3PAR Secure Service Policy Manager User’s Guide 3PARdata, Inc. 4209 Technology Drive Fremont, CA 94538 USA Part No.
Revision Notice This is the first release of this manual. A complete revision history is provided at the end of this document. Changes The material in this document is for information only and is subject to change without notice. While reasonable efforts have been made in the preparation of this document to assure its accuracy, 3PAR Inc. assumes no liability resulting from errors or omissions in this document or from the use of the information contained herein.
PAR Secure Service Policy Manager User’s Guide Table of Contents 1 Introduction 1.1 Audience 1.2 1.2 Related Documentation 1.2 1.3 Organization 1.2 1.4 Typographical Conventions 1.3 1.5 Advisories 1.4 2 Overview 2.1 What is the 3PAR Secure Service Policy Manager? 2.1 2.2 User Authentications 2.2 2.3 3PAR Secure Service Policy Manager Connections 2.3 2.4 How It All Works 2.4 2.4.1 Policies 2.4 3 Installing the 3PAR Policy Manager 3.1 Hardware Requirements 3.2 3.
3PAR Secure Service Policy Manager User’s Guide 4 Configuring Users 4.1 Overview 4.1 4.2 Configuring Users 4.2 5 Starting the 3PAR Secure Service Policy Manager 5.1 Starting 3PAR Secure Service Policy Manager 5.1.1 Starting the Policy Manager User Interface 5.2 Stopping 3PAR Secure Service Policy Manager 5.1 5.1 5.3 6 Understanding the User Interface 6.1 Overview of the User Interface 6.2 6.2 Home Tab 6.3 6.3 Policy Tab 6.5 6.3.1 Sorting Policy Columns 6.4 Pending Requests Tab 6.4.
3PAR Secure Service Policy Manager User’s Guide 7.3.2 Editing Existing Group Configurations 7.17 7.3.3 Configuring Group Notification Settings 7.18 7.3.4 Deleting Existing Groups 7.20 7.3.5 Finding and Removing Missing Devices 7.21 7.4 Working in the Pending Requests Tab 7.22 7.4.1 Accepting and Denying Requests 7.22 7.4.2 Viewing Action Details and Specifying a Timeout 7.23 7.4.3 Container Actions 7.24 7.5 Working in the Audit Log Tab 7.24 7.5.1 Viewing Audit Logs 7.26 7.5.
3PAR Secure Service Policy Manager User’s Guide vi Table of Contents
3PAR Secure Service Policy Manager User’s Guide 1 Introduction In this chapter 1.1 Audience 1.2 1.2 Related Documentation 1.2 1.3 Organization 1.2 1.4 Typographical Conventions 1.3 1.5 Advisories 1.4 This guide is intended to be used as a reference when installing, configuring, and maintaining 3PAR Secure Service Policy Manager (Policy Manager). It contains administration-level information and some user configuration information for the Policy Manager.
3PAR Secure Service Policy Manager User’s Guide 1.1 Audience This guide is for system and storage administrators who monitor and maintain 3PAR InServ Storage Servers. 1.2 Related Documentation The following document provides information related to 3PAR Secure Service Architecture: For information about… Read the… Configuring the Secure Service 3PAR Secure Service Custodian Configuration Utility Custodian Reference 1.
3PAR Secure Service Policy Manager User’s Guide This guide also contains a revision history for your reference. 1.4 Typographical Conventions This guide uses the following typographical conventions: Typeface Meaning Example ABCDabcd Used for dialog When prompted, click Finish elements such as to complete the installation. titles, button labels, and other screen elements. ABCDabcd Used for paths, Open the file filenames, and \gui\windows\setup.exe screen output.
3PAR Secure Service Policy Manager User’s Guide 1.5 Advisories To avoid injury to people or damage to data and equipment, be sure to observe the cautions and warnings in this guide. Always be careful when handling any electrical equipment. NOTE: Notes are reminders, tips, or suggestions that supplement the procedures included in this guide. CAUTION: Cautions alert you to actions that can cause damage to equipment, software, or data.
3PAR Secure Service Policy Manager User’s Guide 2 Overview In this chapter 2.1 What is the 3PAR Secure Service Policy Manager? 2.1 2.2 User Authentications 2.2 2.3 3PAR Secure Service Policy Manager Connections 2.3 2.4 How It All Works 2.4 2.
3PAR Secure Service Policy Manager User’s Guide and manage Custodian-specific permissions and audit Policy Manager operations and use. Users log in to the Policy Manager through Microsoft® Internet Explorer™, version 6. You can host 3PAR Policy Manager on Microsoft Windows NT™ (SP4), Windows 2000™ (SP3), Windows 2003™, or Windows XP™ operating systems. Hypersonic SQL provides a standalone, open source, Java-based database to store and manage the Policy Manager configurations.
3PAR Secure Service Policy Manager User’s Guide 2.3 3PAR Secure Service Policy Manager Connections Within a customer's organization, a single Policy Manager can be configured to manage some or all Custodians, or multiple Policy Managers can be configured to handle multiple sets of Custodians uniquely; for example, Custodians located in different departments and with separate administration and security needs.
3PAR Secure Service Policy Manager User’s Guide 2.4 How It All Works The Secure Service Collector Server communicates with the Secure Service Custodian by posting requests for the Custodian and receiving its responses. These can be requests to perform actions, including uploading files, running applications, restarting, executing packages, setting data values on the Custodians, and so forth. These requests are discovered by the Custodian Custodians upon subsequent pings.
3PAR Secure Service Policy Manager User’s Guide All communications between the Policy Manager and its managed Custodians are initiated by the Custodians. When a Custodian contacts the Policy Manager, either when it registers or based on its defined ping rate, that Custodian receives any current or updated policy settings or accepted or denied requests. At the same time, the Custodian sends the Policy Manager its action requests and its list of supported actions. How It All Works 2.
3PAR Secure Service Policy Manager User’s Guide 2.
3PAR Secure Service Policy Manager User’s Guide 3 Installing the 3PAR Policy Manager In this chapter 3.1 Hardware Requirements 3.2 3.2 Software Requirements 3.2 3.3 Installation and Setup 3.3 The 3PAR Secure Service Policy Manager installation includes all necessary components needed to manage polices on Custodians. The Policy Manager can be hosted from a computer running supported Windows operating system and connected to Custodians via a network connection.
3PAR Secure Service Policy Manager User’s Guide 3.1 Hardware Requirements The following are the minimum requirements for the Policy Manager, database, and Web server: ■ i386 ■ 750 MHz processor ■ 256 MB of memory ■ 100 MB of disk space for the installation with additional space available for log files NOTE: As you use the Policy Manager and audit log files are created, your disk space requirements will grow substantially.
3PAR Secure Service Policy Manager User’s Guide 3.3 Installation and Setup To install and set up 3PAR Secure Service Policy Manager, perform the following: 1 Insert the Policy Manager installation CD in the CD-ROM drive of the computer on which you want to install the Policy Manager, or another networked computer to which the Custodians can connect via LAN or WAN connections. 2 Browse to the CD in your computer's file manager or explorer application. 3 Locate and run install3PARSSPM_x_x_x_x.exe.
3PAR Secure Service Policy Manager User’s Guide 3.3.1 Reinstalling 3PAR Policy Manager If you need to reinstall Policy Manager, perform the following: 1 Remove or uninstall the existing Policy Manager files installed on your computer from the previous installation. 2 Reinstall Policy Manager, by following the instructions described in 3.3 Installation and Setup on page 3.3. 3.
3PAR Secure Service Policy Manager User’s Guide 4 Configuring Users In this chapter 4.1 Overview 4.1 4.2 Configuring Users 4.2 4.1 Overview After installing the server, you need to configure the users and groups with privileges for the 3PAR Secure Service Policy Manager, and modify the Policy Manager configuration settings for your specific use of the server. User configuration is performed through the Apache Tomcat file realm.
3PAR Secure Service Policy Manager User’s Guide ■ Configuring users for server administration and Policy Manager login. ■ Configuring Policy Manager server properties and functionality. 4.2 Configuring Users The Tomcat file realm controls who has access to administering the server and who can log in to and use the Policy Manager application pages.
3PAR Secure Service Policy Manager User’s Guide b Enter the local host IP address/listening port in the browser’s address bar, and then /admin (for example, 123.456.789.111/8080/admin), and press ENTER. The 3PAR Tomcat Server Administration Tool appears (Figure 4-1). Figure 4-1. Tomcat Server Administration Tool Configuring Users 4.
3PAR Secure Service Policy Manager User’s Guide 2 Type your Tomcat5 user name and password and click Login. The Administration Tool page appears (Figure 4-2), with the following navigation window: Figure 4-2. Administration Tool Page 3 Under User Definition, click Users. The Users List pane appears. 4.
3PAR Secure Service Policy Manager User’s Guide 4 From the User Actions list, select Create New User. The Create New User Properties pane appears (Figure 4-3). NOTE: User names and passwords are case-sensitive. Figure 4-3. Creating a User 5 Enter the user name, password, and full name of the user for logging into the application. 6 Select the groups and roles in which this user is to be defined. Each use can be defined in multiple groups and roles.
3PAR Secure Service Policy Manager User’s Guide 4.
3PAR Secure Service Policy Manager User’s Guide 5 Starting the 3PAR Secure Service Policy Manager In this chapter 5.1 Starting 3PAR Secure Service Policy Manager 5.1 5.2 Stopping 3PAR Secure Service Policy Manager 5.3 5.1 Starting 3PAR Secure Service Policy Manager By default, once 3PAR Secure Service Policy Manager has been installed, Policy Manager is started as a service in Windows. In order to set policies in Policy Manager, you must start Policy Manager’s user interface. 5.1.
3PAR Secure Service Policy Manager User’s Guide Figure 5-1. Policy Manager Login Screen 5.1.1.1 Default Login Information The Apache Tomcat5 Web server is configured with one default 3PAR Policy Manager user and password as follows: ■ User name = admin ■ Password = admin Use this login information to access the Policy Manager user interface. 5.
3PAR Secure Service Policy Manager User’s Guide Figure 5-2. Policy Manager User Interface Refer to Chapter 5, Understanding the User Interface for an overview of, and information about how to navigate, Policy Manager’s user interface. WARNING: You need to modify the list of users and their passwords in Tomcat5; when doing so, you should remove this default user name and password to ensure security is not at risk. 5.
3PAR Secure Service Policy Manager User’s Guide 5.
3PAR Secure Service Policy Manager User’s Guide 6 Understanding the User Interface In this chapter 6.1 Overview of the User Interface 6.2 6.2 Home Tab 6.3 6.3 Policy Tab 6.5 6.3.1 Sorting Policy Columns 6.4 Pending Requests Tab 6.4.1 Sorting Pending Requests 6.7 6.9 6.10 6.5 Audit Log Tab 6.11 6.6 Configuration Tab 6.13 Understanding the User Interface 6.
3PAR Secure Service Policy Manager User’s Guide 6.1 Overview of the User Interface The 3PAR Secure Service Policy Manager user interface allows you to set and control all permissions for the 3PAR Secure Service Custodians on your network, and allows you to enable only authorized access and use of managed Custodians.
3PAR Secure Service Policy Manager User’s Guide The Policy Manager user interface home page provides the following: ■ Log Out link ■ Help link ■ Tasks organized by labeled tabs, which include the following: ◆ Home ◆ Policy ◆ Pending Requests ◆ Audit Log ◆ Configuration These tabs are discussed in detail in the following sections. 6.2 Home Tab The Home tab is the first viewable tab upon logging into 3PAR Secure Service Policy Manager (Figure 6-2). Figure 6-2. The Home Tab Home Tab 6.
3PAR Secure Service Policy Manager User’s Guide The Home tab provides quick links to commonly performed tasks within Policy Manager. These links are described in Table 6-1. Table 6-1. Home Tab Links Link Description View All Requests Displays the most recent permission requests received from the managed devices for approval. Up to five pending requests for all groups are displayed.
3PAR Secure Service Policy Manager User’s Guide 6.3 Policy Tab The Policy tab allows you to view and modify policy settings for each 3PAR Secure Service Policy Manager action (Figure 6-3). For instructions on using the Policy tab, see 7.2 Working in the Policy Tab on page 7.3. Figure 6-3. Policy Tab By default, the policy settings for the parent group are displayed on the Policy tab. To display the policy settings for a different group, click Explore Device Groups and select from the listed groups.
3PAR Secure Service Policy Manager User’s Guide Table 6-2. Policy Tab Column Descriptions Column Name Description Action Displays the name of the action managed by the current policy. By default, related actions are grouped together, such as Enable a Script, Register a Script, Disable a Script, etc. Clicking an action in the Action column brings up the View or change details for action screen. Permission Displays the name of the permission set for the action in the same row.
3PAR Secure Service Policy Manager User’s Guide Table 6-2. Policy Tab Column Descriptions Column Name Description Inheritance Identifies the group level from which permissions inherit their access rights and settings. For example, if the Inheritance column displays ITGroup for the permissions of the Emails action, then the permissions settings are inherited from the ITGroup group policy.
3PAR Secure Service Policy Manager User’s Guide ■ Clicking the Access Right column header groups the access rights by type (Figure 6-5). Figure 6-5. Sorting by Access Right ■ Clicking the Lock column header sorts the column by locked policies. Policies that are locked (indicated by check mark) are grouped either from the top to bottom, or from the bottom to top, in the column (Figure 6-6). Figure 6-6. Sorting by Locked Policy 6.
3PAR Secure Service Policy Manager User’s Guide 6.4 Pending Requests Tab The Pending Requests tab displays a list of all pending requests for 3PAR Secure Service Policy Manager groups (Figure 6-7). Requests are either single actions or a container of actions. For information about requests, see 7.4.3 Container Actions on page 7.24. By default, requests for the parent group is displayed. For instructions on using the Pending Requests tab, see 7.4 Working in the Pending Requests Tab on page 7.22.
3PAR Secure Service Policy Manager User’s Guide The list of requests is generated in a table, which is described as follows: Column Name Description Device The name of the device (alias name) sending the request. Device Description A user-defined definition, or default description created by Policy Manager, of the device. The device description includes the model name and serial number. Request Date A time stamp of when the action was initiated on the device.
3PAR Secure Service Policy Manager User’s Guide 6.5 Audit Log Tab The Audit Log tab displays all audit messages generated by 3PAR Secure Service Policy Manager and messages sent from agents per selected group (Figure 6-8). By default, the audit log for the parent group is displayed. For instructions on using the Audit Log tab, see 7.5 Working in the Audit Log Tab on page 7.24. Figure 6-8.
3PAR Secure Service Policy Manager User’s Guide ■ All policy changes. ■ All action activities, including creation, modification, and deletion. ■ All agent registrations. The audit log is generated in a table, which is described as follows: Column Name Description Group Name The name of the group affected by this activity.
3PAR Secure Service Policy Manager User’s Guide 6.6 Configuration Tab The Configuration tab displays all of the groups that have been defined in 3PAR Secure Service Policy Manager (Figure 6-9). For a new device connecting to Policy Manager, if there is not already a preexisting group, a new group is created for that device. For information on how this tab is used in Policy Manager tasks, see Chapter 7, Using 3PAR Secure Service Policy Manager. Figure 6-9. Configuration Tab Configuration Tab 6.
3PAR Secure Service Policy Manager User’s Guide 6.
3PAR Secure Service Policy Manager User’s Guide 7 Using 3PAR Secure Service Policy Manager In this chapter 7.1 Policy Inheritance and Hierarchy 7.2 7.2 Working in the Policy Tab 7.3 7.2.2 Viewing Policies by Group 7.6 7.2.1 Base Installation Actions 7.4 7.2.3 Editing Permissions 7.8 7.2.4 Assigning Access Rights 7.12 7.2.5 Locking Permissions 7.14 7.2.6 Removing Policy Overrides 7.14 7.2.7 Setting Access Rights for All Policy Permissions 7.15 7.3 Working in the Configuration Tab 7.15 7.
3PAR Secure Service Policy Manager User’s Guide 7.4 Working in the Pending Requests Tab 7.22 7.5 Working in the Audit Log Tab 7.24 7.1 Policy Inheritance and Hierarchy 3PAR Secure Service Policy Manager manages device policies and notification settings through a hierarchy of groups and standard parent-child relationships. There is one global group, named Global by default (this name can be changed).
3PAR Secure Service Policy Manager User’s Guide 7.2 Working in the Policy Tab When a device first registers with 3PAR Secure Service Policy Manager, it provides the Policy Manager with a complete list of its supported actions, as can be seen by navigating the Policy tab (Figure 7-2). Each action requires a permission. A permission is a set of parameters and an associated access right. Some actions have parameters and some do not.
3PAR Secure Service Policy Manager User’s Guide Figure 7-2. Policy Manager Policy Settings 7.2.1 Base Installation Actions The following actions listed in Table 7-1 are included and managed in a base installation of this version of Policy Manager. Custom actions are not listed. 7.
3PAR Secure Service Policy Manager User’s Guide Table 7-1. Actions with Base Installation Action Description Alarms Determines whether or not the Custodian can send alarms to the Collector Server, or needs to receive approval for the permission first. Custom alarms started as the result of a Start Custom Alarm action, configured in a logic schema, are not affected. For this release, only one permission can be set for all alarms, meaning all alarms will be included in the action.
3PAR Secure Service Policy Manager User’s Guide Table 7-1. Actions with Base Installation Action Description File Download Determines whether or not the Custodian can accept files downloaded to it from the Collector Server, or needs to receive approval for the permission first. Permission parameters include the fully-qualified path of the file(s) to download to the device. The name(s) of the file(s) and path(s) may be explicit; for example, "c:\error.log", or include wildcards; for example, "c:\*.
3PAR Secure Service Policy Manager User’s Guide Figure 7-3. Selecting a Group 2 Click a group to view that group’s policy settings. The View or change the policy settings for page appears displaying the selected group’s policy information. Figure 7-4. Viewing Policies for a Selected Group Working in the Policy Tab 7.
3PAR Secure Service Policy Manager User’s Guide 7.2.3 Editing Permissions As stated earlier, each action requires a permission. By default, each action has a permission that is made up of set of parameters and an associated access right. Permissions can be edited to include additional parameters such as file names, script names, version numbers, and application names. Additionally, permission parameters can also be removed.
3PAR Secure Service Policy Manager User’s Guide Figure 7-5. Editing Permissions 2 Enter a new name and permission description in the Name and Description fields, respectively, and click Next. The Edit the parameters for of page appears (Figure 7-6). Working in the Policy Tab 7.
3PAR Secure Service Policy Manager User’s Guide Figure 7-6. Editing Parameters 3 Enter the new parameter (for example, a script name or a file name) and click Finish. NOTE: You can use partial values in conjunction with wildcards (*) to specify all applicable values. For example, for a Run Script action you can type a script name of ACME*.pl. This policy will apply to all Run Script actions that are defined to run Perl-based scripts with names starting with "ACME". Other examples include *.
3PAR Secure Service Policy Manager User’s Guide 2 Click Next. The Edit the parameters for of page appears (see Figure 7-6). 3 In the Parameters box, select the parameter(s) you wish to remove from the permission and click Remove Checked. Figure 7-7. Removing Parameters 4 Click Finish. The View or change the policy settings for page reappears and the new parameter is displayed in the Parameters column for the permission you modified. 7.2.3.
3PAR Secure Service Policy Manager User’s Guide 7.2.4 Assigning Access Rights After setting an action and its permission, you assign it an access right. An access right specifies how you want the individual devices to handle the related permission. There are three types of access rights: ■ Always Allow - the Secure Service Custodian can execute these permissions without asking for approval or sending the action information to Policy Manager.
3PAR Secure Service Policy Manager User’s Guide Figure 7-8. Selecting an Access Right 2 Select the appropriate access right. 3 Repeat step 1 and step 2 as necessary. 4 Click Done on the lower right-hand corner of the Policy tab. 5 When prompted for confirmation of the changed policy, click OK. The View or change the policy settings for page refreshes and displays the newly set access right(s). 7.2.4.
3PAR Secure Service Policy Manager User’s Guide ■ If any action in the package, including rollback actions, has a Never Allow access right, the agent denies the package and sends that as a message to the Collector Server. ■ If the package contains actions with any combination of Always Allow and Ask for Approval access rights (with a minimum of one Ask for Approval access right), the Ask for Approval access rights are aggregated and sent to Policy Manager as one permission request.
3PAR Secure Service Policy Manager User’s Guide X On the View or change the policy settings for page, click Reset to Parent's Policy. Any permission settings specific to the policy open in this page are removed. All permission settings are replaced with those defined for the parent's policy. The next time the device contacts the server, it receives this updated policy. 7.2.
3PAR Secure Service Policy Manager User’s Guide as restricted. Then, within the Policy Manager group configuration pages you can move the devices into the related group. To create a new group: 1 On the Configuration tab and click New > Group (Figure 7-10). Figure 7-10. Creating a New Group 2 In the Create new group configurations page, type or select the properties to define this group (see Figure 7-11).
3PAR Secure Service Policy Manager User’s Guide Figure 7-11. Entering Group Information 7.3.2 Editing Existing Group Configurations You can change the name of a device or group to be more meaningful to your purposes. You can also move groups within the inheritance hierarchy. The only group you cannot move is the Global group, which must remain as the top, parent group. Policy Manager can support any number of nested child groups within groups.
3PAR Secure Service Policy Manager User’s Guide Figure 7-12. Editing a Group 2 Edit the group information and hierarchy as necessary by editing the Name and Description fields. You can also select a new parent group from the Parent Group list. 3 Click Submit to commit the changes. 7.3.3 Configuring Group Notification Settings When a device sends an action request to Policy Manager for approval, the Policy Manager will send an Email notification to specified individuals.
3PAR Secure Service Policy Manager User’s Guide ◆ Subject - Subject line for the Email message. ◆ Body - Body or actual content for the Email message. Within the subject line or body of the notification, you can include one or more supported substitution parameters. When Policy Manager sends the Email message, it replaces the substitution parameters with the actual information for those parameters.
3PAR Secure Service Policy Manager User’s Guide 7.3.4 Deleting Existing Groups Deleting a group removes settings for all subgroups and devices configured in that group from the database. If a device of the deleted group re-registers with Policy Manager, a group for that device will be created automatically. To delete a group: 1 On the Select a group to view its group configuration settings page in the Configure tab, select the group you wish to delete.
3PAR Secure Service Policy Manager User’s Guide 7.3.5 Finding and Removing Missing Devices If a device is not online or connected to Policy Manager, Policy Manager may be enforcing an out-dated policy. This could mean the device is permitting actions that should be denied or denying actions that it should be performing. To locate and remove offline devices, perform the following: 1 On Configure tab, click Search > Missing Devices. Figure 7-14.
3PAR Secure Service Policy Manager User’s Guide 7.4 Working in the Pending Requests Tab When a device needs to ask for approval to perform a requested action, the device does the following: ■ Sends a request for approval to Policy Manager. ■ Sends a message to the Collector Server indicating that it needs to get approval from Policy Manager (if the action is a request from the Collector Server). ■ Waits for Policy Manager’s response.
3PAR Secure Service Policy Manager User’s Guide Figure 7-16. Accepting and Denying Pending Requests 2 Click Submit to save your changes. The next time the device contacts Policy Manager for pending requests approvals, Policy Manager notifies the Custodian of all accepted or denied actions. The Custodian will then perform the accepted actions and notify the Collector Server of any denied actions. 7.4.
3PAR Secure Service Policy Manager User’s Guide 7.4.3 Container Actions Some actions are sent to Policy Manager as single action requests, and some are sent as a group of actions, or container, of actions. If a device sent a container of actions on a single contact (ping) to Policy Manager, you need to view the contents of the container package in order to see the actual actions that are pending approval.
3PAR Secure Service Policy Manager User’s Guide Figure 7-17. Viewing Audit Log Entries The audit log information sent from the Custodian and internally-generated information about Policy Manager activity. Information shown in audit log entries from the Custodian includes the following: ■ ■ The Policy Manager group related to the audit log entry. The name of the user who generated the activity that was audited (for example, the Applications user who attempted to perform an action on a Custodian).
3PAR Secure Service Policy Manager User’s Guide 7.5.1 Viewing Audit Logs As stated earlier, you can view all audit log entries, entries for a selected group, or a selected device. By default, audit log entries are displayed for the Global (parent) group and all of its subgroups (children), as shown in Figure 7-17.
3PAR Secure Service Policy Manager User’s Guide ■ dd is the current day. NOTE: There are no bounds on how large audit log files can grow or how many files will be stored on disk. 3PAR recommends that you keep track of disk use and space, and archive the files as needed. 7.5.3 Audited Operations and Activity As discussed earlier, Policy Manager generates audit log entries for the Policy Manager and agents.
3PAR Secure Service Policy Manager User’s Guide 7.5.4 Agent Audit Log Persistence The Custodian queues all Policy Manager related auditing messages in its audit log until the time it sends them to the Policy Manager for processing. If Policy Manager is offline, the Agent continues sending the messages until it can communicate them to Policy Manager.
3PAR Secure Service Policy Manager User’s Guide 8 Troubleshooting and Maintenance In this chapter 8.1 Troubleshooting 8.2 8.2 Maintaining the Server and Database 8.3 When Tomcat5 is operating in standalone mode, you may need to troubleshoot for the following functionality: Troubleshooting and Maintenance 8.
3PAR Secure Service Policy Manager User’s Guide 8.1 Troubleshooting Problem Solution Another web server or other 1 Modify the server.xml file and replace port 8080 process is operating on port with another, unused port greater than 1024 8080, which is the default HTTP (because ports of 1024 or less require super user port that Tomcat attempts to bind to at startup. access for binding).
3PAR Secure Service Policy Manager User’s Guide 8.2 Maintaining the Server and Database Performing maintenance work on the Policy Manager after operations have started is limited to log file maintenance and configuration file settings. It is important that you keep track of the number and size of the audit log files created on disk. You should remove unnecessary files and archive those that are not of immediate need.
3PAR Secure Service Policy Manager User’s Guide 8.
3PAR Secure Service Policy Manager User’s Guide Revision History Release level Revision summary 320-200066. Rev A First release of this manual to support initial release of 3PAR Secure May 2008 Service Policy Manager. 320-200066. Rev B Updated sequence of steps for configuring users and starting the November 2008 3PAR Secure Service Policy Manager. Revision History RH.
3PAR Secure Service Policy Manager User’s Guide RH.