IBM System Storage DR550
Version 3.0 ------17 March 2006
Page 108
IBM Storage Systems
Copyright © 2006 by International Business Machines Corporation
77 Display More Disk Information
88 Help ?
99 Previous Menu
>>> Choice [0]:
4. Select the disk or disks you want to install by typing the number that corresponds to the hard disk
name and pressing Enter. The disk will now be selected as indicated by
>>>
. Do this for each disk
that you want to be part of the AIX root volume group. To unselect the destination disk, type the
number again and press Enter.
5. Complete the disk selection by typing a 0 in the
Choice
field and press Enter. The Installation
and Settings screen displays with
New and Complete Overwrite
as the method of installation and
the user selected disks.
6. To change the
Primary Language Environment Settings
, type 2 in the
Choice
field and press
Enter. Type the number that corresponds to the Cultural Convention, Language, and Keyboard for
your selection and press Enter.
7. To change the
More Options
, type 3 in the
Choice
field and press Enter. Among the installation
options available to you in AIX 5.2, you can:
Change the desktop application.
Enable or disable the Trusted Computing Base option.
Enable or disable the Controlled Access Protection Profile (CAPP) and Evaluation
Assurance Level 4+ (EAL4+) option.
Enable the 64-bit kernel.
Enable the Enhanced Journaled File System (JFS2).
Install graphics software.
Install the documentation services software.
8. Verify that the selections are correct in the Overwrite Installation Summary screen, as follows:
Overwrite Installation Summary
Disks: hdisk0
Cultural Convention: en_US
Language: en_US
Keyboard: en_US
64 Bit Kernel Enabled: No
JFS2 File Systems Created: No
Desktop: CDE
Enable System Backups to install any system: Yes
Optional Software being installed:
>>> 1 Continue with Install
88 Help ?
99 Previous Menu
>>> Choice [1]:
9. Press Enter to begin the BOS installation. The system automatically reboots after installation is
complete.
Backing Up the DR550 Data
Chapter 22 in the TSM Administration Guide (titled
Protecting the Server)
has the details on how to
protect the TSM database, server and storage pools. Backup jobs have already been setup for the data
base and logs. You should review these jobs and modify if needed. Backing up the data needs to be