Download Print this page
   
1
2
Table of Contents
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
144
145
146
147
148
149
150
151
152
153
154
155
156
157
158
159
160
161
162
163
164
165
166
167
168
169
170
171
172
173
174
175
176
177
178
179
180
181
182
183
184
185
186
187
188
189
190
191
192
193
194
195
196
197
198
199
200
201
202
203
204
205
206
207
208
209
210
211
212
213
214
215
216
217
218
219
220
221
222
223
224
225
226
227
228
229
230
231
232
233
234
235
236
237
238
239
240
241
242
243
244
245
246
247
248
249
250
251
252
253
254
255
256
257
258
259
260
261
262
263
264
265
266
267
268
269
270
271
272
273
274
275
276
277
278
279
280
281
282
283
284
285
286
287
288
289
290
291
292
293
294
295
296
297
298
299
300
301
302
303
304
305
306
307
308
309
310
311
312
313
314
315
316
317
318
319
320
321
322
323
324
325
326
327
328
329
330
331
332
333
334
335
336
337
338
339
340
341
342
343
344
345
346
347
348
349
350
351
352
353
354
355
356
357
358
359
360
361
362
363
364
365
366
367
368
369
370
371
372
373
374
375
376
377
378
379
380
381
382
383
384
385
386
387
388
389
390
391
392
393
394
395
396
397
398
399
400
401
402
403
404
405
406
407
408
409
410
411
412
413
414
415
416
417
418
419
420
421
422
423
424
425
426
427
428
429
430
431
432
433
434
435
436
437
438
439
440
441
442
443
444
445
446
447
448
449
450
451
452
453
454
455
456
457
458
459
460
461
462
463
464
465
466
467
468
469
470
471
472
473
474
475
476
477
478
479
480
481
482
483
484
485
486
487
488
489
490
491
492
493
494
495
496
497
498
499
500
501
502
503
504
505
506
507
508
509
510
511
512
513
514
515
516
517
518
519
520
521
522
523
524
525
526
527
528
529
530
531
532
533
534
535
536
537
538
539
540
541
542
543
544
545
546
547
548
549
550
551
552
553
554
555
556
557
558
559
560
561

Advertisement

English
ETERNUS CS800 S6
User Guide
V3.2.7
Edition April 2017

Advertisement

   Also See for Fujitsu ETERNUS CS800 S6

   Related Manuals for Fujitsu ETERNUS CS800 S6

   Summary of Contents for Fujitsu ETERNUS CS800 S6

  • Page 1

    English ETERNUS CS800 S6 User Guide V3.2.7 Edition April 2017...

  • Page 2: Copyright And Trademarks

    Intel is a trademark or registered trademark of Intel Corporation or its subsidiaries in the USA and other countries. Linux is a registered trademark of Linus Torvalds. Fujitsu and the Fujitsu Logo are trademarks of Fujitsu Limited. All hardware and software names used are trademarks of their respective manufacturers.

  • Page 3: Table Of Contents

    2.1.3 Remote Replication of Backup Data Providing Automated Disaster Recovery Protection 25 2.1.4 Configurable Storage Presentation 2.2 Features and Benefits 2.3 What’s New in ETERNUS CS800 S6 with Software V3.2.7 2.3.1 ETERNUS CS800 S6 Hardware 2.3.2 ETERNUS CS800 S6 V3.2.7 Software 2.4 Components ETERNUS CS800 S6 System...

  • Page 4: Table Of Contents

    3.1.2 Server Rear View - Connectors and Indicators 3.1.3 Connecting the servers to the mains 3.1.4 ETERNUS CS800 S6 - Entry System 3.1.4.1 PCI Cards for ETERNUS CS800 S6 Entry 3.1.5 ETERNUS CS800 S6 - Scale System 3.1.5.1 PCI Cards for ETERNUS CS800 S6 Scale 3.1.6 Indicators on the PCI Cards...

  • Page 5: Table Of Contents

    5.2 Installing the components in the rack 5.2.1 Installation of the Server Module in a PRIMECENTER Rack 5.2.2 Installing a Storage Module in the Rack 5.3 Cabling the ETERNUS CS800 S6 System 5.3.1 Entry System without ETERNUS JX40 S2 Option 5.3.2 Entry System with ETERNUS JX40 S2 Option 5.3.3 Scale System...

  • Page 6: Table Of Contents

    Content 9.6 Current Activity 10 Configuration 10.1 Configuration Overview 10.2 NAS Configuration 10.2.1 NAS Summary 10.2.2 Windows Domain 10.2.3 Share Access 10.2.4 Advanced Setting 10.3 VTL Configuration 10.3.1 Partitions 10.3.1.1 Partitions Summary 10.3.2 Media 10.3.3 Remote Host Access 10.4 OST Configuration 10.4.1 Replicating OST Data 10.4.2 Storage Servers 10.4.3 LSU...

  • Page 7: Table Of Contents

    Content 10.10.2 Primary and Secondary 11 Replication 11.1 ETERNUS CS800 Replication Overview 11.2 Replication Send 11.3 Receive NAS 11.4 Receive VTL 11.5 Actions 11.6 Reports 12 Status 12.1 ETERNUS CS800 Overview 12.2 Hardware 12.3 Performance 12.4 Disk Usage 12.5 VTL Status 12.6 Accent Status 12.7 OST Status 12.8 Activity Log...

  • Page 8: Table Of Contents

    15.2.2 Hardware Problems 15.2.3 Ethernet Network Problems 15.2.4 Replication Problems 15.2.5 Temperature Problems 16 Removal Replacement Procedures CRUs 16.1 ETERNUS CS800 S6 Hardware 16.1.1 Hard Disk Drive 16.1.2 HDD Removal and Replacement Procedures 16.2 Storage Subsystem 17 Storage Expansion 17.1 Storage Expansion - Entry 17.1.1 Procedure of Storage Expansion starting with 8TB...

  • Page 9: Introduction

    "Rack Requirements" on page 74 "Installing the ETERNUS CS800 S6 Modules" on page 76 and chapter "Initial Configuration, Connecting with the Network" on page describe all steps to install the hardware for the ETERNUS CS800 S6 system and the initial software configuration. ETERNUS CS800...

  • Page 10

    1.1 Preface Chapter "Remote Management" on page 122 describes how to use the management pages to control the system remotely, and gives an overview over the management pages. Chapter "Configuration Wizards" on page 132 describes how to use the wizards that provide guidance for setting up the ETERNUS CS800.

  • Page 11

    Provides information about performance data logging and Advanced Reporting visual reporting features. ETERNUS CS800 S6 OST Provides information for setting up the ETERNUS CS800 S6 for Guide OST operation with NetBackup and Backup Exec. ETERNUS CS800 Online Provides task-oriented information for the Remote Help Management GUI.

  • Page 12: Technical Support, Customer Service

    The ETERNUS CS800 system includes AIS real-time support via remote access (see "AIS Connect" on page 289) The Support section of the Fujitsu web site provides links with contact information and information about available support programs:http://www.fujitsu.com/fts/services/ If you have an active support agreement, you may contact your service provider.

  • Page 13

    "Storage Products > ETERNUS DX > ETERNUS DX100 S3". To get information of the server component, select: "Industry Standard Servers > Rack server > PRIMERGY RX2540 M1". Worldwide end-user product warranty For information the Fujitsu worldwide end-user standard limited product warranty look at: http://support.ts.fujitsu.com/warranty/index.asp?lng=COM&Level1=&LNID=1 ETERNUS CS800...

  • Page 14: Important Information, Safety Instructions

    1.2 Important Information Important Information In this chapter you find essential information regarding safety when working on the hardware of your system. 1.2.1 Safety Instructions For safety instructions see also the manual Safety Notes and Regulations. This system meets the relevant safety regulations for IT equipment. If you have any questions about whether you can install the ETERNUS CS800 system in the intended environment, please contact your sales outlet or our customer service team.

  • Page 15: Installation And Operation

    1.2 Important Information 1.2.3 Installation and Operation CAUTION! This unit should not be operated in ambient temperatures above 35 °C. If the unit is integrated into an installation that draws power from an industrial power supply network with an IEC309 connector, the power supply's fuse protection must comply with the requirements for non-industrial power supply networks for type A connectors.

  • Page 16: Working With Cds/dvds And Cd/dvd Drives

    1.2 Important Information CAUTION! In emergencies (e.g. damaged casing, controls or cables, penetration of liquids or foreign bodies), switch off the system immediately, remove all power plugs and contact your sales outlet or customer service team. Proper operation of the system (in accordance with IEC 60950-1/ EN 60950- 1) is only ensured if the casing is completely assembled (electric shock, cooling, fire protection, interference suppression).

  • Page 17: Laser Information

    1.2 Important Information You can prevent mechanical damage and damage to the CD/DVD drive, as well as premature CD/DVD wear, by observing the following suggestions: Only insert CDs/DVDs in the drive when needed and remove them after use. Store the CDs/DVDs in suitable sleeves. Protect the CDs/DVDs from exposure to heat and direct sunlight.

  • Page 18: Modules With Electrostatic-sensitive Devices

    1.2 Important Information 1.2.7 Modules with Electrostatic-Sensitive Devices Modules with electrostatic-sensitive devices are identified by the following sticker: Figure 1: ESD label When you handle components fitted with ESDs, you must always observe the following points: Switch off the system and remove the power plugs from the power outlets before installing or removing components with ESDs.

  • Page 19: Other Important Information

    1.2 Important Information Wipe the device casing with a dry cloth. If particularly dirty, use a cloth that has been moistened in a mild domestic detergent and then carefully wrung out. 1.2.9 Other Important Information Keep all documentation (documentation CD, accompanying documentation if delivered with special components) close to the device.

  • Page 20

    Consult the dealer or an experienced radio/TV technician for help. Fujitsu is not responsible for any radio or television interference caused by unauthorized modifications of this equipment or the substitution or attachment of connecting cables and equipment other than those specified by Fujitsu.

  • Page 21: Environmental Protection

    1.2.12 Environmental Protection Environmentally-friendly product design and development This product has been designed in accordance with the Fujitsu standard for "environmentally friendly product design and development". This means that key factors such as durability, selection and labeling of materials, emissions, packaging, ease of dismantling and recycling have been taken into account.

  • Page 22

    1.2 Important Information Energy-saving Information Devices that do not need to be constantly switched on should be switched off until they are needed as well as during long breaks and after completion of work. Packaging Information Do not throw away the packaging. You may need it later for transporting the system. If possible, the equipment should only be transported in its original packaging.

  • Page 23

    Further information can be found at http://www.ts.fujitsu.com/recycling Details regarding the return and recycling of devices and consumables within Europe can also be found in the "Returning used devices" manual, via your local Fujitsu branch or from our recycling center in Paderborn: Fujitsu...

  • Page 24: System Description

    "Overview" on page 25 "Features and Benefits" on page 26 "What’s New in ETERNUS CS800 S6 with Software V3.2.7" on page 27 "Components ETERNUS CS800 S6 System" on page 27 "Data Reduction" on page 30 "Space Reclamation"...

  • Page 25: Overview

    Overview The ETERNUS CS800 is Fujitsu’s entry level and midrange disk backup solution that integrates data deduplication and replication technology to connect backup and DR (disaster recovery) protection across distributed corporate environments. The ETERNUS CS800 disk-based backup appliance uses Fujitsu’s patented data deduplication technology to increase disk capacities by 10 to 50 times, and make WAN replication a practical, cost- effective part of disaster recovery planning.

  • Page 26: Features And Benefits

    IBM LTO-1,LTO-2, LTO-3, LTO-4, or LTO-5 HP LTO-1,LTO-2, LTO-3, LTO-4, or LTO-5 Libraries emulated: Fujitsu CS-TL ADIC Scalar i2000, or ADIC Scalar i500 NAS presentation layer for NFS and CIFS/SMB. OST presentation layer for Symantec NetBackup and BackupExec. Supports also the OST...

  • Page 27: What's New In Eternus Cs800 S6 With Software V3.2.7

    An ETERNUS CS800 S6 system consists of a server component, which is the PRIMERGY RX2540 M1 server, and of storage components, which are up to three optional ETERNUS JX40 S2 for ETERNUS CS800 S6 Entry and ETERNUS DX100 S3 for ETERNUS CS800 S6 Scale. ETERNUS CS800...

  • Page 28: Entry

    2.4 Components ETERNUS CS800 S6 System The following versions of the ETERNUS CS800 S6 are provided: "Entry" on page 28 "Scale" on page 29 2.4.1 Entry This version provides a base amount of network throughput and data storage facility. It...

  • Page 29: Scale

    2.4 Components ETERNUS CS800 S6 System 2.4.2 Scale This version provides a midrange amount as well as fast network throughput and full data storage facility. It includes the following features: 1 server unit with 2 CPUs (8 cores / 16 threads each) and 256GB RAM Backup capacity between 32 and 352TB (ETERNUS DX100 S3 with optionally up to 10 expansion modules, field upgradeable).

  • Page 30: Data Reduction

    2.5 Data Reduction Figure 3: Front View of a Scale System (Example) 2.4.3 Capacity of ETERNUS CS800 S6 Configurations Name Disk Minimum Capacity Maximum Size Capacity Increment steps Capacity Entry 2 TB 8 TB 2 x 8 TB 24 TB...

  • Page 31: Data Deduplication

    2.5.1 Data Deduplication The ETERNUS CS800 system disk backup and replication systems use Fujitsu Technology Solutions patented data deduplication technology to dramatically increase the role that disk can play in data protection. With ETERNUS CS800 solutions, users can retain 10 to 50 times more backup data on fast recovery disk than with conventional arrays.

  • Page 32: Space Reclamation

    Once such a data block is identified, the block is removed to make the space reusable. For correct system operation, space reclamation must be run at regular intervals (at least once a week). Fujitsu Technology Solutions recommends creating a schedule to automatically run space reclamation (see "Scheduling Space Reclamation" on page 269).

  • Page 33: Virtual Tape Storage

    ETERNUS CS800 provides a number of tape drive and library emulations including the tape drive emulations: IBM LTO-1,LTO-2, LTO-3, LTO-4, or LTO-5 HP LTO-1,LTO-2, LTO-3, LTO-4, or LTO-5 and the library emulations: Fujitsu CS-TL ADIC Scalar i2000, or ADIC Scalar i500 ETERNUS CS800...

  • Page 34: Network Attached Storage (nas)

    2.8 Storage Presentation Figure 4: Virtual Tape Library (VTL) 2.8.2 Network Attached Storage (NAS) The ETERNUS CS800 system has the ability to serve as a NAS backup system (see "Network Attached Storage (NAS)" on page 34) where the following protocols are supported: "CIFS/SMB Protocol"...

  • Page 35: Nfs Protocol

    2.8 Storage Presentation Active Directory Support The ETERNUS CS800 supports ADS (Active Directory Services) as well as ACLs (Access Control Lists). This provides the following benefits: Compatibility with CIFS/SMB domains - NAS shares are able to join CIFS/SMB domains and use domain authentication. Precise control of file system permissions - Administrators can specify which users and groups can perform what actions.

  • Page 36: Path To Tape (ptt)

    Windows 2012 64-bit requires Symantec NetBackup (7.6 or later) or Backup Exec 2014 or later. Plug-in clients are host-OS dependent and are supplied by Fujitsu Technology Solutions. To use the ETERNUS CS800 in OST mode, you must configure an OST storage server and LSUs on the ETERNUS CS800.

  • Page 37: Eternus Cs800 Advanced Reporting

    An up-to-date list of the supported backup applications is provided by the most current ETERNUS CS800 Support Matrix. 2.10 ETERNUS CS800 Advanced Reporting Fujitsu Technology Solutions ETERNUS CS800 Advanced Reporting works with all ETERNUS CS800-Series disk backup systems. ETERNUS CS800 Advanced Reporting combines comprehensive performance data logging with powerful visual reporting and analysis tools to help you identify potential problems and optimize system operation.

  • Page 38

    NAS shares provided by ETERNUS CS800 are optimized for backup. Using NAS shares to store many small files may degrade the throughput of the system (e.g. inline throughput, replication) significantly. Contact Fujitsu Customer Support if you need assistance. ETERNUS CS800...

  • Page 39: Hardware Description

    "Turning On and Shutting Down the System" on page 72 "Locating the Serial Number" on page 73 This chapter applies to ETERNUS CS800 S6 hardware only. For an ETERNUS CS800 S5 system see ETERNUS CS800 S5 User Guide. For an ETERNUS CS800 S4 system see ETERNUS CS800 S4 User Guide.

  • Page 40: Server

    Server The server systems used by ETERNUS CS800 S6 is PRIMERGY RX2540 M1 that provides control for the ETERNUS CS800 S6 software (operating system and software applications). All ETERNUS CS800 S6 systems have one server. For detailed information on PRIMERGY RX2540 M1 see:...

  • Page 41

    3.1 Server Figure 9: Front panel indicators and buttons The table below describes each item. Item Indicator, Button, Port Description Reset button Pressing the Reset button reboots the system. It can be pressed using the end of a paper clip. CAUTION! Risk of data loss! NMI button...

  • Page 42

    3.1 Server Item Indicator, Button, Port Description CSS indicator (yellow) Does not light up when no critical event was detected for a CSS (Customer Self Service) component. Lights up yellow if a prefailure event was detected for a CSS component that you can fix yourself (for reasons of precaution) with the CSS concept.

  • Page 43: Server Rear View - Connectors And Indicators

    3.1 Server Item Indicator, Button, Port Description ON/OFF button / The ON/OFF button is used to switch the server on and off. Power-on indicator The ON/OFF button does not disconnect the server (green) from the mains voltage (standby mode). To disconnect from the mains completely, remove the power plug(s).

  • Page 44

    3.1 Server Figure 10: Rear view of the ETERNUS CS800 Item Description Redundant power supplies Power supply indicator Lights up yellow) when the server is switched off, but mains voltage is present (standby mode). Lights up green when the server is switched on and functioning properly. Lights up orange if the power supply unit has failed.

  • Page 45

    3.1 Server Connectors and indicators on the I/O panels Figure 11: I/O panel connectors and indicators The first table below describes the connectors on the I/O panels of the ETERNUS CS800 servers (1, 2, ... in the figure above). The second table contains the indicators located on the rear side I/O panels of the servers (marked with A,B,...).

  • Page 46

    3.1 Server Item Indicator Status Description At each LAN connector (Dynamic LoM, Management LAN connector) you will find the following indicators LAN link/transfer green on LAN connection established indicator no LAN connection green flashing data transfer in progress LAN speed yellow on transfer rate of 1 Gbit/s indicator...

  • Page 47: Connecting The Servers To The Mains

    If the event is still acute after a power cycle, the indicator is activated after the restart. Table 4: Indicators on the I/O panel For detailed information on the ETERNUS CS800 S6 see PRIMERGY RX2540 M1 manual. 3.1.3 Connecting the servers to the mains The ETERNUS CS800 servers are equipped with two hot-plug power supply units.

  • Page 48

    3.1 Server CAUTION! The server is automatically set to a mains voltage in the range 100 V - 240 V. You may only operate the server if its rated voltage range corresponds to the local mains voltage. Connect the power cord with the insulated connector to the power supply unit of the server, and plug the power plug into a grounded outlet on the mains socket strip on the rack (see Technical Manual of the rack).

  • Page 49

    3.1 Server Notes on connecting/disconnecting cables CAUTION! Always read the documentation supplied with the device you wish to connect. Never connect or disconnect cables during a thunderstorm. Never pull on a cable when disconnecting it. Always take hold of the cable by the plug.

  • Page 50: Eternus Cs800 S6 - Entry System

    Figure 13: Entry System - front , with JX40 S2 Option Figure 14: Entry System - front, without JX40 S2 Option 3.1.4.1 PCI Cards for ETERNUS CS800 S6 Entry Entry with JX40 S2 Option Figure 15: Entry System, no option variant...

  • Page 51

    3.1 Server Figure 17: Entry System with 8 Gb/s Fibre Channel Figure 18: Entry System with 8 Gb/s Fibre Channel and with 10 Gb/s Ethernet Variants Slots no option internal RAID Riser 4 x 1 Gb/s external RAID controller card Ethernet controller with 10...

  • Page 52

    3.1 Server Entry without JX40 S2 Option Figure 19: Entry System, no option variant Figure 20: Entry System with 10 Gb/s Ethernet Figure 21: Entry System with 8 Gb/s Fibre Channel Figure 22: Entry System with 8 Gb/s Fibre Channel and with 10 Gb/s Ethernet ETERNUS CS800...

  • Page 53

    3.1 Server Variants Slots no option internal RAID Riser 4 x 1 Gb/s controller card Ethernet with 10 Gb/s Ethernet option internal RAID Riser 4 x 1 Gb/s 2 x 10 Gb/s controller card Ethernet Ethernet with 8 Gb/s Fibre Channel internal RAID 2 x 8 Gb/s Riser...

  • Page 54: Eternus Cs800 S6 - Scale System

    Scale System configuration. Figure 23: Scale System - front 3.1.5.1 PCI Cards for ETERNUS CS800 S6 Scale Figure 24: Scale System, no option / FC option variant Figure 25: Scale System with 1 Gb/s Ethernet option...

  • Page 55: Indicators On The Pci Cards

    3.1 Server Variants Slots with internal 2 x 8 Riser - 4 x 1 2 x 8 Riser 2 x 8 none Gb/s card Gb/s Gb/s Gb/s RAID card or FC Fibre Ethernet Fibre Fibre controller option Channel Channel Channel with internal 2 x 8...

  • Page 56

    3.1 Server Item Slots Variants LED (green) Link/Activity indicator Does not light up if there is no link. Flashes green when a data transfer is in progress. LED (green) Connectivity indicator Lights up green if a LAN connection exists. Does not light up if no LAN connection exists. LED 1 Data rate indicator (green/yellow)

  • Page 57: Storage Modules

    3.2 Storage Modules Storage Modules The Entry model of ETERNUS CS800 S6 with a capacity of more than 24TB uses up to three ETERNUS JX40 S2 storage modules as backup data storage. The Scale model of ETERNUS CS800 S6 uses ETERNUS DX100 S3 storage modules as backup data storage.

  • Page 58: Eternus Jx40 S2 Rear View

    3.2 Storage Modules Operation panel of JX40 Figure 29: Operation panel of JX40 S2 LED name LED status Description POWER green DC power is supplied to the JX40 S2 module. FAULT LED amber The JX40 S2 module is in error status. IDENTIFY blinks blue Specifies the installation location of the storage subsystem.

  • Page 59

    3.2 Storage Modules Figure 31: Figure 32: Rear view of JX40 S2- I/O module LED name LED status Description SAS IN link green The link between the SAS IN port and the source port has been established. SAS IN fault amber The ports to remove the mini SAS HD cables between enclosures from are indicated.

  • Page 60: Eternus Dx100 S3 Base Module - Front View

    3.2.3 ETERNUS DX100 S3 Base Module - Front View The Scale model of ETERNUS CS800 S6 uses ETERNUS DX100 S3 storage modules as backup data storage. There are two variants of the ETERNUS DX100 S3 storage modules: a storage base module (controller enclosure) which is connected to the server...

  • Page 61

    3.2 Storage Modules storage expansion modules (drive enclosure) to provide additional capacity for backup data. The ETERNUS DX100 S3 base module contains 12 3.5-inch NL-SAS hard disk drives in the front and one controller module and two power supplies in the rear. DX100 S3 Base Module Figure 34: Front view of the DX100 S3 controller enclosure Figure 35: Operation Panel (Controller Enclosure)

  • Page 62: Eternus Dx100 S3 Base Module - Rear View

    3.2 Storage Modules LED name LED status Description POWER green DC power is supplied to the controller enclosure. IDENTIFY blue blinking The installation location of the controller enclosure is identified according to the instruction that is issued from ETERNUS Web GUI or ETERNUS CLI. FAULT amber The system is in error status.

  • Page 63

    3.2 Storage Modules Figure 37: Controller Module LED name Description status IDENTIFY/SCU blinks Specifies the installation location of the controller module. READY green System Capacitor Unit (SCU) is charging. green The link between the DI (OUT) port and the destination port has (OUT)LINK/ been established.

  • Page 64

    3.2 Storage Modules LED name Description status MASTER green The controller is set as a Master CM. CA FAULT amber The host interface is in error status. LINK/FAULT green The link between the host interface port and the destination port has been established.

  • Page 65: Eternus Dx100 S3 Expansion Modules - Front View

    3.2 Storage Modules Power Supply Unit (PSU) The power supply unit transforms input AC power from a power socket to DC power and supplies power to each component. Each power supply unit contains fans. Figure 39: Power supply unit (PSU) of the ETERNUS DX100 S3 controller enclosure LED name LED status Description...

  • Page 66: Eternus Dx100 S3 Expansion Modules - Rear View

    3.2 Storage Modules ETERNUS DX100 S3 storage expansion modules are used in the ETERNUS CS800 S6 system to provide additional capacity (backup data storage). Each storage expansion module contains 12 3.5-inch NL-SAS hard disk drives in the front (in the same way as the storage base module) and two I/O modules as well aspower supplies (with fans) in the rear.

  • Page 67

    3.2 Storage Modules Figure 42: Rear view of DX100 S3 drive enclosure Figure 43: Rear view of DX100 S3 - I/O module LED name LED status Description DI (IN) LINK green The link between the DI (IN) port and the source port has been established.

  • Page 68

    3.2 Storage Modules LED name LED status Description Identify blinks blue The installation location of the I/O module is identified according to the instruction that is issued from ETERNUS Web GUI or ETERNUS CLI. Fault amber The I/O module is in error status. Table 15: Status and meanings of each LED (I/O module of the ETERNUS DX100 S3 drive enclosure) Power Supply Unit (PSU)

  • Page 69

    3.2 Storage Modules For detailed information on ETERNUS DX100 S3 storage module see ETERNUS DX100 S3 storage module manuals. ETERNUS CS800...

  • Page 70: Hard Drive Carrier

    3.3 Hard Drive Carrier Hard Drive Carrier 2.5" hard drive carriers 2.5" hard drive carriers are used in the server module. Each 2.5" hard drive carrier has two LED indicators (see the figure below) which are described in the table below. Figure 45: 2.5"...

  • Page 71

    3.3 Hard Drive Carrier 3.5"hard drive carriers 3.5" hard drive carriers are used in the storage modules. There are two LED indicators for each hard drive carrier (see the figure below). Figure 46: 3.5" Hard Drive Carrier Item Colour Description green HDD BUSY Lights up: HDD in active phase Does not light: HDD inactive (drive inactive)

  • Page 72: Turning On And Shutting Down The System

    ON/OFF button for at least 10 seconds and/or send a corresponding control signal. The storage modules are not switched off by shutting down the ETERNUS CS800 S6 via the remote management pages. If you want to switch off the storage modules completely, wait until the server has shut down, then press the Power ON/OFF button of the storage base module(s) for several seconds until the READY LED does not glow any more.

  • Page 73: Locating The Serial Number

    3.5 Locating the Serial Number Locating the Serial Number You will need the serial number at various times. If you contact Fujitsu support provide the ETERNUS CS800 S6 serial number. You can locate the system serial number on the Home page of the remote management console.

  • Page 74: Rack Requirements

    Rack Requirements It is recommended to install the ETERNUS CS800 S6 system in a controlled or restricted area to prevent access by untrained personnel. In addition, it is recommended that system installation is performed only by qualified IT personnel. The tables below contain the rack requirements for the ETERNUS CS800 S6 components.

  • Page 75

    The rack systems from Fujitsu (PRIMECENTER Rack) support the installation of ETERNUS CS800 S6 components. Installation in most current rack systems from other manufacturers is also supported. To ensure proper ventilation, any unused areas in the rack must be sealed using dummy covers.

  • Page 76: Installing The Eternus Cs800 S6 Modules

    Installing the ETERNUS CS800modules in a rack consists of the following steps: "Locating the Mounting Position" on page 77 "Installing the components in the rack" on page 80 "Cabling the ETERNUS CS800 S6 System" on page 87 Necessary tools Provide the following tools for unpacking and installing the ETERNUS CS800 system:...

  • Page 77: Locating The Mounting Position

    5.1 Locating the Mounting Position Locating the Mounting Position The ETERNUS CS800 S6 system is designed to fit in a standard 19" wide rack. It is important for the chassis installation to locate the hole pattern in the rack rails. You must allow 2 HU (3.5") of vertical space for the server module and 2 HU (3.5") of vertical space...

  • Page 78

    5.1 Locating the Mounting Position preserve an appropriate free space (2 to 6 HU) for storage expansion with up to three modules (see the figure below for a graphical representation). The maximum length of the cable between the server and the first JX40 S2 module (JX40-1) is 3.5m and the cables between the JX40 S2 modules have a maximum length of 1.1m.

  • Page 79

    5.1 Locating the Mounting Position Figure 50: Recommended Positions of the Modules in the Rack for Scale a. Server module on the highest (Variant 2) or lowest position (Variant 1). b. Storage base module directly under or above it c. All storage expansion modules directly under or above the storage base module. CAUTION! The DX100 S3 storage expansion modules are preconfigured and assigned by numbers in the factory.

  • Page 80: Installing The Components In The Rack

    5.2 Installing the components in the rack Installing the components in the rack CAUTION! Please note the instructions in section. At least two people are needed to position the server into/out of the rack. The rack can tip over when more than one unit is removed. The ETERNUS CS800 system may not occupy the top height unit of the rack (38 HU/42 HU PRIMECENTER Rack), as otherwise boards or fans cannot be replaced even with the plug-in module fully extended.

  • Page 81

    5.2 Installing the components in the rack Position the support bracket at the corresponding height on the rear left support upright, (place knob in the corresponding hole and secure it as described in the technical manual for the rack in question. Release the rails Figure 52: Removing the Outer Telescopic Rail Start with the left rail.

  • Page 82

    5.2 Installing the components in the rack Mounting the rail systems Figure 53: Fit the Left Support System in the PRIMECENTER Rack CAUTION! When using telescopic rails, the rack must be protected against tilting. 1. Identify the right and the left rail (see label or imprint on the rail). 2.

  • Page 83

    5.2 Installing the components in the rack 6. Check if the rail will be fixed by pressing the left rail backwards. 7. Repeat this procedure to install the right rail. Option Fix each rail with one earthquake security screw M5 (5). The earthquake security screw has to be tightened with max.

  • Page 84: Installing A Storage Module In The Rack

    5.2 Installing the components in the rack Completing installation Figure 55: Sliding the server into the rack 1. Release the locking mechanism of both rails (1). 2. Push the server as far as it will go into the rack (2) until the Quick Release Levers (QRL) engage (3).

  • Page 85

    5.2 Installing the components in the rack Figure 56: Locating the mounting position 2. Push the M5 cage nuts into the 2nd holes of the front rack pillars above the base line of the storage module (1). Push further M5 cage nuts into the 5th holes too (2). Figure 57: Inserting the Cage Nut 3.

  • Page 86

    5.2 Installing the components in the rack Figure 58: Inserting the Pins of the Left Slide Rail 5. Secure the left slide rail to the front pillar using the pre-mounted M5 centering screw (2 in figure "Inserting the Pins of the Left Slide Rail" on page 86) and the M5 pan head screw (3).

  • Page 87: Cabling The Eternus Cs800 S6 System

    8846&intFehlercode=0&NavIDs= Cabling the ETERNUS CS800 S6 System This chapter provides cabling diagrams for the different ETERNUS CS800 S6 configurations. In order to set up the mains connection of the system with phase redundancy, the two power supply units of each module must be connected to two different phases or to two different circuits of the rack installation.

  • Page 88

    The service port of the CS800 should not be connected to the LAN. CS800 Labelsheet Together with each ETERNUS CS800 S6 a label sheet is delivered. The stickers on it are intended to label the storages modules and their power cables (CE, DE-x, JX40-x) as well as the internal LAN and FC cables to connect the DX100 to the server of the Scale model.

  • Page 89: Entry System Without Eternus jx40 S2 Option

    5.3 Cabling the ETERNUS CS800 S6 System LAN Cabling (SCALE) Serv. Onb. LAN1 CE CM0 MNT Server Slot7 P1 CE CM1 MNT CE CM0 MNT Serv. Onb. LAN1 CE CM1 MNT Server Slot7 P1 FC Cabling (SCALE) Server Slot2 P1...

  • Page 90

    Figure 62: Entry System with 10 Gb/s Ethernet Figure 63: Entry System with 8 Gb/s Fibre Channel and with 10 Gb/s Ethernet Proceed as follows to connect the ETERNUS CS800 S6 Entry: 1. Connect a power cable to each power supply of the server.

  • Page 91: Entry System With Eternus jx40 S2 Option

    5.3 Cabling the ETERNUS CS800 S6 System least one of the LAN ports must be connected. 3. If your CS800 also provides FC ports: Connect them to the SAN or directly to the appropriate devices. 5.3.2 Entry System with ETERNUS JX40 S2 Option...

  • Page 92

    5.3 Cabling the ETERNUS CS800 S6 System Figure 65: Entry System with 8 Gb/s Fibre Channel Figure 66: Entry System with 10 Gb/s Ethernet ETERNUS CS800...

  • Page 93

    5.3 Cabling the ETERNUS CS800 S6 System Figure 67: Entry System with 8 Gb/s Fibre Channel and with 10 Gb/s Ethernet Proceed as follows to cable the system: 1. Connect a power cable to each power supply of the components.

  • Page 94: Scale System

    5.3 Cabling the ETERNUS CS800 S6 System 3. Connect the LAN ports and optionally the iRMC port to the appropriate networks. At least one of the LAN ports must be connected. 4. If your ETERNUS CS800 also provides FC ports: Connect them to the SAN or directly to the appropriate devices.

  • Page 95

    5.3 Cabling the ETERNUS CS800 S6 System Appropriate labels should be already affixed to the cables or can be taken from the section LAN Cabling (SCALE) of the label sheet, see "CS800 Labelsheet" on page 2. Connect the host interface adapters CA#1 of both DX100 controller modules to the...

  • Page 96

    5.3 Cabling the ETERNUS CS800 S6 System The last DE is the DE with the always highest identifier in the range of DE-1 to DE-a. The figures "ETERNUS DX100 S3 cabling with one drive enclosure" on page 96 "ETERNUS DX100 S3 reverse cabling with two to ten drive enclosures" on page 96 depicting the cabling with a top down arrangement of the modules.

  • Page 97

    5.3 Cabling the ETERNUS CS800 S6 System a. The SAS port of CE CM#0 must be connected to the SAS IN port of DE-1 IOM#0. b. Only if there are more than just one DE: The IOM#0 SAS OUT port of DE-1 must be connected to the IOM#0 SAS IN port of DE-2.

  • Page 98

    5.3 Cabling the ETERNUS CS800 S6 System Figure 73: Scale System with the 1 Gb/s Ethernet and FC*) options Figure 74: Scale System with the 10 Gb/s Ethernet and FC*) options *)The 8 or 16 Gb/s FC ports are operable only if the appropriate option was purchased too...

  • Page 99: Initial Configuration, Connecting With The Network

    Initial Configuration, Connecting with the Network Before the ETERNUS CS800 is operational, you must configure the system through the setup wizard. You must also connect the ETERNUS CS800 with the network and configure your backup software (in case of OST usage also see ETERNUS CS800 OST Guide). Configuring the ETERNUS CS800 consists of the following steps.

  • Page 100: Switching On The System

    6.1 Switching on the System Switching on the System Proceed as follows: 1. (Scale model only): Turn on all PSU switches on the rear side of the storage modules. a. Check that the LINE LEDs of all storage expansion modules are green. b.

  • Page 101: Connecting The Notebook With The Server

    6.2 Connecting the Notebook with the Server Information on Background Initialize is displayed under the Status menu item of the ETERNUS CS800 Web GUI (Status > Hardware > Details > Storage Arrays), see chapter "Accessing Remote Management" on page 122 for information about how to access the system management pages and chapter "Status"...

  • Page 102: Running The Getting Started Wizard

    If the Login page does not display, verify that you entered the correct IP address (10.17.21.1) and that the network settings on the computer are correct. Wait five minutes, then try again. If the Login page still does not display, contact Fujitsu Technology Solutions. ETERNUS CS800...

  • Page 103

    6.3 Running the Getting Started Wizard Figure 76: Login Screen 2. On the Login page: a. Select Administrator. b. Type spcc for the password. c. Click Login. 3. ETERNUS CS800 Welcome page displays (see figure below). Click Next. Figure 77: ETERNUS CS800 Welcome Page 4.

  • Page 104: Access Control

    Access Control Figure 79: Access Control page Initially only two accounts are enabled for access to the ETERNUS CS800 S6 system: The GUI Administrator and the SSH CLI Service account. It is necessary to specify a new password for both accounts.

  • Page 105

    CAUTION! Keep both passwords in a safe place. If they get lost, you will not be able to access your ETERNUS CS800 S6 anymore. Also the Fujitsu customer support will not be able to help you in such a case.

  • Page 106: Network Configuration

    6.3 Running the Getting Started Wizard 6.3.3 Network Configuration Figure 80: Network Configuration Using the Network page, each physical Ethernet port in the ETERNUS CS800 can be configured as a separate device. In addition, you can create bonded devices (logical ports) consisting of two or more physical ports of the same link speed (1GbE or 10GbE).

  • Page 107

    6.3 Running the Getting Started Wizard Assign the interface to a VLAN (Virtual Local Area Network). Indicate whether the interface IP address will be used to externally identify the system (external host IP address). Specify the types of traffic allowed on the interface (management, replication, or data).

  • Page 108

    6.3 Running the Getting Started Wizard Configuring General Network Settings Under General, enter the following network information as provided by your network administrator (see "Network Page: General" on page 108): Figure 81: Network Page: General When entering IP addresses, never use an address that is in a reserved IP address range.

  • Page 109

    6.3 Running the Getting Started Wizard Primary, Secondary, and Tertiary (Optional) The IP addresses of up to three DNS servers DNS IP Address used to resolve domain names and translate them into IP addresses. You must specify a DNS IP address if you plan to use hostname format when configuring an NTP time server, outgoing e-mail server, replication sources and targets, and other...

  • Page 110

    6.3 Running the Getting Started Wizard To maintain network connectivity, the switch connected to the ETERNUS CS800 must be configured to use the same bonding mode. The best time to change the bonding mode on the switch is during the next reboot of your system, after saving the new network settings.

  • Page 111

    6.3 Running the Getting Started Wizard Figure 83: Network Page: Interface Details 1. If necessary, click the Show link to show the interface details table. 2. For each device, select the MTU (Maximum Transmission Unit) frame size in the Jumbo Frame MTU Size drop-down box.

  • Page 112

    6.3 Running the Getting Started Wizard 1. Click Add IP to add a network interface to a device. Or select an interface to edit the IP address, netmask, gateway and traffic type. (To select an interface, click the radio button next to the interface index name, for example, bond0:2.) A maximum of 10 IP addresses are allowed per device.

  • Page 113

    6.3 Running the Getting Started Wizard IP Address The IP address of the interface. Netmask The network mask of the interface. Gateway The gateway of the ETERNUS CS800. (This is usually not the same as the default gateway.) 5. If necessary, specify NAT (Network Address Translation) settings for the interface: If the ETERNUS CS800 is a replication target and is behind a NAT router, you must configure a NAT IP Address.

  • Page 114

    6.3 Running the Getting Started Wizard When you add a network interface, a default route (via the default gateway) is automatically created for the interface after network settings are applied and the ETERNUS CS800 reboots. For example, if you add an interface with IP address 10.20.185.172, a route with the destination IP address 10.20.185.0 is automatically added.

  • Page 115

    6.3 Running the Getting Started Wizard Dest Gateway The gateway IP address used for outgoing traffic sent from the interface to a host or client. (This is usually not the same as the default gateway.) The destination gateway of each route must match the subnet of at least one configured IP address listed in the IP Address Table.

  • Page 116

    6.3 Running the Getting Started Wizard "Example 2: Segments and Target on the Same Subnet" on page 117 "Example 3: Segments on the Same Subnet and Target on a Different Subnet" on page 117 Example 1: Segments and Target on Different Subnets In the example below (see "Interface Routing: Example 1"...

  • Page 117

    6.3 Running the Getting Started Wizard Example 2: Segments and Target on the Same Subnet In the example below (see "Interface Routing: Example 2" on page 117), the ETERNUS CS800 has two segmented interfaces, one for data and management traffic, and one for replication traffic: The source ETERNUS CS800 management/data IP address, the source ETERNUS CS800 replication IP address, and the target ETERNUS CS800 IP address are all on the same...

  • Page 118

    6.3 Running the Getting Started Wizard Dest Gateway Use the IP address of the gateway (192.168.10.1). In addition, to enable communication with the target ETERNUS CS800 by means of the gateway, you must add a second host route in the Routing Details section on the source ETERNUS CS800.

  • Page 119: Date & Time

    6.3 Running the Getting Started Wizard 6.3.4 Date & Time The Date & Time page allows you to set the system date and time of the ETERNUS CS800. Figure 89: Date & Time Page To set the system date and time: ETERNUS CS800...

  • Page 120: Confirm Settings & Reboot

    6.3 Running the Getting Started Wizard 1. Select one of the following options: Option Description Network Time Protocol (NTP) (Recommended) Select this option to synchronize the Server ETERNUS CS800 with an NTP timeserver or pool. Then select or specify a timeserver or pool. Select a Timeserver Pool - (Recommended) Select one of the well-known, geographically- based NTP timeserver pools in the drop-down...

  • Page 121

    6.3 Running the Getting Started Wizard Figure 90: Confirm Settings A message appears that after clicking yes, your changes will be applied and the system will reboot automatically (see figure below). Click Yes. Figure 91: Confirm Page ETERNUS CS800...

  • Page 122: Remote Management, Remote Management Overview

    Remote Management This chapter contains the following topics: "Remote Management Overview" on page 122 "Accessing Remote Management" on page 122 "The Remote Management Console" on page 126 Remote Management Overview The ETERNUS CS800 provides a powerful Web-based user interface that allows you to configure and manage the system from a remote workstation on the same network as the ETERNUS CS800.

  • Page 123

    7.2 Accessing Remote Management Microsoft Internet Explorer 11 For correct operation of the remote management console, including the display of the online help, disable any pop-up blockers and enable JavaScript in your Web browser. In the Google Chrome browser, the help may not appear when Help is selected.

  • Page 124

    7.2 Accessing Remote Management Service - Allowed to view and change information on the ETERNUS CS800 remote management console. Password changes are not allowed LDAP/AD - Allows users assigned system access through a Lightweight Directory Access Protocol (LDAP) or Active Directory (AD) server to log into the ETERNUS CS800 remote management console.

  • Page 125

    7.2 Accessing Remote Management 6. If a security banner message has been specified for the ETERNUS CS800, click Accept. For information about specifying a security banner message, see "Security Notice" on page 329. 7. A service ticket banner will appear if there are service tickets for the ETERNUS CS800. Click OK to access the Service Tickets page (see "Service Tickets"...

  • Page 126: The Remote Management Console

    7.3 The Remote Management Console If the ETERNUS CS800 remote management console is idle for more than 30 minutes (default setting), the system logs off the user. The inactivity timeout can be changed on the Login Session page (see "Login Session" on page 328).

  • Page 127

    Select from the following help options: Help Contents - Open the ETERNUS CS800 online help. Online Documentation - Access documentation resources on the Fujitsu Web site. About - Display ETERNUS CS800 software version information Figure 96: Help Menu Low Space Management As disk capacity is used and free disk space approaches low levels, the ETERNUS CS800 automatically responds as detailed in the table below.

  • Page 128

    7.3 The Remote Management Console Space reclamation and compaction end when the ETERNUS CS800 exits the Low Space state. When the ETERNUS CS800 enters the Critical Reserve Space state, backup ingest is stopped, and target replication to the system is paused. Backup ingest and target replication resume when the ETERNUS CS800 exits the Critical Reserve Space state.

  • Page 129

    130). Click a menu item to display the corresponding management page. To access Advanced Reporting, click the link below the main menu. Fujitsu Technology Solutions ETERNUS CS800 Advanced Reporting provides performance data logging and visual reporting and graphing features for Fujitsu Technology Solutions ETERNUS CS800- Series systems.

  • Page 130

    7.3 The Remote Management Console Figure 97: Main Menu Management Pages Use the ETERNUS CS800 management pages to view information as well as configure and manage the system. To navigate to a page, first click a menu item, then click a tab to display the corresponding page.

  • Page 131

    7.3 The Remote Management Console Figure 98: Remote Management Pages Map ETERNUS CS800...

  • Page 132: Configuration Wizards

    Configuration Wizards This chapter contains the following topics: "Configuration Wizards Overview" on page 132 "NAS Wizard" on page 134 "VTL Wizard" on page 140 "OST Wizard" on page 146 "Replication Wizard" on page 152 "Users Wizard" on page 158 "Email Alerts Wizard" on page 165 "AIS Connect"...

  • Page 133

    Before exiting the Wizards menu, Fujitsu Technology Solutions recommends configuring an e-mail server and enabling automatic e-mails. To help maintain system integrity, Fujitsu Technology Solutions regularly collects system information through automatic e-mails. These e- mails contain configuration and status information only, and do not...

  • Page 134: Nas Wizard

    8.2 NAS Wizard Figure 99: Wizards Menu NAS Wizard The NAS wizard provides guided assistance for configuring the ETERNUS CS800 as a NAS (Network Attached Storage) appliance. The wizard guides you through the process of adding one or more NAS shares to receive backup data and configuring these shares with the CIFS/SMB, NFS, or Application Specific protocols.

  • Page 135

    8.2 NAS Wizard Figure 100: NAS Wizard: About Step 2: Windows If you selected the UNIX/Linux (NFS) option in the previous step, the wizard automatically skips this step and the next step. Continue with "Step 3: Add Share" on page 137.

  • Page 136

    8.2 NAS Wizard 3. (Active Directory only) Enter information about the primary domain controller: Primary Domain Controller Select an option for the Primary Domain Controller (PDC): Use DNS Discovery - Discover the PDC automatically. Specify Address - Enter the fully qualified name or the IP address of the PDC.

  • Page 137

    8.2 NAS Wizard Figure 101: NAS Wizard: Windows Step 3: Add Share 1. Under Add Share, enter information about the NAS share (see "NAS Wizard: Add Share" on page 138): Name Enter the name of the NAS share. Description (Optional) Enter a brief description of the share.

  • Page 138

    8.2 NAS Wizard Enable deduplication Select the check box to enable data deduplication. Fujitsu Technology Solutions recommends that you enable data deduplication to optimize disk usage. Data deduplication is enabled by default. You cannot enable or disable data deduplication after the share is added.

  • Page 139

    8.2 NAS Wizard Step 4: Confirm 1. Review the settings you selected to make sure they are correct (see "NAS Wizard: Confirm" on page 139). If necessary, click Previous to return to a previous step to make changes. 2. To make changes to a NAS share you added, first select the share and click Delete to delete the share.

  • Page 140: Vtl Wizard

    8.3 VTL Wizard Figure 104: NAS Wizard: Download Client Plug-in VTL Wizard The VTL wizard provides guided assistance for configuring the ETERNUS CS800 to present its storage as one or more VTL (Virtual Tape Library) partitions for use with a backup application.

  • Page 141

    Select the library model emulated by the partition. The library model determines the inquiry string returned to the host by the ETERNUS CS800. The following library models are available: Fujitsu CS-TL ADIC Scalar 100, ADIC Scalar i2000, or ADIC Scalar i500 ADIC Pathlight VX...

  • Page 142

    Enable deduplication Select the check box to enable data deduplication. Fujitsu Technology Solutions recommends that you enable data deduplication to optimize disk usage. Data deduplication is enabled by default. You cannot enable or disable data deduplication after the partition is added.

  • Page 143

    8.3 VTL Wizard 2. Under Add Contiguous Media, enter information about the media: Initial Location The initial location for cartridges after they are created (Storage Slot or I/E Slot). You cannot create more cartridges than the number of available slots in the initial location. For example, if 50 I/E slots are available, you cannot create more than 50 cartridges if the initial location is set to I/E Slot.

  • Page 144

    8.3 VTL Wizard Figure 107: VTL Wizard: Add Media Step 4: Discover Remote Hosts 1. Click Discover Remote Hosts to list all hosts that are known to the ETERNUS CS800 (see "VTL Wizard: Discover Remote Hosts" on page 145). A host is made known to the ETERNUS CS800 if you enter the host ID on this page, or if the host logs on to one or more Fibre Channel target ports.

  • Page 145

    SAN. The CCL is accessible to hosts only through LUN 0. CAUTION! If you are not sure if you should use CCL, contact Fujitsu Technology Solutions Customer Support before you enable this option. 3. Click Add.

  • Page 146: Ost Wizard

    8.4 OST Wizard Figure 109: VTL Wizard: Map Remote Hosts Step 6: Confirm 1. Review the settings you selected to make sure they are correct (see "VTL Wizard: Confirm" on page 146). If necessary, click Previous to return to a previous step to make changes.

  • Page 147

    8.4 OST Wizard servers, configuring LSUs (logical storage units), and adding OST users. The wizard also provides a link for downloading and installing the OST Plug-in on your backup host. Additional Information The OST Wizard is available in ETERNUS CS800 and Multi-Protocol configurations only. If you plan to use Concurrent Optimized Duplication, you should complete the Replication wizard before beginning the OST wizard (see "Replication Wizard"...

  • Page 148

    Enter the maximum number of connections allowed to the storage server. To disable OST, enter 0 connections. To enable OST, enter 3 to 65536 connections. Fujitsu Technology Solutions recommends setting Max Connections to 300. Enable Concurrent Optimized Select the check box to enable optimized duplication Duplication during OST ingest.

  • Page 149

    8.4 OST Wizard Figure 112: OST Wizard: Add Storage Servers Step 3: Add LSUs 1. Enter information about the LSU (see "OST Wizard: Add LSUs" on page 150). Storage Server Select the storage server that will contain the new LSU. Use Available Capacity Select this option to add an LSU that uses the available capacity on the system.

  • Page 150

    8.4 OST Wizard To remove an LSU, select it in the LSUs Added table and click Delete. 4. Click Next to continue. To configure the LSU for Automatic Image Replication, use the Configuration > OST > LSU page (see "LSU" on page 238).

  • Page 151

    8.4 OST Wizard Figure 114: OST Wizard: Confirm Step 5: Download OST Client Plug-in To download the OST Plug-in, click Client Plug-in Download (see "OST Wizard: Download OST Client Plug-in" on page 151). On the download page, download the correct OST Plug- in for your backup application and operating system.

  • Page 152: Replication Wizard

    8.5 Replication Wizard Replication Wizard The Replication wizard provides guided assistance for configuring the ETERNUS CS800 to send replicated data to another ETERNUS CS800 system as part of disaster recovery plan. The wizard can also help you configure the ETERNUS CS800 to receive replicated data from another ETERNUS CS800 system.

  • Page 153

    8.5 Replication Wizard If two targets are already specified, you must delete a target before adding another. First click Pause to pause replication to the target, and then click Delete to remove the target. Before specifying a target, make sure you have completed the Replication wizard on the target ETERNUS CS800.

  • Page 154

    8.5 Replication Wizard enter the following information under Source: a. In the Source Hostnames or IP Addresses box, enter the hostname or IP address of the system that will send the replicated data to the ETERNUS CS800. You can specify up to 10 replication sources. To enter multiple sources, press <Enter>...

  • Page 155

    8.5 Replication Wizard to enable Directory/File Based Replication for the share, and then enter a Sync ID in the box. With Directory/File Based Replication, a file is automatically replicated when it is closed or a period of time after it is modified. After replication, the replicated files are immediately available on the target system.

  • Page 156

    8.5 Replication Wizard Figure 118: Replication Wizard: NAS Shares Step 4: VTL Partition 1. Select a VTL partition in the Replication Settings for VTL Partitions section to manage its replication settings (see "Replication Wizard: VTL Partitions" on page 157).For help adding VTL partitions to the system, use the VTL Configuration Wizard (see "VTL Wizard"...

  • Page 157

    8.5 Replication Wizard The Sync ID is used to identify the source partition that will send replicated data to the target partition. The Sync ID must be identical to the Sync ID of the source partition on the source system. b.

  • Page 158: Users Wizard

    8.6 Users Wizard Figure 120: Replication Wizard: Confirm Users Wizard The Users wizard provides guided assistance to create and manage accounts which are used in different areas of the ETERNUS CS800 functionality. The table below describes which functionality can be used by each type of user and on which page of the remote management console the appropriate users can be created and maintained without using the wizard.

  • Page 159

    8.6 Users Wizard Designation Area of Use Page on which the users could be created alternatively (or maintained later on) Workgroup Users CIFS/SMB share access Configuration > NAS > Share Access (optionally having (requires having administrator rights) joined a Windows Workgroup) Share Administrators CIFS/SMB share users having...

  • Page 160

    8.6 Users Wizard Step 2: Add Authorized Backup Users 1. Enter information about the authorized user (see "Users Wizard: Add Authorized Backup Users" on page 163): Adding a user on this page having selected multiple designations for it will in fact create multiple users in the respective areas having the same name and password.

  • Page 161

    8.6 Users Wizard Manage User Select the check box if the authorized user will be able to access Application Specific (RMAN) shares, OST Storage servers, or PTT. OpenStorage (OST) and Oracle Recovery Manager (RMAN) After you create OST or RMAN user credentials, enter them in the backup application to authenticate on the media (OST) or Oracle (RMAN) server.

  • Page 162

    8.6 Users Wizard Remote User Select the check box if the authorized user will be for OST Automatic Image Replication. To configure the LSU for Automatic Image Replication, use the Configuration > OST > LSU page (see "LSU" on page 238).

  • Page 163

    8.6 Users Wizard Figure 122: Users Wizard: Add Authorized Backup Users Step 3: Add Share Administrators (Active Directory Only) 1. Enter information about the CIFS/SMB Share Administrator to be used with Active Directory. Fully Qualified User or Group Enter the administrator's user or group name. Name 2.

  • Page 164

    8.6 Users Wizard Figure 123: Users Wizard: Add Share Administrators Step 4: Confirm 1. Review the users you created to make sure they are correct (see Figure ). The users to be added display in the Authorized Backup Users Added. If necessary, click Previous to return to a previous step to make changes.

  • Page 165: Email Alerts Wizard

    8.7 Email Alerts Wizard Step 4: Confirm (Active Directory Only) 1. Review the users you created to make sure they are correct (see Figure ). The users to be added display in the Authorized Backup Users Added and Share Administrators Added tables.

  • Page 166

    4. (Optional) Select the Enable Admin Alerts about Email Server not configured check box to have system generate administration alerts to notify you if an e-mail server is not configured. 5. (Recommended) Select the Enable automatic emails to Fujitsu Technology Solutionscheck box to periodically send system configuration and status information ETERNUS CS800...

  • Page 167

    8.7 Email Alerts Wizard to Fujitsu Technology Solutions, including any software upgrades you have installed using the Software Upgrade Utility. Fujitsu Technology Solutions Support can use this information to provide a better support experience in the future. Automatic e-mails contain configuration and status information only, and do not contain any customer data stored on the system.

  • Page 168

    8.7 Email Alerts Wizard Notification Type Select the types of notifications to send to the recipient: High - Send e-mail notifications for High service tickets. High service tickets indicate that a critical problem has occurred and needs to be resolved immediately.

  • Page 169

    8.7 Email Alerts Wizard Figure 128: Email Alerts Wizard: Recipients Step 4: Confirm 1. Review the settings you selected to make sure they are correct. If necessary, click Previous to return to a previous step to make changes (see "Email Alerts: Confirm"...

  • Page 170: Ais Connect

    AIS Connect The AISConnect wizard provides guided assistance for configuring and enabling the connection to the AIS server in the Fujitsu Support Centre in order to provide call-home and dial-in services. Completing the AISConnect Wizard is strongly recommended in order to guarantee fast support actions in case of hardware failures and other system failures.

  • Page 171

    8.8 AIS Connect To register the ETERNUS CS800 system with the Fujitsu Support Centre, please place a service request at the Fujitsu Service Desk http://ts.fujitsu.com/support/servicedesk.html For more information about AIS Connect, see "AIS Connect" on page 289. To begin the AISConnect wizard, on the Wizards menu, click AIS Connect.

  • Page 172

    8.8 AIS Connect Password - Enter the password to use for proxy authentication. Country - Select the country where the ETERNUS CS800 is located. 2. Click Next. Figure 131: AISConnect Wizard: Proxy Step 3: Confirm After you have confirmed all settings, click OK. The wizard configures the ETERNUS CS800 with the settings you selected.

  • Page 173

    8.8 AIS Connect Figure 132: AISConnect Wizard: Confirm ETERNUS CS800...

  • Page 174: Home Page

    Home Page This chapter contains the following topics: " Home Page Overview" on page 174 "System Overview" on page 175 "Disk Usage " on page 176 "Data Reduction Statistics " on page 178 "Replication " on page 180 "Current Activity " on page 183 Home Page Overview The first page that displays after you log on to the ETERNUS CS800 remote management console is the Home page (see...

  • Page 175: System Overview

    9.2 System Overview Figure 133: Home Page System Overview The ETERNUS CS800 System Overview on the Home page (see "ETERNUS CS800 System Overview" on page 175) displays the following information about the system: Figure 134: ETERNUS CS800 System Overview ETERNUS CS800...

  • Page 176: Disk Usage

    9.3 Disk Usage System Information Description Hostname The hostname of the ETERNUS CS800. Click to change the hostname (see "Network" on page 293). IP Address The IP address of the ETERNUS CS800. Click to change the IP address (see "Network" on page 293).

  • Page 177

    Space reclamation is automatically started to free up disk space (see "Space Reclamation" on page 423). For optimal system performance, Fujitsu Technology Solutions recommends keeping the amount of Available Disk Space (free space) at 20% or more. Click Show More to display additional information:...

  • Page 178: Data Reduction Statistics

    9.4 Data Reduction Statistics Data Reduction Statistics The Data Reduction Statistics overview on the Home page (see "Data Reduction Statistics Overview" on page 178) displays the following information about the results of data reduction: Figure 136: Data Reduction Statistics Overview Data Reduction Information Description Data Size Before Reduction...

  • Page 179

    9.4 Data Reduction Statistics Show More Information Description Deduplication Ratio The deduplication ratio of all data that has been processed by the data deduplication engine. Compression Ratio The compression ratio of all data that has been processed by the compression engine. Click an item to view detailed statistics for disk usage (see "Disk Usage"...

  • Page 180: Replication

    9.5 Replication Replication The Replication overview on the Home page (see "Replication Overview" on page 180) displays the following information about target and source replication activity: "Send Settings & Cumulative Statistics" on page 180 "Receive Settings & Cumulative Statistics" on page 182 Figure 137: Replication Overview Send Settings &...

  • Page 181

    9.5 Replication Send Settings Information Description Target System The IP address and replication status for each configured replication target (up to two). Click to specify a replication target (see "Replication Configuration" on page 251). Status Ready - (Green) The system is ready to perform replication.

  • Page 182

    9.5 Replication Send Settings Information Description Pause/Resume The source controls the replication pause behavior. To manually pause replication between the source and target system, click Pause on the source system. To manually restart replication, click Resume on the source system. When the target system enters low disk space condition, replication on the source system is automatically paused.

  • Page 183: Current Activity

    9.6 Current Activity Current Activity The Current Activity overview on the Home page (see "Current Activity Overview" on page 183) displays the following information about system activity that occurred in the previous minute: Figure 138: Current Activity Overview Current Activity Information Description Inline The inline data flow throughput (in MB/s).

  • Page 184

    9.6 Current Activity Current Activity Information Description Replication Throttle The system replication throttle currently in effect (in KB/s or MB/s). When a constant throttle is enabled, the ETERNUS CS800 limits the amount of data it sends during source replication so that it does not exceed the specified bandwidth.

  • Page 185

    9.6 Current Activity Current Activity Information Description OST Service The status of the OST service. OST settings can be configured in Ready, Stopped, or Verifying state. The OST (NAS and Multi-Protocol server is available for backup only in Ready state. configuration only) Status Inline (OpDup) - The inline data flow throughput (in...

  • Page 186

    9.6 Current Activity Additional Information For more detailed information about all system activity, see "ETERNUS CS800 Overview" on page 381. ETERNUS CS800 Accent activity displays only if ETERNUS CS800 Accent is currently enabled or was previously enabled (see "ETERNUS CS800 Accent" on page 250).

  • Page 187: Configuration Overview

    Configuration This chapter contains the following topics: "Configuration Overview" on page 187 "NAS Configuration" on page 188 " VTL Configuration" on page 203 "OST Configuration" on page 227 "Replication Configuration" on page 251 "PTT Configuration" on page 260 "Scheduler" on page 262 "Notifications "...

  • Page 188: Nas Configuration

    10.2 NAS Configuration 10.2 NAS Configuration The NAS page allows you to configure the ETERNUS CS800 to present its storage capacity as NAS (network attached storage) shares that are compatible with standard backup applications. You can create NAS shares for use with Windows or Linux networks. You can also join the ETERNUS CS800 to a Windows domain or workgroup and manage users.

  • Page 189

    10.2 NAS Configuration Figure 139: NAS Summary Page Tasks Use the NAS page to perform the following tasks: View information about existing NAS shares (see "NAS Shares List" on page 189). Add a new NAS share to the system (see "Adding a NAS Share"...

  • Page 190

    10.2 NAS Configuration Protocol The protocol (CIFS/SMB,NFS, or Application Specific (RMAN)) the share is configured to use. For NFS shares, the Protocol column displays the commit type of the share (sync for synchronous or async for asynchronous). For information about changing the commit type of NFS shares, see the ETERNUS CS800 Command Line Interface (CLI) Guide (6-67081).

  • Page 191

    10.2 NAS Configuration To add a NAS share: 1. Click Add. The Add NAS Share page displays (see "Add NAS Share Page" on page 191). Figure 140: Add NAS Share Page 2. Under NAS Share Settings, enter information about the share: Name Enter the name of the NAS share.

  • Page 192

    10.2 NAS Configuration Enable data deduplication Select the check box to enable data deduplication. Fujitsu Technology Solutions recommends that you enable data deduplication to optimize disk usage. Data deduplication is enabled by default. You cannot enable or disable data deduplication after the share is added.

  • Page 193

    10.2 NAS Configuration Figure 141: Edit NAS Share & Replication Settings Page 2. Under NAS Share Settings, enter information about the share: If you are editing a share, only the Description, Enforce read-only access, Hide from network browsing, and Allow all users to access this share options can be changed.

  • Page 194

    10.2 NAS Configuration Allow all users/hosts to access (NFS or CIFS/SMB shares only) Select this check box to this share allow all hosts (NFS shares) to access the share. Or clear the check box to allow only specified users or hosts to access the share.

  • Page 195: Windows Domain

    10.2 NAS Configuration 1. Select the share and click Delete. You can select multiple shares to delete at once. 2. Click Yes to confirm the deletion. 10.2.2 Windows Domain The Windows Domain page allows you to join the ETERNUS CS800 to a Windows workgroup or a Windows domain using SMB.

  • Page 196

    Time" on page 307). The time difference between the ETERNUS CS800 and the ADS server (domain controller) must be less than 300 seconds.Fujitsu Technology Solutions recommends using the same NTP server for the ETERNUS CS800 and the ADS server to keep them synchronized.

  • Page 197

    10.2 NAS Configuration 1. Enter the following information about the Windows domain: Domain Type Select Active Directory. Domain/Workgroup Name Enter the domain name. Primary Domain Controller Select an option for the Primary Domain Controller (PDC): Use DNS Discovery - Discover the PDC automatically.

  • Page 198: Share Access

    10.2 NAS Configuration 10.2.3 Share Access The Share Access page allows you to manage workgroup users when the ETERNUS CS800 is joined to a Windows workgroup, or manage share administrators when the ETERNUS CS800 is joined to a Windows domain using Active Directory. You can add users or administrators, change user privileges, and delete users or administrators.

  • Page 199

    10.2 NAS Configuration Figure 144: Share Access Page (Active Directory) Tasks Use the Share Access page to perform the following tasks: View information about workgroup users or share administrators (see "Workgroup Users or Share Administrators" on page 199). Add a workgroup user or a share administrator (see "Adding a Workgroup User or Share Administrator"...

  • Page 200

    10.2 NAS Configuration 1. Click Add. The Add Workgroup User page displays (see "Add Workgroup User Page" on page 200). Figure 145: Add Workgroup User Page 2. Enter information about the workgroup user: User Name Enter the name of the workgroup user. Password Enter the password for the workgroup user.

  • Page 201

    10.2 NAS Configuration 1. Click Add. The Add Share Administrator page displays (see "Add Share Administrator Page" on page 201). Figure 146: Add Share Administrator Page 2. Enter the Fully Qualified User or Group Name of the share administrator. 3. Click Apply. Use the MMC (Microsoft Management Console) to manage users (see "ADS Share Permissions"...

  • Page 202

    10.2 NAS Configuration 2. Enter information about the workgroup user: If you are editing a workgroup user, you cannot change the User Name. User Name (Optional) Select a different workgroup user to edit. Password Enter the password for the workgroup user. Confirm Password Enter the password again to confirm it.

  • Page 203: Vtl Configuration

    10.3 VTL Configuration 10.2.4 Advanced Setting The Advanced Setting page allows you to enable or disable advanced SMB settings. To access the Advanced Setting page, on the NAS page, click the Advanced Setting tab (see "Advanced Setting Page" on page 203).

  • Page 204: Partitions

    10.3 VTL Configuration applications. You can add virtual tape drives and storage slots to VTL partitions, as well as create and work with virtual tape cartridges. You can also map partitions to hosts. Additional Information Virtual Tape Library (VTL) is available only on the ETERNUS CS800 VTL and Multi-Protocol configurations.

  • Page 205

    10.3 VTL Configuration Figure 149: Partitions Summary Page Tasks Use the Partitions Summary page to perform the following tasks: View information about existing VTL partitions (see "Partition List" on page 205). Add a new VTL partition to the system (see "Adding a VTL Partition"...

  • Page 206

    10.3 VTL Configuration Drive Model The tape drive model emulated by the virtual drives in the partition. Drives The number of virtual tape drives in the partition. Host Mapping The current state of host mapping for the partition (Yes or No). If no hosts have been mapped, click Map to map hosts to partitions (see "Remote Host Mapping"...

  • Page 207

    10.3 VTL Configuration ETERNUS CS800 - Entry - 80 VTD (pre-installed) Scale - 256 VTD (pre-installed) A virtual tape drive is considered active if a cartridge is loaded in the VTD. Make sure to configure the backup application software so that the maximum number of active VTDs is not exceeded at any time.

  • Page 208

    Enable deduplication - Select the check box to enable data deduplication. Fujitsu Technology Solutions recommends that you enable data deduplication to optimize disk usage. Data deduplication is enabled by default. You cannot enable or disable data deduplication after the partition is added.

  • Page 209

    10.3 VTL Configuration Enable Auto Export When a tape is moved from a Storage Slot to an I/E Slot, depending on the Auto Export setting, the media: will be removed from the virtual I/E slot, if Auto Export is enabled. (default) will remain in the virtual I/E slot, if Auto Export is disabled.

  • Page 210

    ETERNUS CS800. The following library models are available: Models Fujitsu CS-TL ADIC Scalar 100, ADIC Scalar i2000, or ADIC Scalar i500 ADIC Pathlight VX Number of Storage Enter the number of storage slots in the partition (up to Slots 9,000).

  • Page 211: Media

    10.3 VTL Configuration 2. If there are tape cartridges in any of the tape drives in the partition, move the cartridges to storage slots (see "Media Move" on page 216). To delete a partition, all drives must be empty. 3. Select the partition and click Delete. You can select multiple partitions to delete at once.

  • Page 212

    10.3 VTL Configuration Figure 152: Media Add Page To add virtual tape cartridges to a partition: 1. In the Partition drop-down box, select the partition where the media will be created. 2. Under Add Contiguous Media, enter information about the media: Initial Location The initial location for cartridges after they are created (Storage Slot or I/E Slot).

  • Page 213

    10.3 VTL Configuration Starting Barcode The first barcode number in the cartridge sequence. You can enter any alpha-numeric string for the starting barcode (uppercase letters only). Subsequent barcodes are incremented accordingly. For example, if you enter AA, the cartridges are numbered AA0000, AA0001, AA0002, and so on.

  • Page 214

    10.3 VTL Configuration Figure 153: Media Actions Page To perform actions on virtual tape cartridges: 1. In the Partition drop-down box, select the partition that contains the cartridges to work with. Select UNASSIGNED to work with cartridges that are not assigned to any partition.

  • Page 215

    10.3 VTL Configuration State The state of the cartridge: State: Scratch - Scratch newly created virtual media or virtual media that has been recycled with no data on it. Virtual - Virtual media with data on it. Virtual, Mounted - Virtual media with data that is mounted in a tape drive.

  • Page 216

    10.3 VTL Configuration Export Removes a cartridge from the virtual media changer and places it in an exported state. Perform this action if an export cannot be performed from the backup application. The cartridge must be in the vaulted, scratch, or virtual state. Recycle Recycles (erases) a cartridge so it can be reused by the partition.

  • Page 217

    10.3 VTL Configuration If you do not create and associate a host access group with a partition, the virtual devices are not visible from the host, and drives cannot be destinations for move operations (see "Remote Host Access" on page 220).

  • Page 218

    10.3 VTL Configuration 6. Select the cartridge to move from the source location. If necessary, use the controls at the bottom of the table to navigate between multiple pages of results. Select the number of rows to display in the Show drop-down box.

  • Page 219

    10.3 VTL Configuration Figure 155: Media Unload Page To unload virtual tape cartridges: 1. In the Partition drop-down box, select the partition that contains the cartridges to unload. 2. If the partition is online, click Offline to take the partition offline. To unload media, the partition must be offline.

  • Page 220: Remote Host Access

    10.3 VTL Configuration Cartridges are moved to a previous storage slot if available. Otherwise, they are moved to the first available storage slot. 8. Return the partition to an online state (see "Changing Partition Mode" on page 211). 10.3.3 Remote Host Access The Remote Host Access page allows you to configure virtual media changers and tape drives on the ETERNUS CS800 to communicate with Fibre Channel hosts (initiators).

  • Page 221

    10.3 VTL Configuration Figure 156: Remote Host Mapping Page Tasks Use the Remote Host Mapping page to perform the following tasks: View information about existing host access groups (see "Remote Host Mapping And Groups" on page 221). Add a new host access group to a partition (see "Adding a Remote Host Access Group"...

  • Page 222

    10.3 VTL Configuration Adding a Remote Host Access Group Add a host access group to associate a VTL partition with a host (a Fibre Channel initiator on the SAN) and a target (a Fibre Channel port on the ETERNUS CS800). To add a host access group: 1.

  • Page 223

    SAN. The CCL is accessible to hosts only through LUN 0. CAUTION! If you are not sure if you should use CCL, contact Fujitsu Technology Solutions Customer Support before you enable this option. 4. Select the check boxes for the media changer and tape drives to add to the host access group.

  • Page 224

    SAN. The CCL is accessible to hosts only through LUN 0. CAUTION! If you are not sure if you should use CCL, contact Fujitsu Technology Solutions Customer Support before you enable this option. 3. Select the check boxes for the media changer and tape drives to add to the host access group.

  • Page 225

    10.3 VTL Configuration You must configure a host before you can assign it to a new host access group (see "Adding a Remote Host Access Group" on page 222). CAUTION! If you are connecting the ETERNUS CS800 directly to a host without using a Fibre Channel switch, you must know the WWPN connecting to each ETERNUS CS800 port.

  • Page 226

    10.3 VTL Configuration Targets Use the Targets page to view the current target (Fibre Channel) configuration. To access the Targets page, on the Host Access page, click the Targets tab (see "Targets Page" on page 226). Figure 160: Targets Page The Targets page displays the Target Port and WWPN for the currently configured targets.

  • Page 227: Ost Configuration

    10.4 OST Configuration Figure 161: Target Usage Page The Backpanel Locations section displays a graphical representation of the Fibre Channel and Ethernet ports as they appear on the rear of the system. A mapped (green) status indicates the host is currently logged on to one or more Fibre Channel target ports.

  • Page 228: Replicating Ost Data

    10.4 OST Configuration backup applications that support OST, such as Symantec NetBackup and Symantec Backup Exec. In addition, OST data can be duplicated (replicated) between ETERNUS CS800 systems using NetBackup (see "Replicating OST Data" on page 228). To authenticate OST devices on a media server, you must create OST user credentials. After you create the OST user credentials, enter them in the backup application to authenticate OST devices on the media server.

  • Page 229

    3. On the target system, create a storage server and LSU to receive the replicated OST data (see "Adding a Storage Server" on page 232). Fujitsu Technology Solutions recommends selecting the Available Capacity option when creating an LSU for use with Automatic Image Replication. ETERNUS CS800...

  • Page 230: Storage Servers

    10.4 OST Configuration 4. On the source system, specify the target system that will receive the replicated data. 5. On the source system, create a remote OST user with the same user name and password that you used in step 2 above (see "Manage Remote Users"...

  • Page 231

    10.4 OST Configuration Figure 163: Storage Servers Page Tasks Use the Storage Servers page to perform the following tasks: View information about existing storage servers (see "Storage Server List" on page 231). Add a new storage server to the system (see "Adding a Storage Server"...

  • Page 232

    10.4 OST Configuration LSUs The number of LSUs that have been added to the storage server. Max Connections The maximum number of connections allowed to the storage server. Active Connections The number of currently active connections to the storage server. Backup Images The number of backup images on the storage server.

  • Page 233

    10.4 OST Configuration Figure 164: Add Storage Server Page 2. Under Add Storage Server, enter information about the storage server: Name Enter the name of the storage server. CAUTION! Do not use an underscore ( _ ) in the name of the storage server.

  • Page 234

    Enter the maximum number of connections allowed to the storage server. To disable OST, enter 0 connections. To enable OST, enter 3 to 65536 connections. Fujitsu Technology Solutions recommends setting Max Connections to 300. Enable Concurrent Optimized Select the check box to enable optimized duplication Duplication during OST ingest.

  • Page 235

    LSU Name - Enter the name of the LSU. Physical Capacity - Enter the physical capacity of the LSU (1 to 1048576 GB). Fujitsu Technology Solutions recommends setting LSUs to maximum size (1048576 GB) because spanning them on a backup is not possible.

  • Page 236

    10.4 OST Configuration 7. If Automatic Image Replication is enabled, select the replication target you want to replicate images to. (You can select only a single target.) When images are replicated, data will be sent to the selected target. 8. If Automatic Image Replication is enabled, specify the following information: Remote Storage Server The name of the remote storage server (on the target Name...

  • Page 237

    The number of active connections is displayed on the OST page (see "Storage Server List" on page 231). Fujitsu Technology Solutions recommends setting Max Connections to 300. Enable Concurrent Optimized Select the check box to enable optimized duplication Duplication during OST ingest.

  • Page 238

    10.4 OST Configuration To delete a storage server: Select the storage server in the Storage Server List. You cannot delete a storage server if it has more than zero currently active connections. The number of active connections is displayed on the OST page (see "Storage Server List"...

  • Page 239

    10.4 OST Configuration Logical Storage Unit List The Logical Storage Unit List displays the following information for all LSUs on the ETERNUS CS800: OST Service The status of the OST service. OST settings can be configured in Ready, Stopped, or Verifying state. The OST server is available for backup only in Ready state.

  • Page 240

    10.4 OST Configuration 1. Click Add. The Add Logical Storage Unit page displays (see "Add Logical Storage Unit Page" on page 240). Figure 167: Add Logical Storage Unit Page ETERNUS CS800...

  • Page 241

    LSU Name - Enter the name of the LSU. Physical Capacity - Enter the physical capacity of the LSU (1 to 1048576 GB). Fujitsu Technology Solutions recommends setting LSUs to maximum size (1048576 GB) because spanning them on a backup is not possible.

  • Page 242

    10.4 OST Configuration You must configure at least one remote user before you can enable Automatic Image Replication (see "Manage Remote Users" on page 245). 5. If Automatic Image Replication is enabled, select the replication target you want to replicate images to. (You can select only a single target.) When images are replicated, data will be sent to the selected target.

  • Page 243

    10.4 OST Configuration Figure 168: Edit Logical Storage Unit Page 2. Enter information about the LSU: If you are editing an LSU, the Name option cannot be changed. Physical Capacity (Specific capacity LSUs only) Enter the physical capacity of the LSU (1 to 1048576 GB). The physical capacity cannot be changed if the LSU has more than zero currently active connections.

  • Page 244

    10.4 OST Configuration 4. If Automatic Image Replication is enabled, select the replication target you want to replicate images to. (You can select only a single target.) When images are replicated, data will be sent to the selected target. 5. If Automatic Image Replication is enabled, specify the following information: Remote Storage Server Name The name of the remote storage server (on the target ETERNUS CS800) to replicate data to.

  • Page 245: Manage Remote Users

    10.4 OST Configuration 10.4.4 Manage Remote Users The Manage Remote Users page allows you to create and manage remote users for use with OST Automatic Image Replication (AIR). You must configure at least one remote user before you can enable Automatic Image Replication for an LSU (see "Adding an LSU"...

  • Page 246

    10.4 OST Configuration Description A brief description of the remote user (if available). To update the list with the latest information, click Refresh. Adding a Remote User Add a remote user to create OST user credentials for use with OST AIR. When you enable Automatic Image Replication for an LSU, you specify a remote user.

  • Page 247: Target Ip Mapping

    10.4 OST Configuration Figure 171: Edit Remote Credentials 2. Enter information about the remote user: If you are editing a remote user, you cannot change the User name. New Password Enter the password for the remote user. Confirm New Password Enter the password again to confirm it.

  • Page 248

    ETERNUS CS800 and target ETERNUS CS800. Fujitsu Technology Solutions does not recommend mapping multiple data IP addresses to a single replication IP address. If you have mapped multiple data IP addresses and the routing is not working, try removing the additional data IP addresses, and map only a single data IP address.

  • Page 249

    10.4 OST Configuration Target IP Mapping List The Target IP Mapping list displays the following information for all mapped IP addresses: Target Data IP - The mapped target data IP address. Target Replication IP - The replication IP address to which the data IP address is mapped.

  • Page 250: Eternus Cs800 Accent

    You can select multiple mapped IP addresses to delete at once. 10.4.6 ETERNUS CS800 Accent Use the Accent page to enable or disable ETERNUS CS800 Accent. Fujitsu Technology Solutions’s ETERNUS CS800 Accent software accelerates backups and reduces network bandwidth requirements by distributing deduplication between the backup server and the ETERNUS CS800.

  • Page 251: Replication Configuration

    (see "Data Encryption" on page 327). To use ETERNUS CS800 Accent, you must install the Fujitsu Technology Solutions OST Client Plug-in on the media server. For information about installing the OST Plug-in and using ETERNUS CS800 Accent, see the ETERNUS CS800 NetBackup and Backup Exec OST Configuration Guide .

  • Page 252

    10.5 Replication Configuration Additional Information For more information about data replication, or to perform data replication, see "Replication" on page 340. If the ETERNUS CS800 is configured as a replication target and replication is performed across a public network, with the source and target located behind NAT-enabled routers, you must specify a NAT IP address for the ETERNUS CS800 on the Network page (see "Configuring Interface IP Addresses"...

  • Page 253

    10.5 Replication Configuration Target System List The Target list displays the following information for each target ETERNUS CS800: Target The IP address of the target system that the ETERNUS CS800 is configured to send data to. Status The replication status of the ETERNUS CS800. For a detailed description of all possible replication statuses, "Replication"...

  • Page 254

    10.5 Replication Configuration partition, replicated data is sent to the target system during scheduled or manual replication. Additional Information Before you can add a replication target, you must add the ETERNUS CS800 to the list of allowed replication sources on the target ETERNUS CS800 (see "Adding a Replication Source"...

  • Page 255

    10.5 Replication Configuration If the target system is at ETERNUS CS800 2.1 software or higher, the Source IP field is not required. If the target system is at ETERNUS CS800 2.0.1 software or below, then you must enter the IP address by which the target system recognizes the source system.

  • Page 256

    10.5 Replication Configuration CAUTION! For encryption, select None or 128-bit if you are sending data to a ETERNUS CS800 running a system software version prior to ETERNUS CS800 2.1.1 software. AES encryption options are available only if the Data-in-Flight license is installed.

  • Page 257

    10.5 Replication Configuration Deleting a Replication Target Delete a replication target if the ETERNUS CS800 no longer needs to send replicated data to that target. After the target system is deleted, the ETERNUS CS800 will no longer send replicated data to that system. When a target is deleted: All replication jobs to that target that are in progress or queued will transition to failed.

  • Page 258

    10.5 Replication Configuration 1. Under Target System, click the box next to Throttling. The Replication Throttle window displays (see "Replication Throttle" on page 258). Figure 179: Replication Throttle 2. Select the Enable system throttling check box, or clear the check box to disable system throttling.

  • Page 259

    ETERNUS CS800. This is because complete replication data is sent to the target before old data is deleted. For optimal performance, if the ETERNUS CS800 is a replication target, Fujitsu Technology Solutions recommends keeping the amount of free space at 20% or more (see "Disk Usage"...

  • Page 260: Ptt Configuration

    10.6 PTT Configuration Deleting a Replication Source Delete a system from the list of replication sources if it will no longer send replicated data to the ETERNUS CS800. After the source system is deleted, the ETERNUS CS800 will no longer accept replicated data from that system. To delete a replication source: 1.

  • Page 261: Physical Device Discovery

    10.6 PTT Configuration Additional Information Path to tape is available only on the ETERNUS CS800 Multi-Protocol configuration. For information about working with storage servers and LSUs, see "OST Configuration" on page 227. For detailed information about configuring and using OST path to tape, see the ETERNUS CS800 NetBackup and Backup Exec OST Configuration Guide .

  • Page 262: Scheduler

    10.7 Scheduler Physical Library and Tape Description Drive Information Last scan time The date and time a scan for attached libraries was last performed. Serial Number The serial number of the library or drive. Vendor The vendor of the library or drive. Product ID The product ID (name) of the library or drive.

  • Page 263

    10.7 Scheduler Figure 182: Scheduler Page Tasks Use the Scheduler page to perform the following tasks: View currently scheduled events (see "Viewing Scheduled Events" on page 263). Add a new scheduled event or edit an existing event (see "Adding or Editing a Scheduled Event"...

  • Page 264

    10.7 Scheduler To view scheduled replication events for NAS shares or VTL partitions, click the arrow next to the folder to display all shares or partitions. Use the following toolbar controls to adjust the schedule view (see "Scheduler Toolbar" on page 264): To show or hide all shares or partitions, click the plus [ + ] or minus [ - ] icons.

  • Page 265

    10.7 Scheduler You can also right-click an existing event to see options for editing an event. Figure 184: Adding a New Event 2. Define the start and, if applicable, the end of the event. Specify the Start Date and Start Time using the pop-up calendar and drop-down box.

  • Page 266

    10.7 Scheduler CAUTION! When adding multiple events of the same type, make sure the events do not overlap. If two events of the same type overlap, the later event takes precedence over the earlier event. After a system reboot, all open-ended events (for example, replication) will restart at their next scheduled time.

  • Page 267

    10.7 Scheduler certain times. For example, you might configure replication throttling to occur during planned backup times to avoid network contention. For more information about configuring the ETERNUS CS800 for replication, see "Replication" on page 340. To schedule replication throttling: 1.

  • Page 268

    10.7 Scheduler values for all slave devices in the bonded interface to calculate the overall outgoing traffic rate. The replication throttle bandwidth maximum is specified in KB/s or MB/s, so depending on the statistic or report you are observing, you may need to convert the bandwidth maximum to Kb/s or Mb/s in order to correctly compare it to the observed values.

  • Page 269

    10.7 Scheduler Scheduling Space Reclamation During space reclamation, the ETERNUS CS800 deletes unneeded tags from the blockpool to free up disk space. Schedule space reclamation regularly to make sure there is enough disk space to store data. CAUTION! Because space reclamation can affect system performance, avoid running space reclamation during known backup periods.

  • Page 270: Notifications

    10.8 Notifications Deleting a Scheduled Event To delete an event occurrence or event series. 1. On the Scheduler page, right-click an event. 2. On the pop-up menu, select an option: Delete this occurrence - Remove the selected occurrence in an event series from the schedule.

  • Page 271

    10.8 Notifications Recipients The Recipients page allows you to manage the e-mail recipients the ETERNUS CS800 sends notifications to. You can add, edit, and delete e-mail recipients, and you can specify the types of notifications to send. To enable the ETERNUS CS800 to send e-mail, you must specify an outgoing e- mail server (see "Email"...

  • Page 272

    10.8 Notifications Tasks Use the Recipients page to perform the following tasks: View information about e-mail recipients (see "Email Recipient List" on page 272). Add an e-mail recipient (see "Adding an E-mail Recipient" on page 272). Edit an e-mail recipient (see "Editing an E-mail Recipient"...

  • Page 273

    10.8 Notifications Name The name of the recipient. Email Address The e-mail address of the recipient. Notification Type Select the types of notifications to send to the recipient: Notification Type High - Send e-mail notifications for High service tickets. High service tickets indicate that a critical problem has occurred and needs to be resolved immediately.

  • Page 274

    10.8 Notifications 1. In the list of the recipients select the check box in front of the recipient you want to edit. 2. Click Edit. The Edit Email Recipient page displays (see "Edit Email Recipient Page" on page 274). Figure 187: Edit Email Recipient Page 3.

  • Page 275

    10.8 Notifications Notification Type Select the types of notifications to send to the recipient: Notification Type High - Send e-mail notifications for High service tickets. High service tickets indicate that a critical problem has occurred and needs to be resolved immediately.

  • Page 276

    3. (Optional) Select the Enable Admin Alerts about Email Server not configured check box to have system generate administration alerts to notify you if an e-mail server is not configured. 4. (Recommended) Select the Enable automatic emails to Fujitsu Technology Solutionscheck box to periodically send system configuration and status information ETERNUS CS800...

  • Page 277

    10.8 Notifications to Fujitsu Technology Solutions, including any software upgrades you have installed using the Software Upgrade Utility. Fujitsu Technology Solutions Support can use this information to provide a better support experience in the future. Automatic e-mails contain configuration and status information only, and do not contain any customer data stored on the system.

  • Page 278

    10.8 Notifications To enable the ETERNUS CS800 to send e-mail, you must specify an outgoing e- mail server (see "Server" on page 276). To access the Email Reports page, on the Email page, click the Email Reports tab. The Email Reports page contains the following tabs: "Recipients"...

  • Page 279: Snmp

    10.8 Notifications Figure 191: On Demand Page Tasks Use the On Demand page to perform the following tasks: Manually send a status data or configuration data report (see "Sending a Report" on page 279). View a configuration data report (see "Viewing Configuration Data"...

  • Page 280

    10.8 Notifications SNMP works by sending messages, called protocol data units (PDUs), to different parts of a network, or communities. SNMP compliant devices, called agents, store data about themselves in Management Information Bases (MIBs) and return this data to the SNMP requesters.

  • Page 281

    10.8 Notifications IP Address The IP address of the destination. Name The name of the destination. Selected Traps The traps the ETERNUS CS800 sends to the destination (Failure, Warning, Informational, Available, or Unavailable). Adding a Destination Add an SNMP destination to send traps from the ETERNUS CS800 to the destination. You can add up to 5 destinations.

  • Page 282

    10.8 Notifications IP Address Enter the IP address of the system that will receive the traps generated by the ETERNUS CS800. Additional Information When entering IP addresses, never use an address that is in a reserved IP address range. To see a list of reserved IP address ranges, click the quick tip icon [?] located near the IP address field.

  • Page 283

    10.8 Notifications Figure 194: Edit Trap Destination Page 2. Enter information about the destination: If you are editing a destination, you cannot change the IP Address. IP Address (Optional) Select a different destination to edit. Name Enter the name of the destination. 3.

  • Page 284

    10.8 Notifications Community The Community page allows you to manage SNMP community information for the ETERNUS CS800. You can add, edit, and delete communities, and you can specify the community access type. To access the Community page, on the SNMP page, click the Community tab (see "Community Page"...

  • Page 285

    10.8 Notifications Adding a Community Add an SNMP community to include the ETERNUS CS800 in a group of devices that are monitored by a common management station. If no communities are defined, the SNMP agent is not accessible. To add a community: 1.

  • Page 286

    10.8 Notifications IP Address / Network Mask Result 10.40.166.87 Invalid because the logical bitwise operation (address 10.40.166.0 AND mask) is not equal to the address 10.40.166.87 Invalid because the logical bitwise operation (address 255.255.0.0 AND mask) is not equal to the address 10.40.0.0 Allows access from any client...

  • Page 287

    10.8 Notifications Figure 197: Edit SNMP Community Page 2. (Optional) In the Name box, select a different community to edit. 3. Enter a valid IP Address and Network Mask pair. A pair is valid if performing a logical bitwise AND operation on the IP address and the network mask results in the IP address.

  • Page 288

    10.8 Notifications When entering IP addresses, never use an address that is in a reserved IP address range. To see a list of reserved IP address ranges, click the quick tip icon [?] located near the IP address field. 4. In the Access Type drop-down box, select the access type for the community: Allows SNMP get operations.

  • Page 289

    Registering the ETERNUS CS800 system with the Fujitsu Service Centre. AISConnect uses the HTTP protocol to connect via the Internet to the Fujitsu Support Centre. AISConnect allows to configure a HTTP proxy in order to connect from a corporate network to the Internet.

  • Page 290

    Field Description Server Enter the IP address of the HTTP proxy to be used to contact the AIS server at the Fujitsu Service Centre. Port Enter the port number of the HTTP proxy. Authentication Enabled Activate the checkbox if the HTTP proxy requires authentication.

  • Page 291

    291). Figure 201: AIS Remote Access Policies Remote access policies must be enabled for a Fujitsu support specialist to remotely connect to the system using SSH or HTTP. If remote access policies are disabled, remote connection using SSH or HTTP is not possible.

  • Page 292: System

    CS800 to diagnose a problem. Figure 202: AIS Smart Poll Page Activate Smart Poll only if you are instructed to do so by a Fujitsu support specialist. To activate Smart Poll: 1. From the AISConnect page, click the Smart Poll tab.

  • Page 293: Network

    10.9 System "Manage Users " on page 331 "FC Initiators and Targets" on page 335 "Client Plug-Ins" on page 334 10.9.1 Network The Network page allows you to view and change network configuration information for the ETERNUS CS800. The ETERNUS CS800 uses this information to connect to the network. Network configuration information is entered during initial setup ETERNUS CS800.

  • Page 294

    10.9 System Figure 203: Network Configuration Configuring the Network Using the Network page, each physical Ethernet port in the ETERNUS CS800 can be configured as a separate device. In addition, you can create bonded devices (logical ports) consisting of two or more physical ports of the same link speed (1GbE or 10GbE). For each port or device, you can specify the MTU (Maximum Transmission Unit) frame size.

  • Page 295

    10.9 System After you define devices (single port or bonded), you can create up to ten network interfaces for each device. Each interface has its own IP address information. In addition, you can configure the following options for each interface: Assign the interface to a VLAN (Virtual Local Area Network).

  • Page 296

    10.9 System When entering IP addresses, never use an address that is in a reserved IP address range. To see a list of reserved IP address ranges, click the quick tip icon [?] located near the IP address field. Hostname The hostname of the ETERNUS CS800.

  • Page 297

    10.9 System Configuring Bonding Details Under IP Address Configuration > Bonding Details, configure bonded devices (see "Network Page: Bonding Details" on page 297): Figure 205: Network Page: Bonding Details 1. If necessary, click the Show link to show the bonding details table. 2.

  • Page 298

    10.9 System Bonding Mode Description Round Robin (Mode 0) This option sends Ethernet frames using the bonded Ethernet ports with a valid MII link. Frames are sent in a round-robin fashion, starting with the first slave device and then the rest of the devices. This only applies to the traffic sent from the ETERNUS CS800.

  • Page 299

    10.9 System Figure 206: Network Page: Interface Details 1. If necessary, click the Show link to show the interface details table. 2. For each device, select the MTU (Maximum Transmission Unit) frame size in the Jumbo Frame MTU Size drop-down box. 1500 MTU (Default) The standard (STD) MTU frame size of 1,500 bytes is used.

  • Page 300

    10.9 System Figure 207: Network Page: IP Address Table 1. Click Add IP to add a network interface to a device. Or select an interface to edit the IP address, netmask, gateway and traffic type. (To select an interface, click the radio button next to the interface index name, for example, bond0:2.) A maximum of 10 IP addresses are allowed per device.

  • Page 301

    10.9 System ETERNUS CS800, and the ETERNUS CS800 is externally identified by the host IP. The following restrictions apply: You can designate only one external host IP for the network configuration. You must specify a traffic type of Mgmt (management) or Any for the external host IP interface.

  • Page 302

    10.9 System Additional Information If the ETERNUS CS800 is configured for source or target replication, you should configure at least one interface to allow replication traffic (select Repl or Any) before applying changes to network settings. If you configure segmentation for non-bonded interfaces (Ethernet ports) that are on the same subnet, all traffic will use the lowest numbered Ethernet port first, no matter how segmentation is configured.

  • Page 303

    10.9 System After selecting an interface in the IP Address Table, the Routing Details table below expands to display available routes (if any). A maximum of 8 routes per interface are allowed. 2. If necessary, click the Show link to show the routing details table. 3.

  • Page 304

    10.9 System Understanding Interface Routing For a network on the interface to communicate with a host located on a different subnet, you must specify routing information in the Routing Details section. Routing is used to direct outgoing traffic from a network interface on the ETERNUS CS800 to an IP address in another subnet by means of a destination gateway.

  • Page 305

    10.9 System Figure 209: Interface Routing: Example 1 Example 2: Segments and Target on the Same Subnet In the example below (see "Interface Routing: Example 2" on page 306), the ETERNUS CS800 has two segmented interfaces, one for data and management traffic, and one for replication traffic: The source ETERNUS CS800 management/data IP address, the source ETERNUS CS800 replication IP address, and the target ETERNUS CS800 IP address are all on the same...

  • Page 306

    10.9 System Figure 210: Interface Routing: Example 2 Example 3: Segments on the Same Subnet and Target on a Different Subnet In the example below (see "Interface Routing: Example 3" on page 306), the ETERNUS CS800 has two segmented interfaces, one for data and management traffic, and one for replication traffic: The source ETERNUS CS800 management/data IP address and the source ETERNUS CS800 replication IP address are on the same subnet (192.168.10.x).

  • Page 307

    10.9 System Backpanel Locations The Backpanel Locations section at the bottom of the Network page displays a graphical representation of the Ethernet ports as they appear on the rear of the system (see "Network" on page 293). The diagram indicates the current bonding configuration and connectivity status for all Ethernet ports.

  • Page 308: Security

    10.9 System To set the system date and time: 1. Select one of the following options: Option Description Network Time Protocol (NTP) (Recommended) Select this option to synchronize the Server ETERNUS CS800 with an NTP timeserver or pool. Then select or specify a timeserver or pool. Select a Timeserver Pool - (Recommended) Select one of the well-known, geographically- based NTP timeserver pools in the drop-down...

  • Page 309

    10.9 System "Local Access" on page 309 "LDAP/AD" on page 319 "SSL" on page 324 "Data Encryption" on page 327 "Login Session" on page 328 "Security Notice" on page 329 "Storage Encryption (Scale model only)" on page 329 Local Access The Local Access page allows you to change the account passwords for the remote management console (GUI) and the command line interface (CLI).

  • Page 310

    10.9 System Figure 213: Access Control Settings Page Tasks Use the Access Control Settings page to perform the following tasks: Change the administrator password (see "Changing GUI Administrator Password" on page 311). Enable or disable GUI access for the monitor account (see "Enabling GUI Monitor Account"...

  • Page 311

    Additional Information Passwords can be up to 32 characters. Alphanumeric characters and special characters are allowed. Loss of this password will require Fujitsu Technology Solutions service support. 2. Click Apply. Enabling GUI Monitor Account Use the GUI password when logging onto the remote management console as a monitor (see "Accessing Remote Management"...

  • Page 312

    10.9 System For more information about using the CLI, see the ETERNUS CS800 Command Line Interface (CLI) Guide. To enable or disable the CLI accounts: 1. Under CLI Administrator or CLI Viewer, do one of the following steps: Select the Enable CLI Administrator Login or Enable CLI View Login check box to enable the CLI administrator or viewer account.

  • Page 313

    10.9 System A public key length can be up to 16kb. Figure 215: Sample Public Key Page d. Click Apply. The "Successfully performed Security action" message appears. e. Click OK. The new key appears in the CLI Administrator or View Available SSH Public Keys table.

  • Page 314

    10.9 System Figure 217: Edit Public Key Page c. Edit the Alias name. The key cannot be modified. To remove a key, see "Delete an Alias Name" on page 314). d. Click Apply. The "Successfully performed Security action" message appears. e.

  • Page 315

    10.9 System d. Click OK. The key is removed in the Available SSH Public Keys table. 3. In addition to configuring SSH authentication, the CLI Administrator and view accounts may also be configured with password authentication. Select the Allow login with password check box to enable a password on a CLI Administrator or CLI Viewer account.

  • Page 316

    10.9 System characters are allowed. 3. Click Apply. Enabling SSH/CLI Service Account The SSH service account provides SSH remote access to the ETERNUS CS800 system. 1. Under SSH Service, do one of the following steps: Select the Enable SSH Service Login check box to enable SSH service Clear the Enable SSH Service Login check box to disable the SSH service account 2.

  • Page 317

    10.9 System Figure 220: Sample Public Key Page d. Click Apply. The "Successfully performed Security action" message appears. e. Click OK. The new key appears in the Available SSH Public Keys table. Figure 221: Available SSH Public Keys Table The Available SSH Public Keys table contains the following information: Alias Name of key.

  • Page 318

    10.9 System Figure 222: Edit Public Key Page c. Edit the Alias name. The key cannot be modified. To remove a key, see "Delete an Alias Name" on page 314). d. Click Apply. The "Successfully performed Security action" message appears. e.

  • Page 319

    10.9 System d. Click OK. The key is removed from the Available SSH Public Keys table. 3. In addition to configuring SSH authentication, the SSH service account may also be configured with password authentication. Select the Allow login with password check box to enable a password on CLI service account Clear the Allow login with password check box to disable a password on CLI service account...

  • Page 320

    10.9 System CAUTION! The following local accounts are defined at the ETERNUS CS800 and should therefore not be defined in LDAP/AD too: admin monitor servicegui ServiceLogin cliviewer cliadmin Having such a local account name also defined in LDAP/AD could result in unpredictable behavior and security issues like the assignment of a wrong user role.

  • Page 321

    10.9 System A pathway that tells LDAP where information is stored in its directory. LDAP reads the pathway from right to left, with the farthest right components providing the domain of the directory and the farthest left component providing the information for which LDAP is looking.

  • Page 322

    10.9 System StartTLS/LDAPS Select one of the following: Start TLS - Select to encrypt the connections to the LDAP/AD server. This enables a secure connection over a standard port. Do not enable Start TLS to encrypt connections if the server URL uses a secure protocol (LDAPS).

  • Page 323

    10.9 System Monitor Group Enter a distinguished name or common name for the users which should get the monitor role on the system. Example - cn=user,ou=Group,dc=mycompany,dc=com Admin Group Enter a distinguished name or common name for the users which should get the monitor role on the system.

  • Page 324

    3. Click Test. The SSL page allows you to enable or disable SSL on the ETERNUS CS800. You can also install a new SSL certificate to replace the Fujitsu Technology Solutions default SSL certificate. To access the SSL page, on the Security page, click the SSL tab (see "SSL Page"...

  • Page 325

    Certification Authority in the form of a certificate file, private key file, and pass phrase. After you install these components, you can establish a secure connection using the SSL protocol. The ETERNUS CS800 comes with a Fujitsu Technology Solutions default SSL certificate.

  • Page 326

    Internet Explorer - If a dialog box displays warning you of a possible certificate error, add the IP address for the Fujitsu Technology Solutions to the Trusted Sites list (Tools > Internet Options > Security > Trusted Sites). If subsequent warning pages display along with an option to close your Web browser or continue to the Web site, click Continue.

  • Page 327

    10.9 System 4. Type your SSL private key and press <Enter>. 5. Type your SSL passphrase and press <Enter>. A Successful Upload page displays stating that the SSL certificate file has been installed on the system. 6. Click OK. The certificate displays in the Certificate section. Data Encryption The Data Encryption page allows you to select the type of encryption to use for OST data transfers.

  • Page 328

    10.9 System 1. Select an option in the Encryption drop-down box: None OST data is not encrypted. Default AES 128 OST data is encrypted using AES 128-bit encryption. Default AES 256 OST data is encrypted using AES 256-bit encryption. TLS with AES 256 OST data is encrypted using AES 256-bit encryption with Transport Layer Security (TLS).

  • Page 329

    10.9 System Figure 232: Login Session Page To specify the inactivity timeout: 1. In the Inactivity Timeout box, enter the number of minutes of inactivity before a user is automatically logged off (1–60 minutes). 2. Click Apply. Security Notice The Security Notice page allows you to specify a message that will appear to all users when logging on to the remote management console or the CLI (command line interface).

  • Page 330

    Enable Storage Encryption To enable the Storage Encryption: 1. Select a encryption type "AES" or "Fujitsu" from the pull down list AES: Advanced Encryption Standard (AES: Standard encryption used for information processing by the US federal government)" is a standardized encryption method.

  • Page 331: Manage Users

    10.9 System CAUTION! Once encrypted, data on the storage array cannot be changed to non-encrypted data. Monitor Initial Encryption During initial encryption an "Initial Encryption" progress bar is displayed, which informs about the percentage of data already encrypted. 10.9.4 Manage Users The Manage Users page allows you to create and manage local authenticated users for use with the OpenStorage (OST), Oracle Recovery Manager (RMAN), and path to tape (PTT) capabilities.

  • Page 332

    10.9 System To access the Manage Users page, on the System page, click the Manage Users tab (see "Manage Users Page" on page 332). Figure 235: Manage Users Page Tasks Use the Manage Users page to perform the following tasks: View information about local authenticated users (see "Manage Authenticated Users List"...

  • Page 333

    10.9 System Adding an Authenticated User Add an authenticated user to create local user credentials. The user credentials are required to authenticate devices on a media server. User credentials are also required to enable the ETERNUS CS800 to receive duplicated data using OST AIR. To add an authenticated user: 1.

  • Page 334: Client Plug-ins

    To delete an authenticated user, select the user and click Delete. You can select multiple users to delete at once. 10.9.5 Client Plug-Ins Use the Client Plug-In page to download the Fujitsu Technology Solutions the following client plug-ins: OST (OpenStorage) RMAN (Oracle Recovery Manager) Running an RMAN and OST Plug-in on the same client is not supported.

  • Page 335: Fc Initiators And Targets

    10.9 System Oracle Recovery Manager (RMAN) Recovery Manager (RMAN) is an Oracle utility that can back up, restore, and recover database files. Using RMAN, an Oracle database server can manage RMAN share backups through the ETERNUS CS800 and can take advantage of the system's capabilities, such as data deduplication and replication.

  • Page 336

    10.9 System Figure 239: FC Initiators and Targets Page Use the FC Initiators & Targets page to perform the following tasks: View information about initiator and target Fibre Channel ports (see "Fibre Channel Initiators and Targets List" on page 336). Change the mode of a Fibre Channel port (see "Editing the Fibre Channel Port Type"...

  • Page 337: Contacts

    10.10 Contacts 1. Select the port in the list and click Edit. 2. Select the new port mode (Initiator or Target) in the drop-down box (see Figure "FC Initiators and Targets Page" on page 336). 3. Click Update. 10.10 Contacts The Contacts page allows you to enter company information.

  • Page 338: Primary And Secondary

    10.10 Contacts 1. Enter the following information: Company Name Enter the company name. Street Enter the company street address. City Enter the company city. State Enter the company state. Postal Code Enter the company postal code. Country Enter the company country. ETERNUS CS800 Location Enter the physical location of the ETERNUS CS800 (for example, data center).

  • Page 339

    10.10 Contacts 1. Enter the following information: Name Enter the contact name. Email Address (Required) Enter the contact e-mail address. Phone Enter the contact phone number. Enter the contact fax number. Pager Enter the contact pager number. Street Enter the contact street address. City Enter the contact city.

  • Page 340

    Additional Information Fujitsu Technology Solutions recommends that you configure and start replication before storing large amounts of data on the ETERNUS CS800. An ETERNUS CS800 can only replicate data to a ETERNUS CS800 that supports the same protocol as the ETERNUS CS800 (NAS or VTL).

  • Page 341

    11.1 ETERNUS CS800 Replication Overview To schedule replication for a share or partition, use the Configuration > Scheduler page (see "Scheduling a Share or Partition for Replication" on page 266). To limit the amount of network bandwidth used for replication, enable a constant throttle (see "Enabling System Throttling"...

  • Page 342

    11.1 ETERNUS CS800 Replication Overview CAUTION! A saved snapshot is necessary to recover your data at a later time. For this reason, it is not enough to simply enable replication for a share or partition. You must also configure a replication schedule (recommended) or perform manual replication on a regular basis to send snapshots of the share or partition to the target system.

  • Page 343

    11.1 ETERNUS CS800 Replication Overview contents of the source share or partition are exactly the same as the target share or partition. CAUTION! Cartridge barcodes for all source systems that are replicating to the same target must be unique. If you delete a share configured for Directory/File Based Replication on the source ETERNUS CS800, the share is not automatically deleted on the target ETERNUS CS800.

  • Page 344

    11.1 ETERNUS CS800 Replication Overview Performing Data Replication The Replication page allows you to set up replication for NAS shares or VTL partitions and to replicate and recover data. To access the Replication page, click the Replication menu. The Replication page contains the following tabs: "Replication Send"...

  • Page 345

    (see "Replicating a Share or Partition" on page 353 Fujitsu Technology Solutions recommends that you always replicate a new share or partition immediately after creating it. This establishes the initial data structure on the target system and greatly increases the speed of the first replication.

  • Page 346

    11.1 ETERNUS CS800 Replication Overview 2. Perform the following steps on the source system: a. Specify the target system that will receive replicated data (see "Adding a Replication Target" on page 253). b. Create a new share or partition with deduplication enabled (see "Adding a NAS Share"...

  • Page 347: Replication Send

    11.2 Replication Send Replication" on page 344). In this scenario, the original source system is now the target, and the original target system is now the source. Task Overview: Performing a Share or Partition Failback If a NAS share or VTL partition is lost or damaged on the source system, you can failback the share or partition to the source system using a received snapshot on the target system.

  • Page 348

    11.2 Replication Send Figure 242: Replication Send Page Tasks Use the Replication Send page to perform the following tasks: View replication information for shares or partitions (see "Replication Jobs List" on page 348). Enable or disable replication for a share or partition(see "Enabling Replication For a Share or Partition"...

  • Page 349

    11.2 Replication Send For information about creating NAS shares or VTL partitions,(see "Adding a NAS Share" on page 190 "Adding a VTL Partition" on page 206). The Replication Jobs list displays the following information: Click the arrow next to Shares or Partitions to display all shares or partitions in the list.

  • Page 350

    11.2 Replication Send Click the top banner row of the list to collapse or expand the list. Click the arrow to the right of a column heading and select Sort Ascending or Sort Descending to sort the rows in the table by that column. To show or hide a column, click the arrow to the right of a column heading, and then click Columns.

  • Page 351

    (You must select at least one target.) When the share or partition is replicated, its data will be sent to all selected targets. 5. Click Apply. Fujitsu Technology Solutions recommends scheduling replication to run after backups are complete (see "Scheduling a Share or Partition For Replication" on page 356).

  • Page 352

    11.2 Replication Send Directory/File or Cartridge Based Replication if you do not want to automatically replicate files or cartridges. When you configure a share or partition for Directory/File or Cartridge Based Replication, you must specify a Sync ID. The Sync ID associates the share or partition on the source system with the share or partition on the target systems that will received the replicated data.

  • Page 353

    11.2 Replication Send 5. Enter a Sync ID in the box. The Sync ID is used to identify the target share or partition that will receive replicated data from the source share or partition. The Sync IDmust be identical to the Sync ID of the target share or partition on the target system.

  • Page 354

    11.2 Replication Send Synchronizing a Share or Partition Synchronize a NAS share or VTL partition to synchronize its contents with the corresponding share or partition on the target systems. To synchronize a share or partition, it must be configured for Directory/File or Cartridge Based Replication (see "Configuring Directory/File or Cartridge Based Replication"...

  • Page 355

    11.2 Replication Send The status of the synchronization job displays in the Job Status column. To cancel the synchronization job, select the share or partition and click Abort. Directory/File or Cartridge Based Replication Queue The Directory/File or Cartridge Based Replication displays replication statistics for shares or partitions that are configured for Directory/File or Cartridge Based Replication (see "Configuring Directory/File or Cartridge Based Replication"...

  • Page 356: Receive Nas

    Scheduling a Share or Partition For Replication When a share or partition is enabled for replication, it is important to regularly replicate the share or partition to the target systems. Fujitsu Technology Solutions recommends scheduling replication to run after backups are complete.

  • Page 357

    11.3 Receive NAS unavailable. Once the source system becomes available, you can failback the share to make it available on the source system again. Before you can receive replicated shares, you must specify one or more replication sources (see "Adding a Replication Target" on page 253).

  • Page 358

    11.3 Receive NAS View information about received snapshots (see "Snapshots List" on page 358). Recover a partition on the target system (see "Recovering a Share" on page 358). Failback a partition to the source system (see "Performing a Failback For a Share" on page 359).

  • Page 359

    11.3 Receive NAS To recover a share: 1. On the target system, select a snapshot in the Snapshots List and click Recover. The Recovered Share Name page displays (see "Recovered Share Name Page" on page 359). Figure 248: Recovered Share Name Page 2.

  • Page 360

    11.3 Receive NAS 1. To perform a share failback: On the target system, select a snapshot in the Snapshots List and click Failback. The Failback Target page displays (see "Failback Target Page" on page 360). Figure 249: Failback Target Page 2.

  • Page 361

    11.3 Receive NAS 6. (Optional) In the Recovered Partition Name box, type a new name for the recovered share. (The default name is the original share name.) 7. Click Apply. The share is recovered on the source system. All data stored on the share at the time the snapshot was saved is available.The original export protocol of the share (NFS or CIFS/SMB) is retained in the recovery process.

  • Page 362

    11.3 Receive NAS Figure 250: Recovery Jobs Page The Snapshot Recovery Jobs section displays the following information about recovery jobs: Original Share Name The name of the share the snapshot was created from. New Share Name The name of the share the snapshot was recovered to. Source System The hostname of the system that the snapshot was received from.

  • Page 363

    11.3 Receive NAS Figure 251: Failback Jobs Page The Snapshot Failback Jobs section displays the following information about failback jobs: Share Name The name of the share the snapshot was created from. Destination System The hostname of the system that the snapshot was sent Started The time the failback job was started.

  • Page 364

    11.3 Receive NAS Figure 252: Directory/File Based Page Tasks Use the Directory/File Based page to perform the following tasks: View shares eligible to receive Directory/File Based data (see "Shares Eligible to Receive Directory/File Based Data" on page 364) Configure a share to receive Directory/File Based data (see "Configuring a Target Share for Directory/File Based Replication"...

  • Page 365

    11.3 Receive NAS Access The selected access option for the share (Locked or Unlocked). Click the Information button next to a partition to display detailed information about the share and recent replication activity. Configuring a Target Share for Directory/File Based Replication Configuring a NAS share for Directory/File Based Replication enables the automatic replication of files and directories on the source partition to the target share.

  • Page 366

    11.3 Receive NAS The Sync ID is used to identify the source share that will send replicated data to the target partition. The Sync ID must be identical to the Sync ID of the source share on the source system. 4.

  • Page 367: Receive Vtl

    11.4 Receive VTL 11.4 Receive VTL The Receive VTL page allows you to manage incoming replication activity for VTL partitions. You can recover a replicated partition on the target system if the source system is unavailable. Once the source system becomes available, you can failback the partition to make it available on the source system again.

  • Page 368

    11.4 Receive VTL Figure 255: Received Snapshots Page Tasks Use the Received Snapshots page to perform the following tasks: View information about received snapshots (see "Snapshots List" on page 368). Recover a partition on the target system (see "Recovering a Partition" on page 369).

  • Page 369

    11.4 Receive VTL Started The time the most recent replication job was started. Finished The time the most recent replication job finished. Status The status of the most recent replication job (see "Replication and Synchronization Status" on page 350). Click the status to display detailed information about the most recent replication job.

  • Page 370

    11.4 Receive VTL The partition and its cartridges are recovered on the target system. All data stored on the partition at the time the snapshot was saved is available. After recovering the partition, you must add tape drives to the partition. The tape drive type must be identical to the original partition so that the media is compatible.

  • Page 371

    11.4 Receive VTL Figure 257: Failback Target Page 2. (Optional) In the Failback Destination System box, type the hostname or IP address of a new destination system to failback the partition to. (The default destination is the original source system.) To use hostname format, you must specify at least one DNS IP address on the Network page (see "Network"...

  • Page 372

    11.4 Receive VTL After recovering the partition, you must add tape drives and a robot to the partition, and you must map the devices before the VTL partition is accessible. If the partition contains media, you will only be able to select the highest capacity tape drive for that media type.

  • Page 373

    11.4 Receive VTL To access the Recovery Jobs page, on the Receive VTL page, click the Recovery Jobs tab (see "Recovery Jobs Page" on page 373). Figure 258: Recovery Jobs Page The Snapshot Recovery Jobs section displays the following information about recovery jobs: Original Partition Name The name of the partition the snapshot was created from.

  • Page 374

    11.4 Receive VTL Figure 259: Failback Jobs Page The Snapshot Failback Jobs section displays the following information about failback jobs: Partition Name The name of the partition the snapshot was created from. Destination System The hostname of the system that the snapshot was sent Started The time the failback job was started.

  • Page 375

    11.4 Receive VTL Figure 260: Cartridge Based Page Tasks Use the Cartridge Based page to perform the following tasks: View partitions eligible to receive Cartridge Based data (see "Partitions Eligible to Receive Cartridge Based Data" on page 375) Configure a partition to receive Cartridge Based Replication data (see "Configuring a Target Partition for Cartridge Based Replication"...

  • Page 376

    11.4 Receive VTL Click the Information button [i] next to a partition to display detailed information about the partition and recent replication activity. Configuring a Target Partition for Cartridge Based Replication Configuring a VTL partition for Cartridge Based Replication enables the automatic replication of cartridges on the source partition to the target partition.

  • Page 377: Actions

    11.5 Actions Locked - The partition is not allowed to receive new Cartridge Based Replication data. Unlocked - The partition is allowed to receive new Cartridge Based Replication data. If a partition configured for Cartridge Based Replication is locked on the target system, synchronization jobs may fail on the source system.

  • Page 378

    11.5 Actions Figure 263: Actions Page Tasks Use the Actions page to perform the following tasks: Pause or resume the replication service (see "Replication Service" on page 378). Enable or disable the replication state (see "Replication State" on page 379). Clear cumulative replication statistics (see "Replication Performance"...

  • Page 379

    11.5 Actions If you pause a replication job that is in process, a Failure event is logged in the replication report (see "Reports" on page 380). Click Resume next to a target to resume all incoming and outgoing replication and failback traffic to that target.

  • Page 380: Reports

    11.6 Reports 11.6 Reports The Reports page allows you to generate and download a replication report. The report includes detailed information about all replication activity, including Directory/File or Cartridge Based Replication. To access the Reports page, click the Replication menu, and then click the Reports tab (see "Reports Page"...

  • Page 381: Status

    Status This chapter contains the following topics: "ETERNUS CS800 Overview" on page 381 "Hardware" on page 381 "Performance" on page 387 "Disk Usage" on page 393 "VTL Status" on page 396 "Accent Status " on page 400 "OST Status" on page 402 "Activity Log"...

  • Page 382

    12.2 Hardware information for components such as the system board, host bus adapters, network ports, and storage arrays. To access the Hardware page, click the Status menu, and then click the Hardware tab. The Hardware page contains the following tabs: "Summary"...

  • Page 383

    12.2 Hardware Component Name The name of the main component. Click the component name to see detailed information (see "Details" on page 383). Component Status The overall status of the main component. Details The Details page allows you to view detailed information about the hardware components of the ETERNUS CS800.

  • Page 384

    12.2 Hardware Value The value reported by the sensor or component. Status The status of the component. Normal - (Green) The component is operating correctly. Attention - (Yellow) There is a problem with the component. Failed - (Red) The component has failed. Host Bus Adapters The Host Bus Adapters page allows you to view information about installed Fibre Channel cards and their ports.

  • Page 385

    12.2 Hardware Status The status of the Fibre Channel card. Normal - (Green) The component is operating correctly. Attention - (Yellow) There is a problem with the component. Failed - (Red) The component has failed. The Fibre Channel Controller section displays the following information about the ports in the selected Fibre Channel or SAS controller: Component The number of the Fibre Channel port.

  • Page 386

    12.2 Hardware Value The speed of the port in Mb/s Status The status of the Ethernet port. Up - (Green) The port is connected. Down - (Green) The port is not connected. Storage Arrays The Storage Arrays page allows you to view information about storage arrays and controllers in the ETERNUS CS800.

  • Page 387: Performance

    12.3 Performance Status The status of the storage array. Normal - (Green) The component is operating correctly. Attention - (Yellow) There is a problem with the component. Failed - (Red) The component has failed. The Components section displays the following information about the components in the selected storage array: Component The name of the component.

  • Page 388

    12.3 Performance To access the Performance page, click the Status menu, and then click the Performance tab. The Performance page contains the following tabs: "Inline" on page 388 "Ethernet" on page 389 "RAID" on page 390 "Fibre Channel" on page 391 "CPU"...

  • Page 389

    12.3 Performance Ethernet The Ethernet page allows you to view throughput performance for network send and receive activity. To access the Ethernet page, on the Performance page, click the Ethernet tab (see "Ethernet Page" on page 389). Figure 271: Ethernet Page Use the Ethernet page to display recent network activity in dynamic graphs: The top graph reports data received and the bottom graph reports data sent.

  • Page 390

    12.3 Performance The vertical axis displays data throughput (0–125 MB/s for 1 GbE ports or 0–1.25 GB/s for 10 GbE ports). Values that exceed the maximum value of the vertical axis are shown in lighter green. Each bar on the graph represents approximately 1 second of time. Hold the cursor over a bar to display the value of the bar.

  • Page 391

    12.3 Performance The vertical axis displays the amount of data read or written (100 OPS/s). Values that exceed the maximum value of the vertical axis are shown in lighter green. Each bar on the graph represents approximately 1 second of time. Hold the cursor over a bar to display the value of the bar.

  • Page 392

    12.3 Performance Figure 273: Fibre Channel Page Use the Fibre Channel page to display recent fibre channel activity in dynamic graphs: The top graph reports data received and the bottom graph reports data sent. Select the port to monitor in the Fibre Channel drop-down box, or select Avg to display an average of all ports.

  • Page 393

    12.4 Disk Usage To access the CPU page, on the Performance page, click the CPU tab (see "CPU Page" on page 393). Figure 274: CPU Page Use the CPU page to display recent CPU usage in a dynamic graph: Select the CPU core to monitor in the CPU drop-down box, or select Avg to display an average of all CPUs.

  • Page 394

    The disk space that is occupied by outdated deduplicated data and which will be automatically reused if additional space for new deduplicated data is needed. For optimal system performance, Fujitsu Technology Solutions recommends keeping the amount of Available disk space at 20% or more. ETERNUS CS800...

  • Page 395

    12.4 Disk Usage Used Used space is the area that already holds data. The Used value is displayed as an amount and as a percentage of the total capacity in the system. Used space is divided into the following categories: Category Description Deduplicated Data...

  • Page 396: Vtl Status

    12.5 VTL Status Category Description Deduplicated Partitions (ETERNUS CS800 VTL and Multi-Protocol configurations only) The amount of data stored in deduplicated partitions. This includes incoming data from Cartridge Based Replication, and incoming data from Failback replication. OST Storage Servers (ETERNUS CS800 NAS and Multi-Protocol configurations only) The amount of data stored in deduplicated OpenStorage (OST) storage servers.

  • Page 397

    12.5 VTL Status Physical View The Physical View page allows you to view a physical representation of the virtual components in a VTL. You can view information about virtual tapes drives, storage slots, and cartridges. To access the Physical View page, on the VTL Status page, click the Physical View tab (see "Physical View Page"...

  • Page 398

    12.5 VTL Status If a cartridge is mounted in the tape drive, the barcode of the cartridge displays beneath the drive. Click a tape drive to view detailed information about the drive. Storage and I/E Slots The Storage Slots and I/E Slots sections displays information about the virtual cartridges located in the storage and I/E slots: The following information is displayed for each cartridge: Slot...

  • Page 399

    12.5 VTL Status Figure 277: Logical View Page The Partitions section displays the following information about VTL partitions: Partition The name of the partition. Number of Drives The number of virtual tape drives in the partition. Capacity The storage capacity of the partition. Used The amount of space on all cartridges in the partition currently used to store data.

  • Page 400: Accent Status

    12.6 Accent Status To access the Performance View page, on the VTL Status page, click the Performance View tab (see "Performance View Page" on page 400). Figure 278: Performance View Page The Partition Throughput section displays the following information about VTL partitions: Partition The name of the partition.

  • Page 401

    12.6 Accent Status To access the Accent Status page, click the Status menu, and then click the Accent tab (see "Accent Status Page" on page 401). Figure 279: Accent Status Page Combined statistics for all media servers display at the top of each section (NAS Application Specific and Accent).

  • Page 402: Ost Status

    12.7 OST Status Inline The inline data flow throughput (in MB/s). Inline data flow represents the original, native size of the data protected by the ETERNUS CS800. Ethernet In The amount of data received by all Ethernet ports (in MB/s). This amount represents the reduced size of the data protected by the ETERNUS CS800 (after deduplication and compression on the media server).

  • Page 403

    12.7 OST Status Figure 280: OST Status Page Combined statistics for all media servers display at the top of each section (Optimized Duplication and Accent): Inline The inline data flow throughput (in MB/s). Inline data flow represents the original, native size of the data protected by the ETERNUS CS800.

  • Page 404: Activity Log

    12.8 Activity Log Ethernet In The amount of data received by all Ethernet ports (in MB/s). This amount represents the reduced size of the data protected by the ETERNUS CS800 (after deduplication and compression on the media server). Bandwidth Reduction The percentage by which network bandwidth utilization was reduced by using optimized duplication or enabling Accent.

  • Page 405

    12.8 Activity Log View information about activities that have been recorded in the log (see "Viewing Logged Activities" on page 405). Enable or disable the recording of activities in the log (see "Enabling or Disabling Activity Logging" on page 406). Delete one or more activities from the log (see "Deleting Logged Activities"...

  • Page 406

    12.8 Activity Log Figure 282: Activity Log View Controls Enabling or Disabling Activity Logging By default, activity logging is enabled on the ETERNUS CS800. Use the toolbar above the Administrative Activity Log list to enable or disable activity logging (see "Activity Log View Controls"...

  • Page 407: Alerts

    Alerts This chapter contains the following topics: "ETERNUS CS800 Alerts Overview" on page 407 "Admin Alerts" on page 407 "Service Tickets" on page 408 13.1 ETERNUS CS800 Alerts Overview The Alerts page allows you to view and work with administration alerts and service tickets.

  • Page 408: Service Tickets

    13.3 Service Tickets Figure 284: Admin Alerts Page The Admin Alerts page displays the following information about administration alerts: Alert The name of the administration alert. Library The library or partition where the admin alert was generated. Last Update The date when the administration alert was last updated by the system.

  • Page 409

    Perform the recommended actions to try to resolve the problem before contacting Fujitsu Technology Solutions customer support. If you are able to resolve the problem, you can close the service ticket.

  • Page 410

    13.3 Service Tickets Figure 285: Service Tickets Page The Service Tickets page displays the following information about open service tickets: Ticket The service ticket number. Request ID The Request ID of the ticket. State The current status of the service ticket (Open or Closed). Priority The priority level of the service ticket (Low, Middle, or High).

  • Page 411

    13.3 Service Tickets Viewing a Service Ticket View a service ticket to see detailed information about the problem that caused the system to generate the ticket and to view recommended actions. To view a service ticket: 1. In the list of service tickets, click the ticket number. The Ticket Details section at the bottom of the page displays information about the service ticket, including the time the ticket was opened and closed, the ticket status, and detailed information about the problem (see...

  • Page 412

    Modifying a Service Ticket Modify a service ticket to add additional information to the ticket, for example, troubleshooting steps you have taken or a record of calls made to Fujitsu Technology Solutions customer support. The additional information is saved with the service ticket and remains associated with the ticket even after it is closed.

  • Page 413

    13.3 Service Tickets 3. In the Analysis Information box, enter all relevant information about actions taken to resolve the issue. 4. Click Apply. Sending a Service Ticket Send a service ticket to send the ticket details to an e-mail address. You can also add optional comments to the e-mail.

  • Page 414

    13.3 Service Tickets You can still view and modify a ticket after it has been closed. To close all service tickets that are currently open, below the list of service tickets, click Close All. To close a single service ticket: 1.

  • Page 415: Utilities

    Utilities This chapter contains the following topics: "ETERNUS CS800 Utilities Overview" on page 415 "Diagnostics" on page 415 "Analyzer" on page 420 "Space Reclamation" on page 423 "Secure Shred" on page 425 "Software Upgrades" on page 427 "Reboot & Shutdown" on page 430 14.1 ETERNUS CS800 Utilities Overview The Utilities pages to perform maintenance tasks on the ETERNUS CS800, such as generating and downloading diagnostic files, analyzing disk and network performance,...

  • Page 416

    14.2 Diagnostics The diagnostic files are helpful when troubleshooting problems on the ETERNUS CS800. Generate and download the diagnostic files before contacting Fujitsu Technology Solutions customer support. To access the Diagnostics page, click the Utilities menu, and then click the Diagnostics tab.

  • Page 417

    14.2 Diagnostics To access the Storage Array Diag File page, on the Diagnostics page, click the Storage Array Diag File tab (see "Storage Array Diag File Page" on page 417). Figure 291: Storage Array Diag File Page To generate and download a system diagnostics file: 1.

  • Page 418

    14.2 Diagnostics To access the General page, on the Healthchecks page, click the General tab (see "General Page" on page 418). Figure 292: General Page The General page displays the following information about the most recently run healthchecks: Status The status of the healthchecks (In Progress, Success, Failed, or Interrupted).

  • Page 419

    Status The status of the healthcheck (Success or Failed). If running a healthcheck results in the Contact Support status, contact Fujitsu Technology Solutions Customer Support for further assistance. To enable or disable a healthcheck: 1. Select the healthcheck and click Edit.

  • Page 420: Analyzer

    CAUTION! If a healthcheck fails when it is run, there may be a problem in the blockpool that could cause replication or restore operations to fail. Contact Fujitsu Technology Solutions customer support if a healthcheck fails. 14.3 Analyzer The Analyzer page allows you to analyze the network and disk performance of the ETERNUS CS800.

  • Page 421

    14.3 Analyzer Figure 295: Performance Page To perform network analysis: 1. In the Target IP Address box, enter the IP address of the system to perform network analysis with. The target system must have NetServer enabled (see "Settings" on page 421).

  • Page 422

    14.3 Analyzer Figure 296: Settings Page To enable or disable NetServer on the target ETERNUS CS800: 1. Select Enable NetServer to enable NetServer. Or select Disable NetServer to disable NetServer. 2. Click Apply. You should disable NetServer on the target system when you are done analyzing network performance.

  • Page 423

    174). CAUTION! For correct system operation, space reclamation must be run at regular intervals (at least once a week). Fujitsu Technology Solutions recommends creating a schedule to automatically run space reclamation (see "Scheduling Space Reclamation" on page 269). Because space reclamation can affect system performance, avoid running space reclamation during known backup periods.

  • Page 424

    14.4 Space Reclamation Low Space or Legacy Mode When disk capacity is low, space reclamation is automatically started to free up disk space. In this case, all four stages of space reclamation are run. To access the Space Reclamation page, click the Utilities menu, and then click the Space Reclamation tab (see "Space Reclamation Page"...

  • Page 425: Secure Shred

    14.5 Secure Shred To start space reclamation, click Start. To stop space reclamation, click Stop. To update the display while space reclamation is running, click Refresh. Space Reclamation Status Space reclamation can have one of the following statuses: Status Description Reclamation Completed Space reclamation completed without errors.

  • Page 426

    14.5 Secure Shred necessary, you can cancel secure shred at any time and return the ETERNUS CS800 to normal operation. CAUTION! The secure shred process can take multiple days to complete. To access the Secure Shred page, click the Utilities menu, and then click the Secure Shred tab (see "Secure Shred Page"...

  • Page 427: Software Upgrades

    14.6 Software Upgrades The Secure File Shred Log displays details about the secure shred progress. Click Hide to hide the log. To cancel the secure shred process, click Cancel. The ETERNUS CS800 reboots and resumes normal operation. When the secure shred process is complete, the Reboot button displays. You must log on as an Admin user to cancel secure shred or reboot the system.

  • Page 428

    14.6 Software Upgrades Before you begin, download the software image on a computer connected to the Internet, and then copy the software image (.fw) file to the computer you will use to access the ETERNUS CS800 remote management console. To access the Software Upgrade page, click the Utilities menu, and then click the Software Upgrade tab (see figure below).

  • Page 429

    14.6 Software Upgrades Figure 302: Software Upgrade Utility - Software Image Uploaded 6. Read and follow the instructions in each of the pre-flight checks. The pre-flight checks can differ depending on the type of upgrade, but typical checks include the following: Delete all outstanding administration alerts (see "Admin Alerts"...

  • Page 430: Reboot & Shutdown

    14.7 Reboot & Shutdown If you decide not to install the software upgrade after uploading it, click Remove to remove the current upload from the ETERNUS CS800. Clear Your Web Browser Cache It is important to clear your Web browser cache before logging on to the remote management console for the first time following the software upgrade.

  • Page 431

    14.7 Reboot & Shutdown 3. Close the browser window. Shutting down the system can take up to 15 minutes. Only the node will completely shut down. When rebooting, the system can take approximately 30 minutes to start up, depending on the amount of installed storage capacity. ETERNUS CS800...

  • Page 432: Troubleshooting

    Troubleshooting This chapter describes the status and problem reporting features of the ETERNUS CS800 as well as problems you might encounter during setup and operation of the system. Corrective information is provided to help you resolve these problems. For for information about troubleshooting the ETERNUS CS800, see the following sections: "General Troubleshooting Actions"...

  • Page 433: Common Problems And Solutions

    15.2 Common Problems and Solutions If the problem reoccurs, the ETERNUS CS800 logs the number of times that it detects the problem in the existing report. If a different problem occurs with the same component, the ETERNUS CS800 adds a new report to the same service ticket.

  • Page 434: Hardware Problems

    12). One power supply is not Determine which power supply has failed by observing functioning. the fault LED on the power supply. Contact your Fujitsu Technology Solutions Customer Support representative to arrange for service (see "Support and Help" on page 12).

  • Page 435

    "Support and Help" on page 12). A hard drive is not responding Determine which drive has failed by observing the fault LED on the drive carrier. Contact your Fujitsu Technology Solutions Customer Support representative for a drive carrier replacement (see "Support and Help"...

  • Page 436: Ethernet Network Problems

    If the ping reports round trip network. times, the ETERNUS CS800 system is active. If not, check the cables, switches, or hubs for damaged components. If everything checks out, contact the Fujitsu Technology Solutions Customer Support department (see "Support and Help" on page 12).

  • Page 437

    15.2 Common Problems and Solutions Problem Corrective Action An Ethernet cable is removed The system will discontinue use of the associated Ethernet during normal operation. port. A Service ticket will be issued. The possibility of errors exist; data corruption will not occur. Reconnect the cable as soon as possible.

  • Page 438: Replication Problems

    15.2 Common Problems and Solutions 15.2.4 Replication Problems The table below describes corrective actions for problems occurring with the replication. Priority Level Description The replication was paused, When you click Pause, the system will continue to but the replication is still in replicate the current tag or block of information in process.

  • Page 439

    3. If a component reports a temperature problem, verify that the associated fan is operating correctly. If necessary, contact Fujitsu Technology Solutions customer support to replace the fan (see "Support and Help" on page 12).

  • Page 440: Removal Replacement Procedures Crus

    Removal Replacement Procedures CRUs This chapter describes how to handle Customer Replaceable Units (CRUs) and how to identify defective CRUs and replace them yourself. Other units may not be replaced by the customer. The CRUs are hot-plug components which can be expanded or replaced during operation. The hot-plug procedure increases the availability of system operation and guarantees a high degree of data integrity and failsafe performance.

  • Page 441: Eternus Cs800 S6 Hardware

    16.1 ETERNUS CS800 S6 Hardware 16.1 ETERNUS CS800 S6 Hardware Server PRIMERGY RX2540 M1 1. Removing the defective PSU module Figure 304: Removing the PSU Press in on the green locking latch (1). Fold up the handle on the PSU module (2).

  • Page 442

    16.1 ETERNUS CS800 S6 Hardware Figure 305: Installing the PSU Insert the PSU module into its slot. Push the PSU module into its slot (1) as far as it will go until the locking latch snaps in place (2). CAUTION!

  • Page 443: Hard Disk Drive

    16.1 ETERNUS CS800 S6 Hardware network or a power outlet of the rack socket strip (see also "PRIMECENTER Rack System" assembly guide). Figure 306: Connecting the Server to the Mains Securing power cords Figure 307: Securing power cord Pull the cable clamp up (2).

  • Page 444

    16.1 ETERNUS CS800 S6 Hardware The Hard Disk Drive (HDD) used in the ETERNUS CS800 server is a 2.5" SAS hard disk (10,000 rpm) and 2.5" SATA hard disks (7,200 rpm). Handling Hard Disk Drives and HDD Modules Hard disk drives incorporated in the HDD modules are highly sensitive electromagnetic devices and must be handled with great care.

  • Page 445: Hdd Removal And Replacement Procedures

    16.1 ETERNUS CS800 S6 Hardware Figure 308: 2.5-inch HDD Numbering 16.1.2 HDD Removal and Replacement Procedures Removing 1. Release the locking mechanism by pressing the locking button (1). 2. Push the handle of the HDD module fully in the direction of the arrow (2).

  • Page 446

    2. Insert the HDD module into a drive bay and carefully push back as far as it will go (1). 3. Close the locking lever to lock the hard disk drive in place (2). 4. If the status of the HDD remains "unknown" after rebuild has finished, contact Fujitsu Customer Support (see "Support and Help"...

  • Page 447: Storage Subsystem

    16.2 Storage Subsystem Removing the non-defective HDD Modules CAUTION! If you need to remove non-defective HDD modules, consider the following: Do never remove a non-defective HDD module during operation of the ETERNUS CS800 All HDD modules (drives) must be uniquely identified so that they can be reinstalled in their original mounting locations later.

  • Page 448

    16.2 Storage Subsystem Figure 312: Removing hard disk drive Installing 1. Insert the HDD module into a drive bay and carefully push back as far as it will go (1). 2. Close the locking lever to lock the hard disk drive in place (2). ETERNUS CS800...

  • Page 449

    16.2 Storage Subsystem Figure 313: Inserting the 3.5-inch HDD module ETERNUS CS800...

  • Page 450: Storage Expansion

    The procedure of storage expansion differs for Entry and Scale models. 17.1 Storage Expansion - Entry The disk capacity of the ETERNUS CS800 S6 Entry model can be enhanced in steps of 2 x 8TB up to a maximum of 24TB.

  • Page 451: Procedure Of Storage Expansion Starting With 16tb

    17.1 Storage Expansion - Entry Proceed as follows: 1. Replace the six blank inserts one after the other by 2.5" 2TB SATA 10,000 rpm hard disks. CAUTION! If the system is operating, to avoid temperature rise do not leave any bay empty longer than necessary.

  • Page 452: Procedure Of Storage Expansion Starting With 24tb Or More

    17.1 Storage Expansion - Entry Storage Expansion starting with 24TB or more" on page 452. 3. Reboot the ETERNUS CS800 via the remote management pages, see "Reboot & Shutdown" on page 430. When the system boots up, a background initialize procedure is started.

  • Page 453

    Using longer cables may cause malfunction with a risk of data loss! The procedure of storage expansion requires a reboot of the ETERNUS CS800 S6 to integrate the new hardware. In general it is possible to connect the additional storage modules and/or to plug in the additional disks while the system is operable.

  • Page 454

    Figure 322: Label positions of the ETERNUS JX40 S2 / DX100 S3 modules Also affix a label to both ends of the power cables. A label sheet was provided together with the original ETERNUS CS800 S6 delivery. 2. If you decided to switch off the system while working on its hardware (recommended,...

  • Page 455

    17.1 Storage Expansion - Entry Figure 323: ETERNUS CS800 S6 Entry SAS cabling with up to three JX40 S2 enclosures The SAS IN port of JX40-1 has to be connected to the upper port of the SAS RAID controller in PCI slot 7 of the server. The SAS OUT port of JX40-1 has to be connected to the SAS IN port of JX40-2 and so on.

  • Page 456: Storage Expansion - Scale

    7. Turn on both PSU switches on the rear side of each storage module. 8. If the ETERNUS CS800 S6 was shut down prior to adding the new hardware, turn on the server by pressing its power ON/OFF button now.

  • Page 457

    Solutions Customer Service or your local sales office. If you cause a defect on the device by installing or exchanging system expansions that are not released or qualified for ETERNUS CS800 S6, the warranty is invalidated. To add expansion modules make sure that you only use storage expansion modules that are fully equipped and not manually configured.

  • Page 458

    17.2 Storage Expansion - Scale Shutdown" on page 430). Shutting down the system can take up to 15 minutes. The server goes into standby mode, its power-off indicator lights up green. 4. After the server has switched off itself, also the ETERNUS DX100 S3 storage module should switched off.

  • Page 459

    17.2 Storage Expansion - Scale Figure 326: ETERNUS DX100 S3 cabling with one drive enclosure Figure 327: ETERNUS DX100 S3 reverse cabling with two to ten drive enclosures The following step by step instructions can be used to verify or to plug the cables: a.

  • Page 460

    17.2 Storage Expansion - Scale The IOM#0 OUT port of the always last DE remains unused. c. The SAS port of CE CM#1 must be connected to the IOM#1 SAS IN port of the always last DE d. Only if there are more than just one DE: The IOM#1 SAS OUT port of the last DE must be connected to the IOM#1 SAS IN port of the predecessor DE.

  • Page 461: System Specifications S6

    System Specifications S6 This chapter lists characteristics and specifications of the ETERNUS CS800 S6 product. The characteristics and specifications are categorized as follows: System Related Specifications The following tables provide characteristics of the ETERNUS CS800 S6 system. General Characteristics NAS backup target...

  • Page 462

    32 TB 352 TB Scale with Hot 4 TB 32 TB 32 TB 320 TB Spare Disks Table 31: Capacity of ETERNUS CS800 S6 Configurations Interfaces Entry Scale Host Ethernet (to Customer 5 x 1GbE 3 x 1GbE LAN) 2 x 10GbE - optional...

  • Page 463

    There is general compliance with the safety requirements of all European countries and North America. National approvals required in order to satisfy statutory regulations or for other reasons can be applied for on request. Compliance Link http://globalsp.ts.fujitsu.com/sites/certificates/default.aspx Table 36: Compliance with Standards ETERNUS CS800...

  • Page 464: Additional Specifications

    18.1 Additional Specifications 18.1 Additional Specifications Entry Model Selected Server Specifications Weight 25 kg + 35 kg per JX40 S2 (up to 130 kg) Disks 4 × 2.5" 600GB (one-CPU model) SAS hard disk or 6 x 2.5" 900GB (two-CPU model) SAS hard disk (10,000 rpm) and 6 or 12 or 18 ×...

  • Page 465

    18.1 Additional Specifications Selected Server Specifications RAID Level RAID 1 (1 + 1) for Operating System RAID 1 (1 + 1) for StorNext and blockpool metadata Table 39: Selected Server Specifications for Scale Selected ETERNUS DX100 S3 Storage Module Specifications Weight Approx.

  • Page 466: Integration In Firewall Environments

    Integration in Firewall Environments Firewall ports The following firewall ports must be opened for correct function of the ETERNUS CS800: TCP ports opened for management traffic: 22 (SSH) 80 (HTTP) 161 (SNMP) 162 (SNMP, trap) 443 (HTTPS) 1311 (OpenManage) TCP ports opened for replication traffic: 22 (Replication) 80 (Replication, OST) 1062 (Replication, OST)

  • Page 467

    3097 (OST) 3098 (OST) 3099 (OST) 3100 (OST) 3101 (OST) 3102 (OST) 10000 (NDMP) 10001 (OST) 10002 (OST) 32000 (NFS, lockd) ETERNUS CS800...

  • Page 468: Eternus Cs800 Open-source Software

    Software (with Advanced Reporting) that have been added to the base operating system, patched, or otherwise included with the product. For each component, the associated licenses are provided. Upon request, Fujitsu will furnish a DVD containing source code for all of these open-source modules, both the base CentOS modules and the additional packages listed here.

  • Page 469

    ETERNUS Version License Agreement CS800 Component Castor 0.9.5 "Ace License" on page 471 "Original Intaglio License" on page 546 4.1.2 "GNU General Public License" on page 499 1.5.1 "Go License" on page 528 Image 1.2.0 BSD-style license ("BSD Exhibit #4" on page 479) Cropper Inotify-tools 3.14-1...

  • Page 470

    ETERNUS Version License Agreement CS800 Component Mersenne MT19937 "Mersenne Twister License" on page 532 Twister (September 2006) Mimepull July 2012 "Common Development And Distribution License Version 1.0 (CDDL-1.0)" on page 480 Netperf 2.4.2 "Netperf License" on page 533 Nmon-14i- Fedora Project "GNU General Public License (Version 3)#"...

  • Page 471

    ETERNUS Version License Agreement CS800 Component Quantum_ 08.04.0200 "GNU Lesser General Public License" on page 506 postgresql- version 2.1 odbc Quantum_ 2.4.1 "BSD Exhibit #3" on page 479 protobuf Quantum_ 3.2.3 "GNU Lesser General Public License" on page 506 version 3 zeromq Rootsh 1.5.3...

  • Page 472

    perpetually and irrevocably--the DOC software source code and object code produced from the source, as well as copy and distribute modified versions of this software. You must, however, include this copyright statement along with any code built using DOC software that you release.

  • Page 473

    DOC software is Y2K-compliant, as long as the underlying OS platform is Y2K-compliant. Likewise, DOC software is compliant with the new US daylight savings rule passed by Congress as "The Energy Policy Act of 2005," which established new daylight savings times (DST) rules for the United States that expand DST as of March 2007.

  • Page 474

    http://www.cs.wustl.edu/~schmidt/doc-center.html http://www.cs.wustl.edu/~schmidt/commercial-support.html mailto:d.schmidt@vanderbilt.edu http://www.dre.vanderbilt.edu/~schmidt/ http://www.cs.wustl.edu/ACE.html Apache License Version 2.0 Apache License Version 2.0, January 2004 http://www.apache.org/licenses/ TERMS AND CONDITIONS FOR USE, REPRODUCTION, AND DISTRIBUTION 1. Definitions. "License" shall mean the terms and conditions for use, reproduction, and distribution as defined by Sections 1 through 9 of this document. "Licensor"...

  • Page 475

    "Work" shall mean the work of authorship, whether in Source or Object form, made available under the License, as indicated by a copyright notice that is included in or attached to the work (an example is provided in the Appendix below). "Derivative Works"...

  • Page 476

    Work or a Contribution incorporated within the Work constitutes direct or contributory patent infringement, then any patent licenses granted to You under this License for that Work shall terminate as of the date such litigation is filed. 4. Redistribution. You may reproduce and distribute copies of the Work or Derivative Works thereof in any medium, with or without modifications, and in Source or Object form, provided that You meet the following conditions: (a) You must give any other recipients of the Work or Derivative Works a copy of this...

  • Page 477

    6. Trademarks. This License does not grant permission to use the trade names, trademarks, service marks, or product names of the Licensor, except as required for reasonable and customary use in describing the origin of the Work and reproducing the content of the NOTICE file.

  • Page 478

    the file format. We also recommend that a file or class name and description of purpose be included on the same "printed page" as the copyright notice for easier identification within third-party archives. Copyright [yyyy] [name of copyright owner] Licensed under the Apache License, Version 2.0 (the "License"); you may not use this file except in compliance with the License.

  • Page 479

    BSD Exhibit #3 The BSD License (http://www.opensource.org/licenses/bsd-license.php) specifies the terms and condi-tions of use for Cairngorm: Copyright (c) 2006. Adobe Systems Incorporated. All rights reserved. Redistribution and use in source and binary forms, with or without modification, are permitted provided that the following conditions are met: Redistributions of source code must retain the above copyright notice, this list of conditions and the fol-lowing disclaimer.

  • Page 480

    Neither the name of the David Spurr nor the names of its contributors may be used to endorse or promote products derived from this software without specific prior written permission. THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS "AS IS" AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED.

  • Page 481

    Modification; or C. Any new file that is contributed or otherwise made available under the terms of this License. 1.10. Original Software means the Source Code and Executable form of computer software code that is originally released under this License. 1.11.

  • Page 482

    (ii) the combination of the Original Software with other software or devices. 2.2. Contributor Grant. Conditioned upon Your compliance with Section 3.1 below and subject to third party intellectual property claims, each Contributor hereby grants You a world-wide, royalty-free, non-exclusive license: (a) under intellectual property rights (other than patent or trademark) Licensable by Contributor to use, reproduce, modify, display, perform, sublicense and distribute the Modifications created by such Contributor (or...

  • Page 483

    the terms of this License. You represent that You believe Your Modifications are Your original creation(s) and/or You have sufficient rights to grant the rights conveyed by this License. 3.3. Required Notices. You must include a notice in each of Your Modifications that identifies You as the Contributor of the Modification.

  • Page 484

    Sun Microsystems, Inc. is the initial license steward and may publish revised and/or new versions of this License from time to time. Each version will be given a distinguishing version number. Except as provided in Section 4.3, no one other than the license steward has the right to modify this License. 4.2.

  • Page 485

    Contributor against whom You assert such claim is referred to as Participant) alleging that the Participant Software (meaning the Contributor Version where the Participant is a Contributor or the Original Software where the Participant is the Initial Developer) directly or indirectly infringes any patent, then any and all rights granted directly or indirectly to You by such Participant, the Initial Developer (if the Initial Developer is not the Participant) and all Contributors under Sections 2.1 and/or 2.2 of this License shall, upon 60 days notice from...

  • Page 486

    This License represents the complete agreement concerning subject matter hereof. If any provision of this License is held to be unenforceable, such provision shall be reformed only to the extent necessary to make it enforceable. This License shall be governed by the law of the jurisdiction specified in a notice contained within the Original Software (except to the extent applicable law, if any, provides otherwise), excluding such jurisdictions conflict-of-law provisions.

  • Page 487

    1.6. "Larger Work” means a work which combines Covered Software or portions thereof with code not governed by the terms of this License. 1.7. "License” means this document. 1.8. "Licensable” means having the right to grant, to the maximum extent possible, whether at the time of the initial grant or subsequently acquired, any and all of the rights conveyed herein.

  • Page 488

    (b) under Patent Claims infringed by the making, using or selling of Original Software, to make, have made, use, practice, sell, and offer for sale, and/or otherwise dispose of the Original Software (or portions thereof). (c) The licenses granted in Sections 2.1(a) and (b) are effective on the date Initial Developer first distributes or otherwise makes the Original Software available to a third party under the terms of this License.

  • Page 489

    must be distributed only under the terms of this License. You must include a copy of this License with every copy of the Source Code form of the Covered Software You distribute or otherwise make available. You must inform recipients of any such Covered Software in Executable form as to how they can obtain such Covered Software in Source Code form in a reasonable manner on or through a medium customarily used for software exchange.

  • Page 490

    You may create a Larger Work by combining Covered Software with other code not governed by the terms of this License and distribute the Larger Work as a single product. In such a case, You must make sure the requirements of this License are fulfilled for the Covered Software.

  • Page 491

    6. TERMINATION. 6.1. This License and the rights granted hereunder will terminate automatically if You fail to comply with terms herein and fail to cure such breach within 30 days of becoming aware of the breach. Provisions which, by their nature, must remain in effect beyond the termination of this License shall survive.

  • Page 492

    OF INCIDENTAL OR CONSEQUENTIAL DAMAGES, SO THIS EXCLUSION AND LIMITATION MAY NOT APPLY TO YOU. 8. U.S. GOVERNMENT END USERS. The Covered Software is a "commercial item,” as that term is defined in 48 C.F.R. 2.101 (Oct. 1995), consisting of "commercial computer software” (as that term is defined at 48 C.F.R.

  • Page 493

    such responsibility on an equitable basis. Nothing herein is intended or shall be deemed to constitute any admission of liability. -------------------------------------------------------------------------------- NOTICE PURSUANT TO SECTION 9 OF THE COMMON DEVELOPMENT AND DISTRIBUTION LICENSE (CDDL) The code released under the CDDL shall be governed by the laws of the State of California (excluding conflict-of-law provisions).

  • Page 494

    License THE WORK (AS DEFINED BELOW) IS PROVIDED UNDER THE TERMS OF THIS CREATIVE COMMONS PUBLIC LICENSE ("CCPL" OR "LICENSE"). THE WORK IS PROTECTED BY COPYRIGHT AND/OR OTHER APPLICABLE LAW. ANY USE OF THE WORK OTHER THAN AS AUTHORIZED UNDER THIS LICENSE OR COPYRIGHT LAW IS PROHIBITED. BY EXERCISING ANY RIGHTS TO THE WORK PROVIDED HERE, YOU ACCEPT AND AGREE TO BE BOUND BY THE TERMS OF THIS LICENSE.

  • Page 495

    f."Work" means the literary and/or artistic work offered under the terms of this License including without limitation any production in the literary, scientific and artistic domain, whatever may be the mode or form of its expression including digital form, such as a book, pamphlet and other writing; a lecture, address, sermon or other work of the same nature;...

  • Page 496

    any translation in any medium, takes reasonable steps to clearly label, demarcate or otherwise identify that changes were made to the original Work. For example, a translation could be marked "The original work was translated from English to Spanish," or a modification could indicate "The original work has been modified."; c.to Distribute and Publicly Perform the Work including as incorporated in Collections;...

  • Page 497

    Collection, upon notice from any Licensor You must, to the extent practicable, remove from the Collection any credit as required by Section 4(b), as requested. If You create an Adaptation, upon notice from any Licensor You must, to the extent practicable, remove from the Adaptation any credit as required by Section 4(b), as requested.

  • Page 498

    UNLESS OTHERWISE MUTUALLY AGREED TO BY THE PARTIES IN WRITING, LICENSOR OFFERS THE WORK AS-IS AND MAKES NO REPRESENTATIONS OR WARRANTIES OF ANY KIND CONCERNING THE WORK, EXPRESS, IMPLIED, STATUTORY OR OTHERWISE, INCLUDING, WITHOUT LIMITATION, WARRANTIES OF TITLE, MERCHANTIBILITY, FITNESS FOR A PARTICULAR PURPOSE, NONINFRINGEMENT, OR THE ABSENCE OF LATENT OR OTHER DEFECTS, ACCURACY, OR THE PRESENCE OF ABSENCE OF ERRORS, WHETHER OR NOT DISCOVERABLE.

  • Page 499

    d.No term or provision of this License shall be deemed waived and no breach consented to unless such waiver or consent shall be in writing and signed by the party to be charged with such waiver or consent. e.This License constitutes the entire agreement between the parties with respect to the Work licensed here.

  • Page 500

    Copyright (C) 1989, 1991 Free Software Foundation, Inc. 51 Franklin Street, Fifth Floor, Boston, MA 02110-1301, USA Everyone is permitted to copy and distribute verbatim copies of this license document, but changing it is not allowed. Preamble The licenses for most software are designed to take away your freedom to share and change it.

  • Page 501

    0. This License applies to any program or other work which contains a notice placed by the copyright holder saying it may be distributed under the terms of this General Public License. The "Program”, below, refers to any such program or work, and a "work based on the Program”...

  • Page 502

    whole must be on the terms of this License, whose permissions for other licensees extend to the entire whole, and thus to each and every part regardless of who wrote it. Thus, it is not the intent of this section to claim rights or contest your rights to work written entirely by you;...

  • Page 503

    5. You are not required to accept this License, since you have not signed it. However, nothing else grants you permission to modify or distribute the Program or its derivativeworks. These actions are prohibited by law if you do not accept this License. Therefore, by modifying or distributing the Program (or any work based on the Program), you indicate your acceptance of this License to do so, and all its terms and conditions for copying, distributing or modifying the Program or works based on it.

  • Page 504

    9. The Free Software Foundation may publish revised and/or new versions of the General Public License from time to time. Such new versions will be similar in spirit to the present version, but may differ in detail to address new problems or concerns. Each version is given a distinguishing version number.

  • Page 505

    one line to give the program's name and an idea of what it does. Copyright (C) yyyy name of author This program is free software; you can redistribute it and/or modify it under the terms of the GNU General Public License as published by the Free Software Foundation; either version 2 of the License, or (at your option) any later version.

  • Page 506

    GNU Lesser General Public License Version 2.1, February 1999 Copyright (C) 1991, 1999 Free Software Foundation, Inc. <http://fsf.org/> Everyone is permitted to copy and distribute verbatim copies of this license document, but changing it is not allowed. [This is the first released version of the Lesser GPL. It also counts as the successor of the GNU Library Public License, version 2, hence the version number 2.1.] Preamble The licenses for most software are designed to take away your freedom to share and...

  • Page 507

    should know that what they have is not the original version, so that the original author's reputation will not be affected by problems that might be introduced by others. Finally, software patents pose a constant threat to the existence of any free program. We wish to make sure that a company cannot effectively restrict the users of a free program by obtaining a restrictive license from a patent holder.

  • Page 508

    TERMS AND CONDITIONS FOR COPYING, DISTRIBUTION AND MODIFICATION 0. This License Agreement applies to any software library or other program which contains a notice placed by the copyright holder or other authorized party saying it may be distributed under the terms of this Lesser General Public License (also called "this License”).

  • Page 509

    parties under the terms of this License. d) If a facility in the modified Library refers to a function or a table of data to be supplied by an application program that uses the facility, other than as an argument passed when the facility is invoked, then you must make a good faith effort to ensure that, in the event an application does not supply such function or table, the facility still operates, and performs whatever part of its purpose remains meaningful.

  • Page 510

    If distribution of object code is made by offering access to copy from a designated place, then offering equivalent access to copy the source code from the same place satisfies the requirement to distribute the source code, even though third parties are not compelled to copy the source along with the object code.

  • Page 511

    object code and/or source code, so that the user can modify the Library and then relink to produce a modified executable containing the modified Library. (It is understood that the user who changes the contents of definitions files in the Library will not necessarily be able to recompile the application to use the modified definitions.) b) Use a suitable shared library mechanism for linking with the Library.

  • Page 512

    8. You may not copy, modify, sublicense, link with, or distribute the Library except as expressly provided under this License. Any attempt otherwise to copy, modify, sublicense, link with, or distribute the Library is void, and will automatically terminate your rights under this License.

  • Page 513

    those countries, so that distribution is permitted only in or among countries not thus excluded. In such case, this License incorporates the limitation as if written in the body of this License. 13. The Free Software Foundation may publish revised and/or new versions of the Lesser General Public License from time to time.

  • Page 514

    To apply these terms, attach the following notices to the library. It is safest to attach them to the start of each source file to most effectively convey the exclusion of warranty; and each file should have at least the "copyright” line and a pointer to where the full notice is found.

  • Page 515

    The licenses for most software and other practical works are designed to take away your freedom to share and change the works. By contrast, the GNU General Public License is intended to guarantee your freedom to share and change all versions of a program--to make sure it remains free software for all its users.

  • Page 516

    0. Definitions. "This License" refers to version 3 of the GNU General Public License. "Copyright" also means copyright-like laws that apply to other kinds of works, such as semiconductor masks. "The Program" refers to any copyrightable work licensed under this License. Each licensee is addressed as "you".

  • Page 517

    A "Standard Interface" means an interface that either is an official standard defined by a recognized standards body, or, in the case of interfaces specified for a particular programming language, one that is widely used among developers working in that language.

  • Page 518

    works to others for the sole purpose of having them make modifications exclusively for you, or provide you with facilities for running those works, provided that you comply with the terms of this License in conveying all material for which you do not control copyright. Those thus making or running the covered works for you must do so exclusively on your behalf, under your direction and control, on terms that prohibit them from making any copies of your copyrighted material outside their relationship with you.

  • Page 519

    You may convey a work based on the Program, or the modifications to produce it from the Program, in the form of source code under the terms of section 4, provided that you also meet all of these conditions: a) The work must carry prominent notices stating that you modified it, and giving a relevant date.

  • Page 520

    b) Convey the object code in, or embodied in, a physical product (including a physical distribution medium), accompanied by a written offer, valid for at least three years and valid for as long as you offer spare parts or customer support for that product model, to give anyone who possesses the object code either (1) a copy of the Corresponding Source for all the software in the product that is covered by this License, on a durable physical medium customarily used for software interchange, for...

  • Page 521

    "Installation Information" for a User Product means any methods, procedures, authorization keys, or other information required to install and execute modified versions of a covered work in that User Product from a modified version of its Corresponding Source. The information must suffice to ensure that the continued functioning of the modified object code is in no case prevented or interfered with solely because modification has been made.

  • Page 522

    may place additional permissions on material, added by you to a covered work, for which you have or can give appropriate copyright permission. Notwithstanding any other provision of this License, for material you add to a covered work, you may (if authorized by the copyright holders of that material) supplement the terms of this License with terms: a) Disclaiming warranty or limiting liability differently from the terms of sections 15 and 16 of this License;...

  • Page 523

    You may not propagate or modify a covered work except as expressly provided under this License. Any attempt otherwise to propagate or modify it is void, and will automatically terminate your rights under this License (including any patent licenses granted under the third paragraph of section 11).

  • Page 524

    An "entity transaction" is a transaction transferring control of an organization, or substantially all assets of one, or subdividing an organization, or merging organizations. If propagation of a covered work results from an entity transaction, each party to that transaction who receives a copy of the work also receives whatever licenses to the work the party's predecessor in interest had or could give under the previous paragraph, plus a right to possession of the Corresponding Source of the work from the predecessor in interest, if the predecessor has it or can get it with reasonable efforts.

  • Page 525

    If you convey a covered work, knowingly relying on a patent license, and the Corresponding Source of the work is not available for anyone to copy, free of charge and under the terms of this License, through a publicly available network server or other readily accessible means, then you must either (1) cause the Corresponding Source to be so available, or (2) arrange to deprive yourself of the benefit of the patent license for this particular work, or (3) arrange, in a manner consistent with the requirements of this...

  • Page 526

    collect a royalty for further conveying from those to whom you convey the Program, the only way you could satisfy both those terms and this License would be to refrain entirely from conveying the Program. 13. Use with the GNU Affero General Public License. Notwithstanding any other provision of this License, you have permission to link or combine any covered work with a work licensed under version 3 of the GNU Affero General Public License into a single combined work, and to convey the resulting work.

  • Page 527

    THERE IS NO WARRANTY FOR THE PROGRAM, TO THE EXTENT PERMITTED BY APPLICABLE LAW. EXCEPT WHEN OTHERWISE STATED IN WRITING THE COPYRIGHT HOLDERS AND/OR OTHER PARTIES PROVIDE THE PROGRAM "AS IS" WITHOUT WAR-RANTY OF ANY KIND, EITHER EXPRESSED OR IMPLIED, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE.

  • Page 528

    <one line to give the program's name and a brief idea of what it does.> Copyright (C) <year> <name of author> This program is free software: you can redistribute it and/or modify it under the terms of the GNU General Public License as published by the Free Software Foundation, either version 3 of the License, or (at your option) any later version.

  • Page 529

    * Redistributions of source code must retain the above copyright notice, this list of conditions and the following disclaimer. * Redistributions in binary form must reproduce the above copyright notice, this list of conditions and the following disclaimer in the documentation and/or other materials provided with the distribution.

  • Page 530

    The default JSP implementation is provided by the Glassfish JSP engine from project Glassfish http://glassfish.dev.java.net. Copyright 2005 Sun Microsystems, Inc. and portions Copyright Apache Software Foundation. Some portions of the code are Copyright: 2006 Tim Vernum 1999 Jason Gilbert. The jboss integration module contains some LGPL code. The win32 Java Service Wrapper (v3.2.3) is Copyright (c) 1999, 2006 Tanuki Software, Inc.

  • Page 531

    #define _LGPL_SOURCE #include <lttng/lttng.h> Dynamic-only linking with the LGPL library is used if _LGPL_SOURCE is not defined. It permits relinking with newer versions of the library, which is required by the LGPL license. * GPLv2 All remaining source code is distributed under the GPLv2 license. See gpl-2.0.txt for details.

  • Page 532

    Permission is hereby granted, free of charge, to any person obtaining a copy of this software and associated documentation files (the "Software"), to deal in the Software without restriction, including without limitation the rights to use, copy, modify, merge, publish, distribute, sublicense, and/or sell copies of the Software, and to permit persons to whom the Software is furnished to do so, subject to the following conditions: The above copyright notice and this permission notice shall be included in all copies or substantial portions of the Software.

  • Page 533

    3. The names of its contributors may not be used to endorse or promote products derived from this software without specific prior written permission. THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS "AS IS" AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED.

  • Page 534

    3. The enclosed software and documentation has not been subjected to testing and quality control and is not a Hewlett-Packard Co. product. At a future time, Hewlett-Packard Co. may or may not offer a version of the software and documentation as a product. 4.

  • Page 535

    AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE. The names of the authors and copyright holders must not be used in advertising or otherwise to promote the sale, use or other dealing in this Software without specific, written prior permission.

  • Page 536

    Public License. Portions Copyright 1999-2008 Howard Y.H. Chu. Portions Copyright 1999-2008 Symas Corporation. Portions Copyright 1998-2003 Hallvard B. Furuseth. Portions Copyright 2007-2011 Gavin Henry. Portions Copyright 2007-2011 Suretec Systems Ltd. All rights reserved. Redistribution and use in source and binary forms, with or without modification, are permitted provided that this notice is preserved.

  • Page 537

    * Redistribution and use in source and binary forms, with or without * modification, are permitted provided that the following conditions * are met: * 1. Redistributions of source code must retain the above copyright * notice, this list of conditions and the following disclaimer. * 2.

  • Page 538

    * EXPRESSED OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR * PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE OpenSSL PROJECT OR * ITS CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, * SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT * NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES;...

  • Page 539

    * Copyright remains Eric Young's, and as such any Copyright notices in * the code are not to be removed. * If this package is used in a product, Eric Young should be given attribution * as the author of the parts of the library used. * This can be in the form of a textual message at program startup or * in documentation (online or textual) provided with the package.

  • Page 540

    * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF * SUCH DAMAGE.

  • Page 541

    telematics and network control switching equipment, printers and storage management systems, and other related systems are excluded from this definition and not licensed under this Agreement. "Programs" means (a) Java technology applets and applications intended to run on the Java Platform, Standard Edition platform on Java-enabled General Purpose Desktop Computers and Servers;...

  • Page 542

    AN ACTION IN CONTRACT OR TORT, EVEN IF ORACLE HAS BEEN ADVISED OF THE POSSIBILITY OF SUCH DAMAGES. ORACLE'S ENTIRE LIABILITY FOR DAMAGES HEREUNDER SHALL IN NO EVENT EXCEED ONE THOUSAND DOLLARS (U.S. $1,000). 6. TERMINATION. This Agreement is effective until terminated. You may terminate this Agreement at any time by destroying all copies of Software.

  • Page 543

    frustrate the intent of the parties, in which case this Agreement will immediately terminate. 12. INTEGRATION. This Agreement is the entire agreement between you and Oracle relating to its subject matter. It supersedes all prior or contemporaneous oral or written communications, proposals, representations and warranties and prevails over any conflicting or additional terms of any quote, order, acknowledgment, or other communication between the parties relating to its subject matter during the term of this...

  • Page 544

    complete and unmodified and only bundled as part of, and for the sole purpose of running, your Programs, (ii) the Programs add significant and primary functionality to the Software, (iii) you do not distribute additional software intended to replace any component(s) of the Software, (iv) you do not remove or alter any proprietary legends or notices contained in the Software, (v) you only distribute the Software subject to a license agreement that: (a) is a complete, unmodified reproduction of this Agreement;...

  • Page 545

    following terms: (i) You may not distribute the JDK on a stand-alone basis; it must be distributed with your Publication(s); (ii) You are responsible for downloading the JDK from the applicable Oracle web site; (iii) You must refer to the JDK as JavaTM SE Development Kit;...

  • Page 546

    I. SOURCE CODE. Software may contain source code that, unless expressly licensed for other purposes, is provided solely for reference purposes pursuant to the terms of this Agreement. Source code may not be redistributed unless expressly provided for in this Agreement.

  • Page 547

    1. Redistributions of source code must retain copyright statements and notices. Redistributions must also contain a copy of this document. 2. Redistributions in binary form must reproduce the above copyright notice, this list of conditions and the following disclaimer in the documentation and/or other materials provided with the distribution.

  • Page 548

    7-Zip Copyright (C) 1999-2010 Igor Pavlov. Licenses for files are: 1) CPP/7zip/Compress/Rar* files: GNU LGPL + unRAR restriction 2) All other files: GNU LGPL The GNU LGPL + unRAR restriction means that you must follow both GNU LGPL rules and unRAR restriction rules.

  • Page 549

    and source comments that the code may not be used to develop a RAR (WinRAR) compatible archiver. Pbzip2 License This program, "pbzip2" is copyright (C) 2003-2011 Jeff Gilchrist. All rights reserved. The library "libbzip2" which pbzip2 uses, is copyright (C) 1996-2008 Julian R Seward. All rights reserved. Redistribution and use in source and binary forms, with or without modification, are permitted provided that the following conditions are met: 1.

  • Page 550

    THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE. Jeff Gilchrist, Ottawa, Canada. pbzip2@compression.ca pbzip2 version 1.1.6 of Oct 30, 2011 PCRE License PCRE LICENCE ------------...

  • Page 551

    Contributed by: Google Inc. Copyright (c) 2007, Google Inc. All rights reserved. THE "BSD" LICENCE ----------------- Redistribution and use in source and binary forms, with or without modification, are permitted provided that the following conditions are met: * Redistributions of source code must retain the above copyright notice, this list of conditions and the following disclaimer.

  • Page 552

    1. Redistribution in binary form must reproduce the above copyright notice, this list of conditions and the following disclaimer in the documentation and/or other materials provided with the distribution. 2. The name of QLogic Corporation may not be used to endorse or promote products derived from this software without specific prior written permission.

  • Page 553

    THIS SOFTWARE IS PROVIDED "AS IS" AND ANY EXPRESSED OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE APACHE SOFTWARE FOUNDATION OR ITS CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES;...

  • Page 554

    http://www.hpl.hp.com/personal/Hans_Boehm/gc/gc_source/ This MIT-style license (BSD like) apply to: uatomic/gcc.h uatomic/unknown.h uatomic/generic.h uatomic/sparc64.h uatomic/arm.h uatomic/ppc.h uatomic/x86.h uatomic.h MIT/X11 (BSD like) license apply to: compiler.h arch/s390.h uatomic/alpha.h uatomic/mips.h uatomic/s390.h system.h * GPLv2 Library test code is distributed under the GPLv2 license. See gpl-2.0.txt for license details. See headers of individual files under tests/ for details.

  • Page 555

    IBM Corporation allowed LGPLv2.1+ licensing of their contribution to the userspace RCU library in a patch submitted on May 8, 2009 from Paul E. McKenney and reviewed by Steven L. Bennett: http://lists.casi.polymtl.ca/pipermail/ltt-dev/2009-May/001584.html I (Mathieu Desnoyers) re-implemented ACCESS_ONCE(), likely(), unlikely() and barrier() from scratch without reference to the original code.

  • Page 556: Index

    Index 2.5" HDD 3.5" HDD alerts admin service tickets batteries cabling Entry with JX40 S2 Entry without JX40 S2 Scale system capacity common problems and solutions components installing compression configuration contacts initial notifications replication scheduler system ETERNUS CS800...

  • Page 557

    DX100 S3 controller enclosure front rear DX100 S3 drive enclosure front rear Entry storage expansion environmental protection ESD 18, ETERNUS CS800 S6 capacity components features firewall ports getting started wizard data&time network configuration setting&reboot ETERNUS CS800...

  • Page 558

    Index hard drives hardware home home page installing components modules JX40 S2 front rear labelsheet licence agreement login modules installing mounting position locating advanced setting CIFS/SMB configuration share access summary windows domain network connecting notifications AIS connect configuration email ETERNUS CS800...

  • Page 559

    Index SNMP open source licenses accent configuration manage remote users storage servers target IP mapping Entry indicators Scale PRIMERGY RX2540 M1 problems Ethernet hardware replication start-up 433-434 temperature protocol CIFS/SMB configuration physical device discovery rack requirements remote management accessing console remote replication replication 180, actions...

  • Page 560

    Index replication send reports safety instructions Scale storage expansion Scale system switching on scheduler serial number server connecting notebook indicators front indicators rear mains shutting down system software space reclamation status activity log disk usage hardware OST status performance VTL status storage expansion Entry Scale...

  • Page 561

    Index shutting down turning on system banner system overview system specifications technical support troubleshooting turning on system users manage utilities analyzer diagnostics reboot & shutdown secure shred software upgrades space reclamation configuration media partitions remote host access wizard AIS connect email alerts NAS 134, replication...

Comments to this Manuals

Symbols: 0
Latest comments: