background image

provided that: (i) you distribute the Redistributables complete and

unmodified, and only bundled as part of Programs, (ii) the Programs add

significant and primary functionality to the Redistributables, (iii) you do

not distribute additional software intended to supersede any component(s)

of the Redistributables (unless otherwise specified in the applicable

README File), (iv) you do not remove or alter any proprietary legends or

notices contained in or on the Redistributables, (v) you only distribute

the Redistributables pursuant to a license agreement that: (a) is a

complete, unmodified reproduction of this Agreement; or (b) protects

Oracle's interests consistent with the terms contained in the Agreement and

includes the notice set forth in Section H, (vi) you agree to defend and

indemnify Oracle and its licensors from and against any damages, costs,

liabilities, settlement amounts and/or expenses (including attorneys' fees)

incurred in connection with any claim, lawsuit or action by any third party

that arises or results from the use or distribution of any and all Programs

and/or Software. The license set forth in this Section D does not extend to

the Software identified in Section G.

E. DISTRIBUTION BY PUBLISHERS. This section pertains to your distribution

of the JavaTM SE Development Kit Software ("JDK”) with your printed book or

magazine (as those terms are commonly used in the industry) relating to

Java technology ("Publication"). Subject to and conditioned upon your

compliance with the restrictions and obligations contained in the

Agreement, Oracle hereby grants to you a non-exclusive, nontransferable

limited right to reproduce complete and unmodified copies of the JDK on

electronic media (the "Media") for the sole purpose of inclusion and

distribution with your Publication(s), subject to the following terms: (i)

You may not distribute the JDK on a stand-alone basis; it must be

distributed with your Publication(s); (ii) You are responsible for

downloading the JDK from the applicable Oracle web site; (iii) You must

refer to the JDK as JavaTM SE Development Kit; (iv) The JDK must be

reproduced in its entirety and without any modification whatsoever

(including with respect to all proprietary notices) and distributed with

your Publication subject to a license agreement that is a complete,

unmodified reproduction of this Agreement; (v) The Media label shall

include the following information: Copyright 2011, Oracle America, Inc. All

rights reserved. Use is subject to license terms. ORACLE and JAVA

trademarks and all ORACLE- and JAVA-related trademarks, service marks,

logos and other brand designations are trademarks or registered trademarks

of Oracle in the U.S. and other countries. This information must be placed

ETERNUS CS800

587

20   ETERNUS CS800 3.2 Open-Source Software

Summary of Contents for ETERNUS CS800

Page 1: ...ETERNUS CS800 V3 2 User Guide English ...

Page 2: ......

Page 3: ...English ETERNUS CS800 User Guide V3 2 Edition October 2015 ...

Page 4: ...plies with the requirements of the standard DIN EN ISO 9001 2008 cognitas Gesellschaft für Technik Dokumentation mbH www cognitas de Copyright and trademarks Copyright 2015 Fujitsu Technology Solutions All rights reserved Delivery subject to availability right of technical modifications reserved This document includes trademarks and copyrights of Quantum Corporation All rights reserved Microsoft M...

Page 5: ...ment 21 1 2 11 Notes on Installing Devices in the Rack 23 1 2 12 Environmental Protection 23 1 3 Typographic Conventions 25 2 System Description 27 2 1 Overview 28 2 1 1 Disk Based Backup Appliance 28 2 1 2 Advanced Data Deduplication Increasing Disk Retention for Backup Data 28 2 1 3 Remote Replication of Backup Data Providing Automated Disaster Recovery Protection 28 2 1 4 Configurable Storage P...

Page 6: ...nd Indicators 48 3 1 3 Connecting the servers to the mains 52 3 1 4 ETERNUS CS800 S6 Entry System 54 3 1 4 1 PCI Cards for ETERNUS CS800 S6 Entry 54 3 1 5 ETERNUS CS800 S6 Scale System 58 3 1 5 1 PCI Cards for ETERNUS CS800 S6 Scale 58 3 1 6 Indicators on the PCI Cards 59 3 2 Storage Modules 61 3 2 1 ETERNUS JX40 S2 Front View 61 3 2 2 ETERNUS JX40 S2 Rear View 62 3 2 3 ETERNUS DX100 S3 Base Modul...

Page 7: ...7 6 2 Connecting the Notebook with the Server 109 6 3 Running the Getting Started Wizard 110 6 3 1 Login Welcome License Agreement 110 6 3 2 Access Control 113 6 3 3 Network Configuration 114 6 3 4 Date Time 128 6 3 5 Confirm Settings Reboot 130 7 Remote Management 133 7 1 Remote Management Overview 133 7 2 Accessing Remote Management 133 7 3 The Remote Management Console 137 8 Configuration Wizar...

Page 8: ...41 10 4 1 Replicating OST Data 241 10 4 2 Storage Servers 244 10 4 3 LSU 252 10 4 4 Manage Users 259 10 4 5 Manage Remote Users 261 10 4 6 Target IP Mapping 265 10 4 7 ETERNUS CS800 Accent 268 10 4 8 OST Client Plug In 269 10 5 Replication Configuration 270 10 6 PTT Configuration 280 10 6 1 Physical Device Discovery 280 10 6 2 Backup Application Specific 282 10 7 Scheduler 286 10 8 Notifications 2...

Page 9: ...atus 428 12 7 Activity Log 429 13 Alerts 433 13 1 ETERNUS CS800 Alerts Overview 433 13 2 Admin Alerts 433 13 3 Service Tickets 434 14 Utilities 441 14 1 ETERNUS CS800 Utilities Overview 441 14 2 Diagnostics 441 14 3 Analyzer 446 14 4 Space Reclamation 449 14 5 Secure Shred 452 14 6 Software Upgrades 454 14 7 Reboot Shutdown 457 15 Troubleshooting 459 15 1 General Troubleshooting Actions 459 15 1 1...

Page 10: ... Procedures 471 16 2 Storage Subsystem 473 17 Storage Expansion 477 17 1 Storage Expansion Entry 477 17 1 1 Procedure of Storage Expansion starting with 8TB 478 17 1 2 Procedure of Storage Expansion starting with 16TB 478 17 1 3 Procedure of Storage Expansion starting with 24TB or more 479 17 2 Storage Expansion Scale 483 18 System Specifications S6 489 18 1 Additional Specifications 492 19 Integr...

Page 11: ...ave a basic understanding of Linux Document organization Following is a brief description of chapter contents l Chapter Important Information on page 16 provides essential information regarding safety when working on your ETERNUS CS800 l Chapter System Description on page 27 provides an overview of the ETERNUS CS800 system l Chapter Hardware Description on page 43 describes the hardware components...

Page 12: ...to resolve them l Chapter Removal Replacement Procedures CRUs on page 467 describes how the Customer can exchange Customer Replaceable Units l Chapter Storage Expansion on page 477 describes how additional storage modules are introduced into an existing ETERNUS CS800 system l Chapter System Specifications S6 on page 489 provides technical data l Chapter Integration in Firewall Environments on page...

Page 13: ...performance data logging and visual reporting features U41853 J Z125 4 76 ETERNUS CS800 S4 OST Guide Provides information for setting up the ETERNUS CS800 S6 for OST operation with NetBackup and Backup Exec ETERNUS CS800 Online Help Provides task oriented information for the Remote Management GUI 1 1 1 Support and Help Where to find information Resource Address Product information and documentatio...

Page 14: ...su web site provides links with contact information and information about available support programs http www fujitsu com fts services If you have an active support agreement you may contact your service provider If you do not have an active support agreement contact your Fujitsu sales representative to purchase a service contract or updates ETERNUS CS800 14 ...

Page 15: ...numbers and any other details that will help us locate the subject you are addressing Fujitsu home page Visit the home page of Fujitsu at http www fujitsu com fts Fujitsu compliance link See the compliance link of Fujitsu at https globalsp ts fujitsu com sites certificates default aspx To get information about the storage component select Storage Products ETERNUS JX ETERNUS JX40 S2 Storage Product...

Page 16: ...00 system may be replaced by the customer if they fail These components are called Customer Replaceable Units CRUs Other units may not be replaced by the customer Please note that unauthorized interference with the system will void the warranty and exempt the manufacturer from all liability l Any failure to observe the guidelines in this manual and any improper repairs could expose the user to ris...

Page 17: ...nt does not isolate the device from the mains power supply To disconnect it completely from the mains power supply unplug all network power plugs from the grounded shock proof sockets l Always connect the system components and the attached peripherals to the same power circuit Otherwise you run the risk of losing data if for example the ETERNUS CS800 server unit is still running but a storage subs...

Page 18: ...rsonnel Exception CRU Customer Replaceable Units components can be replaced l The warranty is void if the system is damaged during installation or replacement of system expansions l Only set screen resolutions and refresh rates that are specified in the operating manual for the monitor Otherwise you may damage your monitor If you are in any doubt contact your sales outlet or customer service cente...

Page 19: ...n may result in hazardous radiation exposure 1 2 6 Batteries CAUTION l Incorrect replacement of batteries may lead to a risk of explosion The batteries may only be replaced with identical batteries or with a type recommended by the manufacturer see the technical manual for the system board l Do not throw batteries into the trash can They must be disposed of in accordance with local regulations con...

Page 20: ...ts you to the external chassis of the system unit l Always hold components with ESDs at the edges or at the points marked green touch points l Do not touch any connectors or conduction paths on an ESD l Place all the components on a pad which is free of electrostatic charge For a detailed description of how to handle ESD components see the relevant European or international standards EN 61340 5 1 ...

Page 21: ...ust be included if the equipment is passed on to a third party 1 2 10 FCC Class a Compliance Statement If there is an FCC statement on the device then The following statement applies to the products covered in this manual unless otherwise specified herein The statement for other products will appear in the accompanying documentation WARNING l This is a class A product In a domestic environment thi...

Page 22: ... determined by turning the equipment off and on the user is encouraged to try to correct the interference by one or more of the following measures l Reorient or relocate the receiving antenna l Increase the separation between equipment and the receiver l Connect the equipment into an outlet on a circuit different from that to which the receiver is connected Consult the dealer or an experienced rad...

Page 23: ...not be damaged l The rack must be connected to the power supply by an authorized electrician approved by the local utility company l If the rack model is integrated into an installation that draws power from an industrial power supply network with an IEC309 type connector the power supply s fuse protection must comply with the requirements for non industrial power supply networks for the type A co...

Page 24: ...ufacturer dealer or an authorized agent for recycling or disposal All batteries containing pollutants are marked with a symbol a crossed out garbage can They are also marked with the chemical symbol for the heavy metal that causes them to be categorized as containing pollutants Cd Cadmium Hg Mercury Pb Lead Labels on plastic casing parts Please avoid sticking your own labels on plastic parts where...

Page 25: ...lements monospace Indicates system output and system elements e g file names and paths monospace semibold Indicates statements that are to be entered using the keyboard blue continuous text Indicates a link to a related topic abc Indicates variables which must be replaced with real values abc Indicates options that can be specified syntax key Indicates a key on your keyboard If you need to enter t...

Page 26: ...26 ...

Page 27: ...Benefits on page 29 l What s New in ETERNUS CS800 S6 with Software V3 2 on page 30 l Components ETERNUS CS800 S6 System on page 30 l Data Reduction on page 34 l Space Reclamation on page 35 l Remote Replication on page 35 l Storage Presentation on page 36 l Path to tape PTT on page 39 l ETERNUS CS800 Advanced Reporting on page 40 l Network Configuration on page 40 ETERNUS CS800 27 ...

Page 28: ...e jobs and improves the reliability that backup jobs complete within their planned backup window 2 1 2 Advanced Data Deduplication Increasing Disk Retention for Backup Data The ETERNUS CS800 leverages Fujitsu s patented data deduplication technology U S Pat No 5 990 810 to dramatically increase the role that disk can play in the protection of critical data With the ETERNUS CS800 solution users can...

Page 29: ...y VTL presentation layer all models with Fibre Channel option l Supported by every major backup software vendor l Tape drives emulated l IBM LTO 2 LTO 3 LTO 4 or LTO 5 l HP LTO 2 LTO 3 LTO 4 or LTO 5 l Libraries emulated l Fujitsu CS TL l ADIC Scalar i2000 or ADIC Scalar i500 l NAS presentation layer for NFS and CIFS l OST presentation layer for Symantec NetBackup and BackupExec Supports also the ...

Page 30: ...ddition to the internal disks The provided capacity varies between 8 and 120 TB l Scale model consisting of a PRIMERGY RX2540 M1 system and an ETERNUS DX100 S3 storage system The provided capacity varies between 32 and 352 TB 2 3 2 ETERNUS CS800 S6 V3 2 Software l New blockpool with significant performance improvements in some cases l Support of Symantec NetBackup Accelerator l Access to root and ...

Page 31: ...actory installed option l Optionally 2 x 10GbE factory installed option field upgradeable on special release only With the Entry model either 4x2 5 600GB one CPU model or 6x2 5 900GB two CPU model SAS hard disk 10 000 rpm are building up RAID 1 disk groups used for the operating system and backup metadata Further 6 or 12 or 18 2 5 2TB SATA hard disks 7 200 rpm are building up RAID 6 4 2 disk group...

Page 32: ...8GbFC always factory installed l Optionally Hot Spares in ETERNUS DX100 S3 factory enabled l The 1st storage expansion shelf of the DX100 S3 will be equipped with 12 x Hot Spare disks l This will reduced the max capacity to 320TB The Scale model uses an DX100 S3 storage array with large capacity highly cost effective Nearline SAS disks Serial Attached SCSI Twelve disks of 3 5 size with a capacity ...

Page 33: ...ons Name Disk Size Minimum Capacity Capacity Increment steps Maximum Capacity Entry 2 TB 8 TB 2 x 8 TB 24 TB Entry with JX40 S2 option 2 TB 4 TB 8 TB 2 x 8 TB 6 x 16 TB 120 TB Scale 4 TB 32 TB 32 TB 352 TB Scale with Hot Spare Disks 4 TB 32 TB 32 TB 320 TB ETERNUS CS800 33 2 System Description ...

Page 34: ...ntage of extended retention capability Inline data flow provides streamlined deduplication that offers a maximum combination of total system performance manageability and value Fujitsu s deduplication technology uses a sub file variable length approach to identify redundant blocks in a data stream blocks that have appeared before in the same dataset or in datasets processed at an earlier time When...

Page 35: ...know when to schedule the space reclamation process As best practice it is recommended that this process commences at least two hours after your backup job has completed on a daily basis It is far more efficient to process a day s worth of new data than a week s worth 2 7 Remote Replication Today most backup occurs on isolated devices making it difficult to deploy disk backup when disaster recover...

Page 36: ... to the backup application as tape cartridges DLT or LTO Data is stored on the hard drives through an interface that appears as a tape library with virtual cartridges virtual drives and a virtual changer mechanism An ETERNUS CS800 with a VTL or Multi Protocol configuration can be configured to present multiple VTL interfaces of different sizes and types at once This allows backup applications to r...

Page 37: ...S Protocol on page 37 l NFS Protocol on page 38 Figure 5 NAS Backup using CIFS and NFS NAS shares are optimized for backup i e typically large files rather than file sharing When used with many small files the performance may be degraded 2 8 3 CIFS Protocol The CIFS Common Internet File System protocol defines a standard for remote file access from many computers at a time in Windows environments ...

Page 38: ... the same as the default permissions for a Windows 2003 share with the addition of an ACE Access Control Entry that permits full access to the share for all authenticated users Administrators can choose to remove this full access ACE set up custom permissions or leave the ACL Access Control List as is if the server is set up in a fully trusted environment 2 8 4 NFS Protocol The NFS Network File Sy...

Page 39: ... NetBackup 7 6 or later or Backup Exec 2014 or later Plug in clients are host OS dependent and are supplied by Fujitsu Technology Solutions To use the ETERNUS CS800 in OST mode you must configure an OST storage server and LSUs on the ETERNUS CS800 You must also map the LSUs on the NetBackup server so that NetBackup can perform backups and restore from them Additionally policies for optimized dupli...

Page 40: ...Reporting User s Guide 2 11 Network Configuration During network configuration each individual interface on the ETERNUS CS800 can be configured as a subnet with its own network settings Each physical Ethernet port can be configured as an interface In addition you can also create bonded interfaces logical ports consisting of two or more physical ports Keep in mind that any traffic can pass through ...

Page 41: ...able compressible new or already stored in the blockpool l the backup software and the method used by it l the client operating system l the presentation layer NFS CIFS VTL OST l non backup jobs performed in parallel replication space reclamation Therefore a general recommendation cannot be given here As a rough guideline only If each backup file job written concurrently to the system is considere...

Page 42: ...42 ...

Page 43: ...0 S4 system see ETERNUS CS800 S4 User Guide For an ETERNUS CS800 S2 S3 system see ETERNUS CS800 S3 User Guide 3 1 Server The server systems used by ETERNUS CS800 S6 is PRIMERGY RX2540 M1 that provides control for the ETERNUS CS800 S6 software operating system and software applications All ETERNUS CS800 S6 systems have one server For detailed information on PRIMERGY RX2540 M1 see l FUJITSU Server P...

Page 44: ...s on the front panel modules of the ETERNUS CS800 Figure 9 Front panel indicators and buttons The table below describes each item Item Indicator Button Port Description 1 Reset button Pressing the Reset button reboots the system It can be pressed using the end of a paper clip CAUTION Risk of data loss 44 ETERNUS CS800 ...

Page 45: ...nd on the rear of the server when the ID button is pressed Both ID indicators are synchronized 4 CSS indicator yellow Does not light up when no critical event was detected for a CSS Customer Self Service component Lights up yellow if a prefailure event was detected for a CSS component that you can fix yourself for reasons of precaution with the CSS concept Flashes yellow if an error was detected t...

Page 46: ...SS component Flashes orange if an error was detected that requires service intervention non CSS component Does not light up if there is no critical event If the event is still acute after a power failure the indicator is activated after the restart The indicator also lights up in standby mode 6 HDD SSD activity indicator Flashes green when an internal drive is being accessed 46 ETERNUS CS800 ...

Page 47: ...Power on indicator lights up green l the system has been switched on and is in power on delay or l the system is powered on and in normal operation S0 The Power on indicator flashes green slowly 1 2 Hz iRMC S4 is not ready 8 Power off indicator AC connected green The Power off indicator is off l the system is not connected to the mains or l the system is powered on and in normal operation S0 The P...

Page 48: ...1a Power supply indicator Lights up yellow when the server is switched off but mains voltage is present standby mode Lights up green when the server is switched on and functioning properly Lights up orange if the power supply unit has failed 2 I O panel for detailed information on the servers I O panels see the figure below 3 Depending of the ETERNUS CS800 Table 2 Rear panel connectors and Indicat...

Page 49: ...ear side I O panels of the servers marked with A B Item Description 1 USB 2 0 connector s 2 Dynamic LoM The LAN connectors on the dynamicLoM modules are numbered in ascending order from right to left beginning with 0 The rightmost connector LAN 0 is the service port 3 USB 3 0 connectors SuperSpeed USB 4 Management LAN connector for iRMC S4 server management function 5 Video connector VGA Table 3 C...

Page 50: ...ate of 100 Mbit s off transfer rate of 10 Mbit s C Global error indicator off no critical event non CSS component orange on prefailure event detected non CSS component orange flashing non CSS component failure CSS indicator off no critical event CSS component orange on prefailure event detected CSS component orange flashing CSS component failure ID indicator blue on server has been highlighted usi...

Page 51: ...s Manager or via the iRMC S4 s Web interface ID indicator visible through the chassis perforation blue on The system has been selected by pressing the ID button in the front of the server To deactivate the indicator press the button again E CSS indicator yellow on A prefailure event was detected for a CSS component that you can fix yourself for reasons of precaution with the CSS concept yellow fla...

Page 52: ... to the power supply unit of the server and plug the power plug into a grounded outlet on the mains socket strip on the rack see Technical Manual of the rack A phase redundancy in the power supply of the server can be set up if each of the power supply units is either connected to two different phases or to two separate circuits of the internal power supply network Using the cable clamp You can se...

Page 53: ...he utility sockets Plug all power cords into the properly grounded power outlets Disconnecting cables Turn off all power and equipment switches Disconnect all power plugs from the properly grounded power outlets Unplug all data communication cables from the utility sockets Disconnect the relevant cables from the server and all the peripherals For connecting or disconnecting LAN cables the server d...

Page 54: ...ts on the rear panel for the Entry System configuration Figure 13 Entry System front with JX40 S2 Option Figure 14 Entry System front without JX40 S2 Option 3 1 4 1 PCI Cards for ETERNUS CS800 S6 Entry Entry with JX40 S2 Option Figure 15 Entry System no option variant Figure 16 Entry System with 10 Gb s Ethernet 54 ETERNUS CS800 ...

Page 55: ...ser card 4 x 1 Gb s Ethernet 2 x 10 Gb s Ethernet external RAID controller with 8 Gb s Fibre Channel option internal RAID controller 2 x 8 Gb s Fibre Channel Riser card 4 x 1 Gb s Ethernet external RAID controller with 10 Gb s Ethernet and with 8 Gb s Fibre Channel option internal RAID controller 2 x 8 Gb s Fibre Channel Riser card 4 x 1 Gb s Ethernet 2 x 10 Gb s Ethernet external RAID controller ...

Page 56: ... Option Figure 19 Entry System no option variant Figure 20 Entry System with 10 Gb s Ethernet Figure 21 Entry System with 8 Gb s Fibre Channel Figure 22 Entry System with 8 Gb s Fibre Channel and with 10 Gb s Ethernet 56 ETERNUS CS800 ...

Page 57: ...b s Ethernet with 8 Gb s Fibre Channel option internal RAID controller 2 x 8 Gb s Fibre Channel Riser card 4 x 1 Gb s Ethernet with 10 Gb s Ethernet and 8 Gb s Fibre Channel option internal RAID controller 2 x 8 Gb s Fibre Channel Riser card 4 x 1 Gb s Ethernet 2 x 10 Gb s Ethernet Table 6 Usage of PCI Slots Entry System without JX40 S2 option ETERNUS CS800 57 3 Hardware Description ...

Page 58: ...ping of the slots on the rear panel for the Scale System configuration Figure 23 Scale System front 3 1 5 1 PCI Cards for ETERNUS CS800 S6 Scale Figure 24 Scale System no option FC option variant Figure 25 Scale System with 1 Gb s Ethernet option Figure 26 Scale System with 10 Gb s Ethernet option 58 ETERNUS CS800 ...

Page 59: ...card 2 x 10 Gb s Ethernet 4 x 1 Gb s Ethernet 2 x 8 Gb s Fibre Channel Riser card 2 x 10 Gb s Ethernet 2 x 8 Gb s Fibre Channel with 1Gb s Ethernet option internal RAID controller 2 x 8 Gb s Fibre Channel Riser card 4 x 1 Gb s Ethernet 4 x 1 Gb s Ethernet 2 x 8 Gb s Fibre Channel Riser card 4 x 1 Gb s Ethernet 2 x 8 Gb s Fibre Channel Table 7 Usage of PCI Slots Scale System 3 1 6 Indicators on the...

Page 60: ... in case of input output activity with 1 Gb s 4 LED 2 green Link Activity indicator Lights up green if a valid connection exists Does not light up if there is no link Flashes green when a data transfer is in progress 5 LED 1 yellow Link Activity indicator Lights up yellow if a 8 Gb s link exists Flashes in case of input output activity with 8 Gb s 6 LED 2 green Link Activity indicator Lights up gr...

Page 61: ...n optional l storage expansion modules to provide additional capacity for backup data For detailed information on storage modules see ETERNUS JX and ETERNUS DX storage module manuals 3 2 1 ETERNUS JX40 S2 Front View ETERNUS JX40 S2 goes just with Entry model only This chapter describes the front view of JX40 S2 storage module which includes panel features and indicator The ETERNUS JX40 storage mod...

Page 62: ...ule FAULT LED amber The JX40 S2 module is in error status IDENTIFY LED blinks blue Specifies the installation location of the storage subsystem Table 9 Status and meanings of each LED operation panel of JX40 S2 module 3 2 2 ETERNUS JX40 S2 Rear View This chapter describes the rear view of JX40 S2 storage module which includes connectors and indicators 62 ETERNUS CS800 ...

Page 63: ...stablished SAS IN fault amber The ports to remove the mini SAS HD cables between enclosures from are indicated This occurs while a drive enclosure is being added SAS OUT link green The link between the SAS OUT port and the destination port has been established SAS OUT fault amber The link between the SAS OUT port and the destination port is in error status ETERNUS CS800 63 3 Hardware Description ...

Page 64: ...ble 10 Status and meanings of each LED I O module Power Supply Units The power supply unit transforms input AC power from a power socket to DC power and supplies power to each component Each power supply unit contains fans Figure 33 Power supply unit PSU of the ETERNUS JX40 S2 Explanation l Inlet This inlet is used to connect a power cord l PSU switch This switch is used to turn on and off the AC ...

Page 65: ... information on ETERNUS JX40 S2 storage module see ETERNUS JX40 storage module manuals 3 2 3 ETERNUS DX100 S3 Base Module Front View The Scale model of ETERNUS CS800 S6 uses ETERNUS DX100 S3 storage modules as backup data storage There are two variants of the ETERNUS DX100 S3 storage modules l a storage base module controller enclosure which is connected to the server component and up to ten optio...

Page 66: ...stem is in error status blinks amber A part of the ETERNUS DX requires preventive maintenance MAINTENANCE green Maintenance for the ETERNUS DX is in progress blinks green Maintenance or a status check via ETERNUS Web GUI or ETERNUS CLI is necessary CACHE green There is data in the cache memory of the ETERNUS DX READY green The ETERNUS DX is available for use Table 12 Status and Meanings of Each LE...

Page 67: ...ar View This chapter describes the rear view of ETERNUS DX100 S3 base module which includes connectors and indicators Figure 36 Rear view of DX100 S3 controller enclosure Figure 37 Controller Module ETERNUS CS800 67 3 Hardware Description ...

Page 68: ...added READY FAULT green The link between the DI OUT port and the destination port has been established blinks green An error has occurred during startup amber The controller is performing the initial setup after the power is turned on The controller is in error status blinks amber MASTER green The controller is set as a Master CM CA FAULT amber The host interface is in error status LINK FAULT gree...

Page 69: ...pplied to the power supply unit Fault amber AC power is not supplied to the power supply unit AC missing amber AC power is not supplied to this power supply unit but AC power is supplied to the other power supply unit Fan fail amber The power supply unit or the fan in the power supply unit is in error status Table 13 Status and meanings of each LED power supply unit For detailed information on ETE...

Page 70: ...storage expansion module contains 12 3 5 inch NL SAS hard disk drives in the front in the same way as the storage base module and two I O modules as well aspower supplies with fans in the rear Status and Meanings of Each LED Figure 40 Front view of the DX100 S3 drive enclosure Figure 41 Operation panel of DX100 S3 drive enclosure LED name LED status Description POWER LED green DC power is supplied...

Page 71: ...RNUS Web GUI or ETERNUS CLI Table 14 Status and Meanings of Each LED 3 2 6 ETERNUS DX100 S3 Expansion Modules Rear View This chapter describes the rear view of ETERNUS DX100 S3 storage expansion modules which includes connectors and indicators Figure 42 Rear view of DX100 S3 drive enclosure Figure 43 Rear view of DX100 S3 I O module ETERNUS CS800 71 3 Hardware Description ...

Page 72: ...e link between the DI OUT port and the destination port is in error status amber blinking The ports to connect the cables are indicated This occurs while a drive enclosure is being added Ready green The I O module is in normal status Identify blinks blue The installation location of the I O module is identified according to the instruction that is issued from ETERNUS Web GUI or ETERNUS CLI Fault a...

Page 73: ...nit AC missing amber AC power is not supplied to this power supply unit but AC power is supplied to the other power supply unit Fan fail amber The power supply unit or the fan in the power supply unit is in error status Table 16 Status and meanings of each LED power supply unit For detailed information on ETERNUS DX100 S3 storage module see ETERNUS DX100 S3 storage module manuals ETERNUS CS800 73 ...

Page 74: ...e l Does not light HDD inactive drive inactive 2 orange HDD FAULT l Does not light no HDD error l Lights up HDD faulty or rebuild stopped drive defective needs replacing a rebuild process was stopped or the HDD module is not correctly inserted l Slow flashing HDD Rebuild the data is being restored after changing a drive l Fast flashing HDD Identify l Four fast blinks pause HDD Predicted Fault l Tw...

Page 75: ...n active phase l Does not light HDD inactive drive inactive 2 orange HDD FAULT l Does not light no HDD error l Lights up HDD faulty or rebuild stopped drive defective needs replacing a rebuild process was stopped or the HDD module is not correctly inserted Table 18 3 5 Hard Drive Disk Indicator If a drive fails you will be notified by an admin alert in the remote management pages see Admin Alerts ...

Page 76: ...on which is located at the front panel on the right side 3 Wait about 15 minutes before starting any further actions such as configurations via software Shutting down the system To shut down the ETERNUS CS800 S6 use the remote management pages see Reboot Shutdown on page 457 Shutting down the system can take up to 15 minutes The server is switched off and goes into standby mode The Power off indic...

Page 77: ...the system serial number on the Home page of the remote management console See System Overview on page 186 You can also locate the serial number by looking at the system ID card on the front panel of the server green to be pulled or as a label on the PRIMERGY RX2540 M1 See the figure below Figure 47 Serial number ETERNUS CS800 S6 ETERNUS CS800 77 3 Hardware Description ...

Page 78: ...78 ...

Page 79: ... 6 cm with 3 JX40 S2 Width side to side 48 26 cm 48 26 cm Depth front to back 77 cm 77 cm Weight stand alone 25 kg 25kg 35kg per JX40 up to 130kg Ventilation Clearance At least 200 mm on the front and rear Table 19 Rack Requirements for Entry ETERNUS CS800 S6 Scale With ETERNUS DX100 S3 expansion modules Height 4 HU i e 17 8 cm Up to 23 HU i e 106 8 cm 10 expansions Width side to side 48 26 cm 48 ...

Page 80: ...su are as follows l rail systems that can be mounted without tools l support systems having a linear alignment feature to ensure that they can be adjusted to different rack depths Asymmetrical PRIMECENTER Rack provides an enhanced cable management in the lateral rack area Installation of the cable management is described in detail in the Technical Manual for the respective rack 3rd Party Racks Ins...

Page 81: ...while performing installation procedures always observe the following precautions l Keep the system turned off during all installation procedures l Keep static sensitive parts in their original shipping containers until ready for installation l Do not place static sensitive parts on a metal surface Place them inside their protective shipping bag or on an antistatic mat l Avoid touching connectors ...

Page 82: ...identifiers must be observed precisely when they are mounted and connected to each other Otherwise the system will not work and might get damaged The labels with the numbers assigned in the factory are affixed at the right flange of the front side and at the ID card on top of the cover as described in figure below Figure 48 Labels on Front and Rear of the Storage Expansion Module The ETERNUS CS800...

Page 83: ... are preconfigured and assigned by numbers in the factory This sequence must be observed precisely when they are mounted Otherwise the system does not work The labels with the numbers assigned in the factory are affixed at the right flange of the front side and at the ID card on top of the modules cover as described in figure Labels on Front and Rear of the Storage Expansion Module on page 82 Stor...

Page 84: ...herwise the system does not work The labels with the numbers assigned in the factory are affixed at the right flange of the front side and at the ID card on top of the cover as described in figure Labels on Front and Rear of the Storage Expansion Module on page 82 The table below shows the numbering schemes for the storage array s Storage Modules Denotation DX100 S3 base CE 1 DX100 S3 expansion mo...

Page 85: ...a PRIMECENTER rack the following parts are required l Support bracket l One support system on the left and one on the right General information is provided in the technical manual for the PRIMECENTER rack When mounting the left telescopic rail in the PRIMECENTER rack the supplied support bracket must first be mounted on the rear left support upright flush with the bottom edge of the device Fitting...

Page 86: ...Outer Telescopic Rail Start with the left rail To release the locking mechanism press the rear side of the toothed levers together 1 and pull the hook simultaneously as far as it will go 2 If the toothed levers are difficult to access you can use the unlocking tool to release it see delivery pack Put the unlocking tool into the holes of the toothed levers Press the toothed levers together in the d...

Page 87: ...see label or imprint on the rail 2 Position the rail on the rear left support bracket by inserting the retaining bolts 1 3 Press the rail together 2 4 Move the rail outwards until the designated position grid of support upright is reached 3 The black bolts must lock in the corresponding holes 5 Press the bracket backwards until the rail engages 4 ETERNUS CS800 87 5 Installing the ETERNUS CS800 S6 ...

Page 88: ...s to be tightened with max 1Nm Figure 54 Mounting the server onto the rack rails 1 Fully extend the telescopic rails until they lock in place 1 The telescopic rails must click into place so that they can no longer be moved 2 At a slight angle lower the server onto the rear mounting point on the telescopic rails 2 3 Fold down the server 3 while pressing the rails inwards to the server sides Ensure ...

Page 89: ...ling a Storage Module in the Rack CAUTION Do not uninstall the drives that are installed by default or move them to any other slot Contact your sales representative or maintenance engineer if drives that are installed by default need to be uninstalled or moved to another slot Attaching the Slide Rails to the Rack The position of the 1HU support bracket is determined relatively to the base line of ...

Page 90: ...e module 1 Push further M5 cage nuts into the 5th holes too 2 Figure 57 Inserting the Cage Nut 3 Attach the support bracket to the left rear rack pillar see Fitting the Support Bracket on page 85 4 Insert the pins of the left slide rail in the 1st and 3rd holes from the bottom of the support bracket see 1 in figure Inserting the Pins of the Left Slide Rail on page 91 90 ETERNUS CS800 ...

Page 91: ...DX100 S3 Module 1 Install the JX40 S2 DX100 S3 Storage Module in the rack CAUTION If the ETERNUS CS800 uses multiple storages modules Double check the identifier label of the module to ensure the correct order of the modules see figure Labels on Front and Rear of the Storage Expansion Module on page 82 When installing the storage module to the rack make sure to have the right and left sides and th...

Page 92: ... intlevel2 118846 intFehlercode 0 NavIDs For detailed information about installation of the DX100 S3 module in a PRIMECENTER rack see the following manual http support ts fujitsu com Manuals ShowManuals asp LNG COM LNID 35 intlevel2 118846 intFehlercode 0 NavIDs 5 3 Cabling the ETERNUS CS800 S6 System This chapter provides cabling diagrams for the different ETERNUS CS800 S6 configurations In order...

Page 93: ... is delivered The stickers on it are intended to label the storages modules and their power cables CE DE x JX40 x as well as the internal LAN and FC cables to connect the DX100 to the server of the Scale model The cells within the tables below should represent the labels All components delivered with the initial order of the system are already labeled in the factory i e the appropriate positions a...

Page 94: ...8 P1 CE CM1 CA0 P0 CE CM1 CA0 P0 Server Slot8 P1 JX40 Modules ENTRY JX40 1 JX40 1 JX40 1 JX40 1 JX40 1 JX40 1 JX40 2 JX40 2 JX40 2 JX40 2 JX40 2 JX40 2 JX40 3 JX40 3 JX40 3 JX40 3 JX40 3 JX40 3 5 3 1 Entry System without ETERNUS JX40 S2 Option There are four different versions of the Entry model without the JX40 option which can be distinguished by the ports respectively the PCI slots used see tab...

Page 95: ...System without 8 Gb s Fibre Channel and without 10 Gb s Ethernet Figure 61 Entry System with 8 Gb s Fibre Channel Figure 62 Entry System with 10 Gb s Ethernet ETERNUS CS800 95 5 Installing the ETERNUS CS800 S6 Modules ...

Page 96: ... the appropriate devices 5 3 2 Entry System with ETERNUS JX40 S2 Option There are four different versions of the Entry model with the JX40 option which can be distinguished by the ports respectively the PCI slots used in the server see table Usage of PCI Slots Entry System with JX40 S2 option on page 55 Optionally up to three ETERNUS JX40 S2 storage modules can be connected to the server to provid...

Page 97: ...Figure 64 Entry System without 8 Gb s Fibre Channel and without 10 Gb s Ethernet ETERNUS CS800 97 5 Installing the ETERNUS CS800 S6 Modules ...

Page 98: ...5 3 Cabling the ETERNUS CS800 S6 System Figure 65 Entry System with 8 Gb s Fibre Channel Figure 66 Entry System with 10 Gb s Ethernet 98 ETERNUS CS800 ...

Page 99: ... supply unit of the server are connected with the same phase 2 If JX40 storage modules are available Connect the SAS IN port of the first JX40 module labeled JX40 1 to the upper port of the SAS RAID card in slot 7 of the server as shown by figure Entry System without 8 Gb s Fibre Channel and without 10 Gb s Ethernet on page 97 If there are further JX40 modules connect the OUT port of the module JX...

Page 100: ...cted 4 If your ETERNUS CS800 also provides FC ports Connect them to the SAN or directly to the appropriate devices 5 3 3 Scale System There are three different versions of the Scale model which can be distinguished by the ports respectively the PCI slots used in the server see table Usage of PCI Slots Scale System on page 59 Optionally up to ten ETERNUS DX100 S3 drive enclosures can be connected t...

Page 101: ... LAN1 at LoM b CM 1 MNT port has to be connected to the uppermost LAN port of the PCI card in slot 7 Appropriate labels should be already affixed to the cables or can be taken from the section LAN Cabling SCALE of the label sheet see CS800 Labelsheet on page 93 2 Connect the host interface adapters CA 1 of both DX100 controller modules to the server ETERNUS CS800 101 5 Installing the ETERNUS CS800...

Page 102: ...cables delivered together with the system CAUTION The sequence of the DX100 storage expansion modules must be observed precisely when they are mounted and connected to each other see Labels on Front and Rear of the Storage Expansion Module on page 82 Otherwise the system will not work and might get damaged The SAS cabling of the DX100 storage modules has to be prepared in the form of a so called r...

Page 103: ... with two to ten drive enclosures on page 104 are depicting the cabling with a top down arrangement of the modules Figure 70 ETERNUS DX100 S3 cabling with one drive enclosure ETERNUS CS800 103 5 Installing the ETERNUS CS800 S6 Modules ...

Page 104: ...f DE 1 must be connected to the IOM 0 SAS IN port of DE 2 If there are further DE s they must be connected in the same way The IOM 0 OUT port of the always last DE remains unused c The SAS port of CE CM 1 must be connected to the IOM 1 SAS IN port of the always last DE d Only if there are more than just one DE The IOM 1 SAS OUT port of the last DE must be connected to the IOM 1 SAS IN port of the ...

Page 105: ...ifferent versions of the Scale model which can be distinguished by the ports respectively the PCI slots used in the server see table Usage of PCI Slots Scale System on page 59 Please refer to the pictures below to identify the model and to see which ports can be connected to the LAN and SAN Figure 72 Scale System with 8Gb s FC option Figure 73 Scale System with the 1 Gb s Ethernet and 8Gb s FC opt...

Page 106: ...Scale system to the mains as well as to the LAN and optionally to the SAN or appropriate devices 1 Connect a power cable to each power supply of the components 2 Connect the LAN ports and optionally the iRMC port to the appropriate networks At least one of the LAN ports must be connected 3 If your ETERNUS CS800 also provides FC support Connect the FC ports to the SAN or directly to the appropriate...

Page 107: ...stall multiple ETERNUS CS800 systems at the same time an IP address conflict can occur because each system is configured with the same default IP addresses 10 1 1 1 for the system and 10 17 21 199 for the iRMC To avoid this problem install one system and configure it to use a different IP address before you connect another system to the network 6 1 Switching on the System Proceed as follows 1 Scal...

Page 108: ...rebooted and powered off without any restriction If the storage base module needs to be powered off this can be done using the power switch on the front panel As soon as the storage base is powered on again the Background Initialize process is automatically continued If an additional expansion module is integrated a Background Initialize process is also started here The same rules apply as above I...

Page 109: ...nd sharing into the Search box in the Start Menu and select Network and Sharing Center when it comes up When Network and Sharing Center opens click on Change adapter settings b Right click the network connection that corresponds to the Ethernet port you have connected to the server for example Local Area Connection and click Properties c Select Internet Protocol TCP IP in the list of connections t...

Page 110: ...ed Wizard 6 3 1 Login Welcome License Agreement See Supported Browsers on page 133 for information about the browsers supported by the ETERNUS CS800 Web GUI Proceed as follows 1 On the notebook a Open a supported Web browser b Type 10 17 21 1 in the Address box Press Enter The Login page displays see figure below If the Login page does not display verify that you entered the correct IP address 10 ...

Page 111: ...r b Type spcc for the password c Click Login 3 ETERNUS CS800 Welcome page displays see figure below Click Next Figure 77 ETERNUS CS800 Welcome Page 4 ETERNUS CS800 License Agreement page displays ETERNUS CS800 111 6 Initial Configuration Connecting with the Network ...

Page 112: ...d Wizard Scroll down to the bottom of the page and click I have read and accept this License Agreement see figure below Figure 78 ETERNUS CS800 Licence Agreement Page 5 The ETERNUS CS800Access Control page displays 112 ETERNUS CS800 ...

Page 113: ...zed service personnel and Fujitsu Customer Support only l Optionally further accounts can be enabled at the Access Control page later on see Access Control on page 337 CAUTION Keep both passwords in a safe place If they get lost you will not be able to access your ETERNUS CS800 S6 anymore Also the Fujitsu customer support will not be able to help you in such a case After clicking at the Next butto...

Page 114: ...6 3 Running the Getting Started Wizard 6 3 3 Network Configuration Figure 80 Network Configuration 114 ETERNUS CS800 ...

Page 115: ...bnets You can choose to allow any traffic type management replication or data on an interface In this case the routing of different traffic types as well as firewall capability must be controlled using the network infrastructure routers and switches that the ETERNUS CS800 is connected to The iRMC port of the server cannot be configured through the Web GUI of the ETERNUS CS800 Using the iRMC port i...

Page 116: ...s on page 120 Configuring Interface Routing on page 123 Configuring General Network Settings Under General enter the following network information as provided by your network administrator see Network Page General on page 116 Figure 81 Network Page General When entering IP addresses never use an address that is in a reserved IP address range To see a list of reserved IP address ranges click the qu...

Page 117: ... up to 6 domain names The first domain name listed is used as the local domain Domain names must contain only letters A Z a z numbers 0 9 dots and hyphens Primary Secondary and Tertiary DNS IP Address Optional The IP addresses of up to three DNS servers used to resolve domain names and translate them into IP addresses You must specify a DNS IP address if you plan to use hostname format when config...

Page 118: ...gned to the same device are bonded together into a single logical port For example if you select bond0 for port eth1 and port eth2 both ports are bonded together in the bond0 device A bonded device can contain two or more ports All ports associated with a bond must have the same link speed 1GbE or 10GbE 3 For each bonded device specify the bonding mode To maintain network connectivity the switch c...

Page 119: ...thernet switch ports must be configured in a 802 3ad based Link Aggregation group LAG in LACP mode The ETERNUS CS800 frame reception and transmission is controlled by the LACP between the bonded ports and the Ethernet switch ports Active Backup Mode 1 This option does not require switch configuration but may not provide the same level of load balancing and performance as other bonding modes Only o...

Page 120: ...TU frame size of 1 500 bytes is used 9000 MTU The jumbo MTU frame size of 9 000 bytes is used For best performance make sure the entire network path to the ETERNUS CS800 is configured to use 9000 MTU 3 Click Update to save the changes you made to the Interface Details table Clicking Update does not yet apply the new network settings to the ETERNUS CS800 4 Click Undo to revert to all current Interf...

Page 121: ... box to disable VLAN tagging for the interface VLAN tagging allows you to assign an interface to a virtual local area network VLAN With VLAN tagging you can route different traffic types management data and replication over different VLANs making sure traffic types do not mix If VLAN tagging is enabled enter the VLAN Tag ID for the interface Valid values are 2 to 4094 You can assign only one tag I...

Page 122: ...y to ensure external communication 4 Enter the following network information as provided by your network administrator all fields are required IP Address The IP address of the interface Netmask The network mask of the interface Gateway The gateway of the ETERNUS CS800 This is usually not the same as the default gateway 5 If necessary specify NAT Network Address Translation settings for the interfa...

Page 123: ...able changes to the last update When you add a network interface a default route via the default gateway is automatically created for the interface after network settings are applied and the ETERNUS CS800 reboots For example if you add an interface with IP address 10 20 185 172 a route with the destination IP address 10 20 185 0 is automatically added If you delete the default route it is automati...

Page 124: ...twork mask for the route Dest Gateway The gateway IP address used for outgoing traffic sent from the interface to a host or client This is usually not the same as the default gateway The destination gateway of each route must match the subnet of at least one configured IP address listed in the IP Address Table If no match is found an error displays stating that the route s destination gateway is n...

Page 125: ...source ETERNUS CS800 to make sure the replication interface is correctly selected when replicating data to the target ETERNUS CS800 See the following examples for details Example 1 Segments and Target on Different Subnets on page 125 Example 2 Segments and Target on the Same Subnet on page 126 Example 3 Segments on the Same Subnet and Target on a Different Subnet on page 127 Example 1 Segments and...

Page 126: ...mple 1 Example 2 Segments and Target on the Same Subnet In the example below see Interface Routing Example 2 on page 127 the ETERNUS CS800 has two segmented interfaces one for data and management traffic and one for replication traffic l The source ETERNUS CS800 management data IP address the source ETERNUS CS800 replication IP address and the target ETERNUS CS800 IP address are all on the same su...

Page 127: ...urce ETERNUS CS800 replication IP address are on the same subnet 192 168 10 x The target ETERNUS CS800 IP address is on a different subnet 192 168 20 x l To make sure the replication segment is used when communicating with the target ETERNUS CS800 you must add a network route in the Routing Details section on the source ETERNUS CS800 In this example you would specify the following routing details ...

Page 128: ...at the bottom of the Network page displays a graphical representation of the Ethernet ports as they appear on the rear of the system The diagram indicates the current bonding configuration and connectivity status for all Ethernet ports l Ports that are bonded together in an interface are shaded the same color l A green border indicates a port is connected to a network l A red border indicates a po...

Page 129: ...Figure 89 Date Time Page To set the system date and time ETERNUS CS800 129 6 Initial Configuration Connecting with the Network ...

Page 130: ...ver or Pool Type the name or IP address of the NTP server or pool See http support ntp org for information about publicly available NTP servers To verify that the ETERNUS CS800 can communicate with the NTP server or pool click Test NTP Manual Date Time Settings Select this option to manually set the system date and time Specify the New System Date by clicking the calendar icon Specify the New Syst...

Page 131: ... Settings A message appears that after clicking yes your changes will be applied and the system will reboot automatically see figure below Click Yes ETERNUS CS800 131 6 Initial Configuration Connecting with the Network ...

Page 132: ...6 3 Running the Getting Started Wizard Figure 91 Confirm Page 132 ETERNUS CS800 ...

Page 133: ... data replication activities see Replication on page 363 l Monitor hardware status and system performance see Status on page 407 l View administration alerts and resolve service tickets see Alerts on page 433 l Configure storage presentation data replication and system settings see Configuration on page 199 l Run diagnostic tools and maintain the system see Utilities on page 441 7 2 Accessing Remo...

Page 134: ...the ETERNUS CS800 2 In the browser address box type the IP address of the ETERNUS CS800 and then press Enter The Login window displays see Login Window on page 134 Figure 92 Login Window If the Login window does not display verify that the IP address is correct and that the network path to the ETERNUS CS800 is valid Also verify that you are using a supported Web browser Then try again If you are s...

Page 135: ...e ETERNUS CS800 remote management console Password changes are not allowed Passwords are limited to 32 characters Alphanumeric characters and special characters are allowed Passwords can be changed on the Access Control page see Access Control on page 337 4 Click Login 5 If a security banner message has been specified for the ETERNUS CS800 click Accept For information about specifying a security b...

Page 136: ...s changes will overwrite the other s Always coordinate configuration changes with other Administrator users Logging Off of the ETERNUS CS800 When you are done working in the ETERNUS CS800 remote management console click Logout on the upper right of the remote management console to end your session If the ETERNUS CS800 remote management console is idle for more than 30 minutes default setting the s...

Page 137: ...e ETERNUS CS800 Status Displays the operating state of the ETERNUS CS800 l Normal Green The system is operating correctly l Attention Yellow There is a problem with the system The state displays Attention during a blockpool verify operation see Blockpool Verify Behavior on page 140 l Verify Failure Red The blockpool verify process has failed l Low Space Yellow Available disk space is low Ingest an...

Page 138: ...e system is paused see Replication Service on page 404 In addition space reclamation and compaction are automatically started to free up disk space see Space Reclamation on page 449 Logout Click to end your remote management session Help Menu Select from the following help options Help Contents Open the ETERNUS CS800 online help Online Documentation Access documentation resources on the Fujitsu We...

Page 139: ...and replication occur as normal Space reclamation occurs at normally scheduled times Low Space Yellow Free Space is less than 850 GB 100 GB x total usable capacity in TB 10 TB Low Capacity button is lit Backup ingest and replication occur as normal Space reclamation is automatically started Critical Reserve Space Red Free Space is less than 250 GB Low Capacity button is lit Backup ingest and repli...

Page 140: ...While a blockpool verify operation is in progress some system operations are affected l Mounting VTL cartridges created prior to the blockpool verify may fail l Retrieving data created prior to the blockpool verify may fail l Creating and mounting new VTL cartridges should succeed l Ingesting new data to new VTL cartridges or using NAS OST should succeed l Sending data that existed prior to the bl...

Page 141: ...systems For more information see the ETERNUS CS800 Advanced Reporting User s Guide 6 67353 Clicking Wizards on the main menu replaces the main menu with the wizards menu Click a menu item to begin a wizard or click Exit to return to the main menu see Configuration Wizards on page 145 Figure 96 Main Menu Management Pages Use the ETERNUS CS800 management pages to view information as well as configur...

Page 142: ...n or field to learn more about that item Management pages related to VTL virtual tape library and Fibre Channel status and configuration do not display for ETERNUS CS800 NAS configurations Similarly management pages related to NAS network attached storage and OST OpenStorage technology do not display for ETERNUS CS800 VTL configurations CAUTION Unless directed to do so by the documentation do not ...

Page 143: ...Figure 97 Remote Management Pages Map ETERNUS CS800 143 7 Remote Management ...

Page 144: ...144 ...

Page 145: ...he Configuration Wizards page displays the first time you log on to the remote management console after completing the Getting Started wizard After that to access the Configuration Wizards click Wizards on the main menu This replaces the main menu with the Wizards menu see Wizards Menu on page 147 The Wizards menu includes the following wizards Wizard Description NAS NAS and Multi Protocol configu...

Page 146: ...176 Before exiting the Wizards menu Fujitsu Technology Solutions recommends configuring an e mail server and enabling automatic e mails To help maintain system integrity Fujitsu Technology Solutions regularly collects system information through automatic e mails These e mails contain configuration and status information only and do not contain any customer data stored on the system AIS Advanced In...

Page 147: ...h the process of adding one or more NAS shares to receive backup data The NAS Wizard is available in ETERNUS CS800 NAS and Multi Protocol configurations only You cannot use the NAS wizard to edit existing shares For more information about working with NAS shares see NAS Configuration on page 200 To begin the NAS wizard on the Wizards menu click NAS Step 1 About 1 Read the information about the wiz...

Page 148: ...zard Protocol on page 149 l Windows CIFS All hosts that will interact with the ETERNUS CS800 run Windows l UNIX Linux NFS All hosts that will interact with the ETERNUS CS800 run UNIX or Linux l Both Windows UNIX Linux Both types of hosts Windows and UNIX Linux will interact with the ETERNUS CS800 2 Click Next to continue 148 ETERNUS CS800 ...

Page 149: ...oining the ETERNUS CS800 to the Windows network see NAS Wizard Windows on page 151 l Active Directory Add the ETERNUS CS800 to a Windows network using Active Directory l Workgroup Add the ETERNUS CS800 to a workgroup on a Windows network To disjoin a domain see Windows Domain on page 207 2 In the Domain Workgroup Name box enter the name of the domain or workgroup the ETERNUS CS800 is joining ETERN...

Page 150: ...it in the domain The ETERNUS CS800 will become a member of this organization Administrator Name Enter Administrator or any user that has the right to join the domain By default any user belonging to the Administrators group or the Domain Admins group has the right to join the domain In addition any user can join the domain if they are specifically delegated this right by a member of the Administra...

Page 151: ...assword Enter the password for the workgroup user Confirm Password Enter the password again to confirm it Description Optional Enter a brief description of the workgroup user Grant Administrator Privileges Select the check box to add the workgroup user to the Windows Administrators group This allows the workgroup user to override certain permissions settings and prevents the workgroup user from be...

Page 152: ...re administrator Fully Qualified User or Group Name Enter the administrator s user or group name 2 Click Add 3 Optional To add additional workgroup users or share administrators repeat Steps 1 2 4 Click Next to continue Figure 102 NAS Wizard Share Access 152 ETERNUS CS800 ...

Page 153: ... enable or disable data deduplication after the share is added Hide from network browsing Windows shares only Select the check box to hide the share from network browsing If selected you cannot see the share when browsing the network Export Protocol Available only if you selected the Both option in Step 2 Protocol Select the export protocol for the share l CIFS Select the CIFS option to use the sh...

Page 154: ... click Previous to return to a previous step to make changes 2 To make changes to a NAS share you added first select the share and click Delete to delete the share Then click Previous to return to the previous step and add a new share 3 After you have confirmed all settings click Finish The wizard configures the ETERNUS CS800 with the settings you selected 154 ETERNUS CS800 ...

Page 155: ...al media discovering hosts and mapping partitions to hosts The VTL Wizard is available in ETERNUS CS800 VTL and Multi Protocol configurations only You cannot use the VTL wizard to edit or add media to existing partitions or to edit existing host access groups For more information about working with VTL partitions see VTL Configuration on page 216 To begin the VTL wizard on the Wizards menu click V...

Page 156: ...lect the library model emulated by the partition The library model determines the inquiry string returned to the host by the ETERNUS CS800 The following library models are available l Fujitsu CS TL l ADIC Scalar 100 ADIC Scalar i2000 or ADIC Scalar i500 l ADIC Pathlight VX Number of Storage Slots Accept the default number of storage slots based on model or enter the number of storage slots in the ...

Page 157: ...sting partition to make them available for use in a new partition Enable deduplication Select the check box to enable data deduplication Fujitsu Technology Solutions recommends that you enable data deduplication to optimize disk usage Data deduplication is enabled by default You cannot enable or disable data deduplication after the partition is added Enable Auto Export When a tape is moved from a ...

Page 158: ...n the initial location For example if 50 I E slots are available you cannot create more than 50 cartridges if the initial location is set to I E Slot Number of Media The number of cartridges to create in the partition Starting Barcode The first barcode number in the cartridge sequence You can enter any alpha numeric string for the starting barcode Subsequent barcodes are incremented accordingly Fo...

Page 159: ...e custom cartridge capacity in the box Make sure the value is within the acceptable range displayed next to the box 3 Click Add 4 Optional To add additional media repeat Steps 1 3 Click Next to continue Figure 107 VTL Wizard Add Media Step 4 Discover Remote Hosts 1 Click Discover Remote Hosts to list all hosts that are known to the ETERNUS CS800 see VTL Wizard Discover Remote Hosts on page 160 A h...

Page 160: ...Fibre Channel target ports 2 Enter information about the host Remote Host WWPN Enter the World Wide Port Name WWPN of the host Alias Enter a descriptive alias for the host 3 Click Apply 4 Optional To discover additional hosts repeat Steps 1 3 5 Click Next to continue Figure 108 VTL Wizard Discover Remote Hosts Step 5 Map Remote Hosts 1 Enter information about the host access group see VTL Wizard M...

Page 161: ... Select the Use CCL check box to use the Command and Control LUN The CCL Command and Control LUN is not used in most environments This option is recommended for host access groups that contain an HP UX host It can also be used if hosts that are not assigned to any host access group exist in the SAN The CCL is accessible to hosts only through LUN 0 CAUTION If you are not sure if you should use CCL ...

Page 162: ...Wizard Confirm 8 4 OST Wizard The OST wizard provides guided assistance for configuring the ETERNUS CS800 to present its storage as one or more OST OpenStorage storage servers for use with a backup application The wizard guides you through the process of adding one or more OST storage servers configuring LSUs logical storage units and adding OST users The wizard also provides a link for downloadin...

Page 163: ...rifying state The OST server is available for backup only in Ready state 2 Click Next to continue At any time while using the wizard you can click Previous to return to the previous step At any time while using the wizard you can click Previous to return to the previous step Figure 111 OST Wizard About Step 2 Add Storage Servers 1 Under Add Storage Server enter information about the storage server...

Page 164: ...uently occurs the operation is more efficient because a portion of the required data has already been replicated to the target storage server To configure the target ETERNUS CS800 see Replication Wizard on page 169 When Concurrent Optimized Duplication is enabled all data on the storage server is duplicated not just the specified images 2 Select the check box for each optimized duplication target ...

Page 165: ...rage server you cannot add additional LSUs to that same storage server After you add an LSU that uses the Available Capacity option you cannot change the LSU to use the Specific Capacity option Instead you must delete the LSU then add a new LSU and choose the Specific Capacity option see Deleting an LSU on page 258 Specify Capacity Select this option to specify the physical capacity of the LSU and...

Page 166: ...bout the authenticated user see OST Wizard Add Users on page 167 Username Enter the name of the authenticated user Password Enter the password for the authenticated user Confirm Password Enter the password again to confirm it Description Optional Enter a brief description of the authenticated user 2 Click Apply The user displays in the Users Added table 3 Optional To add additional users click Add...

Page 167: ...tables If necessary click Previous to return to a previous step to make changes 2 To make changes to storage servers LSUs or users you added click Previous to return to the appropriate step Select the incorrect item and click Delete to remove it and then add a new item 3 After you have confirmed all settings click Finish The wizard configures the ETERNUS CS800 with the settings you selected ETERNU...

Page 168: ...zard Download OST Client Plug in on page 169 On the download page download the correct OST Plug in for your backup application and operating system Also on the download page click Installation Instructions to download the OST Plug in Installation Instructions Follow the instructions to install the OST Plug in on your media server 168 ETERNUS CS800 ...

Page 169: ...m can receive data from up to 10 sources A source system can send data to up to two targets Finally one system can act as both a source and a target Additional Information l For more information about working with data replication see Replication on page 363 l Use the Replication wizard or the Configuration Replication page to configure other ETERNUS CS800 systems that this ETERNUS CS800 is config...

Page 170: ...Delete to remove the target Before specifying a target make sure you have completed the Replication wizard on the target ETERNUS CS800 The target ETERNUS CS800 must be configured to allow the source ETERNUS CS800 hostname or IP address You can specify up to two targets a In the Target Hostname or IP Address box enter the hostname or IP address of the system that will receive the replicated data Wh...

Page 171: ...quired If the target system is at ETERNUS CS800 2 0 1 x Software or below then you must enter the IP address by which the target system recognizes the source system The default value is 0 0 0 0 2 If data on other ETERNUS CS800 systems will be replicated to this ETERNUS CS800 enter the following information under Source a In the Source Hostnames or IP Addresses box enter the hostname or IP address ...

Page 172: ... use the NAS Configuration Wizard see NAS Wizard on page 147 2 To configure the share to replicate its data to another ETERNUS CS800 system enter the following information under Send a Select the Enable replication for selected share check box to enable replication for the share b Optional Select the Enable Directory File based replication to target check box to enable Directory File Based Replica...

Page 173: ...mation under Receive a Optional Select the Enable Directory File based replication to this ETERNUS CS800 check box to enable Directory File Based Replication for the share and then enter a Sync ID in the box The Sync ID is used to identify the source share that will send replicated data to the target share The Sync ID must be identical to the Sync ID of the source share on the source system b If y...

Page 174: ...ion for the partition b Optional Select the Enable Cartridge based replication to target check box to enable Cartridge Based Replication for the partition and then enter a Sync ID in the box With Cartridge Based Replication a cartridge is automatically replicated when it is unmounted After replication the replicated cartridges are immediately available on the target system The Sync ID is used to i...

Page 175: ...on The Sync ID must be identical to the Sync ID of the source partition on the source system b If you enabled Cartridge Based Replication select an Access option Locked The partition is not allowed to receive new Cartridge Based Replication data Unlocked The partition is allowed to receive new Cartridge Based Replication data You cannot configure a partition to both send and receive Cartridge Base...

Page 176: ...ssistance for configuring the ETERNUS CS800 to automatically send notifications and reports to selected recipients The wizard helps you configure an outgoing e mail server Then the wizard guides you through the process of specifying e mail recipients and selecting the notifications and reports to send to the recipients For more information about sending e mail alerts see Email on page 294 To begin...

Page 177: ...by the ETERNUS CS800 3 Specify a return address that lets you easily identify the system that generated the e mail for example systemname any domain com The return address must contain an symbol and a valid domain name including a period 4 Optional Select the Enable Admin Alerts about Email Server not configured check box to have system generate administration alerts to notify you if an e mail ser...

Page 178: ...ain any customer data stored on the system 6 Click Next to continue Figure 123 Email Alerts Wizard Server Step 3 Recipients 1 Click Add to add an e mail recipient 2 Under Add Email Recipient enter information about the recipient see Email Alerts Wizard Recipients on page 180 Name The name of the recipient Email Address The e mail address of the recipient 178 ETERNUS CS800 ...

Page 179: ...ion and performance of the ETERNUS CS800 may be degraded l All Send e mail notifications for High Middle and Low service tickets as well as any administration alerts Low service tickets indicate that a minor problem occurred and needs to be resolved but the operation and performance of the ETERNUS CS800 are not significantly affected 3 Select the Notification Enabled check box to enable sending of...

Page 180: ...ings you selected to make sure they are correct If necessary click Previous to return to a previous step to make changes see Email Alerts Confirm on page 181 2 After you have confirmed all settings click Finish The wizard configures the ETERNUS CS800 with the settings you selected 180 ETERNUS CS800 ...

Page 181: ...d dial in services Completing the AISConnect Wizard is strongly recommended in order to guarantee fast support actions in case of hardware failures and other system failures The setup of AISConnect consists of two tasks l Configuring and enabling the AISConnect service which is done with the AISConnect Wizard l Registering the ETERNUS CS800 system with the Fujitsu Service Centre ETERNUS CS800 181 ...

Page 182: ...ce request at the Fujitsu Service Desk http ts fujitsu com support servicedesk html For more information about AIS Connect see AIS Connect on page 315 To begin the AISConnect wizard on the Wizards menu click AIS Connect Step 1 About 1 Read the information about the wizard see the Figure below 2 Click Next to continue At any time while using the wizard you can click Previous to return to the previo...

Page 183: ...x if the proxy server requires NTLM NT LAN Manager authentication l Username Enter the username to use for proxy authentication l Password Enter the password to use for proxy authentication l Country Select the country where the ETERNUS CS800 is located 2 Click Next Figure 127 AISConnect Wizard Proxy Step 3 Confirm After you have confirmed all settings click OK The wizard configures the ETERNUS CS...

Page 184: ...8 7 AIS Connect Figure 128 AISConnect Wizard Confirm 184 ETERNUS CS800 ...

Page 185: ... see Home Page on page 186 Use the Home page to see important performance information at a glance including disk usage data reduction statistics and replication activity To return to the Home page at any time click Home on the main menu The Home page contains the following overviews l System Overview on page 186 l Disk Usage on page 187 l Data Reduction Statistics on page 189 l Replication on page...

Page 186: ...me Page 9 2 System Overview The ETERNUS CS800 System Overview on the Home page see ETERNUS CS800 System Overview on page 186 displays the following information about the system Figure 130 ETERNUS CS800 System Overview 186 ETERNUS CS800 ...

Page 187: ...on page 454 Serial Number The serial number of the ETERNUS CS800 9 3 Disk Usage The Disk Usage overview on the Home page see Disk Usage Overview on page 187 displays the following information about disk usage as an amount and as a percentage of the total capacity in the system Figure 131 Disk Usage Overview Disk Usage Information Description Disk Capacity The total usable disk capacity of the ETER...

Page 188: ...ter to see more information l When disk space is low target replication to the system is paused see Replication Service on page 404 l Space reclamation is automatically started to free up disk space see Space Reclamation on page 449 l For optimal system performance Fujitsu Technology Solutions recommends keeping the amount of Available Disk Space free space at 20 or more Click Show More to display...

Page 189: ...ystem configuration files as well as temporary files created during replication space reclamation and healthchecks Click an item to view detailed statistics for disk usage see Disk Usage on page 421 9 4 Data Reduction Statistics The Data Reduction Statistics overview on the Home page see Data Reduction Statistics Overview on page 189 displays the following information about the results of data red...

Page 190: ...ETERNUS CS800 This does not include incoming data from ETERNUS CS800 or incoming data from Failback replication Shares Partitions The amount of data stored on the ETERNUS CS800 via local I O This includes incoming data from Directory File or Cartridge Based Replication and incoming data from Failback replication OST Storage Servers The amount of data stored in deduplicated OpenStorage OST storage ...

Page 191: ...s on page 191 l Receive Settings Cumulative Statistics on page 193 Figure 133 Replication Overview Send Settings Cumulative Statistics The Send Settings Cumulative Statistics section displays statistics for all data sent from the system since system installation or since Send cumulative replication statistics were last cleared by clicking Clear Send on the Replication Actions page ETERNUS CS800 19...

Page 192: ...t were not replicated see Reports on page 406 l Manually Paused Yellow Replication was manually paused To resume replication click Resume l System Paused Yellow The system has automatically paused replication due to a problem for example low disk space or a problem on the target system To see more information about the problem that occurred click Admin at the top of the remote management console t...

Page 193: ...alue is usually much less than the Original Data Size due to the benefits of data deduplication and compression Average Send Rate The average send rate in MB s of data sent over the network during replication or failback Actual Data Sent divided by the amount of time required to complete replication or failback Receive Settings Cumulative Statistics The Receive Settings Cumulative Statistics secti...

Page 194: ...n or failback Actual Data Received divided by the amount of time required to complete replication or failback 9 6 Current Activity The Current Activity overview on the Home page see Current Activity Overview on page 194 displays the following information about system activity that occurred in the previous minute Figure 134 Current Activity Overview 194 ETERNUS CS800 ...

Page 195: ...mits the amount of data it sends during source replication so that it does not exceed the specified bandwidth Click to enable or disable system throttling see Replication Configuration on page 270 Ethernet The amount of data received In and sent Out by all Ethernet ports in MB s Click to view details statistics for Ethernet performance see Ethernet on page 415 Fibre Channel VTL and Multi Protocol ...

Page 196: ...ation Inline Accent The inline data flow throughput in MB s Inline data flow represents the original native size of the data protected by the ETERNUS CS800 Ethernet In Accent The amount of data received by all Ethernet ports in MB s This amount represents the reduced size of the data protected by the ETERNUS CS800 after deduplication and compression on the media servers Accent Bandwidth Reduction ...

Page 197: ...ion about all system activity see ETERNUS CS800 Overview on page 407 l ETERNUS CS800 Accent activity displays only if ETERNUS CS800 Accent is currently enabled or was previously enabled see ETERNUS CS800 Accent on page 268 ETERNUS CS800 197 9 Home Page ...

Page 198: ...198 ...

Page 199: ...uration Overview The Configuration page allows you to configure the features of the ETERNUS CS800 including storage presentation data replication system settings and notifications To access the Configuration page click the Configuration menu The Configuration page contains the following tabs l NAS Configuration on page 200 l VTL Configuration on page 216 l OST Configuration on page 241 l Replicati...

Page 200: ...onfiguration Wizards on page 145 CAUTION Filenames on NAS shares are limited to a length of 256 bytes If a filename uses Japanese characters the filename can be no longer than 85 characters This is because each Japanese character is represented by 3 bytes To access the NAS page click the Configuration menu and then click the NAS tab The NAS page contains the following tabs l NAS Summary on page 20...

Page 201: ...system see Deleting a NAS Share on page 206 NAS Shares List The NAS Shares List section displays the following information for all NAS shares on the ETERNUS CS800 Shares The number of shares that have been added to the system Maximum The maximum number of shares that can be added to the system NFS The number of existing shares configured to use the NFS protocol for Linux networks CIFS The number o...

Page 202: ...ting a NAS Share on page 204 l Scheduled Replication is scheduled for the share Click to view or modify the schedule see Scheduling a Share or Partition for Replication on page 290 Targets The targets the share is configured to replicate to Description A brief description of the NAS share if available Additional Information l Click a column heading to sort the rows in the table by that column Clic...

Page 203: ...e names are not case sensitive For example if you create a share named nas1 you cannot create another share named NAS1 because the system considers the names to be the same Description Optional Enter a brief description of the share Hide from network browsing CIFS shares only Select the check box to hide the share from network browsing If selected you cannot see the share when browsing the network...

Page 204: ...al Under Replication Settings specify replication settings For more information about configuring replication for a share or to set up replication for the share at a later time see Replication on page 363 4 Click Apply When you create a CIFS share the initial permissions are the same as the default permissions for a Windows 2003 share with the addition of an ACE Access Control Entry that permits f...

Page 205: ...users to access this share options can be changed Description Optional Enter a brief description of the share Enforce read only access Select the check box to make the share read only If selected you cannot write to the share Hide from network browsing CIFS shares only Select the check box to hide the share from network browsing If selected you cannot see the share when browsing the network ETERNU...

Page 206: ...gs For more information about configuring replication for a share or to set up replication for the share at a later time see Replication on page 363 4 Click Apply If you modify a NAS share that uses the CIFS protocol you must restart the CIFS service for the changes to take effect To restart the CIFS service first disjoin the Windows workgroup then join it again see Windows Domain on page 207 Rest...

Page 207: ...ndows domain using SMB To use a NAS share configured for the CIFS protocol on a Windows network you must first join the ETERNUS CS800 to a workgroup or a domain After you join the ETERNUS CS800 to a workgroup or a domain CIFS shares are available for use on the Windows network To access the Windows Domain page on the NAS page click the Windows Domain tab see Windows Domain Page on page 207 Figure ...

Page 208: ...xample Workgroup or Sales 2 Click Apply When an SMB server is joined to a workgroup share security is managed directly from the remote management console For a CIFS share security is provided through the read only or read write access to the share By default when a CIFS share is created the default security setting allows access for all users Any access restrictions on individual users can be mana...

Page 209: ... this organization Administrator Name Enter Administrator or any user that has the right to join the domain By default any user belonging to the Administrators group or the Domain Admins group has the right to join the domain In addition any user can join the domain if they are specifically delegated this right by a member of the Administrators group Administrator Password Enter the password for t...

Page 210: ...ows domain using Active Directory You can add users or administrators change user privileges and delete users or administrators Available users or administrators can be granted access to NAS shares configured for the CIFS protocol You must join a Windows workgroup or domain before you can add workgroup users or share administrators see Windows Domain on page 207 The Share Access page is different ...

Page 211: ...nistrator on page 214 Workgroup Users or Share Administrators If the ETERNUS CS800 is joined to a Windows workgroup the Workgroup Users section displays the following information about workgroup users Username The name of the workgroup user Administrator Privileges The privileges of the workgroup user Yes if the user has administrator privileges No if they do not Description A brief description of...

Page 212: ... User Page 2 Enter information about the workgroup user User Name Enter the name of the workgroup user Password Enter the password for the workgroup user Confirm Password Enter the password again to confirm it Description Optional Enter a brief description of the workgroup user Grant Administrator Privileges Select the check box to add the workgroup user to the Windows Administrators group This al...

Page 213: ...tor 3 Click Apply Use the MMC Microsoft Management Console to manage users see ADS Share Permissions on page 215 Editing a Workgroup User Edit a workgroup user to change the user s password or description or to change the user s administrator privileges You cannot edit a share administrator Instead delete the share administrator then add a new share administrator To edit a workgroup user 1 Select ...

Page 214: ...dministrator Privileges Select the check box to add the workgroup user to the Windows Administrators group This allows the workgroup user to override certain permissions settings and prevents the workgroup user from being locked out of shares or directories 3 Click Apply Deleting a Workgroup User or Share Administrator Delete a workgroup user or share administrator if the user or administrator no ...

Page 215: ...nd the user and group from the source system do not exist on the target system Often users and groups are unique to a particular scope such as a Windows system or an ADS domain As a result some assigned permissions might not be available on the target system because the associated user and group do not exist there However common groups for example Administrators Users and Everyone are recognized o...

Page 216: ... 3 VTL Configuration The VTL page allows you to configure the ETERNUS CS800 to present its storage capacity as VTL virtual tape library partitions that are compatible with standard backup applications You can add virtual tape drives and storage slots to VTL partitions as well as create and work with virtual tape cartridges You can also map partitions to hosts Additional Information Virtual Tape Li...

Page 217: ...se the Partitions Summary page to perform the following tasks l View information about existing VTL partitions see Partition List on page 217 l Add a new VTL partition to the system see Adding a VTL Partition on page 219 l Edit properties for an existing VTL partition see Editing a VTL Partition on page 221 l Delete a VTL partition from the system see Deleting a VTL Partition on page 223 l Change ...

Page 218: ...ape cartridges in the partition If no cartridges have been created click Create to add media see Media Add on page 224 Slots The number of storage slots in the partition Deduplication The data deduplication state of the partition Enabled or Disabled Replication The current state of replication for the partition l Enabled Replication is enabled l Send Receive Sync ID Cartridge Based Replication is ...

Page 219: ...ure to configure the backup application software so that the maximum number of active VTDs is not exceeded at any time Exceeding the maximum number of active VTDs may cause backup jobs to time out l If you plan to replicate partitions to another ETERNUS CS800 make sure that every partition name and barcode number on each ETERNUS CS800 is unique There cannot be duplicate partition names or barcode ...

Page 220: ...d to the host by the ETERNUS CS800 The library model does not restrict the number of slots or drives in a partition because library emulation is not a representation of a physical library The following library models are available l Fujitsu CS TL l ADIC Scalar 100 ADIC Scalar i2000 or ADIC Scalar i500 l ADIC Pathlight VX Number of Storage Slots Enter the number of storage slots in the partition up...

Page 221: ...cation after the partition is added If data duplication is disabled then data compression is also disabled Enable Auto Export When a tape is moved from a Storage Slot to an I E Slot depending on the Auto Export setting the media will be removed from the virtual I E slot if Auto Export is enabled default will remain in the virtual I E slot if Auto Export is disabled 3 Optional Under Replication Set...

Page 222: ... partition it must be offline 3 Under Partition Settings enter information about the partition If you are editing a partition only the Library Model Number of Storage Slots and Number of Virtual Tape Drives options can be changed Library Model Select the library model emulated by the partition The library model determines the inquiry string returned to the host by the ETERNUS CS800 The following l...

Page 223: ...if it is no longer needed When you delete a partition all data stored on the partition is lost If you delete a partition configured for Cartridge Based Replication on the source ETERNUS CS800 the partition is not automatically deleted on the target ETERNUS CS800 If you do not want to retain the partition on the target ETERNUS CS800 you can manually delete it To delete a VTL partition 1 If the part...

Page 224: ... tape cartridges just as they would to physical media To access the Media page on the VTL page click the Media tab The Media page contains the following tabs l Media Add on page 224 l Media Actions on page 226 l Media Move on page 229 l Media Unload on page 231 Media Add Use the Media Add page to add a contiguous range of virtual tape cartridges to a VTL partition You can specify the initial locat...

Page 225: ...Initial Location The initial location for cartridges after they are created Storage Slot or I E Slot You cannot create more cartridges than the number of available slots in the initial location For example if 50 I E slots are available you cannot create more than 50 cartridges if the initial location is set to I E Slot Number of Media The number of cartridges to create in the partition ETERNUS CS8...

Page 226: ... of tape drive selected when the partition was created see Media on page 224 Media Capacity The capacity of the cartridges Select an option l Native Size The capacity is determined by the selected media type l Custom Size The capacity is a custom value Enter the custom cartridge capacity in the box Make sure the value is within the acceptable range displayed next to the box 3 Click Apply Media Act...

Page 227: ...to work with cartridges that are not assigned to any partition The table displays the following information for all virtual tape cartridges in the partition Barcode The barcode number of the cartridge Type The cartridge type Partition The partition where the cartridge is located WP The write protect status of the cartridge Write Enabled or Write Protected ETERNUS CS800 227 10 Configuration ...

Page 228: ...ridge that is used CAUTION The Used value is not updated while the media is mounted Because of this the displayed Used value may be different fr om the real value for mounted media Capacity The total capacity of the tape cartridge Click a column heading to sort the rows in the table by that column Click the column heading again to reverse the sort order Click the Information button i next to a car...

Page 229: ...ning with AAA Or enter AAA010 AAA020 to display all barcodes in the specified range Click the Quick Tip icon for additional examples 4 Select the cartridges to perform the action on The action is performed only for selected cartridges on the current page Or select the check box in the table heading row to perform the action on all cartridges in the partition If necessary use the controls at the bo...

Page 230: ...al Tape Drives check box to force the drive to unload the cartridge before ejecting it 5 Optional To reduce the number of cartridges displayed in the table enter a barcode or barcode range in the Barcode Filter box and click Apply Filter Use a hyphen to indicate a range and use an asterisk to indicate a wildcard Separate multiple entries with commas and do not use spaces Example Enter AAA to displ...

Page 231: ...ine state see Changing Partition Mode on page 224 Media Unload Use the Media Unload page to perform a bulk unload of virtual tape cartridges from drives or I E slots If you do not create and associate a host access group with a partition the virtual devices are not visible from the host and drives cannot be destinations for move operations see Remote Host Access on page 233 CAUTION If you unload a...

Page 232: ...e type of location you want to unload cartridges from Drive I E Slot 4 Optional If you are unloading cartridges from a drive select the Force Unload Virtual Tape Drives check box to force drives to unload the cartridges before ejecting them 5 Optional To reduce the number of cartridges displayed in the table enter a barcode or barcode range in the Barcode Filter box and click Apply Filter Use a hy...

Page 233: ...ll as view Fibre Channel target ports on the ETERNUS CS800 If you do not create and associate a host access group with a partition the virtual devices are not visible from the host and drives cannot be destinations for move operations To access the Remote Host Access page on the VTL page click the Remote Host Access tab The Remote Host Access page contains the following tabs l Remote Host Mapping ...

Page 234: ...Remote Host Mapping And Groups on page 234 l Add a new host access group to a partition see Adding a Remote Host Access Group on page 235 l Edit properties for an existing host access group see Editing a Remote Host Access Group on page 236 l Delete a host access group from a partition see Deleting a Remote Host Access Group on page 237 Remote Host Mapping And Groups The Remote Host Mapping Groups...

Page 235: ... Add a host access group to associate a VTL partition with a host a Fibre Channel initiator on the SAN and a target a Fibre Channel port on the ETERNUS CS800 To add a host access group 1 Click Add The Map Remote Hosts Define Groups page displays see Map Remote Hosts Define Groups Page on page 235 Figure 154 Map Remote Hosts Define Groups Page 2 Enter information about the host access group Group N...

Page 236: ...ments This option is recommended for host access groups that contain an HP UX host It can also be used if hosts that are not assigned to any host access group exist in the SAN The CCL is accessible to hosts only through LUN 0 CAUTION If you are not sure if you should use CCL contact Fujitsu Technology Solutions Customer Support before you enable this option 4 Select the check boxes for the media c...

Page 237: ...only through LUN 0 CAUTION If you are not sure if you should use CCL contact Fujitsu Technology Solutions Customer Support before you enable this option 3 Select the check boxes for the media changer and tape drives to add to the host access group The LUN assignment displays next to the device 4 Click Apply Deleting a Remote Host Access Group Delete a host access group if it is no longer needed To...

Page 238: ...on the Remote Host Access page click the Remote Hosts tab see Remote Hosts Page on page 238 Figure 156 Remote Hosts Page To add a host 1 Click Discover Remote Hosts to list all hosts that are known to the ETERNUS CS800 A host is made known to the ETERNUS CS800 if you enter the host ID on this page or if the host logs on to one or more Fibre Channel target ports If you do not see the world wide nam...

Page 239: ...rgets page on the Host Access page click the Targets tab see Targets Page on page 239 Figure 157 Targets Page The Targets page displays the Target Port and WWPN for the currently configured targets The Backpanel Locations section displays a graphical representation of the Fibre Channel and Ethernet ports as they appear on the rear of the system A mapped green status indicates the host is currently...

Page 240: ... Figure 158 Target Usage Page The Backpanel Locations section displays a graphical representation of the Fibre Channel and Ethernet ports as they appear on the rear of the system A mapped green status indicates the host is currently logged on to one or more Fibre Channel target ports Each target Fibre Channel port is displayed along with the partition and virtual media changer and tape drives VMC ...

Page 241: ...e Technology OST is available only on the ETERNUS CS800 NAS and ETERNUS CS800 Multi Protocol configuration To access the OST page click the Configuration menu and then click the OST tab The OST page contains the following tabs l Storage Servers on page 244 l LSU on page 252 l Manage Users on page 259 l Manage Remote Users on page 261 l Target IP Mapping on page 265 l ETERNUS CS800 Accent on page 2...

Page 242: ...d data has already been replicated to the target storage server It is important to remember that with Automatic Image Replication the local and remote LSUs reside in different NetBackup domains This differs from optimized duplication which occurs between two LSUs residing within the same NetBackup domain For more information about configuring the ETERNUS CS800 for optimized duplication or Automati...

Page 243: ...On the source system specify the target system that will receive the replicated data 5 On the source system create a remote OST user with the same user name and password that you used in step 2 above see Manage Remote Users on page 261 CAUTION On the source system make sure to create a remote user on the Configuration OST Manage Remote Users page 6 On the source system create a storage server and ...

Page 244: ...you to manage OST storage servers on the ETERNUS CS800 You can view information about existing storage servers add or edit storage servers and delete storage servers To access the Storage Servers page on the OST page click the Storage Servers tab see Storage Servers Page on page 244 Figure 160 Storage Servers Page 244 ETERNUS CS800 ...

Page 245: ...nits LSUs that have been added to the system see LSU on page 252 OST Service The status of the OST service OST settings can be configured in Ready Stopped or Verifying state The OST server is available for backup only in Ready state Name The name of the storage server LSUs The number of LSUs that have been added to the storage server Max Connections The maximum number of connections allowed to the...

Page 246: ...s in parallel Adding a Storage Server Add a storage server to present the storage capacity of the ETERNUS CS800 as LSUs that are compatible with backup applications that support OST You can add up to 100 storage servers When adding a storage server you must also add an LSU to the storage server For more information about LSUs see LSU on page 252 Data on storage servers is always deduplicated To ad...

Page 247: ...the storage server CAUTION Do not use an underscore _ in the name of the storage server OST storage server names are not case sensitive For example if you create a storage server named ost1 you cannot create another storage server named OST1 because the system considers the names to be the same ETERNUS CS800 247 10 Configuration ...

Page 248: ... Optimized Duplication is enabled all data on the storage server is duplicated not just the specified images 3 Select the check box for each optimized duplication target you want to duplicate the storage server to When the storage server is duplicated its data will be sent to all selected targets 4 Under Logical Storage Unit select the type of LSU to add to the new storage server Available Capacit...

Page 249: ... the storage lifecycle policies SLPs configured in NetBackup OST AIR requires NetBackup 7 1 or higher For information about configuring NetBackup for Automatic Image Replication see the ETERNUS CS800 NetBackup and Backup Exec OST Configuration Guide You must configure at least one remote user before you can enable Automatic Image Replication see Manage Remote Users on page 261 7 If Automatic Image...

Page 250: ...erver Edit a storage server to change the description of the storage server or the maximum number of allowed connections To edit a storage server 1 Select the storage server and click Edit The Edit Storage Server page displays see Edit Storage Server Page on page 250 Figure 162 Edit Storage Server Page 2 Enter information about the storage server If you are editing a storage server the Name option...

Page 251: ...To configure the target ETERNUS CS800 see When Concurrent Optimized Duplication is enabled all data on the storage server is duplicated not just the specified images 3 Select the check box for each optimized duplication target you want to duplicate the storage server to When the storage server is duplicated its data will be sent to all selected targets 4 Click Apply Deleting a Storage Server Delet...

Page 252: ...rs on the ETERNUS CS800 You can view information about existing LSUs add or edit LSUs and delete LSUs To access the LSU page on the OST page click the LSU tab see LSU Page on page 252 Figure 163 LSU Page Tasks Use the LSU page to perform the following tasks l View information about existing LSUs see Logical Storage Unit List on page 253 l Add a new LSU to the system see Adding an LSU on page 253 l...

Page 253: ...Images The number of backup images on the LSU Description A brief description of the LSU if available Additional Information l Click a column heading to sort the rows in the table by that column Click the column heading again to reverse the sort order l The connections of a storage server that are used equals the data streams plus one for each LSU polling A backup job may generate more than one da...

Page 254: ...T Configuration To add an LSU to a storage server 1 Click Add The Add Logical Storage Unit page displays see Add Logical Storage Unit Page on page 254 Figure 164 Add Logical Storage Unit Page 254 ETERNUS CS800 ...

Page 255: ...ty of the LSU 1 to 1048576 GB Fujitsu Technology Solutions recommends setting LSUs to maximum size 1048576 GB because spanning them on a backup is not possible 3 Optional In the Description box enter a brief description of the LSU 4 Optional Select the Enable Automatic Image Replication check box to automatically replicate duplicate data on the LSU to a remote LSU on another ETERNUS CS800 Automati...

Page 256: ...ackup domains To configure the target ETERNUS CS800 see Replication Send on page 371 Remote LSU Name The name of the LSU in the remote storage server that will receive the replicated data Remote User The OST user credentials to use for authentication on the remote target ETERNUS CS800 The selected remote user must match a local user on the Configuration OST Manage Users page on the target ETERNUS ...

Page 257: ...replicate duplicate data on the LSU to a remote LSU on another ETERNUS CS800 Automatic Image Replication AIR is disabled by default If enabled data on an LSU is automatically replicated to a remote LSU that resides on a ETERNUS CS800 in a different NetBackup domain The timing of the duplication as well as the backup images that are duplicated are determined by the storage lifecycle policies SLPs c...

Page 258: ...a local user on the Configuration OST Manage Users page on the target ETERNUS CS800 see Manage Users on page 259 6 Click Apply Deleting an LSU Delete an LSU if it is no longer needed When you delete an LSU all data stored on the LSU is lost If you deleted the LSU from Symantec NetBackup or Symantec Backup Exec you must wait several minutes before deleting the LSU from the ETERNUS CS800 To delete a...

Page 259: ...the target remote ETERNUS CS800 To access the Manage Users page on the OST page click the Manage Users tab see Manage Users Page on page 259 Figure 166 Manage Users Page Tasks Use the Manage Users page to perform the following tasks l View information about local authenticated users see Manage Local Users List on page 260 l Add a local authenticated user see Adding an Authenticated User on page 26...

Page 260: ... OST user credentials are required to authenticate OST devices on a media server or to enable the ETERNUS CS800 to receive duplicated data using OST AIR To add an authenticated user 1 Click Add The Add User Credential window displays see Add User Credential on page 260 Figure 167 Add User Credential 2 Enter information about the authenticated user User name Enter the name of the authenticated user...

Page 261: ...assword again to confirm it Description Optional Enter a brief description of the authenticated user 3 Click Apply Deleting an Authenticated User Delete an authenticated user if the OST user credentials are no longer needed to authenticate OST devices on a media server To delete an authenticated user select the user and click Delete You can select multiple users to delete at once 10 4 5 Manage Rem...

Page 262: ...the Manage Users page to perform the following tasks l View information about remote users see Manage Remote Users List on page 262 l Add a remote user see Adding a Remote User on page 263 l Edit a remote user see Editing a Remote User on page 263 l Delete a remote user see Deleting a Remote User on page 265 Manage Remote Users List The Manage Remote Users list displays the following information f...

Page 263: ...R Credential on page 263 Figure 170 Add Remote AIR Credential 2 Enter information about the remote user User name Enter the name of the remote user New Password Enter the password for the remote user Confirm New Password Enter the password again to confirm it Description Optional Enter a brief description of the remote user 3 Click Apply Editing a Remote User Edit a remote user to change the user ...

Page 264: ...e remote user If you are editing a remote user you cannot change the User name New Password Enter the password for the remote user Confirm New Password Enter the password again to confirm it Description Optional Enter a brief description of the remote user 3 Click Apply 264 ETERNUS CS800 ...

Page 265: ...tion AIR and Concurrent Optimized Duplication features use the replication network segment to transmit data to the target system Optimized duplication can optionally use the replication channel When a data IP address is mapped to a replication IP address OST traffic that is sent to one of the IP addresses is routed to the other IP address as necessary You must add target IP mapping information if ...

Page 266: ...diting a Mapped IP Address on page 267 l Delete the mapping for a target data IP address see Editing a Mapped IP Address on page 267 Target IP Mapping List The Target IP Mapping list displays the following information for all mapped IP addresses l Target Data IP The mapped target data IP address l Target Replication IP The replication IP address to which the data IP address is mapped By default it...

Page 267: ...gure 173 Add Target Data IP Mapping 2 Enter information about the mapping Target Data IP The target data IP address to map Target Replication IP The replication IP address to map the data IP address to 3 Click Apply Editing a Mapped IP Address Edit a mapped IP address to route traffic sent to the target data IP address to a different replication IP address To edit a mapped IP address 1 Select the ...

Page 268: ...address select the IP address and click Delete You can select multiple mapped IP addresses to delete at once 10 4 7 ETERNUS CS800 Accent Use the Accent page to enable or disable ETERNUS CS800 Accent Fujitsu Technology Solutions s ETERNUS CS800 Accent software accelerates backups and reduces network bandwidth requirements by distributing deduplication between the backup server and the ETERNUS CS800...

Page 269: ...Click Apply Click the Change Encryption Type link to change the OST data encryption type see Data Encryption on page 353 To use ETERNUS CS800 Accent you must install the Fujitsu Technology Solutions OST Client Plug in on the media server For information about installing the OST Plug in and using ETERNUS CS800 Accent see the ETERNUS CS800 NetBackup and Backup Exec OST Configuration Guide 10 4 8 OST...

Page 270: ...sing OST with the ETERNUS CS800 see the ETERNUS CS800 NetBackup and Backup Exec OST Configuration Guide Figure 176 OST Client Plug in Download 10 5 Replication Configuration The Replication Configuration page allows you to configure and manage replication targets and allowed replication sources on the ETERNUS CS800 A source sends replicated data to 1 or 2 targets and a target receives replicated d...

Page 271: ...n target see Adding a Replication Target on page 272 Editing a Replication Target on page 274 or Deleting a Replication Target on page 276 l Pause or resume replication to a target see Pausing or Resuming Replication to a Target on page 276 l Configure a constant replication throttle see Enabling System Throttling on page 276 l View information about allowed replication source systems see Source E...

Page 272: ...d compression Average Send Rate The average send rate e g MB s of data sent over the network during replication or failback Actual Data Sent divided by the amount of time required to complete replication or failback You can customize the appearance of the Target System list in the following ways l Click the top banner row of the list to collapse or expand the list l Click the arrow to the right of...

Page 273: ...hostname or IP address of the system that will receive the replicated data When entering IP addresses never use an address that is in a reserved IP address range To see a list of reserved IP address ranges click the quick tip icon located near the IP address field To use hostname format you must specify at least one DNS IP address on the Network page see Network on page 319 3 In the Encryption dro...

Page 274: ...the same subnet you must add a host route on the source ETERNUS CS800 to make sure the replication interface is correctly selected when replicating data to the target ETERNUS CS800 see Understanding Interface Routing on page 331 5 Click Apply The new target is not automatically added to existing replication schedules You must add or edit scheduled events to schedule replication to the new target s...

Page 275: ...s at ETERNUS CS800 2 0 1 software or below then you must enter the IP address by which the target system recognizes the source system The default value is 0 0 0 0 The Source IP Address field does not accept fully qualified domain names You must enter a valid IP address Make sure this IP address is configured in the allowable sources list on the target ETERNUS CS800 When configuring segmented netwo...

Page 276: ...cation pause behavior l To pause replication select a target under Target System and click Pause The ETERNUS CS800 temporarily stops sending replicated data to the selected target l To resume replication select a target under Target System and click Resume The ETERNUS CS800 resumes sending replicated data to the selected target Enabling System Throttling Enable system throttling to limit the netwo...

Page 277: ...he maximum allowed bandwidth and select the units you want to use to specify the constant throttle KB s or MB s The lowest value you can set is 32 KB s The lowest value you can set is 32 KB s The highest value you can set is 125 MB s for 1GbE and 500 MB s for 10GbE 4 Click Apply CAUTION Do not set the maximum allowed bandwidth to a value that is lower than necessary If the maximum allowed bandwidt...

Page 278: ...box to show a column or clear the check box to hide a column The statistics in the Source System list are for each source ETERNUS CS800 rather than a cumulative total for all sources as is displayed on the Home page Adding a Replication Source Add a system to the list of replication sources to allow it to send replicated data to the ETERNUS CS800 You must add a source system to the list of allowed...

Page 279: ...e 1 Under Source System select one or more sources to delete 2 Click Delete If a source ETERNUS CS800 is deleted from the list its contribution to the cumulative totals on the Home page are not removed until you clear Receive statistics see Replication Performance on page 405 Changing the Maximum Number of Snapshots During scheduled or manual data replication the ETERNUS CS800 receives a snapshot ...

Page 280: ...ws you to use Symantec NetBackup to copy LSUs from a storage server on the ETERNUS CS800 to a physical tape library Additional Information l Path to tape is available only on the ETERNUS CS800 Multi Protocol configuration l For information about working with storage servers and LSUs see OST Configuration on page 241 l For detailed information about configuring and using OST path to tape see the ET...

Page 281: ...can time The date and time a scan for attached libraries was last performed Serial Number The serial number of the library or drive Vendor The vendor of the library or drive Product ID The product ID name of the library or drive State The state of the library or drive Enabled or Disabled Drive Type Tape drives only The drive type of the drive Tasks Use the Physical Device Discovery page to perform...

Page 282: ...n click Scan l To update the libraries or drives list with the latest information click Refresh 10 6 2 Backup Application Specific The Backup Application Specific page allows you to create and manage authenticated users for use with the path to tape capability The following applications are supported for backup application specific path to tape l Symantec NetBackup l Symantec Backup Exec l EMC Net...

Page 283: ...ackup Application Specific User List on page 284 l Add a backup application specific user see Adding a Backup Application Specific User on page 284 l Edit a backup application specific user see Editing a Backup Application Specific User on page 285 l Delete a backup application specific user see Deleting a Backup Application Specific User on page 286 ETERNUS CS800 283 10 Configuration ...

Page 284: ...ific user if available To update the list with the latest information click Refresh Adding a Backup Application Specific User Add a backup application specific user to create user credentials The user credentials are required to authenticate devices on a media server To add a backup application specific user 1 Click Add The Add Backup Application Specific User page displays see Add Backup Applicat...

Page 285: ...r a brief description of the backup application specific user 3 Click Apply Editing a Backup Application Specific User Edit a backup application specific user to change the user s password or description To edit a backup application specific user 1 Select the user and click Edit The Edit Backup Application Specific User page displays see Edit Backup Application Specific User Page on page 285 Figur...

Page 286: ...ic user if the user credentials are no longer needed to authenticate devices on a media server To delete a backup application specific user select the user and click Delete You can select multiple users to delete at once 10 7 Scheduler The Scheduler page allows you to manage scheduled events on the ETERNUS CS800 including replication and replication throttling e mail reports healthchecks and space...

Page 287: ...ation throttle events see Scheduling Replication Throttling on page 291 l Configure the ETERNUS CS800 to send status and configuration reports see Scheduling E mail Reports on page 292 l Configure the ETERNUS CS800 to run healthchecks see Scheduling Healthchecks on page 292 l Configure the ETERNUS CS800 to run space reclamation see Scheduling Space Reclamation on page 293 l Specify when and how of...

Page 288: ...number of days displayed at a time click Daily Weekly or Monthly The thickness of the bars on the schedule view varies based on the type of event and the selected time frame Healthcheck events have an estimated span of 6 hours Space Reclamation events have an estimated span of 16 hours All other open ended events have a default span of 2 hours Figure 187 Scheduler Toolbar Adding or Editing a Sched...

Page 289: ...End Date and End Time The end date and time must occur after the start date and time For a new event you can click and drag to adjust the start and end time For an existing event you can drag the event to change when it occurs You can also drag the left or right edge of the event to adjust the start or end time 3 Enter a brief description of the event in the Description box This description will d...

Page 290: ...t want to automatically replicate the share or partition data to the target To schedule a share or partition for replication you must first add one or more replication targets see Replication Configuration on page 270 In addition you must add one or more shares or partitions with deduplication enabled and at least one target selected see or Partitions on page 216 To configure a replication schedul...

Page 291: ... is set to the lowest value large replication jobs may fail During the replication throttle event the ETERNUS CS800 will limit the amount of data it sends during source replication so that it does not exceed the specified bandwidth After the replication throttle event ends the ETERNUS CS800 will no longer throttle the sending of source replication data until the next replication throttle event occ...

Page 292: ... e mail you must specify an outgoing e mail server see Server on page 300 In addition you must specify one or more recipients see Email Reports on page 303 To configure a schedule for e mail reports 1 On the Scheduler page add or edit an event in the Email Reports row see Adding or Editing a Scheduled Event on page 288 2 In the Report Type drop down box select the type of e mail report to schedule...

Page 293: ...e information about space reclamation see Space Reclamation on page 449 To configure a schedule for space reclamation 1 On the Scheduler page add or edit an event in the Space Reclamation row see Scheduler on page 286 2 Specify when and how often the event reoccurs see Scheduler on page 286 CAUTION For correct system operation space reclamation must be run at regular intervals at least once a week...

Page 294: ... selected occurrence in an event series from the schedule l Delete all occurrences Remove the entire event series from the schedule The event or series is deleted from the schedule and will no longer occur 10 8 Notifications The Notifications page allows you to manage the methods the ETERNUS CS800 uses to send notifications The ETERNUS CS800 can send notifications by e mail or using SNMP Simple Ne...

Page 295: ...ients on page 295 l Server on page 300 l Test on page 302 l Email Reports on page 303 Recipients The Recipients page allows you to manage the e mail recipients the ETERNUS CS800 sends notifications to You can add edit and delete e mail recipients and you can specify the types of notifications to send To enable the ETERNUS CS800 to send e mail you must specify an outgoing e mail server see Email on...

Page 296: ... List displays the following information about e mail recipients Name The name of the recipient Email Address The e mail address of the recipient Notification Type The types of notifications sent to the recipient High High and Medium or All Notification Status The status of e mail notifications for the recipient Enabled or Disabled Adding an E mail Recipient Add an e mail recipient to send notific...

Page 297: ...Figure 189 Add Email Recipient Page 2 Enter information about the recipient Name The name of the recipient Email Address The e mail address of the recipient ETERNUS CS800 297 10 Configuration ...

Page 298: ...tions for High Medium and Low service tickets as well as any administration alerts Low service tickets indicate that a minor problem occurred and needs to be resolved but the operation and performance of the ETERNUS CS800 are not significantly affected 3 Select the Enable notification check box to enable sending of notifications to the recipient Or clear the Enable notification check box to disabl...

Page 299: ...er information about the recipient If you are editing an e mail recipient you cannot change the Name Name Optional Select a different e mail recipient to edit Email Address The e mail address of the recipient ETERNUS CS800 299 10 Configuration ...

Page 300: ...as well as any administration alerts Low service tickets indicate that a minor problem occurred and needs to be resolved but the operation and performance of the ETERNUS CS800 are not significantly affected 4 Select the Enable notification check box to enable sending of notifications to the recipient Or clear the Enable notification check box to disable sending of notifications to the recipient 5 ...

Page 301: ...t by the ETERNUS CS800 Specify a return address that lets you easily identify the system that generated the e mail for example systemname any domain com The return address must contain an symbol and a valid domain name including a period 3 Optional Select the Enable Admin Alerts about Email Server not configured check box to have system generate administration alerts to notify you if an e mail ser...

Page 302: ...ail notifications are correctly configured on the ETERNUS CS800 To access the Email Test page on the Email page click the Test tab see Email Test Page on page 302 Figure 192 Email Test Page To send a test e mail select a recipient in the list and click Send If the recipient does not receive the e mail make sure that the recipient s e mail address is correct see Editing an E mail Recipient on page ...

Page 303: ...oing e mail server see Server on page 300 To access the Email Reports page on the Email page click the Email Reports tab The Email Reports page contains the following tabs l Recipients on page 303 l On Demand on page 304 Recipients The Recipients page allows you to specify the e mail recipients who will receive all scheduled status data and configuration data reports To configure the schedule when...

Page 304: ...ccess the On Demand page on the Email Reports page click the On Demand tab see On Demand Page on page 304 Figure 194 On Demand Page Tasks Use the On Demand page to perform the following tasks l Manually send a status data or configuration data report see Sending a Report on page 304 l View a configuration data report see Viewing Configuration Data on page 305 Sending a Report To manually send a st...

Page 305: ...lled agents store data about themselves in Management Information Bases MIBs and return this data to the SNMP requesters You can configure the ETERNUS CS800 to act as an agent and send traps to a specified destination You can also add SNMP community information To access the SNMP page on the Notifications page click the SNMP tab The SNMP page contains the following tabs l Destinations on page 305 ...

Page 306: ...NMP destination see Deleting a Destination on page 309 Trap Destination List The Trap Destination List displays the following information about SNMP destinations IP Address The IP address of the destination Name The name of the destination Selected Traps The traps the ETERNUS CS800 sends to the destination Failure Warning Informational Available or Unavailable Adding a Destination Add an SNMP dest...

Page 307: ...itional Information l When entering IP addresses never use an address that is in a reserved IP address range To see a list of reserved IP address ranges click the quick tip icon located near the IP address field l To use hostname format you must specify at least one DNS IP address on the Network page see Network on page 319 Name Enter the name of the destination 3 Select one or more traps to send ...

Page 308: ...e 4 Click Apply Editing a Destination Edit an SNMP destination to change the name of the destination or the types of traps the ETERNUS CS800 sends to the destination To edit a destination 1 Select SNMP destination and click Edit The Edit Trap Destination page displays see Edit Trap Destination Page on page 308 Figure 197 Edit Trap Destination Page 2 Enter information about the destination If you a...

Page 309: ...ilable to an unavailable state 4 Click Apply Deleting a Destination Delete an SNMP destination if you no longer want the ETERNUS CS800 to send traps to the destination To delete a destination select the destination and click Delete You can select multiple destinations to delete at once Community The Community page allows you to manage SNMP community information for the ETERNUS CS800 You can add ed...

Page 310: ...y see Editing a Community on page 312 l Delete an SNMP community see Deleting a Community on page 314 SNMP Community List The SNMP Community List displays the following information about SNMP communities Name The name of the community IP Address The IP address of the community Network Mask The network mask of the community Access Type The access type of the community Get or Get Set Community Statu...

Page 311: ...Page 2 In the Name box enter a unique Name for the community up to 20 characters Valid characters are letters numbers hyphens and underscores 3 Enter a valid IP Address and Network Mask pair A pair is valid if performing a logical bitwise AND operation on the IP address and the network mask results in the IP address See the table below for examples IP Address Network Mask Result 10 40 166 87 255 2...

Page 312: ...dress l When entering IP addresses never use an address that is in a reserved IP address range To see a list of reserved IP address ranges click the quick tip icon located near the IP address field 4 In the Access Type drop down box select the access type for the community Get Allows SNMP get operations Get Set Allows both SNMP get and put operations 5 Select the Community status check box to enab...

Page 313: ... 166 87 10 40 166 87 10 40 166 87 Allows access only from 10 40 166 87 10 40 166 87 10 40 166 0 Invalid because the logical bitwise operation address AND mask is not equal to the address 10 40 166 87 255 255 0 0 Invalid because the logical bitwise operation address AND mask is not equal to the address 10 40 0 0 255 255 0 0 Allows access from any client with address 10 40 xx xx Additional Informati...

Page 314: ...ity status check box to enable the community Or clear the Community status check box to disable the community 6 Click Apply Deleting a Community Delete an SNMP community if you no longer want the ETERNUS CS800 to belong to a group of devices that are monitored by a common management station To delete a community select the community and click Delete You can select multiple destinations to delete a...

Page 315: ... Service Centre l Dial in Provides remote access Allows Fujitsu support specialists to remotely connect to the system Remote access is only possible if it has been enabled on the ETERNUS CS800 system The setup of AISConnect consists of two tasks l Configuring and enabling the AISConnect service on the ETERNUS CS800 system which is described below l Registering the ETERNUS CS800 system with the Fuj...

Page 316: ...ll on page 318 Proxy Use the Proxy page to specify proxy server information for AIS Connect If your network environment requires use of a proxy server you must specify the proxy server settings to enable AIS Connect To specify proxy server information 1 AISConnect From the Notifications menu click the AISConnect tab The AISConnect Proxy page displays see AISConnect Proxy on page 316 Figure 202 AIS...

Page 317: ...ires authentication NTML Authentication Enabled Activate the checkbox if the HTTP proxy requires NTLM NT LAN Manager authentication Username Enter the user name for proxy authentication Password Enter the password for proxy authentication Country Select the country where your ETERNUS CS800 is located Table 23 AISConnect Information Control Use the Control page to stop or start the AISConnect servi...

Page 318: ...st to remotely connect to the system using SSH or HTTP If remote access policies are disabled remote connection using SSH or HTTP is not possible To enable or disable remote access policies 1 From the AISConnect page click the Remote Access Policies tab The Remote Access Policies page displays the current remote access policies status 2 Do one of the following actions l Click Enable to enable remo...

Page 319: ...To access the System page click the Configuration menu and then click the System tab The System page contains the following tabs l Network on page 319 l Date Time on page 334 l Security on page 337 l FC Initiators and Targets on page 358 10 9 1 Network The Network page allows you to view and change network configuration information for the ETERNUS CS800 The ETERNUS CS800 uses this information to c...

Page 320: ...fter the new network configuration is saved close your Web browser and wait 15 minutes before logging in again If you change the IP address that you use to log in to the system you will temporarily lose your connection to the remote management console Because of this you might not see a confirmation page informing you that the new settings have been saved To access the Network page on the System p...

Page 321: ...Figure 206 Network Configuration ETERNUS CS800 321 10 Configuration ...

Page 322: ... mapped to if it is used for replication through a NAT firewall l Add routing information for an interface to enable connectivity with devices on different subnets You can choose to allow any traffic type management replication or data on an interface In this case the routing of different traffic types as well as firewall capability must be controlled using the network infrastructure routers and s...

Page 323: ...her than those that the ETERNUS CS800 is directly connected to For example if the ETERNUS CS800 and its clients are on different subnets or you are using an external NTP server you must specify a default gateway DNS Suffix Search List Optional The domain list to search when resolving domain names The list may be either a single domain name or a comma separated list of up to 6 domain names The firs...

Page 324: ... That is settings cannot be entered for the bond in the Interface Details or IP Address tables because no Ethernet ports are assigned to the device All ports assigned to the same device are bonded together into a single logical port For example if you select bond0 for port eth0 and port eth1 both ports are bonded together in the bond0 device A bonded device can contain two or more ports All ports ...

Page 325: ...oup LAG in LACP mode The ETERNUS CS800 frame reception and transmission is controlled by the LACP between the bonded ports and the Ethernet switch ports Active Backup Mode 1 This option does not require switch configuration but may not provide the same level of load balancing and performance as other bonding modes Only one port in the bond is active at a time If the active port fails another port ...

Page 326: ...rmance make sure the entire network path to the ETERNUS CS800 is configured to use 9000 MTU 3 Click Update to save the changes you made to the Interface Details table Clicking Update does not yet apply the new network settings to the ETERNUS CS800 4 Click Undo to revert to all current Interface Details changes to the last update Configuring Interface IP Addresses Under IP Address Configuration IP ...

Page 327: ...Or clear the check box to disable VLAN tagging for the interface VLAN tagging allows you to assign an interface to a virtual local area network VLAN With VLAN tagging you can route different traffic types management data and replication over different VLANs making sure traffic types do not mix If VLAN tagging is enabled enter the VLAN Tag ID for the interface Valid values are 2 to 4094 You can ass...

Page 328: ...xternal communication 4 Enter the following network information as provided by your network administrator all fields are required IP Address The IP address of the interface Netmask The network mask of the interface Gateway The gateway of the ETERNUS CS800 This is usually not the same as the default gateway 5 If necessary specify NAT Network Address Translation settings for the interface If the ETE...

Page 329: ...revert all current IP Address Table changes to the last update When you add a network interface a default route via the default gateway is automatically created for the interface after network settings are applied and the ETERNUS CS800 reboots For example if you add an interface with IP address 10 20 185 172 a route with the destination IP address 10 20 185 0 is automatically added If you delete t...

Page 330: ...r the route Dest Gateway The gateway IP address used for outgoing traffic sent from the interface to a host or client This is usually not the same as the default gateway The destination gateway of each route must match the subnet of at least one configured IP address listed in the IP Address Table If no match is found an error displays stating that the route s destination gateway is not reachable ...

Page 331: ...host route on the source ETERNUS CS800 to make sure the replication interface is correctly selected when replicating data to the target ETERNUS CS800 See the following examples for details Example 1 Segments and Target on Different Subnets on page 331 Example 2 Segments and Target on the Same Subnet on page 332 Example 3 Segments on the Same Subnet and Target on a Different Subnet on page 333 Exam...

Page 332: ...e 2 Segments and Target on the Same Subnet In the example below see Interface Routing Example 2 on page 333 the ETERNUS CS800 has two segmented interfaces one for data and management traffic and one for replication traffic l The source ETERNUS CS800 management data IP address the source ETERNUS CS800 replication IP address and the target ETERNUS CS800 IP address are all on the same subnet 192 168 ...

Page 333: ...e on the same subnet 192 168 10 x The target ETERNUS CS800 IP address is on a different subnet 192 168 20 x l To make sure the replication segment is used when communicating with the target ETERNUS CS800 you must add a network route in the Routing Details section on the source ETERNUS CS800 In this example you would specify the following routing details for the replication interface on the source ...

Page 334: ...work l A red border indicates a port is configured but is not connected to a network l Click Update Port View to update the information on the diagram 10 9 2 Date Time The Date Time page allows you to set the system date and time of the ETERNUS CS800 You can specify a Network Time Protocol NTP server to synchronize the system time with or you can manually enter the date and time CAUTION Changing t...

Page 335: ...Figure 215 Date Time Page To set the system date and time ETERNUS CS800 335 10 Configuration ...

Page 336: ...ust specify the IP address of the timeserver pool l Specify a Timeserver or Pool Type the name or IP address of the NTP server or pool See http support ntp org for information about publicly available NTP servers To verify that the ETERNUS CS800 can communicate with the NTP server or pool click Test NTP Manual Date Time Settings Select this option to manually set the system date and time Specify t...

Page 337: ...onsole GUI and the command line interface CLI Access Control Levels The ETERNUS CS800 has the following access levels for logging onto the remote management console or the GUI Access Level Description Graphical User Interface GUI GUI Administrator Allowed to view and change information on the ETERNUS CS800 remote management console GUI Monitor Allowed to view information on the ETERNUS CS800 remot...

Page 338: ...ice Login SSH Service Allow Secure Shell SSH remote access to the ServiceLogin account To access the Access Control Settings page on the Security page click the Access Control tab see Access Control Settings Page on page 339 338 ETERNUS CS800 ...

Page 339: ...Figure 216 Access Control Settings Page ETERNUS CS800 339 10 Configuration ...

Page 340: ...an administrator see Accessing Remote Management on page 133 1 Under GUI Administrator enter the following information Old Password Enter the old password New Password Enter the new password Confirm New Password Enter the new password again to confirm it Additional Information l Passwords can be up to 32 characters Alphanumeric characters and special characters are allowed l Loss of this password ...

Page 341: ...or disable the CLI accounts 1 Under CLI Administrator or CLI Viewer do one of the following steps l Select the Enable CLI Administrator Login or Enable CLI View Login check box to enable the CLI administrator or viewer account l Clear the Enable CLI Administrator Login or Enable CLI View Login check box to disable the CLI administrator or viewer account 2 The CLI administrator and view accounts ma...

Page 342: ... an alphanumeric string no spaces or special characters l It is OK to have the same alias for different accounts CLI Administrator and CLI Viewer c Copy and paste the Public Key generated from a SSH key Additional Information l A public key should be in the following form key type base64 encoded string l A public key length can be up to 16kb 342 ETERNUS CS800 ...

Page 343: ... The new key appears in the CLI Administrator or View Available SSH Public Keys table Figure 219 Available SSH Public Keys Table The Available SSH Public Keys table contains the following information Alias Name of key Fingerprint Short sequence of bytes used to identify a public key ETERNUS CS800 343 10 Configuration ...

Page 344: ...lias name The key cannot be modified To remove a key see Delete an Alias Name on page 344 d Click Apply The Successfully performed Security action message appears e Click OK The updated key appears in the Available SSH Public Keys table Delete an Alias Name a Select the check box next to the public key in the Available SSH Public Keys table b Click Delete The Delete Public Key page displays 344 ET...

Page 345: ... Viewer account Enter the following information New Password Enter the new password Confirm New Password Enter the new password again to confirm it Additional Information l Passwords can be up to 32 characters Alphanumeric characters and special characters are allowed l For accounts enabled with both SSH and password authentication the ETERNUS CS800 system will first attempt SSH authentication If ...

Page 346: ...rs Alphanumeric characters and special characters are allowed 3 Click Apply Enabling SSH Service Account The SSH service account provides SSH remote access to the ETERNUS CS800 system 1 Under SSH Service do one of the following steps l Select the Enable SSH Service Login check box to enable SSH service l Clear the Enable SSH Service Login check box to disable the SSH service account 2 The SSH serv...

Page 347: ...up to 20 characters l Alias must be an alphanumeric string no spaces or special characters c Enter the Public Key generated from a SSH key Additional Information l A public key should be in the following form key type base64 encoded string l A public key length can be up to 16kb ETERNUS CS800 347 10 Configuration ...

Page 348: ...n message appears e Click OK The new key appears in the Available SSH Public Keys table Figure 224 Available SSH Public Keys Table The Available SSH Public Keys table contains the following information Alias Name of key Fingerprint Short sequence of bytes used to identify a public key 348 ETERNUS CS800 ...

Page 349: ...dified To remove a key see Delete an Alias Name on page 344 d Click Apply The Successfully performed Security action message appears e Click OK The updated key appears in the Available SSH Public Keys table Delete an Alias Name a Select the check box next to the public key in the Available SSH Public Keys table b Click Delete The Delete Public Key page displays ETERNUS CS800 349 10 Configuration ...

Page 350: ...e Allow login with password check box to disable a password on CLI service account Enter the following information New Password Enter the new password Confirm New Password Enter the new password again to confirm it Additional Information l Passwords can be up to 20 characters Alphanumeric characters and special characters are allowed l For accounts enabled with both SSH and password authentication...

Page 351: ...Installing an SSL Certificate on page 352 Enabling SSL SSL Secure Sockets Layer is a protocol that provides security and privacy over the Internet by negotiating encryption keys before transmitting data between a client and a server To establish a secure connection the ETERNUS CS800 must have an encryption key assigned to it by a Certification Authority in the form of a certificate file private ke...

Page 352: ...on in addition to encrypted communication To suppress server authentication warnings for the default certificate l Internet Explorer If a dialog box displays warning you of a possible certificate error add the IP address for the Fujitsu Technology Solutions to the Trusted Sites list Tools Internet Options Security Trusted Sites If subsequent warning pages display along with an option to close your...

Page 353: ...tem 6 Click OK The certificate displays in the Certificate section Data Encryption The Data Encryption page allows you to select the type of encryption to use for OST data transfers OST data sent from the media server to the ETERNUS CS800 can be encrypted using AES Advanced Encryption Standard encryption methods This setting does not apply to data transfers during replication For replication speci...

Page 354: ... available only if the Data in Flight license is installed 2 If you selected the TLS with AES 256 encryption option you must install the required certificate and key files on the ETERNUS CS800 l Certificate File l Private Key File l Certificate Authority File l Rejection List File The certificate and key files installed on the ETERNUS CS800 system must match the files on the OST media server For m...

Page 355: ...ent console is inactive for the specified period of time the user is automatically logged off and must log back on to continue see Remote Management on page 133 To access the Login Session page on the Security page click Login Session see Login Session Page on page 355 Figure 229 Login Session Page To specify the inactivity timeout 1 In the Inactivity Timeout box enter the number of minutes of ina...

Page 356: ...set up data encryption for stored user data Data encryption for stored user data is only available with ETERNUS CS800 Scale models Encrypting data as it is being written to the drive prevents information leakage caused by fraudulent decoding Even if a drive is removed and stolen by malicious third parties data cannot be decoded The encryption function only encrypts the data stored on the drives so...

Page 357: ...andard encryption used for information processing by the US federal government is a standardized encryption method The ETERNUS CS800 adopt the AES 128 bit encryption l Fujitsu Fujitsu is an encryption method which uses a Fujitsu proprietary algorithm Compared to AES its practical security level is almost equal while it allows faster processing than AES 2 Click Enable CAUTION Once encrypted date on...

Page 358: ...ange the mode of a Fibre Channel port see Editing the Fibre Channel Port Type on page 359 Fibre Channel Initiators and Targets List The Fibre Channel Initiators Targets section displays the following information for all Fibre Channel ports l Alias The alias of the Fibre Channel port l WWPN The World Wide Port Number of the Fibre Channel Port l Port Type The current mode of the Fibre Channel port I...

Page 359: ... Edit 2 Select the new port mode Initiator or Target in the drop down box see Figure FC Initiators and Targets Page on page 358 3 Click Update 10 10 Contacts The Contacts page allows you to enter company information You can also enter individual contact information for primary and secondary contacts To access the Contacts page click the Configuration menu and then click the Contacts tab The Contac...

Page 360: ... country ETERNUS CS800 Location Enter the physical location of the ETERNUS CS800 for example data center Support Contract Enter the support contract number for the ETERNUS CS800 2 Click Apply 10 10 2 Primary and Secondary The Primary and Secondary pages allow you to enter information about the primary and secondary contacts for the ETERNUS CS800 To access the Primary or Secondary page on the Conta...

Page 361: ...quired Enter the contact e mail address Phone Enter the contact phone number Fax Enter the contact fax number Pager Enter the contact pager number Street Enter the contact street address City Enter the contact city State Enter the contact state Postal Code Enter the contact postal code Country Enter the contact country 2 Click Apply ETERNUS CS800 361 10 Configuration ...

Page 362: ...362 ...

Page 363: ...the remote system allowing your business to resume normal operations Once the original system is available again you can restore all data back to its original location Additional Information l Fujitsu Technology Solutions recommends that you configure and start replication before storing large amounts of data on the ETERNUS CS800 l An ETERNUS CS800 can only replicate data to a ETERNUS CS800 that s...

Page 364: ...mpared to the original amount of data stored In addition a data block is transmitted only if the target does not already have a copy of the block Finally data can optionally be encrypted before it is transmitted The ETERNUS CS800 can perform the following types of replication l Replication on page 364 l Directory File or Cartridge Based Replication on page 365 l OST Optimized Duplication on page 3...

Page 365: ... ID is used to associate the replicated share or partition on the source system with the share or partition that will receive the replicated data on the target system l You do not need to schedule or manually perform Directory File or Cartridge Based Replication through the remote management console Instead replication is triggered when a file is closed or a period of time after it is modified NAS...

Page 366: ...Replication The ETERNUS CS800 can send replicated data to multiple target systems First configure up to two replication targets see Adding a Replication Target on page 272 Then for each share or partition select which targets to replicate data to one both or neither see Enabling Replication For a Share or Partition on page 374 Below are two possible scenarios in which multiple replication targets ...

Page 367: ...ectory File or Cartridge Based Replication on page 368 l Restore a lost or damaged share or partition back to its original location see Task Overview Performing a Share or Partition Failback on page 370 l Recover data from a lost or damaged share or partition see Task Overview Recovering a Replicated Share or Partition on page 369 The Replication wizard provides guided assistance for configuring d...

Page 368: ...artition on the target system see Task Overview Recovering a Replicated Share or Partition on page 369 or restore the share or partition to its original location on the source system see Task Overview Performing a Share or Partition Failback on page 370 CAUTION If you do not configure a replication schedule or manually replicate the share or partition on a regular basis your data is not protected ...

Page 369: ...time after it is modified A cartridge is automatically replicated after it is unmounted After replication the replicated files or cartridges are immediately available on the target system There is no need to recover the share or partition to make the files or cartridges available CAUTION Cartridge barcodes for all source systems that are replicating to the same target must be unique To limit the a...

Page 370: ...e or VTL partition is lost or damaged on the source system you can failback the share or partition to the source system using a received snapshot on the target system When you failback a share or partition it is restored on the source system just as it was at the point in time when the snapshot was saved To perform a share or partition failback 1 On the original source system add the original targ...

Page 371: ... page to perform the following tasks l View replication information for shares or partitions see Replication Jobs List on page 372 l Enable or disable replication for a share or partition see Enabling Replication For a Share or Partition on page 374 l Configure Directory File or Cartridge Based Replication for a share or partition see Configuring Directory File or Cartridge Based Replication on pa...

Page 372: ...s icons to show or hide all shares or partitions l NAS VTL The name of the share or partition Hold the cursor over the name to display detailed information about the share or partition If multiple targets are configured for a share or partition click the arrow next to the share or partition to view all targets l Replication The replication state On or Off Click the toggle switch to turn replicatio...

Page 373: ...or hide a column click the arrow to the right of a column heading and then click Columns Select the check box to show a column or clear the check box to hide a column The following columns are hidden by default Original Data Size Actual Data Sent and Average Data Sent l To filter content in a column click the arrow to the right of a column heading and then click Filters Type or select the desired ...

Page 374: ...ve data deduplication enabled at the time it is created To enable or disable replication for a share or partition 1 Select the share or partition and click Configure The Share or Partition Configure window displays see Share or Partition Configure Window on page 374 Figure 236 Share or Partition Configure Window 2 Select the Enable Replication check box to enable replication for the share or parti...

Page 375: ...ated files or cartridges are immediately available on the target systems There is no need to recover the share or partition to make the files or cartridges available Disable Directory File or Cartridge Based Replication if you do not want to automatically replicate files or cartridges When you configure a share or partition for Directory File or Cartridge Based Replication you must specify a Sync ...

Page 376: ...or Cartridge Based Replication to target to target check box to disable Directory File or Cartridge Based Replication for the share or partition 5 Enter a Sync ID in the box The Sync ID is used to identify the target share or partition that will receive replicated data from the source share or partition The Sync IDmust be identical to the Sync ID of the target share or partition on the target syst...

Page 377: ...licate a partition containing media in an Exported state To replicate a share or partition 1 Select the share or partition to replicate If multiple targets are configured click the arrow next to the share or partition to display all targets and then select the desired target 2 Click Replicate Now The status of the replication job displays in the Job Status column To cancel the replication job sele...

Page 378: ...tory File or Cartridge Based Replication operations Each time an operation is queued the system logs an administration alert that reports the total number of queued Directory File or Cartridge Based Replication requests If a synchronization fails make sure the target share or partition is unlocked see Configuring a Target Share for Directory File Based Replication on page 390 or Configuring a Targ...

Page 379: ...e to be replicated State The replication state for the file directory or cartridge Progress The percentage complete for replication of the file directory or cartridge Estimated Duration The estimated time it will take to complete replication for the file directory or cartridge The estimated duration may display as unknown if replication has been very recently initiated After the system has enough ...

Page 380: ...artition to the target systems Fujitsu Technology Solutions recommends scheduling replication to run after backups are complete To schedule a share or partition for replication click Scheduler The Scheduler window displays see Scheduler Window on page 380 For details about using the Scheduler to add or edit a replication schedule see Scheduling a Share or Partition for Replication on page 290 Figu...

Page 381: ...s l View received snapshots and recover failback or delete snapshots see Received Snapshots on page 381 l Manage recovery jobs see Recovery Jobs on page 386 l Manage failback jobs see Failback Jobs on page 387 l Manage shares configured for Directory File Based Replication see Directory File Based on page 388 Received Snapshots The Received Snapshots page allows you to view and work with received ...

Page 382: ...the source system see Performing a Failback For a Share on page 384 l Delete a received snapshot see Deleting a Snapshot on page 386 The target system will retain up to 10 replication snapshots default setting for each replicated partition Once 10 snapshots have been saved the oldest snapshot is deleted to make room for each new snapshot that is received To change the maximum number of snapshots r...

Page 383: ...Click a column heading to sort the rows in the table by that column Click the column heading again to reverse the sort order Recovering a Share Recover a NAS share if the source system is unavailable and you need to access the share for example to continue performing backups When you recover a share you select a received snapshot The ETERNUS CS800 uses the snapshot to recreate the share on the tar...

Page 384: ...failback of a NAS share if a source system that was previously unavailable becomes available again When you failback a share you select a received snapshot The ETERNUS CS800 copies the snapshot from the target system back to the source system You can then perform a recover operation to recreate the share on the source system just as it was at the point in time when the snapshot was saved Before yo...

Page 385: ...ion check box selected to enable encryption when sending the snapshot to the destination Or clear the Use Encryption check box to disable encryption when sending the snapshot to the destination CAUTION Select 128 bit encryption if you are sending data to an ETERNUS CS800 running a system software version prior to ETERNUS CS800 2 1 Software AES encryption options are available only if the Data in F...

Page 386: ...mplete or abort the operation To delete a snapshot 1 Do one of the following actions l On the source system disable replication for the share associated with the snapshot see Enabling Replication For a Share or Partition on page 374 l On the target system delete the source system associated with the snapshot from the list of allowed replication sources see Deleting a Replication Source on page 279...

Page 387: ...tarted Finished The time the recovery job finished Status The status of the recovery job Success In Progress or Failed To delete information for a recovery job select it in the Snapshot Recovery Jobs list and click Delete Job Info Failback Jobs The Failback Jobs page allows you to view information about snapshot failback operations that were previously completed You can also abort a failback that ...

Page 388: ...Failback Jobs page to perform the following tasks To delete information for a failback job select it in the Snapshot Failback Jobs section and click Delete Job Info To abort a failback job that is in progress select it in the Snapshot Failback Jobs section and click Abort Directory File Based The Directory File Based page allows you to manage Directory File Based Replication on the target system Y...

Page 389: ...ed data see Configuring a Target Share for Directory File Based Replication on page 390 l View statistics for shares configured for Directory File Based Replication see Unpack Queue on page 391 Shares Eligible to Receive Directory File Based Data The Shares Eligible to Receive Directory File Based Data section displays information for all NAS shares on the ETERNUS CS800 that are eligible to receiv...

Page 390: ...Directory File Based Replication Configuring a NAS share for Directory File Based Replication enables the automatic replication of files and directories on the source partition to the target share Before you configure a share on the source system for Directory File Based Replication you must configure a share on the target system to receive the replicated data from the source share For information...

Page 391: ...identical to the Sync ID of the source share on the source system 4 Select an Access option l Locked The share is not allowed to receive new Directory File Based Replication data l Unlocked The share is allowed to receive new Directory File Replication data If a share configured for Directory File Based Replication is locked on the target system synchronization jobs may fail on the source system 5...

Page 392: ...system if the source system is unavailable Once the source system becomes available you can failback the partition to make it available on the source system again Before you can receive replicated partitions you must specify one or more replication sources see Adding a Replication Source on page 278 To access the Receive VTL page click the Replication menu and then click the Receive VTL tab Tasks ...

Page 393: ...pshot was saved To access the Received Snapshots page on the Receive VTL page click the Received Snapshots tab see Received Snapshots Page on page 393 Figure 248 Received Snapshots Page Tasks Use the Received Snapshots page to perform the following tasks l View information about received snapshots see Snapshots List on page 394 l Recover a partition on the target system see Recovering a Partition ...

Page 394: ...ation job was started Finished The time the most recent replication job finished Status The status of the most recent replication job see Replication and Synchronization Status on page 373 Click the status to display detailed information about the most recent replication job Click a column heading to sort the rows in the table by that column Click the column heading again to reverse the sort order...

Page 395: ... addition you must map the devices before the VTL partition is accessible If the partition contains media you will only be able to select the highest capacity tape drive for that media type For example if the partition contains SDLT600 tape cartridges you will only be able to select DLT S4 tape drives when mapping devices to the recovered partition When a VTL partition is recovered on a target sys...

Page 396: ... in the Snapshots List and click Failback The Failback Target page displays see Failback Target Page on page 396 Figure 250 Failback Target Page 2 Optional In the Failback Destination System box type the hostname or IP address of a new destination system to failback the partition to The default destination is the original source system To use hostname format you must specify at least one DNS IP ad...

Page 397: ...he highest capacity tape drive for that media type For example if the partition contains SDLT600 tape cartridges you will only be able to select DLT S4 tape drives when mapping devices to the recovered partition When a VTL partition is recovered on a target system a new serial number is created for the partition If you previously remapped your backup application to a recovered partition on the tar...

Page 398: ...tition is not deleted To delete this data on the source system disable replication for the partition before deleting the last snapshot 3 Click Yes to confirm the action Recovery Jobs The Recovery Jobs page allows you to view information about snapshot recover operations that were previously completed To access the Recovery Jobs page on the Receive VTL page click the Recovery Jobs tab see Recovery ...

Page 399: ...Info Failback Jobs The Failback Jobs page allows you to view information about snapshot failback operations that were previously completed You can also abort a failback that is currently in progress To access the Failback Jobs page on the Receive VTL page click the Failback Jobs tab see Failback Jobs Page on page 399 Figure 252 Failback Jobs Page The Snapshot Failback Jobs section displays the fol...

Page 400: ...s select it in the Snapshot Failback Jobs section and click Abort Cartridge Based The Cartridge Based page allows you to manage Cartridge Based Replication on the target system You can configure a VTL partition to receive Cartridge Based Replication data sent from a source system and view replication statistics for the partition For information about creating VTL partitions see Adding a VTL Partit...

Page 401: ... information Partition Name The name of the partition State The state of Cartridge Based Replication for the partition Enabled or Disabled Sync ID The Sync ID used to identify the source partition that will send replicated data to the partition Access The selected access option for the partition Locked or Unlocked Click the Information button i next to a partition to display detailed information a...

Page 402: ...cation for the partition 3 Enter a Sync ID in the box The Sync ID is used to identify the source partition that will send replicated data to the target partition The Sync ID must be identical to the Sync ID of the source partition on the source system 4 Select an Access option l Locked The partition is not allowed to receive new Cartridge Based Replication data l Unlocked The partition is allowed ...

Page 403: ... the cartridge to be replicated State The replication state of the cartridge Click Refresh to update the statistics in the Unpack Queue Click OK to return to the Cartridge Based page 11 5 Actions The Actions page allows you to manage replication activity on the ETERNUS CS800 You can pause the replication service enable the replication state and clear performance statistics To access the Actions pa...

Page 404: ...Service on page 404 l Enable or disable the replication state see Replication State on page 405 l Clear cumulative replication statistics see Replication Performance on page 405 Replication Service The replication service controls replication and failback traffic on the ETERNUS CS800 You can pause each replication target independently 404 ETERNUS CS800 ...

Page 405: ...ble to enable replication for all shares or partitions l Click Disable to disable replication for all shares or partitions If a replication job is currently in progress the system continues until the entire replication job is complete After the replication job has completed the system disables replication The system will not be able to replicate data for any shares or partitions until you click En...

Page 406: ...r Cartridge Based Replication To access the Reports page click the Replication menu and then click the Reports tab see Reports Page on page 406 Figure 257 Reports Page Use the Reports page to perform the following tasks To generate a new replication report click Generate New l To download the most recently generated replication report click Download Current l Save the replication report to your lo...

Page 407: ...cess the Status pages click the Status menu The Status pages contains the following tabs l Hardware on page 407 l Performance on page 414 l Disk Usage on page 421 l VTL Status on page 423 l OST Status on page 428 l Activity Log on page 429 12 2 Hardware The Hardware page allows you to view information about the hardware components of the ETERNUS CS800 You can view the overall status of the node as...

Page 408: ...he Hardware page click the Summary tab see Hardware Summary Page on page 408 Figure 258 Hardware Summary Page The Hardware Summary page displays the following information Available System Memory RAM The total amount of memory RAM installed in the system Free System Memory RAM The amount of system memory RAM that is currently free State The status of the node Status The overall status of all compon...

Page 409: ...Host Bus Adapters on page 410 l Network Ports on page 411 l Storage Arrays on page 412 System Board The System Board page allows you to view information reported by the main system board in the node such as temperature voltage fan and power supply information To access the System Board page on the Details page click the System Board tab see System Board Page on page 409 Figure 259 System Board Pag...

Page 410: ...component has failed Host Bus Adapters The Host Bus Adapters page allows you to view information about installed Fibre Channel cards and their ports The Host Bus Adapters page displays only on ETERNUS CS800 configurations that include a Fibre Channel card To access the Host Bus Adapters page on the Details page click the Host Bus Adapters tab see Host Bus Adapters Page on page 410 Figure 260 Host ...

Page 411: ... the ports in the selected Fibre Channel or SAS controller Component The number of the Fibre Channel port Value The throughput capacity of the port if connected Status The status of the port l Up Green The port is connected l Down Green The port is not connected Network Ports The Network Ports page allows you to view information about Ethernet ports in the system The ETERNUS CS800 includes three o...

Page 412: ... Status The status of the Ethernet port l Up Green The port is connected l Down Green The port is not connected Storage Arrays The Storage Arrays page allows you to view information about storage arrays and controllers in the ETERNUS CS800 To access the Storage Arrays page on the Details page click the Storage Arrays tab see Storage Arrays Page on page 413 412 ETERNUS CS800 ...

Page 413: ...ay to view detailed information for the array in the Component section Status The status of the storage array l Normal Green The component is operating correctly l Attention Yellow There is a problem with the component l Failed Red The component has failed The Components section displays the following information about the components in the selected storage array ETERNUS CS800 413 12 Status ...

Page 414: ...mponent Location The location of the subcomponent within the system Value The value reported by the subcomponent Status The status of the subcomponent l Normal Green The component is operating correctly l Attention Yellow There is a problem with the component l Failed Red The component has failed 12 3 Performance The Performance page allows you to view information about system performance includin...

Page 415: ... to display in the Last list 1 24 hours l The horizontal axis displays time in minutes l The vertical access displays inline throughput 0 2 000 MB s The range represented by the Y axis changes based on the maximum value increasing in 200 MB increments as needed l Each bar on the graph represents approximately 1 minute of time l Hold the cursor over a bar to display the value of the bar Ethernet Th...

Page 416: ...orts data received and the bottom graph reports data sent l Select the port to monitor in the Ethernet drop down box or select Avg to display an average of all ports l The horizontal axis displays time 0 100 seconds l The vertical axis displays data throughput 0 125 MB s for 1 GbE ports or 0 1 25 GB s for 10 GbE ports 416 ETERNUS CS800 ...

Page 417: ...hput performance for RAID read and write activity To access the RAID page on the Performance page click the RAID tab see RAID Page on page 417 Figure 265 RAID Page Use the RAID page to display recent RAID activity in dynamic graphs l The top graph reports data reads and the bottom graph reports data writes l The horizontal axis displays time 0 100 seconds l The vertical axis displays the amount of...

Page 418: ...ar to display the value of the bar Fibre Channel The Fibre Channel page allows you to view throughput performance for Fibre Channel send and receive activity The Fibre Channel page displays only on ETERNUS CS800 configurations that include a Fibre Channel card To access the Fibre Channel page on the Performance page click the Fibre Channel tab see Fibre Channel Page on page 419 418 ETERNUS CS800 ...

Page 419: ...he Fibre Channel drop down box or select Avg to display an average of all ports l The horizontal axis displays time 0 100 seconds l The vertical axis displays data throughput 0 500 MB s l Values that exceed the maximum value of the vertical axis are shown in lighter green l Each bar on the graph represents approximately 1 second of time l Hold the cursor over a bar to display the value of the bar ...

Page 420: ... Select the CPU core to monitor in the CPU drop down box or select Avg to display an average of all CPUs l The CPU drop down box lists all CPU threads Each hyper threaded CPU core counts as two threads l The horizontal axis displays time 0 100 seconds l The vertical axis displays CPU usage 0 100 Each bar on the graph represents approximately 1 second of time l Hold the cursor over a bar to display...

Page 421: ...page 421 Figure 268 Disk Usage Page Use the Disk Usage page to view the following information l Available on page 421 l Used on page 422 l Data Before Reduction on page 422 l Data After Reduction on page 423 Available Available space is the area that is available for data storage The Available value is displayed as an amount and as a percentage of the total capacity in the system Available space i...

Page 422: ... deduplicated Data Not Intended For Deduplication The amount of data that will not be deduplicated data on shares or partitions that do not have deduplication enabled System Metadata The amount of disk space used for internal operations of the ETERNUS CS800 including system configuration files as well as temporary files created during replication space reclamation and healthchecks Data Before Redu...

Page 423: ...TERNUS CS800 NAS and Multi Protocol configurations only The amount of data stored in deduplicated OpenStorage OST storage servers This includes incoming data for OST and ETERNUS CS800 Accent Data After Reduction The Data After Reduction value represents the final reduced size of all data that has been processed by the data deduplication and compression engines Data after reduction is divided into ...

Page 424: ... on page 424 l Logical View on page 426 l Performance View on page 427 Physical View The Physical View page allows you to view a physical representation of the virtual components in a VTL You can view information about virtual tapes drives storage slots and cartridges To access the Physical View page on the VTL Status page click the Physical View tab see Physical View Page on page 424 Figure 269 P...

Page 425: ...e and I E Slots The Storage Slots and I E Slots sections displays information about the virtual cartridges located in the storage and I E slots The following information is displayed for each cartridge Slot The slot where the cartridge is located Barcode The barcode of the cartridge WP The write protect status of the cartridge Capacity The capacity of the cartridge Used The amount of space on the ...

Page 426: ...wing information about VTL partitions Partition The name of the partition Number of Drives The number of virtual tape drives in the partition Capacity The storage capacity of the partition Used The amount of space on all cartridges in the partition currently used to store data The value for Used might be less than the original native raw data size because the data is compressed before it is writte...

Page 427: ... page on the VTL Status page click the Performance View tab see Performance View Page on page 427 Figure 271 Performance View Page The Partition Throughput section displays the following information about VTL partitions Partition The name of the partition Click the partition name to display the tape drives in the partition Click a tape drive to see individual performance information for that drive...

Page 428: ...ed see ETERNUS CS800 Accent on page 268 To access the OST Status page click the Status menu and then click the OST tab see OST Status Page on page 428 Figure 272 OST Status Page Combined statistics for all media servers display at the top of each section Optimized Duplication and Accent Inline The inline data flow throughput in MB s Inline data flow represents the original native size of the data ...

Page 429: ...ected by the ETERNUS CS800 after deduplication and compression on the media server Bandwidth Reduction The percentage by which network bandwidth utilization was reduced by using optimized duplication or enabling Accent 12 7 Activity Log The Activity Log page allows you to view a record of all activities performed by administrative and service users in the past 90 days You can view the user who per...

Page 430: ...tivity performed Create Update or Delete Category The category of the activity Alert Analyzer Cluster Date Time Email Event Hard Drive Security Healthcheck NAS Network OST Replication Security SNMP Utility or VTL Role The role of the user that performed the activity Admin Summary Details about the activity that was performed including CLI commands and field values Click a column heading to sort th...

Page 431: ...the toolbar Figure 275 Activity Log View Controls Deleting Logged Activities Use the toolbar above the Administrative Activity Log list to delete one or more entries in the activity log see Activity Log View Controls on page 431 l To delete a log entry select the entry and click Delete l To delete all entries in the activity log click Delete All Downloading the Activity Log Use the toolbar above t...

Page 432: ...432 ...

Page 433: ...erts page contains the following tabs l Admin Alerts on page 433 l Service Tickets on page 434 13 2 Admin Alerts The Admin Alerts page allows you to view and work with administration alerts The ETERNUS CS800 generates an administration alert when the condition of the system has changed such as going from the offline state to the online state In addition to viewing administration alerts on the Admi...

Page 434: ... the alert name Detailed information about the alert appears in the Activity Status History section l To delete an administration alert select it and click Delete 13 3 Service Tickets The ETERNUS CS800 has the capability to automatically detect and resolve problems encountered by the system during operation If a problem cannot be resolved automatically and requires user intervention or servicing t...

Page 435: ... critical problem has occurred and needs to be resolved immediately The operation and performance of the ET are degraded and there is a risk of system failure or data loss Recommended Actions If appropriate a service ticket includes recommended actions The recommended actions provide instructions for resolving the problem that caused the system to generate the ticket Perform the recommended action...

Page 436: ...ect an option to display Open tickets Closed tickets or All tickets Get individual ticket To display a specific ticket in the list enter a ticket number and click Apply Click a column heading to sort the rows in the table by that column Click the column heading again to reverse the sort order Tasks Use the Service Tickets page to perform the following tasks l View details for a service ticket incl...

Page 437: ...icket was opened and closed the ticket status and detailed information about the problem see Ticket Details on page 437 The time indicated in the service ticket may not match the ETERNUS CS800 system time Figure 278 Ticket Details 2 Optional Click View Recommended Actions to view instructions for resolving the problem The recommended actions display in a new Web browser window see Recommended Acti...

Page 438: ... made to Fujitsu Technology Solutions customer support The additional information is saved with the service ticket and remains associated with the ticket even after it is closed To modify a service ticket 1 In the list of service tickets click the ticket number 2 Click Analysis at the bottom of the page The Ticket Analysis section displays at the bottom of the page see Ticket Analysis on page 439 ...

Page 439: ...ail address You can also add optional comments to the e mail To enable the ETERNUS CS800 to send e mail you must specify an outgoing e mail server see Server on page 300 To send a service ticket 1 In the list of service tickets click the ticket number 2 Click Email at the bottom of the page The Email Ticket Information section displays at the bottom of the page see Email Ticket Information on page...

Page 440: ...em to generate the ticket is resolved You can also close all service tickets that are currently open You can still view and modify a ticket after it has been closed To close all service tickets that are currently open below the list of service tickets click Close All To close a single service ticket 1 In the list of service tickets click the ticket number 2 Click Analysis at the bottom of the page...

Page 441: ...oot or shut down the ETERNUS CS800 To access the Utilities pages click the Utilities menu The Utilities pages contain the following tabs l Diagnostics on page 441 l Analyzer on page 446 l Space Reclamation on page 449 l Secure Shred on page 452 l Software Upgrades on page 454 l Reboot Shutdown on page 457 14 2 Diagnostics The Diagnostics page allows you to generate and download diagnostic files Yo...

Page 442: ... Click Generate New to generate a new system diagnostics file The system generates a new diagnostics file This can take several minutes 2 After the file finishes generating click the link to enable the Download Current button 3 To download the generated diagnostics file click Download Current A dialog box displays asking if you want to open or save the file 4 Click Save or OK to download the file ...

Page 443: ...you to perform tests that verify the health and integrity of the data deduplication blockpool You can also enable and disable healthchecks To configure the ETERNUS CS800 to automatically run the healthchecks at specified intervals use the Configuration Scheduler page see Scheduling Healthchecks on page 292 To access the Healthchecks page on the Diagnostics page click the Healthchecks tab The Healt...

Page 444: ...checks started End Time The time the healthchecks ended Use the General page to perform the following tasks l To start all enabled healthchecks click Start l To stop all healthchecks in progress click Stop Status The Status page allows you to view information about the most recent test results for each healthcheck You can also enable or disable a healthcheck The following healthchecks are availabl...

Page 445: ... recently run test for each healthcheck Healthcheck Name The name of the healthcheck State The state of the healthcheck enabled or disabled Started The time the healthcheck started Finished The time the healthcheck ended Status The status of the healthcheck Success or Failed If running a healthcheck results in the Contact Support status contact Fujitsu Technology Solutions Customer Support for fur...

Page 446: ...here may be a problem in the blockpool that could cause replication or restore operations to fail Contact Fujitsu Technology Solutions customer support if a healthcheck fails 14 3 Analyzer The Analyzer page allows you to analyze the network and disk performance of the ETERNUS CS800 To access the Analyzer page click the Utilities menu and then click the Analyzer tab The Analyzer page contains the f...

Page 447: ...l Settings on page 448 Performance The Performance page allows you to perform network analysis with another system the target You can also view results from the most recently run test To access the Performance page on the Network Analyzer page click the Performance tab see Performance Page on page 447 Figure 287 Performance Page To perform network analysis 1 In the Target IP Address box enter the ...

Page 448: ... Network Analyzer page click the Settings tab see Settings Page on page 448 Figure 288 Settings Page To enable or disable NetServer on the target ETERNUS CS800 1 Select Enable NetServer to enable NetServer Or select Disable NetServer to disable NetServer 2 Click Apply You should disable NetServer on the target system when you are done analyzing network performance Disk Analyzer The Disk Analyzer p...

Page 449: ...ee up space In addition the ETERNUS CS800 automatically compacts reclaimable space in the following ways l During data ingest reclaimable space is compacted as needed to provide space for new deduplicated data l If the ETERNUS CS800 is not in Low Space state compaction starts when used disk space reaches a high level and there is sufficient reclaimable space Compaction stops when used disk space f...

Page 450: ...ace Reclamation Status on page 451 New or Normal Mode To increase performance when space reclamation is initiated on the Space Reclamation page or as a scheduled event only Stage 2 Calculating Deletion Candidates and Stage 3 Deleting New Candidates are run Low Space or Legacy Mode When disk capacity is low space reclamation is automatically started to free up disk space In this case all four stage...

Page 451: ...appear lower if ingest occurs at the same time as space reclamation Tasks Use the Space Reclamation page to perform the following tasks l To start space reclamation click Start l To stop space reclamation click Stop l To update the display while space reclamation is running click Refresh Space Reclamation Status Space reclamation can have one of the following statuses Status Description Reclamatio...

Page 452: ...stored on the ETERNUS CS800 To securely erase data first delete files on NAS shares or storage servers or erase tape cartridges on VTL partitions then start secure shred During secure shred all residual data associated with the deleted files or cartridges is securely erased from the disk drives by performing a single pass overwrite with zeros While secure shred is running the ETERNUS CS800 operate...

Page 453: ... reclamation from the Utilities Space Reclamation page see Space Reclamation on page 449 3 Make sure all replication and backup jobs are completed see Replication on page 363 4 On the Secure Shred page click Start Shred A warning message displays 5 Click Yes The system reboots and begins the secure shred process This process can take multiple days to complete 6 To check the status of secure shred ...

Page 454: ...the system Figure 292 Secure Shred Mode Interface 7 Click Reboot to finalize the secure shred process and reboot the ETERNUS CS800 After the ETERNUS CS800 finishes rebooting you can resume normal system operation 14 6 Software Upgrades The Software Upgrade page allows you to upload a new software image to update the system software on the ETERNUS CS800 The current software version is displayed on ...

Page 455: ... access the Software Upgrade page click the Utilities menu and then click the Software Upgrade tab see figure below Figure 293 Software Upgrade Page To upload a new ETERNUS CS800 software image 1 Click the Browse button to browse the system and locate the new software image 2 Click Upload 3 Click Start to begin the upload process Do not close the window until the uploading and unpacking process is...

Page 456: ...lose all outstanding service tickets see Service Tickets on page 434 l Stop all active backup jobs see your backup application l Make sure all replication jobs are complete or nearly complete see ETERNUS CS800 Replication Overview on page 363 l Make sure space reclamation is complete or nearly complete see Space Reclamation on page 449 l Download a system diagnostics file and transfer the file to ...

Page 457: ...t click Remove to remove the current upload from the ETERNUS CS800 Clear Your Web Browser Cache It is important to clear your Web browser cache before logging on to the remote management console for the first time following the software upgrade This will ensure the remote management console displays correctly 14 7 Reboot Shutdown The Reboot Shutdown page allows you to reboot or shut down the ETERN...

Page 458: ...ERNUS CS800 Reset from diagnostic state Only available when the node is in degraded mode Restarts the services on the node without rebooting the system 2 Click Apply 3 Close the browser window Shutting down the system can take up to 15 minutes Only the node will completely shut down When rebooting the system can take approximately 30 minutes to start up depending on the amount of installed storage...

Page 459: ...n page 465 l Temperature Problems on page 466 15 1 General Troubleshooting Actions For information about general troubleshoot actions you can take see the following sections l Viewing Service Tickets on page 459 l Checking Hardware Status on page 460 l Downloading a System Diagnostics File on page 460 15 1 1 Viewing Service Tickets Service tickets include time and date information status open or c...

Page 460: ...atus information for components such as the system board Fibre Channel adapters network ports and storage arrays To access the Hardware page click the Status menu and then click the Hardware tab For information about using the Status page see Hardware on page 407 15 1 3 Downloading a System Diagnostics File The System Diag File page allows you to generate and download a system diagnostics file Thi...

Page 461: ...tions Customer Support representative see Support and Help on page 13 FATAL ERROR Unable to start blockpool Message displays Contact your Fujitsu Technology Solutions Customer Support representative see Support and Help on page 13 Table 24 Start up Problems 15 2 2 Hardware Problems The table below describes corrective actions for problems occurring with the system hardware ETERNUS CS800 461 15 Tro...

Page 462: ...operating Determine which fan has failed by reading the service ticket generated by the system Contact your Fujitsu Technology Solutions Customer Support representative to arrange for service see Support and Help on page 13 Multiple fans are not operating CAUTION Turn the system off immediately The system will overheat with multiple fans not operating Contact your Fujitsu Technology Solutions Cust...

Page 463: ...15 2 3 Ethernet Network Problems The table below describes corrective actions for problems occurring with the Ethernet network ETERNUS CS800 463 15 Troubleshooting ...

Page 464: ... host on the same network If the ping reports round trip times the ETERNUS CS800 system is active If not check the cables switches or hubs for damaged components If everything checks out contact the Fujitsu Technology Solutions Customer Support department see Support and Help on page 13 ETERNUS CS800 remote management pages are not visible If you cannot connect to the ETERNUS CS800 remote manageme...

Page 465: ...cation when you click Resume Replication was disabled while a replication was in process and the replication completed If you click Disable during a replication in process the system will complete the entire replication and then disable replication on the system The system will be unable to replicate until you click Enable Enabled replication on a NAS share and received the following Event No dest...

Page 466: ...m containing the ETERNUS CS800 system to verify that the temperature falls within the specified range 2 Inspect for adequate air circulation inside the rack Some racks may provide additional fans to improve air circulations Check the fan for proper operation Clean or replace any air filter as necessary 3 If a component reports a temperature problem verify that the associated fan is operating corre...

Page 467: ...e availability of system operation and guarantees a high degree of data integrity and failsafe performance Please note that unauthorized interference with the system will void the warranty and exempt the manufacturer from all liability CAUTION Follow the safety instructions in chapter Important Information on page 16 16 1 ETERNUS CS800 S6 Hardware Server PRIMERGY RX2540 M1 1 Removing the defective...

Page 468: ... out of the chassis during transportation l If applicable fold down the handle on the PSU module 3 Connecting the server to the mains In its basic configuration level the server has a hot plug power supply unit A second hotplug power supply unit can be added to ensure a redundant power supply If one power supply unit is defective the other then guarantees unimpaired operation Each hot plug power s...

Page 469: ...ns outlet in the in house power supply l network or a power outlet of the rack socket strip see also PRIMECENTER Rack System assembly guide Figure 298 Connecting the Server to the Mains Securing power cords Figure 299 Securing power cord ETERNUS CS800 469 16 Removal Replacement Procedures CRUs ...

Page 470: ...s incorporated in the HDD modules are highly sensitive electromagnetic devices and must be handled with great care Incorrect handling can cause partial or total failure of the hard disk drives These failures can result in data errors and to a loss of data or to total corruption of the hard disk drive Observe the following rules to prevent such problems occurring l Only store and transport HDD modu...

Page 471: ...bering used by the ETERNUS CS800 software e g in Tickets and at the Storage Array Status page of the Remote Management Console Figure 300 2 5 inch HDD Numbering 16 1 2 HDD Removal and Replacement Procedures Removing 1 Release the locking mechanism by pressing the locking button 1 2 Push the handle of the HDD module fully in the direction of the arrow 2 The HDD module is now unlocked 3 Wait about 3...

Page 472: ...D module as described above 2 Insert the HDD module into a drive bay and carefully push back as far as it will go 1 3 Close the locking lever to lock the hard disk drive in place 2 4 If the status of the HDD remains unknown after rebuild has finished contact Fujitsu Customer Support see Support and Help on page 13 472 ETERNUS CS800 ...

Page 473: ... is not done existing data can be lost 16 2 Storage Subsystem The following chapter applies for ETERNUS CS800 JX40 S2 and ETERNUS CS800 DX100 S3 storage systems The Hard Disk Drive HDD used in the JX40 S2 storage module and in the DX100 S3 is a 3 5 NL SAS HDD with 7200 rpm CAUTION In order to avoid giving damages to the device by the static electricity of human body be sure to wear a wrist strap d...

Page 474: ...e error log will display multiple errors due to a temporary disarray of the transmission route within the separation connection of the HDD unit This is not a problem error of the HDD unit or the device Removing 1 Press the latch of the disk drive and open the lock lever 1 2 Hold the lock lever and pull the disk drive partway 3 Take the hard disk drive out of the bay while supporting its bottom 2 4...

Page 475: ...nsert the HDD module into a drive bay and carefully push back as far as it will go 1 2 Close the locking lever to lock the hard disk drive in place 2 Figure 305 Inserting the 3 5 inch HDD module ETERNUS CS800 475 16 Removal Replacement Procedures CRUs ...

Page 476: ...476 ...

Page 477: ...de package The procedure of storage expansion differs for Entry and Scale models 17 1 Storage Expansion Entry The disk capacity of the ETERNUS CS800 S6 Entry model can be enhanced in steps of 2 x 8TB up to a maximum of 24TB Figure 306 2 5 inch HDD Numbering Entry basic configuration 8TB Figure 307 Entry system without JX40 S2 basic configuration 8TB Figure 308 Entry system with JX40 S2 basic confi...

Page 478: ...starting with 16TB on page 478 3 Reboot the ETERNUS CS800 via the remote management pages see Reboot Shutdown on page 457 When the system boots up a background initialize procedure is started The new disks are automatically integrated into the system and put into service No further actions are required Figure 309 Entry system without JX40 S2 first extension 16TB Figure 310 Entry system with JX40 S...

Page 479: ...tension 24TB Figure 312 Entry system with JX40 S2 second extension 24TB 17 1 3 Procedure of Storage Expansion starting with 24TB or more If the server of the Entry model is already fully equipped with disks further capacity enhancement is supported by connecting up to three ETERNUS JX40 S2 storage modules The enhancement can be done in up to six steps with 16TB each up to a maximum of 120TB in tot...

Page 480: ...ble between the server and the first JX40 S2 module JX40 1 is 3 5m and the cables between the JX40 S2 modules have a maximum length of 1 1m Using longer cables may cause malfunction with a risk of data loss The procedure of storage expansion requires a reboot of the ETERNUS CS800 S6 to integrate the new hardware In general it is possible to connect the additional storage modules and or to plug in ...

Page 481: ...00 S6 remote management pages see Reboot Shutdown on page 457 Shutting down the system can take up to 15 minutes The server goes into standby mode its power off indicator lights up green 3 If necessary rearrange the existing components in the rack and or mount the new storage module s See section Locating the Mounting Position on page 82 and Installing a Storage Module in the Rack on page 89 CAUTI...

Page 482: ... slot 7 of the server The SAS OUT port of JX40 1 has to be connected to the SAS IN port of JX40 2 and so on 5 If the disks are not already inserted to the ETERNUS JX40 S2 Replace the blank inserts one after the other by 3 5 4TB Nearline SAS 7 200 rpm hard disks The slots you have to fill up with disks are shown by figure Disk bays in JX40 used for storage expansion from 24TB to up to 120TB 482 ETE...

Page 483: ...ng its power ON OFF button now Otherwise if the system was operable while the new disks were added initiate a reboot via the remote management pages see Reboot Shutdown on page 457 9 Wait at least 15 minutes before starting any further actions The integration of the added disks takes place automatically no further actions are required 17 2 Storage Expansion Scale Table below shows the numbering sc...

Page 484: ...dules make sure that you only use storage expansion modules that are fully equipped and not manually configured No preparations of the ETERNUS DX100 S3 or the new expansion must be done Just connect the new expansion physically as described below and let the ETERNUS CS800 S6 software perform all steps necessary WARNING DO NOT run the Add new enclosure function provided by the ETERNUS DX100 S3 Proc...

Page 485: ... switched off Therefore press and hold the power ON OFF button of the storage base module for at least 4 seconds until the READY LED does not glow any more Then wait a few minutes until DX100 S3 has shut down its power LED goes off 5 Depending on the needs relocate the existing modules or just mount the new ones in the rack according to the numbering scheme of the modules The sequence of the modul...

Page 486: ... moving the end of the cable connected to CM 1 from the IOM 1 IN port of the priorly last DE to the IOM 1 IN port of the new last DE The figures ETERNUS DX100 S3 cabling with one drive enclosure on page 486 and ETERNUS DX100 S3 reverse cabling with two to ten drive enclosures on page 487 are depicting the cabling with a top down arrangement of the modules Figure 318 ETERNUS DX100 S3 cabling with o...

Page 487: ...e IOM 0 SAS IN port of DE 2 If there are further DE s they must be connected in the same way The IOM 0 OUT port of the always last DE remains unused c The SAS port of CE CM 1 must be connected to the IOM 1 SAS IN port of the always last DE d Only if there are more than just one DE The IOM 1 SAS OUT port of the last DE must be connected to the IOM 1 SAS IN port of the predecessor DE If there are fu...

Page 488: ...ed in their slots correctly 10 Press the power ON OFF button at the left side of the controller modules front panel 11 Wait until the READY LED of the storage base module glows green CAUTION Check all LED s at the front and rear side of each storage module Do not continue if any LED indicates a problem i e lights up with a color other than green Otherwise booting up the server could damage the exi...

Page 489: ... partitions maximum 80 virtual drives maximum 9000 virtual cartridges per partition Inline Deduplication Inline data flow provides deduplication with an optimal combination of total system performance manageability and value Optionally shares or partitions without deduplication enabled can be used to store data not suitable for deduplication Replication Support for remote replication Replication i...

Page 490: ...x 10GbE optional 3 x 1GbE 4 x 10GbE optional 8 x 1GbE optional Path to Tape Fibre Channel 2 x 8Gb optional each port either PTT or VTL target 4 x 8Gb optional each port either PTT or VTL target Fibre Channel to VTL Target Table 32 Interfaces Physical Characteristics Height Entry 2 HU 8 HU 8 9 cm 35 6 cm Scale 4 HU 23 HU 17 8 cm 106 8 cm Width side to side 48 26 cm Depth front to back 77 cm Weight ...

Page 491: ...lass A VCCI Class A AS NZS CISPR22 Class A CNS13438 C6357 Class A C Tick BSMI Electromagnetic Immunity EN 55024 CE Certification Electromagnetic Compatibility Directive 2004 108 EC Low Voltage Directive 2006 95 EC Environmental Compliance RoHS compliant Restriction of Hazardous Substances WEEEcompliant Waste Electrical and Electronically Equipment Compliance Notes There is general compliance with ...

Page 492: ...ontroller LSI GEN3 SAS 6G RAID Level RAID 1 1 1 for Operating System StorNext and blockpool metadata RAID 6 4 2 for backup data Table 37 Selected Server Specifications for Entry Selected ETERNUS JX40 S2 Storage Module Specifications Weight Approx 35 kg depending on the upgrading Disks 6 or 12 3 5 2TB SATA hard disks 7 200 rpm Interface to Server SAS RAID Level 1 to 4 x RAID 6 4 2 Table 38 Selected...

Page 493: ...ID 1 1 1 for StorNext and blockpool metadata Table 39 Selected Server Specifications for Scale Selected ETERNUS DX100 S3 Storage Module Specifications Weight Approx 35 kg Disks 12 x 3 5 4TB Nearline SAS hard disks 7 200 rpm Interface to Server from Storage Base Module 2 x 8 GbFC RAID Level 2 RAID 6 4 2 Table 40 Selected Storage Module Specifications for ETERNUS DX100 S3 ETERNUS CS800 493 18 System...

Page 494: ...494 ...

Page 495: ...OpenManage o 8406 HTTP jettyd o 8407 HTTP thriftd l TCP ports opened for replication traffic o 22 Replication o 80 Replication OST o 1062 Replication OST l UDP ports opened for data traffic o 111 RPC portmap o 628 NFS statd o 682 NFS rquotad o 880 NFS mountd o 2049 NFS nfsd o 10000 NDMP o 32000 NFS lockd l TCP ports opened for data traffic o 111 RPC portmap o 139 CIFS o 445 CIFS o 628 NFS statd o ...

Page 496: ...o 2049 NFS nfsd o 3095 OST o 3096 OST o 3097 OST o 3098 OST o 3099 OST o 3100 OST o 3101 OST o 3102 OST o 10000 NDMP o 10001 OST o 10002 OST o 32000 NFS lockd 496 ETERNUS CS800 ...

Page 497: ... system patched or otherwise included with the product For each component the associated licenses are provided Upon request Fujitsu will furnish a DVD containing source code for all of these open source modules both the base CentOS modules and the additional packages listed here ETERNUS CS800 Component Version License Agreement Ace 6 2 4 Ace License on page 501 AS3 Commo6 67162 07 Rev ASeptember 2...

Page 498: ...se CDDL Version 1 1 on page 518 GNU General Public License on page 534 version 2 and ETERNUS CS800 3 2 Open Source Software on page 497 Jetty 8 1 12 v20130726 Ace License on page 501 and Creative Commons Attribution 3 0 License on page 527 with Jetty Web Container Notice on page 570 Jre 1 7 0 Oracle Binary Code License Agreement on page 582 Kernel 2 3 32 GNU General Public License on page 534versi...

Page 499: ...License on page 574 Nmon 14i 8 el6x86_64 Fedora Project ETERNUS CS800 3 2 Open Source Software on page 497 OpenLdap 2 8 OpenLdap on page 575 Open SSL 1 0 1g Open SSL License on page 578 Openutil lib 1 0 GNU Lesser General Public License on page 542 version 2 Pcre 7 4 PCRE License on page 593 P7zip 9 20 1 GNU Lesser General Public License on page 542 P7zip License on page 591 Pbzip2 1 1 6 Pbzip2 Li...

Page 500: ...n page 542 version 3 Rootsh 1 5 3 ETERNUS CS800 3 2 Open Source Software on page 497 Rrdtool 1 4 7 GNU General Public License on page 534 Samba4 4 1 12 ETERNUS CS800 3 2 Open Source Software on page 497 Scriptaculous 1 8 3 The MIT License on page 574 Spring ActionScript 2 0 1 Ace License on page 501 Thrift 0 8 0 Ace License on page 501 Userspace RCU 0 8 3 Userspace RCU License on page 596 Userspac...

Page 501: ...You must however include this copyright statement along with any code built using DOC software that you release No copyright statement needs to be provided if you just ship binary executables of your software products You can use DOC software in commercial and or binary software releases and are under no obligation to redistribute any of your source code that is built using DOC software Note howev...

Page 502: ... thereof Moreover in no event will Washington University UC Irvine or Vanderbilt University their employees or students be liable for any lost revenue or profits or other special indirect and consequential damages DOC software is provided with no support and without any obligation on the part of Washington University UC Irvine Vanderbilt University their employees or students to assist in its use ...

Page 503: ...p www dre vanderbilt edu CIAO 4 http www dre vanderbilt edu cosmic 5 http www dre vanderbilt edu schmidt 6 http www cs wustl edu schmidt ACE members html 7 http www wustl edu 8 http www uci edu 9 http www vanderbilt edu 10 mailto doc_group cs wustl edu 11 http www cs wustl edu schmidt ACE users html 12 http www cs wustl edu schmidt ACE html 13 http www cs wustl edu schmidt TAO html 14 http www dre...

Page 504: ...ontrol means i the power direct or indirect to cause the direction or management of such entity whether by contract or otherwise or ii ownership of fifty percent 50 or more of the outstanding shares or iii beneficial ownership of such entity You or Your shall mean an individual or Legal Entity exercising permissions granted by this License Source form shall mean the preferred form for making modif...

Page 505: ...communication sent to the Licensor or its representatives including but not limited to communication on electronic mailing lists source code control systems and issue tracking systems that are managed by or on behalf of the Licensor for the purpose of discussing and improving the Work but excluding communication that is conspicuously marked or otherwise designated in writing by the copyright owner...

Page 506: ...ou must cause any modified files to carry prominent notices stating that You changed the files and c You must retain in the Source form of any Derivative Works that You distribute all copyright patent trademark and attribution notices from the Source form of the Work excluding those notices that do not pertain to any part of the Derivative Works and d If the Work includes a NOTICE text file as par...

Page 507: ... the content of the NOTICE file 7 Disclaimer of Warranty Unless required by applicable law or agreed to in writing Licensor provides the Work and each Contributor provides its Contributions on an AS IS BASIS WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND either express or implied including without limitation any warranties or conditions of TITLE NON INFRINGEMENT MERCHANTABILITY or FITNESS FOR A PART...

Page 508: ...IX How to apply the Apache License to your work To apply the Apache License to your work attach the following boilerplate notice with the fields enclosed by brackets replaced with your own identifying information Don t include the brackets The text should be enclosed in the appropriate comment syntax for the file format We also recommend that a file or class name and description of purpose be incl...

Page 509: ...e form of machine executable object code generated by a source language processor THE SOFTWARE IS PROVIDED AS IS WITHOUT WARRANTY OF ANY KIND EXPRESS OR IMPLIED INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY FITNESS FOR A PARTICULAR PURPOSE TITLE AND NON INFRINGEMENT IN NO EVENT SHALL THE COPYRIGHT HOLDERS OR ANYONE DISTRIBUTING THE SOFTWARE BE LIABLE FOR ANY DAMAGES OR OTHER LIABI...

Page 510: ...SUCH DAMAGE BSD Exhibit 4 Copyright c 2006 2009 David Spurr http www defusion org uk Redistribution and use in source and binary forms with or without modification are permitted provided that the following conditions are met l Redistributions of source code must retain the above copyright notice this list of conditions and the following disclaimer l Redistributions in binary form must reproduce th...

Page 511: ...vidual or entity that first makes Original Software available under this License 1 6 Larger Work means a work which combines Covered Software or portions thereof with code not governed by the terms of this License 1 7 License means this document 1 8 Licensable means having the right to grant to the maximum extent possible whether at the time of the initial grant or subsequently acquired any and al...

Page 512: ...Developer Grant Conditioned upon Your compliance with Section 3 1 below and subject to third party intellectual property claims the Initial Developer hereby grants You a world wide royalty free non exclusive license a under intellectual property rights other than patent or trademark Licensable by Initial Developer to use reproduce modify display perform sublicense and distribute the Original Softw...

Page 513: ...tions of such combination to make use sell offer for sale have made and or otherwise dispose of 1 Modifications made by that Contributor or portions thereof and 2 the combination of Modifications made by that Contributor with its Contributor Version or portions of such combination c The licenses granted in Sections 2 2 a and 2 2 b are effective on the date Contributor first distributes or otherwis...

Page 514: ...butor of the Modification You may not remove or alter any copyright patent or trademark notices contained within the Covered Software or any notices of licensing or any descriptive text giving attribution to any Contributor or the Initial Developer 3 4 Application of Additional Terms You may not offer or impose any terms on any Covered Software in Source Code form that alters or restricts the appl...

Page 515: ...irements of this License are fulfilled for the Covered Software 4 Versions of the License 4 1 New Versions Sun Microsystems Inc is the initial license steward and may publish revised and or new versions of this License from time to time Each version will be given a distinguishing version number Except as provided in Section 4 3 no one other than the license steward has the right to modify this Lic...

Page 516: ...NO USE OF ANY COVERED SOFTWARE IS AUTHORIZED HEREUNDER EXCEPT UNDER THIS DISCLAIMER 6 TERMINATION 6 1 This License and the rights granted hereunder will terminate automatically if You fail to comply with terms herein and fail to cure such breach within 30 days of becoming aware of the breach Provisions which by their nature must remain in effect beyond the termination of this License shall survive...

Page 517: ...IABILITY SHALL NOT APPLY TO LIABILITY FOR DEATH OR PERSONAL INJURY RESULTING FROM SUCH PARTYS NEGLIGENCE TO THE EXTENT APPLICABLE LAW PROHIBITS SUCH LIMITATION SOME JURISDICTIONS DO NOT ALLOW THE EXCLUSION OR LIMITATION OF INCIDENTAL OR CONSEQUENTIAL DAMAGES SO THIS EXCLUSION AND LIMITATION MAY NOT APPLY TO YOU 8 U S GOVERNMENT END USERS The Covered Software is a commercial item as that term is de...

Page 518: ...ntrol laws and regulation of any other countries when You use distribute or otherwise make available any Covered Software 10 RESPONSIBILITY FOR CLAIMS As between Initial Developer and the Contributors each party is responsible for claims and damages arising directly or indirectly out of its utilization of rights under this License and You agree to work with Initial Developer and Contributors to di...

Page 519: ...able under the terms of this License 1 10 Original Software means the Source Code and Executable form of computer software code that is originally released under this License 1 11 Patent Claims means any patent claim s now owned or hereafter acquired including without limitation method process and apparatus claims in any patent Licensable by grantor 1 12 Source Code means a the common form of comp...

Page 520: ...iginal Software or 2 for infringements caused by i the modification of the Original Software or ii the combination of the Original Software with other software or devices 2 2 Contributor Grant Conditioned upon Your compliance with Section 3 1 below and subject to third party intellectual property claims each Contributor hereby grants You a world wide royalty free non exclusive license a under inte...

Page 521: ...d Software You distribute or otherwise make available You must inform recipients of any such Covered Software in Executable form as to how they can obtain such Covered Software in Source Code form in a reasonable manner on or through a medium customarily used for software exchange 3 2 Modifications The Modifications that You create or to which You contribute are governed by the terms of this Licen...

Page 522: ...is License If You distribute the Covered Software in Executable form under a different license You must make it absolutely clear that any terms which differ from this License are offered by You alone not by the Initial Developer or Contributor You hereby agree to indemnify the Initial Developer and every Contributor for any liability incurred by the Initial Developer or such Contributor as a resul...

Page 523: ...license contains terms which differ from this License 5 DISCLAIMER OF WARRANTY COVERED SOFTWARE IS PROVIDED UNDER THIS LICENSE ON AN AS IS BASIS WITHOUT WARRANTY OF ANY KIND EITHER EXPRESSED OR IMPLIED INCLUDING WITHOUT LIMITATION WARRANTIES THAT THE COVERED SOFTWARE IS FREE OF DEFECTS MERCHANTABLE FIT FOR A PARTICULAR PURPOSE OR NON INFRINGING THE ENTIRE RISK AS TO THE QUALITY AND PERFORMANCE OF ...

Page 524: ...es any patent where such claim is resolved such as by license or settlement prior to the initiation of patent infringement litigation then the reasonable value of the licenses granted by such Participant under Sections 2 1 or 2 2 shall be taken into account in determining the amount or value of any payment or license 6 4 In the event of termination under Sections 6 1 or 6 2 above all end user lice...

Page 525: ...such provision shall be reformed only to the extent necessary to make it enforceable This License shall be governed by the law of the jurisdiction specified in a notice contained within the Original Software except to the extent applicable law if any provides otherwise excluding such jurisdiction s conflict of law provisions Any litigation relating to this License shall be subject to the jurisdict...

Page 526: ...rts of the Northern District of California and the state courts of the State of California with venue lying in Santa Clara County California CLASSPATH Exception to the GP Version 2 Certain source files distributed by Oracle are subject to the following clarification and special exception to the GPL Version 2 but only where Oracle has expressly included in the particular source file s header the wo...

Page 527: ...SE THE WORK IS PROTECTED BY COPYRIGHT AND OR OTHER APPLICABLE LAW ANY USE OF THE WORK OTHER THAN AS AUTHORIZED UNDER THIS LICENSE OR COPYRIGHT LAW IS PROHIBITED BY EXERCISING ANY RIGHTS TO THE WORK PROVIDED HERE YOU ACCEPT AND AGREE TO BE BOUND BY THE TERMS OF THIS LICENSE TO THE EXTENT THIS LICENSE MAY BE CONSIDERED TO BE A CONTRACT THE LICENSOR GRANTS YOU THE RIGHTS CONTAINED HERE IN CONSIDERATI...

Page 528: ...ed the publisher and in addition i in the case of a performance the actors singers musicians dancers and other persons who act sing deliver declaim play in interpret or otherwise perform literary or artistic works or expressions of folklore ii in the case of a phonogram the producer being the person or legal entity who first fixes the sounds of a performance or other sounds and iii in the case of ...

Page 529: ... or images i Reproduce means to make copies of the Work by any means including without limitation by sound or visual recordings and the right of fixation and reproducing fixations of the Work including storage of a protected performance or phonogram in digital form or other electronic medium 2 Fair Dealing Rights Nothing in this License is intended to reduce limit or restrict any uses free from co...

Page 530: ...ise by You of the rights granted under this License The above rights may be exercised in all media and formats whether now known or hereafter devised The above rights include the right to make such modifications as are technically necessary to exercise the rights in other media and formats Subject to Section 8 f all rights not expressly granted by Licensor are hereby reserved 4 Restrictions The li...

Page 531: ...of such party or parties ii the title of the Work if supplied iii to the extent reasonably practicable the URI if any that Licensor specifies to be associated with the Work unless such URI does not refer to the copyright notice or licensing information for the Work and iv consistent with Section 3 b in the case of an Adaptation a credit identifying the use of the Work in the Adaptation e g French ...

Page 532: ... ANY KIND CONCERNING THE WORK EXPRESS IMPLIED STATUTORY OR OTHERWISE INCLUDING WITHOUT LIMITATION WARRANTIES OF TITLE MERCHANTIBILITY FITNESS FOR A PARTICULAR PURPOSE NONINFRINGEMENT OR THE ABSENCE OF LATENT OR OTHER DEFECTS ACCURACY OR THE PRESENCE OF ABSENCE OF ERRORS WHETHER OR NOT DISCOVERABLE SOME JURISDICTIONS DO NOT ALLOW THE EXCLUSION OF IMPLIED WARRANTIES SO SUCH EXCLUSION MAY NOT APPLY T...

Page 533: ...vision valid and enforceable d No term or provision of this License shall be deemed waived and no breach consented to unless such waiver or consent shall be in writing and signed by the party to be charged with such waiver or consent e This License constitutes the entire agreement between the parties with respect to the Work licensed here There are no understandings agreements or representations w...

Page 534: ... party of the trademark Creative Commons or any related trademark or logo of Creative Commons without the prior written consent of Creative Commons Any permitted use will be in compliance with Creative Commons then current trademark usage guidelines as may be published on its website or otherwise made available upon request from time to time For the avoidance of doubt this trademark restriction do...

Page 535: ...rights with two steps 1 copyright the software and 2 offer you this license which gives you legal permission to copy distribute and or modify the software Also for each author s protection and ours we want to make certain that everyone understands that there is no warranty for this free software If the software is modified by someone else and passed on we want its recipients to know that what they...

Page 536: ...al act of transferring a copy and you may at your option offer warranty protection in exchange for a fee 2 You may modify your copy or copies of the Program or any portion of it thus forming a work based on the Program and copy and distribute such modifications or work under the terms of Section 1 above provided that you also meet all of these conditions a You must cause the modified files to carr...

Page 537: ...ions 1 and 2 above provided that you also do one of the following a Accompany it with the complete corresponding machine readable source code which must be distributed under the terms of Sections 1 and 2 above on a medium customarily used for software interchange or b Accompany it with a written offer valid for at least three years to give any third party for a charge no more than your cost of phy...

Page 538: ...se Therefore by modifying or distributing the Program or any work based on the Program you indicate your acceptance of this License to do so and all its terms and conditions for copying distributing or modifying the Program or works based on it 6 Each time you redistribute the Program or any work based on the Program the recipient automatically receives a license from the original licensor to copy...

Page 539: ...o places the Program under this License may add an explicit geographical distribution limitation excluding those countries so that distribution is permitted only in or among countries not thus excluded In such case this License incorporates the limitation as if written in the body of this License 9 The Free Software Foundation may publish revised and or new versions of the General Public License f...

Page 540: ...MODIFY AND OR REDISTRIBUTE THE PROGRAM AS PERMITTED ABOVE BE LIABLE TO YOU FOR DAMAGES INCLUDING ANY GENERAL SPECIAL INCIDENTAL OR CONSEQUENTIAL DAMAGES ARISING OUT OF THE USE OR INABILITY TO USE THE PROGRAM INCLUDING BUT NOT LIMITED TO LOSS OF DATA OR DATA BEING RENDERED INACCURATE OR LOSSES SUSTAINED BY YOU OR THIRD PARTIES OR A FAILURE OF THE PROGRAM TO OPERATE WITH ANY OTHER PROGRAMS EVEN IF S...

Page 541: ...on version 69 Copyright C year name of author Gnomovision comes with ABSOLUTELY NO WARRANTY for details type show w This is free software and you are welcome to redistribute it under certain conditions type show c for details The hypothetical commands show w and show c should show the appropriate parts of the General Public License Of course the commands you use may be called something other than ...

Page 542: ...are Foundation and other authors who decide to use it You can use it too but we suggest you first think carefully about whether this license or the ordinary General Public License is the better strategy to use in any particular case based on the explanations below When we speak of free software we are referring to freedom of use not price Our General Public Licenses are designed to make sure that ...

Page 543: ...rsion of the library must be consistent with the full freedom of use specified in this license Most GNU software including some libraries is covered by the ordinary GNU General Public License This license the GNU Lesser General Public License applies to certain designated libraries and is quite different from the ordinary General Public License We use this license for certain libraries in order to...

Page 544: ...and modification follow Pay close attention to the difference between a work based on the library and a work that uses the library The former contains code derived from the library whereas the latter must be combined with the library in order to run GNU LESSER GENERAL PUBLIC LICENSE TERMS AND CONDITIONS FOR COPYING DISTRIBUTION AND MODIFICATION 0 This License Agreement applies to any software libr...

Page 545: ...harge a fee for the physical act of transferring a copy and you may at your option offer warranty protection in exchange for a fee 2 You may modify your copy or copies of the Library or any portion of it thus forming a work based on the Library and copy and distribute such modifications or work under the terms of Section 1 above provided that you also meet all of these conditions a The modified wo...

Page 546: ...ry on a volume of a storage or distribution medium does not bring the other work under the scope of this License 3 You may opt to apply the terms of the ordinary GNU General Public License instead of this License to a given copy of the Library To do this you must alter all the notices that refer to this License so that they refer to the ordinary GNU General Public License version 2 instead of to t...

Page 547: ...f the Library even though the source code is not Whether this is true is especially significant if the work can be linked without the Library or if the work is itself a library The threshold for this to be true is not precisely defined by law If such an object file uses only numerical parameters data structure layouts and accessors and small macros and small inline functions ten lines or less in l...

Page 548: ...e shared library mechanism for linking with the Library A suitable mechanism is one that 1 uses at run time a copy of the library already present on the user s computer system rather than copying library functions into the executable and 2 will operate properly with a modified version of the library if the user installs one as long as the modified version is interface compatible with the version t...

Page 549: ...cense link with or distribute the Library except as expressly provided under this License Any attempt otherwise to copy modify sublicense link with or distribute the Library is void and will automatically terminate your rights under this License However parties who have received copies or rights from you under this License will not have their licenses terminated so long as such parties remain in f...

Page 550: ... the integrity of the free software distribution system which is implemented by public license practices Many people have made generous contributions to the wide range of software distributed through that system in reliance on consistent application of that system it is up to the author donor to decide if he or she is willing to distribute software through any other system and a licensee cannot im...

Page 551: ... OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE THE ENTIRE RISK AS TO THE QUALITY AND PERFORMANCE OF THE LIBRARY IS WITH YOU SHOULD THE LIBRARY PROVE DEFECTIVE YOU ASSUME THE COST OF ALL NECESSARY SERVICING REPAIR OR CORRECTION 16 IN NO EVENT UNLESS REQUIRED BY APPLICABLE LAW OR AGREED TO IN WRITING WILL ANY COPYRIGHT HOLDER OR ANY OTHER PARTY WHO MAY MODIFY AND OR REDISTRIBUTE THE LIBRAR...

Page 552: ...al Public License for more details You should have received a copy of the GNU Lesser General Public License along with this library if not write to the Free Software Foundation Inc 51 Franklin St Fifth Floor Boston MA 02110 1301 USA Also add information on how to contact you by electronic and paper mail You should also get your employer if you work as a programmer or your school if any to sign a c...

Page 553: ...pect the freedom of others For example if you distribute copies of such a program whether gratis or for a fee you must pass on to the recipients the same freedoms that you received You must make sure that they too receive or can get the source code And you must show them these terms so they know their rights Developers that use the GNU GPL protect your rights with two steps 1 assert copyright on t...

Page 554: ...f works such as semiconductor masks The Program refers to any copyrightable work licensed under this License Each licensee is addressed as you Licensees and recipients may be individuals or organizations To modify a work means to copy from or adapt all or part of the work in a fashion requiring copyright permission other than the making of an exact copy The resulting work is called a modified vers...

Page 555: ...terface means an interface that either is an official standard defined by a recognized standards body or in the case of interfaces specified for a particular programming language one that is widely used among developers working in that language The System Libraries of an executable work include anything other than the work as a whole that a is included in the normal form of packaging a Major Compo...

Page 556: ...d the stated conditions are met This License explicitly affirms your unlimited permission to run the unmodified Program The output from running a covered work is covered by this License only if the output given its content constitutes a covered work This License acknowledges your rights of fair use or other equivalent as provided by copyright law You may make run and propagate covered works that y...

Page 557: ...rbatim Copies You may convey verbatim copies of the Program s source code as you receive it in any medium provided that you conspicuously and appropriately publish on each copy an appropriate copyright notice keep intact all notices stating that this License and any non permissive terms added in accord with section 7 apply to the code keep intact all notices of the absence of any warranty and give...

Page 558: ...hem do so A compilation of a covered work with other separate and independent works which are not by their nature extensions of the covered work and which are not combined with it such as to form a larger program in or on a volume of a storage or distribution medium is called an aggregate if the compilation and its resulting copyright are not used to limit the access or legal rights of the compila...

Page 559: ...ed not require recipients to copy the Corresponding Source along with the object code If the place to copy the object code is a network server the Corresponding Source may be on a different server operated by you or a third party that supports equivalent copying facilities provided you maintain clear directions next to the object code saying where to find the Corresponding Source Regardless of wha...

Page 560: ...nveying occurs as part of a transaction in which the right of possession and use of the User Product is transferred to the recipient in perpetuity or for a fixed term regardless of how the transaction is characterized the Corresponding Source conveyed under this section must be accompanied by the Installation Information But this requirement does not apply if neither you nor any third party retain...

Page 561: ...ve appropriate copyright permission Notwithstanding any other provision of this License for material you add to a covered work you may if authorized by the copyright holders of that material supplement the terms of this License with terms a Disclaiming warranty or limiting liability differently from the terms of sections 15 and 16 of this License or b Requiring preservation of specified reasonable...

Page 562: ...cable terms Additional terms permissive or non permissive may be stated in the form of a separately written license or stated as exceptions the above requirements apply either way 8 Termination You may not propagate or modify a covered work except as expressly provided under this License Any attempt otherwise to propagate or modify it is void and will automatically terminate your rights under this...

Page 563: ...o not accept this License Therefore by modifying or propagating a covered work you indicate your acceptance of this License to do so 10 Automatic Licensing of Downstream Recipients Each time you convey a covered work the recipient automatically receives a license from the original licensors to run modify and propagate that work subject to this License You are not responsible for enforcing complian...

Page 564: ...at would be infringed only as a consequence of further modification of the contributor version For purposes of this definition control includes the right to grant patent sublicenses in a manner consistent with the requirements of this License Each contributor grants you a non exclusive worldwide royalty free patent license under the contributor s essential patent claims to make use sell offer for ...

Page 565: ...patent license is discriminatory if it does not include within the scope of its coverage prohibits the exercise of or is conditioned on the non exercise of one or more of the rights that are specifically granted under this License You may not convey a covered work if you are a party to an arrangement with a third party that is in the business of distributing software under which you make payment t...

Page 566: ...ll continue to apply to the part which is the covered work but the special requirements of the GNU Affero General Public License section 13 concerning interaction through a network will apply to the combination as such 14 Revised Versions of this License The Free Software Foundation may publish revised and or new versions of the GNU General Public License from time to time Such new versions will b...

Page 567: ...RVICING REPAIR OR CORRECTION 16 Limitation of Liability IN NO EVENT UNLESS REQUIRED BY APPLICABLE LAW OR AGREED TO IN WRITING WILL ANY COPYRIGHT HOLDER OR ANY OTHER PARTY WHO MODIFIES AND OR CONVEYS THE PROGRAM AS PERMITTED ABOVE BE LIABLE TO YOU FOR DAMAGES INCLUDING ANY GENERAL SPECIAL INCIDENTAL OR CONSEQUENTIAL DAMAGES ARISING OUT OF THE USE OR INABILITY TO USE THE PROGRAM INCLUDING BUT NOT LI...

Page 568: ...ear name of author This program is free software you can redistribute it and or modify it under the terms of the GNU General Public License as published by the Free Software Foundation either version 3 of the License or at your option any later version This program is distributed in the hope that it will be useful but WITHOUT ANY WARRANTY without even the implied warranty of MERCHANTABILITY or FIT...

Page 569: ...or without modification are permitted provided that the following conditions are met Redistributions of source code must retain the above copyright notice this list of conditions and the following disclaimer Redistributions in binary form must reproduce the above copyright notice this list of conditions and the following disclaimer in the documentation and or other materials provided with the dist...

Page 570: ...tography used by Unix systems for simple password protection Copyright 1996 Aki Yoshida modified April 2001 by Iris Van den Broeke Daniel Deville Permission to use copy modify and distribute UnixCrypt for non commercial or commercial purposes and without fee is granted provided that the copyright notice appears in all copies The default JSP implementation is provided by the Glassfish JSP engine fr...

Page 571: ...L but should not impact anything even if we change them in the future to GPL LGPL compatible source code can statically use the library header using define _LGPL_SOURCE include lttng lttng h Dynamic only linking with the LGPL library is used if _LGPL_SOURCE is not defined It permits relinking with newer versions of the library which is required by the LGPL license GPLv2 All remaining source code i...

Page 572: ...he GNU Lesser General Public License for more details You should have received a copy of the GNU Lesser General Public License along with this library if not write to the Free Software Foundation Inc 51 Franklin Street Fifth Floor Boston MA 02110 1301 USA System headers are MIT licensed BSD style Permission is hereby granted free of charge to any person obtaining a copy of this software and associ...

Page 573: ...right C 2005 Mutsuo Saito All rights reserved Redistribution and use in source and binary forms with or without modification are permitted provided that the following conditions are met 1 Redistributions of source code must retain the above copyright notice this list of conditions and the following disclaimer 2 Redistributions in binary form must reproduce the above copyright notice this list of c...

Page 574: ...ubstantial portions of the Software The software is provided as is without warranty of any kind express or implied including but not limited to the warranties of merchantability fitness for a particular purpose and noninfringement In no event shall the authors or copyright holders be liable for any claim damages or other liability whether in an action of contract tort or otherwise arising from out...

Page 575: ...LETT PACKARD COMPANY WILL NOT IN ANY EVENT BE LIABLE FOR ANY DIRECT INDIRECT SPECIAL INCIDENTAL OR CONSEQUENTIAL DAMAGES INCLUDING LOST PROFITS RELATED TO ANY USE REPRODUCTION MODIFICATION OR DISTRIBUTION OF THE SOFTWARE OR DOCUMENTATION OpenLdap openldap 2 4 40 5 el6 i686 usr share doc openldap 2 4 40 LICENSE The OpenLDAP Public License Version 2 8 17 August 2003 Redistribution and use of this so...

Page 576: ...e names of the authors and copyright holders must not be used in advertising or otherwise to promote the sale use or other dealing in this Software without specific written prior permission Title to copyright in this Software shall at all times remain with copyright holders OpenLDAP is a registered trademark of the OpenLDAP Foundation Copyright 1999 2003 The OpenLDAP Foundation Redwood City Califo...

Page 577: ... 1998 2003 Hallvard B Furuseth Portions Copyright 2007 2011 Gavin Henry Portions Copyright 2007 2011 Suretec Systems Ltd All rights reserved Redistribution and use in source and binary forms with or without modification are permitted provided that this notice is preserved The names of the copyright holders may not be used to endorse or promote products derived from this software without their spec...

Page 578: ...t c 1998 2011 The OpenSSL Project All rights reserved Redistribution and use in source and binary forms with or without modification are permitted provided that the following conditions are met 1 Redistributions of source code must retain the above copyright notice this list of conditions and the following disclaimer 2 Redistributions in binary form must reproduce the above copyright notice this l...

Page 579: ...MPLIED WARRANTIES INCLUDING BUT NOT LIMITED TO THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED IN NO EVENT SHALL THE OpenSSL PROJECT OR ITS CONTRIBUTORS BE LIABLE FOR ANY DIRECT INDIRECT INCIDENTAL SPECIAL EXEMPLARY OR CONSEQUENTIAL DAMAGES INCLUDING BUT NOT LIMITED TO PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES LOSS OF USE DATA OR PROFITS OR BUSINESS ...

Page 580: ...Copyright remains Eric Young s and as such any Copyright notices in the code are not to be removed If this package is used in a product Eric Young should be given attribution as the author of the parts of the library used This can be in the form of a textual message at program startup or in documentation online or textual provided with the package Redistribution and use in source and binary forms ...

Page 581: ...ARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED IN NO EVENT SHALL THE AUTHOR OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT INDIRECT INCIDENTAL SPECIAL EXEMPLARY OR CONSEQUENTIAL DAMAGES INCLUDING BUT NOT LIMITED TO PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES LOSS OF USE DATA OR PROFITS OR BUSINESS INTERRUPTION HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY WHETHER IN CON...

Page 582: ...load install or use from Oracle or its authorized licensees any other machine readable materials including but not limited to libraries source files header files and data files any updates or error corrections provided by Oracle and any user manuals programming guides and other documentation provided to you by Oracle under this Agreement General Purpose Desktop Computers and Servers means computer...

Page 583: ...tware is copyrighted Title to Software and all associated intellectual property rights is retained by Oracle and or its licensors Unless enforcement is prohibited by applicable law you may not modify decompile or reverse engineer Software You acknowledge that the Software is developed for general use in a variety of information management applications it is not developed or intended for use in any...

Page 584: ...able export and import laws govern your use of the Software including technical data additional information can be found on Oracle s Global Trade Compliance web site http www oracle com products export You agree that neither the Software nor any direct product thereof will be exported directly or indirectly in violation of these laws or will be used for any purpose prohibited by these laws includi...

Page 585: ...elating to its subject matter during the term of this Agreement No modification of this Agreement will be binding unless in writing and signed by an authorized representative of each party SUPPLEMENTAL LICENSE TERMS These Supplemental License Terms add to or modify the terms of the Binary Code License Agreement Capitalized terms not defined in these Supplemental Terms shall have the same meanings ...

Page 586: ...ditional software intended to replace any component s of the Software iv you do not remove or alter any proprietary legends or notices contained in the Software v you only distribute the Software subject to a license agreement that a is a complete unmodified reproduction of this Agreement or b protects Oracle s interests consistent with the terms contained in this Agreement and that includes the n...

Page 587: ...nt Kit Software JDK with your printed book or magazine as those terms are commonly used in the industry relating to Java technology Publication Subject to and conditioned upon your compliance with the restrictions and obligations contained in the Agreement Oracle hereby grants to you a non exclusive nontransferable limited right to reproduce complete and unmodified copies of the JDK on electronic ...

Page 588: ... JAVA TECHNOLOGY RESTRICTIONS You may not create modify or change the behavior of or authorize your licensees to create modify or change the behavior of classes interfaces or subpackages that are in any way identified as java javax sun oracle or similar convention as specified by Oracle in any naming convention designation G LIMITATIONS ON REDISTRIBUTION You may not redistribute or otherwise trans...

Page 589: ...pply to all Software in this distribution K TERMINATION FOR INFRINGEMENT Either party may terminate this Agreement immediately should any Software become or in either party s opinion be likely to become the subject of a claim of infringement of any intellectual property right L INSTALLATION AND AUTO UPDATE The Software s installation and auto update processes transmit a limited amount of data to O...

Page 590: ...tact info exolab org 4 Products derived from this Software may not be called Castor nor may Castor appear in their names without prior written permission of Intalio Inc Exolab Castor and Intalio are trademarks of Intalio Inc 5 Due credit should be given to the ExoLab Project http www exolab org THIS SOFTWARE IS PROVIDED BY INTALIO AND CONTRIBUTORS AS IS AND ANY EXPRESSED OR IMPLIED WARRANTIES INCL...

Page 591: ...eneral Public License as published by the Free Software Foundation either version 2 1 of the License or at your option any later version This library is distributed in the hope that it will be useful but WITHOUT ANY WARRANTY without even the implied warranty of MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE See the GNU Lesser General Public License for more details You should have received a ...

Page 592: ...ip2 is copyright C 2003 2011 Jeff Gilchrist All rights reserved The library libbzip2 which pbzip2 uses is copyright C 1996 2008 Julian R Seward All rights reserved Redistribution and use in source and binary forms with or without modification are permitted provided that the following conditions are met 1 Redistributions of source code must retain the above copyright notice this list of conditions ...

Page 593: ...ICT LIABILITY OR TORT INCLUDING NEGLIGENCE OR OTHERWISE ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE Jeff Gilchrist Ottawa Canada pbzip2 compression ca pbzip2 version 1 1 6 of Oct 30 2011 PCRE License PCRE LICENCE PCRE is a library of functions to support regular expressions whose syntax and semantics are as close as possible to those of the ...

Page 594: ...claimer Redistributions in binary form must reproduce the above copyright notice this list of conditions and the following disclaimer in the documentation and or other materials provided with the distribution Neither the name of the University of Cambridge nor the name of Google Inc nor the names of their contributors may be used to endorse or promote products derived from this software without sp...

Page 595: ...erials provided with the distribution 2 The name of QLogic Corporation may not be used to endorse or promote products derived from this software without specific prior written permission 3 Reverse engineering decompilation or disassembly of this firmware is not permitted REGARDLESS OF WHAT LICENSING MECHANISM IS USED OR APPLICABLE THIS PROGRAM IS PROVIDED BY QLOGIC CORPORATION AS IS AND ANY EXPRES...

Page 596: ...ove copyright notice this list of conditions and the following disclaimer in the documentation and or other materials provided with the distribution THIS SOFTWARE IS PROVIDED AS IS AND ANY EXPRESSED OR IMPLIED WARRANTIES INCLUDING BUT NOT LIMITED TO THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED IN NO EVENT SHALL THE APACHE SOFTWARE FOUNDATION OR ITS ...

Page 597: ...hich is required by the LGPL license See lgpl relicensing txt for details MIT style license xchg primitive has been rewritten from scratch starting from atomic_ops 1 2 which has a MIT style license that is intended to allow use in both free and proprietary software http www hpl hp com research linux atomic_ops LICENSING txt http www hpl hp com personal Hans_Boehm gc gc_source This MIT style licens...

Page 598: ...or later m4 ax_tls m4 Userspace RCU LGPLv2 1 Relicensing Mathieu Desnoyers May 13th 2009 IBM Corporation allowed LGPLv2 1 licensing of their contribution to the userspace RCU library in a patch submitted on May 8 2009 from Paul E McKenney and reviewed by Steven L Bennett http lists casi polymtl ca pipermail ltt dev 2009 May 001584 html I Mathieu Desnoyers re implemented ACCESS_ONCE likely unlikely...

Page 599: ...tel and powerpc They are MIT licensed and therefore usable in LGPL code This cmpxchg code was obtained from the atomic_ops project http www hpl hp com research linux atomic_ops I Mathieu Desnoyers wrote the remainder of the code The license for the library files in this project was therefore changed to LGPLv2 1 on May 13 2009 as detailed in LICENSE ETERNUS CS800 599 20 ETERNUS CS800 3 2 Open Sourc...

Page 600: ...600 ...

Page 601: ...4 OST 241 PTT 280 replication 270 scheduler 286 system 319 VTL 216 configuration wizards 145 contacts company 359 configuration 359 primary and secondary 360 CRUs 467 HDD 470 server 467 storage subsystem 473 current activity 194 customer service 15 D data deduplication 34 data reduction statistics 189 data storage 36 disk usage 187 DX100 S3 controller enclosure front 65 rear 67 DX100 S3 drive encl...

Page 602: ...g position locating 82 N NAS 37 advanced setting 215 CIFS 37 configuration 200 NFS 38 share access 210 summary 200 windows domain 207 network connecting 107 notifications AIS connect 315 configuration 294 email 294 SNMP 305 O open source licenses 497 order number 13 OST 39 accent 268 client plug in 269 configuration 241 LSU 252 manage remote users 261 manage users 259 storage servers 244 target IP...

Page 603: ... scheduler 286 serial number 77 server 43 connecting notebook 109 indicators front 43 indicators rear 48 mains 52 shutting down system 76 software 30 space reclamation 35 status 407 activity log 429 disk usage 421 hardware 407 OST status 428 performance 414 VTL status 423 storage expansion 477 Entry 477 Scale 483 storage modules 61 supported browsers 133 system cabling 92 configuration 319 date ti...

Page 604: ...t shutdown 457 secure shred 452 software upgrades 454 space reclamation 449 V VTL 36 configuration 216 media 224 partitions 216 remote host access 233 W wizard AIS connect 181 email alerts 176 NAS 147 OST 162 replication 169 VTL 155 wizards overview configuration 145 604 ETERNUS CS800 ...

Reviews: