Development ...

Page 581: ...al Software or previous Modification or C Any new file that is contributed or otherwise made available under the terms of this License 1 10 Original Software means the Source Code and Executable form of computer software code that is originally released under this License 1 11 Patent Claims means any patent claim s now owned or hereafter acquired including without limitation method process and app...

Page 582: ...oftware or 2 for infringements caused by i the modification of the Original Software or ii the combination of the Original Software with other software or devices 2 2 Contributor Grant Conditioned upon Your compliance with Section 3 1 below and subject to third party intellectual property claims each Contributor hereby grants You a world wide royalty free non exclusive license a under intellectual...

Page 583: ...rough a medium customarily used for software exchange 3 2 Modifications The Modifications that You create or to which You contribute are governed by the terms of this License You represent that You believe Your Modifications are Your original creation s and or You have sufficient rights to grant the rights conveyed by this License 3 3 Required Notices You must include a notice in each of Your Modi...

Page 584: ...Work by combining Covered Software with other code not governed by the terms of this License and distribute the Larger Work as a single product In such a case You must make sure the requirements of this License are fulfilled for the Covered Software 4 Versions of the License 4 1 New Versions Sun Microsystems Inc is the initial license steward and may publish revised and or new versions of this Lic...

Page 585: ...icense and the rights granted hereunder will terminate automatically if You fail to comply with terms herein and fail to cure such breach within 30 days of becoming aware of the breach Provisions which by their nature must remain in effect beyond the termination of this License shall survive 6 2 If You assert a patent infringement claim excluding declaratory judgment actions against Initial Develo...

Page 586: ...ial item as that term is defined in 48 C F R 2 101 Oct 1995 consisting of commercial computer software as that term is defined at 48 C F R 252 227 7014 a 1 and commercial computer software documentation as such terms are used in 48 C F R 12 212 Sept 1995 Consistent with 48 C F R 12 212 and 48 C F R 227 7202 1 through 227 7202 4 June 1995 all U S Government End Users acquire Covered Software with o...

Page 587: ... Initial Developer and the Contributors each party is responsible for claims and damages arising directly or indirectly out of its utilization of rights under this License and You agree to work with Initial Developer and Contributors to distribute such responsibility on an equitable basis Nothing herein is intended or shall be deemed to constitute any admission of liability Open SSL License Licens...

Page 588: ...the documentation and or other materials provided with the distribution 3 All advertising materials mentioning features or use of this software must display the following acknowledgment This product includes software developed by the OpenSSL Project for use in the OpenSSL Toolkit http www openssl org 4 The names OpenSSL Toolkit and OpenSSL Project must not be used to endorse or promote products de...

Page 589: ...S BE LIABLE FOR ANY DIRECT INDIRECT INCIDENTAL SPECIAL EXEMPLARY OR CONSEQUENTIAL DAMAGES INCLUDING BUT NOT LIMITED TO PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES LOSS OF USE DATA OR PROFITS OR BUSINESS INTERRUPTION HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY WHETHER IN CONTRACT STRICT LIABILITY OR TORT INCLUDING NEGLIGENCE OR OTHERWISE ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE EVEN IF ...

Page 590: ...ot to be removed If this package is used in a product Eric Young should be given attribution as the author of the parts of the library used This can be in the form of a textual message at program startup or in documentation online or textual provided with the package Redistribution and use in source and binary forms with or without modification are permitted provided that the following conditions ...

Page 591: ...ERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED IN NO EVENT SHALL THE AUTHOR OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT INDIRECT INCIDENTAL SPECIAL EXEMPLARY OR CONSEQUENTIAL DAMAGES INCLUDING BUT NOT LIMITED TO PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES LOSS OF USE DATA OR PROFITS OR BUSINESS INTERRUPTION HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY WHETHER IN CONTRACT STRICT L...

Page 592: ...designed to take away your freedom to share and change it By contrast the GNU General Public License is intended to guarantee your freedom to share and change free software to make sure the software is free for all its users This General Public License applies to most of the Free Software Foundation s software and to any other program whose authors commit to using it Some other Free Software Found...

Page 593: ...software and 2 offer you this license which gives you legal permission to copy distribute and or modify the software Also for each author s protection and ours we want to make certain that everyone understands that there is no warranty for this free software If the software is modified by someone else and passed on we want its recipients to know that what they have is not the original so that any ...

Page 594: ...ether that is true depends on what the Program does 1 You may copy and distribute verbatim copies of the Program s source code as you receive it in any medium provided that you conspicuously and appropriately publish on each copy an appropriate copyright notice and disclaimer of warranty keep intact all the notices that refer to this License and to the absence of any warranty and give any other re...

Page 595: ...ribute them as separate works But when you distribute the same sections as part of a whole which is a work based on the Program the distribution of the whole must be on the terms of this License whose permissions for other licensees extend to the entire whole and thus to each and every part regardless of who wrote it Thus it is not the intent of this section to claim rights or contest your rights ...

Page 596: ... source code distributed need not include anything that is normally distributed in either source or binary form with the major components compiler kernel and so on of the operating system on which the executable runs unless that component itself accompanies the executable If distribution of executable or object code is made by offering access to copy from a designated place then offering equivalen...

Page 597: ...y other pertinent obligations then as a consequence you may not distribute the Program at all For example if a patent license would not permit royalty free redistribution of the Program by all those who receive copies directly or indirectly through you then the only way you could satisfy both it and this License would be to refrain entirely from distribution of the Program If any portion of this s...

Page 598: ...sion published by the Free Software Foundation If the Program does not specify a version number of this License you may choose any version ever published by the Free Software Foundation 10 If you wish to incorporate parts of the Program into other free programs whose distribution conditions are different write to the author to ask for permission For software which is copyrighted by the Free Softwa...

Page 599: ...SED OF THE POSSIBILITY OF SUCH DAMAGES END OF TERMS AND CONDITIONS The Artistic License Preamble The intent of this document is to state the conditions under which a Package may be copied such that the Copyright Holder maintains some semblance of artistic control over the development of the package while giving the users of the package the right to use and distribute the Package in a more or less ...

Page 600: ...ou may apply bug fixes portability fixes and other modifications derived from the Public Domain or from the Copyright Holder A Package modified in such a way shall still be considered the Standard Version 3 You may otherwise modify your copy of this Package in any way provided that you insert a prominent notice in each changed file stating how and when you changed that file and provided that you d...

Page 601: ...ual pages or equivalent together with instructions on where to get the Standard Version d make other distribution arrangements with the Copyright Holder 5 You may charge a reasonable copying fee for any distribution of this Package You may charge any fee you choose for support of this Package You may not charge a fee for this Package itself However you may distribute this Package in aggregate with...

Page 602: ...your freedom to share and change it By contrast the GNU General Public Licenses are intended to guarantee your freedom to share and change free software to make sure the software is free for all its users This license the Lesser General Public License applies to some specially designated software packages typically libraries of the Free Software Foundation and other authors who decide to use it Yo...

Page 603: ...rmission to copy distribute and or modify the library To protect each distributor we want to make it very clear that there is no warranty for the free library Also if the library is modified by someone else and passed on the recipients should know that what they have is not the original version so that the original author s reputation will not be affected by problems that might be introduced by ot...

Page 604: ...ter number of people to use a large body of free software For example permission to use the GNU C Library in non free programs enables many more people to use the whole GNU operating system as well as its variant the GNU Linux operating system Although the Lesser General Public License is Less protective of the users freedom it does ensure that the user of a program that is linked with the Library...

Page 605: ...rary in a tool for writing it Whether that is true depends on what the Library does and what the program that uses the Library does 1 You may copy and distribute verbatim copies of the Library s complete source code as you receive it in any medium provided that you conspicuously and appropriately publish on each copy an appropriate copyright notice and disclaimer of warranty keep intact all the no...

Page 606: ... thus to each and every part regardless of who wrote it Thus it is not the intent of this section to claim rights or contest your rights to work written entirely by you rather the intent is to exercise the right to control the distribution of derivative or collective works based on the Library In addition mere aggregation of another work not based on the Library with the Library or with a work bas...

Page 607: ...library The executable is therefore covered by this License Section 6 states terms for distribution of such executables When a work that uses the Library uses material from a header file that is part of the Library the object code for the work may be a derivative work of the Library even though the source code is not Whether this is true is especially significant if the work can be linked without ...

Page 608: ... in the Library will not necessarily be able to recompile the application to use the modified definitions b Use a suitable shared library mechanism for linking with the Library A suitable mechanism is one that 1 uses at run time a copy of the library already present on the user s computer system rather than copying library functions into the executable and 2 will operate properly with a modified v...

Page 609: ...panying uncombined form of the same work 8 You may not copy modify sublicense link with or distribute the Library except as expressly provided under this License Any attempt otherwise to copy modify sublicense link with or distribute the Library is void and will automatically terminate your rights under this License However parties who have received copies or rights from you under this License wil...

Page 610: ...rpose of protecting the integrity of the free software distribution system which is implemented by public license practices Many people have made generous contributions to the wide range of software distributed through that system in reliance on consistent application of that system it is up to the author donor to decide if he or she is willing to distribute software through any other system and a...

Page 611: ...AS IS WITHOUT WARRANTY OF ANY KIND EITHER EXPRESSED OR IMPLIED INCLUDING BUT NOT LIMITED TO THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE THE ENTIRE RISK AS TO THE QUALITY AND PERFORMANCE OF THE LIBRARY IS WITH YOU SHOULD THE LIBRARY PROVE DEFECTIVE YOU ASSUME THE COST OF ALL NECESSARY SERVICING REPAIR OR CORRECTION 16 IN NO EVENT UNLESS REQUIRED BY APPLICABLE LAW ...

Page 612: ...ive the library s name and a brief idea of what it does Copyright C year name of author This library is free software you can redistribute it and or modify it under the terms of the GNU Lesser General Public License as published by the Free Software Foundation either version 2 1 of the License or at your option any later version This library is distributed in the hope that it will be useful but WI...

Page 613: ...tion License You can obtain a copy of the license at https glassfish dev java net public CDDLv1 0 html The UnixCrypt java code Implements the one way cryptography used by Unix systems for simple password protection Copyright 1996 Aki Yoshida modified April 2001 by Iris Van den Broeke Daniel Deville Permission to use copy modify and distribute UnixCrypt for non commercial or commercial purposes and...

Page 614: ... THE SOFTWARE TO YOU ONLY UPON THE CONDITION THAT YOU ACCEPT ALL OF THE TERMS CONTAINED IN THIS BINARY CODE LICENSE AGREEMENT AND SUPPLEMENTAL LICENSE TERMS COLLECTIVELY AGREEMENT PLEASE READ THE AGREEMENT CAREFULLY BY SELECTING THE ACCEPT LICENSE AGREEMENT OR THE EQUIVALENT BUTTON AND OR BY USING THE SOFTWARE YOU ACKNOWLEDGE THAT YOU HAVE READ THE TERMS AND AGREE TO THEM IF YOU ARE AGREEING TO TH...

Page 615: ... and not licensed under this Agreement Programs means a Java technology applets and applications intended to run on the Java Platform Standard Edition platform on Java enabled General Purpose Desktop Computers and Servers and b JavaFX technology applications intended to run on the JavaFX Runtime on JavaFX enabled General Purpose Desktop Computers and Servers Commercial Features means those feature...

Page 616: ...TATION ANY IMPLIED WARRANTIES OF MERCHANTABILITY FITNESS FOR A PARTICULAR PURPOSE OR NONINFRINGEMENT 5 LIMITATION OF LIABILITY IN NO EVENT SHALL ORACLE BE LIABLE FOR ANY INDIRECT INCIDENTAL SPECIAL PUNITIVE OR CONSEQUENTIAL DAMAGES OR DAMAGES FOR LOSS OF PROFITS REVENUE DATA OR DATA USE INCURRED BY YOU OR ANY THIRD PARTY WHETHER IN AN ACTION IN CONTRACT OR TORT EVEN IF ORACLE HAS BEEN ADVISED OF T...

Page 617: ...rnment s rights in Software and accompanying documentation shall be only those set forth in this Agreement 10 GOVERNING LAW This agreement is governed by the substantive and procedural laws of California You and Oracle agree to submit to the exclusive jurisdiction of and venue in the courts of San Francisco or Santa Clara counties in California in any dispute arising out of or relating to this agr...

Page 618: ...et forth in the README File incorporated herein by reference including but not limited to the Java Technology Restrictions of these Supplemental Terms Oracle grants you a non exclusive non transferable limited license without fees to reproduce internally and use internally the Software complete and unmodified for the purpose of designing developing and testing your Programs C LICENSE TO DISTRIBUTE...

Page 619: ...ctionality to the Redistributables iii you do not distribute additional software intended to supersede any component s of the Redistributables unless otherwise specified in the applicable README File iv you do not remove or alter any proprietary legends or notices contained in or on the Redistributables v you only distribute the Redistributables pursuant to a license agreement that a is a complete...

Page 620: ... label and you may not state or imply that Oracle is responsible for any third party software contained on the Media vii You may not include any third party software on the Media which is intended to be a replacement or substitute for the JDK viii You agree to defend and indemnify Oracle and its licensors from and against any damages costs liabilities settlement amounts and or expenses including a...

Page 621: ...reference purposes pursuant to the terms of this Agreement Source code may not be redistributed unless expressly provided for in this Agreement J THIRD PARTY CODE Additional copyright notices and license terms applicable to portions of the Software are set forth in the THIRDPARTYLICENSEREADME file accessible at http www oracle com technetwork java javase documentation index html In addition to any...

Page 622: ... 30 2011 Original Intaglio License The code of this project is released under a BSD like license license txt Copyright 1999 2004 C Intalio Inc and others All Rights Reserved Redistribution and use of this software and associated documentation Software with or without modification are permitted provided that the following conditions are met 1 Redistributions of source code must retain copyright sta...

Page 623: ...IO AND CONTRIBUTORS AS IS AND ANY EXPRESSED OR IMPLIED WARRANTIES INCLUDING BUT NOT LIMITED TO THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED IN NO EVENT SHALL INTALIO OR ITS CONTRIBUTORS BE LIABLE FOR ANY DIRECT INDIRECT INCIDENTAL SPECIAL EXEMPLARY OR CONSEQUENTIAL DAMAGES INCLUDING BUT NOT LIMITED TO PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES LOSS...

Page 624: ... or any part thereof and wants to make the derivative work available to others as provided herein then Licensee hereby agrees to include in any such work a brief summary of the changes made to Python 2 4 3 4 PSF is making Python 2 4 3 available to Licensee on an AS IS basis PSF MAKES NO REPRESENTATIONS OR WARRANTIES EXPRESS OR IMPLIED BY WAY OF EXAMPLE BUT NOT LIMITATION PSF MAKES NO AND DISCLAIMS...

Page 625: ...eOpen hereby grants Licensee a non exclusive royalty free world wide license to reproduce analyze test perform and or display publicly prepare derivative works distribute and otherwise use the Software alone or in any derivative version provided however that the BeOpen Python License is retained in the Software alone or in any derivative version prepared by Licensee 3 BeOpen is making the Software...

Page 626: ...E AGREEMENT is between the Corporation for National Research Initiatives having an office at 1895 Preston White Drive Reston VA 20191 CNRI and the Individual or Organization Licensee accessing and otherwise using Python 1 6 1 software in source or binary form and its associated documentation 2 Subject to the terms and conditions of this License Agreement CNRI hereby grants Licensee a nonexclusive ...

Page 627: ...G DISTRIBUTING OR OTHERWISE USING PYTHON 1 6 1 OR ANY DERIVATIVE THEREOF EVEN IF ADVISED OF THE POSSIBILITY THEREOF 6 This License Agreement will automatically terminate upon a material breach of its terms and conditions 7 This License Agreement shall be governed by the federal intellectual property law of the United States including without limitation the federal copyright law and to the extent s...

Page 628: ...opyright notice appear in all copies and that both that copyright notice and this permission notice appear in supporting documentation and that the name of Stichting Mathematisch Centrum or CWI not be used in advertising or publicity pertaining to distribution of the software without specific written prior permission STICHTING MATHEMATISCH CENTRUM DISCLAIMS ALL WARRANTIES WITH REGARD TO THIS SOFTW...

Page 629: ...4 capacity of ETERNUS CS800 S5 39 cartridge based replication 356 394 CD DVD 23 checking delivery unit 83 class A compliance statement 26 Cleaning Devices 25 common problems and solutions 465 compression 40 configuration contacts 351 data and time 313 email 325 initial 117 NAS 201 notifications 325 OST 255 PTT 283 replication 246 security 315 SNMP 335 SSL Certificate 320 system 300 VTL 218 configu...

Page 630: ...ostatic sensitive devices ESD 25 email 325 email alerts wizard 182 recipients 184 server 183 entry 37 cabling 109 PCI cards 59 VTL and PTT cabling 114 environmental protection 28 ESD electrostatic sensitive devices 25 precautions 93 ETERNUS CS800 connecting with the customer LAN 112 unpacking 94 ETERNUS CS800 S5 cabling 106 Ethernet cable 117 Ethernet port 119 expansion JX40 486 expansion entry 48...

Page 631: ...on 140 M main menu 147 management pages 148 map remote management 149 mounting position 95 mounting server rack rails 101 N NAS 201 advanced setting 216 CIFS 43 NFS 44 share access 211 summary 202 windows domain 208 NAS wizard 152 add share 157 share access 156 network attached storage NAS 43 network configuration 46 notifications 325 AIS connect 345 O online replacement 481 482 open storage OST 4...

Page 632: ...on 40 Remote 149 remote management 139 map 149 remote replication 41 replication 246 355 action 397 problems 468 receive NAS 371 receive VTL 385 send NAS 362 replication reports 401 replication wizard 174 NAS shares 177 system 175 VTL partition 179 reports 401 requirements 3rd party rack 82 PRIMECENTER rack 82 rack 81 rack system 98 return of devices 29 RX300 S7 transport box 94 S safety instructi...

Page 633: ...ging off 143 logging on 140 network 300 shutting down 78 turning on 77 system banner 143 system description 31 system specifications 491 T tilting protection 88 tools 93 transporting the server 27 troubleshooting actions 463 U unpacking ETERNUS CS800 94 utilities 443 analyzer 449 diagnostics 443 healthchecks 445 reboot shutdown 461 secure shred 455 software upgrade 458 space reclamation 452 V virt...

Page 634: ...Index 634 U41840 J Z125 7 76 ...

Reviews: