HP Storage Essentials 5.
Legal and notice information © Copyright 2002-2006 Hewlett-Packard Development Company, L.P. Hewlett-Packard Company makes no warranty of any kind with regard to this material, including, but not limited to, the implied warranties of merchantability and fitness for a particular purpose. Hewlett-Packard shall not be liable for errors contained herein or for incidental or consequential damages in connection with the furnishing, performance, or use of this material.
Contents About this guide . . . . . . . . . . . . . . . Contents . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . xxv Intended audience . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Prerequisites . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Related documentation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Document conventions and symbols . . . . . . . . . . . . . . . . . . . . . HP technical support . . . . . . . . . . . . . .
Overview of Discovery Features . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . About Entering Credentials for Elements in HP SIM . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Setting Default User Names and Passwords . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Discovery from HP SIM . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Discovery from HP SE . . . . . . . . . . .
Step 2 - Verify the Discovery Setting for McDATA and Connectrix Switches is Set to SWAPI. 48 Step 3 - Discover the Proxy . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 48 Discovery from HP SIM . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 48 Discovery from HP SE . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Discovery from HP SIM by Using Command View XP Advanced Edition . . . . . . . . . Discovery from HP SE by Using Command View XP Advanced Edition. . . . . . . . . . Discovering HP XP Arrays by using XP Provider for Storage Essentials . . . . . . . . . . . . . . . . Discovery from HP SIM by Using XP Provider for Storage Essentials . . . . . . . . . . . Discovery from HP SE by Using XP Provider for Storage Essentials . . . . . . . . . . . . Discovering IBM Storage Systems . . . . . . . . . . . . . . . . . . .
Stopping the Gathering of Details . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 92 Excluding EMC Symmetrix Storage Systems from Force Device Manager Refresh . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 93 Excluding HDS Storage Systems from Force Device Manager Refresh. . . . . . . . . . . . . . . . . . . 94 Troubleshooting Mode . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Step B - Provide the Sybase Server Name and Port Number. . . . . . . . . . . . . . . . . . . . . . Deleting Sybase Information. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Monitoring Microsoft Exchange . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Adding Microsoft Exchange Domain Controller Access . . . . . . . . . . . . . . . . . . . . . . . . . Deleting a Microsoft Exchange Domain Controller . . . . . . . . . . . . . . . .
Changing the Password of System Accounts . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Using Active Directory/LDAP for Authentication . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Step 1 - Configure the Management Server to Use Active Directory or LDAP . . . . . . . . . . . . . Active Directory . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . LDAP . . . . . . .
Configuring the Deletion of Events . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Managing File System Viewer . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Managing Collectors for File System Viewer . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Adding File Servers . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Checking the Database and Listener Status . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Changing the Password of System Accounts . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Exporting the Database . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Importing the Database . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Re-initializing the Database. . . . . . . . .
Viewing Ports . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Showing the Impact of an Element . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Assigning a Business Cost to an Application . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Expanding the Topology Pane. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Filtering Fabrics . . . . . . . . . .
Accessing the Topology. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . About the New Window Option . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Printing the Topology . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Creating a Virtual Application . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . About the Provisioning Tab . . .
Managing Volumes . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 356 Accessing Information About Volumes . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 356 Filtering Volumes . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 357 About Volumes on HDS Storage Systems . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 358 Creating a Storage Volume . . . . . . . . .
Creating and Deleting Storage Volumes . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 380 10Managing Backups . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 383 About Backup Manager . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Requirements for Using Backup Manager . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Accessing Backup Manager . . . . . . . . . . . . . . .
Step 3 - Select a Zone . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Creating a Zone . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Volume Creation and LUN Security . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Step 1 - Select Storage System . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Step 2 - Select a Volume . . . . . . . . . . . .
Changing the CLARiiON Event Polling Interval . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Brocade Events . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Brocade Switch Events . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Supported Brocade Events . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Filtering Events . . . .
About the Toolbars in Performance Manager . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Comparing the Performance of Different Elements. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Viewing Summary Charts . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Viewing Trending Information for Performance . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Removing Performance Data from a Graph .
Deactivating a Policy . . . . . . . . . . . . . . . Deleting Policies . . . . . . . . . . . . . . . . . . . Providing E-mail Notification for a Policy . . Providing Event Generation for a Policy. . . Providing a Custom Command for a Policy .. .. .. .. .. . . . . . .. .. .. .. .. .. .. .. .. .. . . . . . .. .. .. .. .. .. .. .. .. .. . . . . . .. .. .. .. .. . . . . . .. .. .. .. .. .. .. .. .. .. . . . . . .. .. .. .. .. .. .. .. .. .. . . . . . .. .. .. .. .. . . . . . .. .. .. .. .. ..
How a Depreciation Method Is Calculated . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Calculating Straight Line Depreciation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Calculating Fixed Declining Balance . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Calculating Double Declining Balance . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Viewing Chargeback . . . . . . . . . . . . . . . . . . . . . . . . . .
to Run Behind Firewalls . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Volume Names from Ambiguous Automounts Are Not Displayed . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Installing the Software Security Certificate . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Installing the Certificate by Using Microsoft Explorer 6.0 . . . . . . . . . . . . . . . . . . . . . . . . . .
Manager Query/Reconfiguration . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . A Discovered Sun StorEdge A5000 JBOD Does Not Display Its WWN Properly . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Unable to Monitor McDATA Switches . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Unable to Detect a Host Bus Adapter . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
P . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 687 S . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 688 V. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 688 W . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 689 Z . . . . . . . . . . . . .
36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 xxiv Expanding the Topology Pane. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 280 Filtering Fabrics . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 280 Remote Console . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
83 Capacity in Capacity Manager . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 623 Tables 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 Document conventions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . xxvi Status Light Settings . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 xxvi Variables for Only Hosts*. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 296 Variables for Only Applications. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 296 Buttons on the Remote Console . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 299 Drop-Down Menu Options .
85 MVC_SWITCHSUMMARYVW . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 509 86 MVC_PORTSUMMARYVW . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 511 87 MVC_ZONESUMMARYVW . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 511 88 MVC_ZONEVW . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 512 89 MVC_PATHVW . . . . . . . . . . . . . . . . . . . . . . .
132 133 134 135 136 137 138 139 140 141 142 143 144 145 xxviii Host Monitoring Support . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 557 Toolbar in Lower Pane of Capacity Manager . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 564 Explanation of the Properties of the Capacity Levels for HDS Array Groups . . . . . . . . . 570 Policy Templates. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
About this guide This guide provides information about: • Discovering elements • Managing Security • Configuring HP • Monitoring and managing elements • Provisioning elements • Viewing events from elements • Viewing reports about elements • Viewing performance, capacity and chargeback information • Troubleshooting HP Intended audience This guide is intended for: • Network Engineers • Administrators • Any one that needs to monitor and/or manage their file servers Prerequisites Prerequisites for using this
Document conventions and symbols Document conventions Table 1 Convention Element Medium blue text: Figure 1 Cross-reference links and e-mail addresses Medium blue, underlined text (http://www.hp.
TIP: Provides helpful hints and shortcuts. HP technical support Telephone numbers for worldwide technical support are listed on the HP support web site: http://www.hp.com/support/.
xxviii
1 Overview This chapter describes the following: • ”About This Product” on page 1 • ”Suggested Topics for First-Time Users” on page 4 • ”Product Components” on page 4 • ”About the User Interface on the SE Home Page” on page 6 • ”Installing the Java Plug-in” on page 11 • ”Installing the Software Security Certificate” on page 12 • ”Stopping the Service for the Management Server” on page 14 About This Product IMPORTANT: If you access HP Systems Insight Manager through HTTP over SSL (HTTPS), you must provide
Storage Essentials, you see a submenu listing several features. These features are only in Storage Essentials. Figure 1 Accessing Features from the Tools > Storage Essentials Menu Some features are not directly accessible from the menus in HP Systems Insight Manager. For example, to edit a role, you must access Storage Essentials first. You can access Storage Essentials numerous ways. One way to access Storage Essentials is to select Tools > Storage Essentials > Home.
The Documentation Center provides the documentation set for Storage Essentials, including the PDFs, online help, release notes, and support matrix. Figure 3 Accessing the Documentation Center To manage and monitor your elements in Storage Essentials, discover your elements in HP Systems Insight Manager or HP Storage Essentials. This product provides two types of discovery: • Discovery from HP SIM - Lets you perform all of your discovery tasks within the framework of Systems Insight Manager.
The management server's integrated storage management lowers your cost of acquiring and managing a heterogeneous storage environment. Storage Management Terms • CIM - A common data model of an implementation-neutral schema for describing overall management information in a network/enterprise environment. • Web-Based Enterprise Management (WBEM) - An initiative based on a set of management and Internet standard technologies developed to unify the management of enterprise computing environments.
• Management server - The management server provides various tools to let you monitor and manage your SAN devices. See ”Management Server Components” on page 5 for more information about these tools. • CIM Extensions - A CIM Extension gathers information from the operating system and host bus adapters. It then makes the information available to the management server. For more information, see the following in the glossary. Refer to the Installation Guide for information on how to install the CIM Extensions.
• Command Line Interface - The command line interface (CLI) provides an alternate way for you to manage elements the management server monitors. You can use the CLI commands in scripts to manage your storage. • File System Viewer - File System Viewer does a recursive lookup on the file system and stores the information in an embedded database. File System Viewer can scan files very quickly because of its structure in the database and because it uses a multi-threaded process.
About the User Interface on the SE Home Page The SE Home page provides a gateway into the functionality for SE. To access the SE Home page, select Tools > Storage Essentials > Home. The user interface for the Home page is split into several panes: • Top pane - It provides access to discovery and configuration features, in addition to features that let you change your login profile. • Left pane - Displays the status light.
Table 2 Status Light Settings Discovery Backup Topology Details Include infrastructure details NOTE: When the status light is orange or red, you may want to click the text to the left of the light to access discovery logs quickly (Tasks & Logs > View Storage Essentials Log). About the Left Pane The left pane displays the buttons used to access the management server's main utilities.
• Policy Manager - Policy Manager lets you set up rules so that an automated response occurs when a particular event happens or a value triggers the system. See ”About Policy Manager” on page 579. • Business Tools - The management server provides advisors and automators. Advisors provides detailed information for you to make informed decisions about your network, such as non-compliant HBA firmware. Automators let you automate particular tasks.
Table 3 Icons on the Home Page (continued) Feature Description Where to Find More Information System Manager shows you the topology of your SAN and gives you the ability to explore details about each element. ”Viewing Element Topology and Properties” on page 245 Performance Manager provides detailed performance management capabilities enabling you to visualize what you have and how it is performing.
Table 3 Icons on the Home Page (continued) Feature Business Tools Reporting Description Where to Find More Information Business Tools helps you manage the business aspect of your network. You can use Advisors to retrieve important network information, and Automators to automate tasks. ”Business Tools” on page 643 Reporting provides reports using data collected by the management server.
To install the Java plug-in: 1. Go to the following URL and download the installation file for the Sun JRE when asked: http:///appiq/j2re-1_4_2_04-solaris-sparc.sh where is the hostname of the management server. 2. In a terminal window, execute the downloaded file in a directory where you want the JRE installed. This executable installs the Sun JRE on your computer.
Installing the Certificate by Using Microsoft Explorer 6.0 1. Access the management server by typing the following: https://machinename where machinename is the name of the management server. 2. When the security alert message appears, click OK. If you do not want the Web browser to warn you about a secure connection at any Web site, select the In the future, do not show this warning option. 3. When you are told there is a problem with the site's security certificate, click the View Certificate button. 4.
"The security certificate has a valid name matching the name of the page you are trying to view." When you change the certificate, you must use the generateAppiqKeystore.bat program to delete the original certificate. Then, use the generateAppiqKeystore.bat program to create a new certificate and to copy the new certificate to the management server. To change the certificate: 1. Go to the %MGR_DIST%\Tools directory. 2.
2 Discovering NAS Devices, Tape Libraries, Switches and Storage Systems Before you can use the management server, you must make the software aware of the elements on your network. An element is anything on the network that can be detected by the management server, such as a switch. This is done through the discovery process. Discovery obtains a list of discovered elements and information about their management interface and dependencies.
• ”Overview of Discovery Features” on page 22 • ”Step 1 - Discover Switches” on page 31 • ”Step 2 - Discover Storage Systems, NAS Devices and Tape Libraries” on page 58 • ”Step 3 (Discovery from HP SE Only) - Build the Topology” on page 85 • ”Step 4 - Discovery Data Collection or Get Details” on page 90 • ”Troubleshooting Mode” on page 94 • ”Managing McDATA and EMC Connectrix Switches” on page 95 • ”Assigning a File Extension in Netscape 7” on page 97 • ”Filtering Discovery Groups” on page 98 • ”Moving Elem
from HP SIM. Credentials are passed from HP SIM to HP SE, so if you perform Discovery from HP SIM, the user names and passwords for discovering those elements appear in HP SE. • Multiple entries in SE may result when modifying username and password in HP SIM - If you use Discovery from HP SIM, the user name and passwords for those elements are forwarded HP SE. If you modify a user name for an element in Discovery from HP SIM, the modification is passed to HP SE as a new discovery entry for that element.
Selective Discovery Filter The Selective Discovery Filter provides the capability to selectively filter the devices that are passed from HP SIM to HP SE for discovery operations. The filter is a file created by the user that contains a list of the IP addresses that should (or should not) be passed to HP SE. The filter does not impact the device discovery operations within HP SIM. It only restricts the data that is sent from HP SIM to HP SE.
IMPORTANT: Because of subtle differences between discovery from HP SIM and HP SE, HP strongly recommends you do either all of your discovery steps in HP SIM or HP SE. See ”Differences Between HP SE and HP SIM Discovery” on page 16 for more information about the differences between HP SIM and HP SE discovery. Discovery from HP SIM Steps Discovery of switches, storage systems, NAS devices and tape libraries consists of several steps: 1. Discover your switches by using HP Systems Insight Manager.
• After you discover an EMC Connectrix or McDATA switch, the IP address displayed next to the name of the switch is actually the IP address of the service processor for the switch in the Get Details/Discovery Data Collection screens. To find the IP address of the switch, click the link for the switch in one of the following screens: • Run Discovery Data Collection screen (Options > Storage Essentials > Discovery > Run Discovery Data Collection) for Discovery from HP SIM.
as they can be accessed directly. Make sure the proxy service has started. On a computer running Windows, this can be determined by looking in the Services window. EMC Solutions Enabler version 5.1 requires additional steps for discovery. See ”Discovering EMC Solutions Enabler 5.1” on page 62 for more information. NOTE: Before performing any provisioning operations that involve a Brocade switch you must perform Discovery Step 3 for any subset of elements that includes this Brocade switch.
Use the following table for SE discovery steps. See ”Accessing the Discovery Pages for HP SIM and HP SE” on page 17 if needed. Table 5 HP SE Discovery Steps for Switches, NAS Devices, and Storage Systems Step Description 1 If you have several switches and storage systems that use the same password and user name, set that password and user name as the default. See ”Setting Default User Names and Passwords” on page 23 for more information. 2 Discover your switches.
This section describes the following: • ”About Entering Credentials for Elements in HP SIM” on page 23 • ”Setting Default User Names and Passwords” on page 23 • ”Adding an IP Range for Scanning” on page 24 • ”Adding a Single IP Address or DNS Name for Discovery” on page 25 • ”Modifying a Single IP Address Entry for Discovery” on page 27 • ”Removing Elements from the Addresses to Discover List” on page 28 About Entering Credentials for Elements in HP SIM For elements you want to discover and manage in HP SI
another user name and password, you would also enter this user name and password. Do not specify the user name and password for the storage system in the individual range because that overrides the default user name and password. To access a Windows-based device, prefix the user name with domain_name\, as shown in the following example. This is required by the Windows login mechanism.
Discovery from HP SE Instead of adding each IP address individually for scanning, the management server can detect a range of IP addresses, automatically populating the list of elements to be discovered. Keep in mind the following: • Include in the scanning, the proxy server that has a direct connection or a SAN connection to the management server, such as the EMC Solutions Enabler. Make sure the proxy service has started.
• The following steps provide general information on how to discover an element. See Table 6 on page 32, Table 11 on page 59, and Table 13 on page 109. • To obtain drive-related statistics, install a proxy host. Ensure the proxy host has at least one LUN rendered by each controller of the array. See ”Obtaining Disk Drive Statistics from Engenio Storage Systems” on page 135 for more information. • (Discovery from HP SE only) The Do Not Authenticate option is for Engenio storage systems.
• If you do not want to do provisioning on a storage system, leave the Password field blank. For Engenio storage systems, you must also select the Do Not Authenticate option. • If you want to do provisioning on a storage system, type the corresponding password for controller or proxy and make sure the Do Not Authenticate option is not selected. • For all other elements other than storage systems, provide the password if it is necessary for authentication.
4. To add or change a comment, type a comment in the Comment field. 5. To change the password: a. Click the Change password button. b. Type the new password in the New Password field. c. Type the password again in the Verify Password field. d. Click OK in the Change Password page. 6. Click OK in the Edit Address for Discovery page. 7. Select the option, Step 2 - Topology: Select the discovered elements and build the topology view. 8. Select the element for which you changed the user name and/or password. 9.
opens in a separate web browser window. Click the Discovery icon in the upper-right pane of the Storage Essentials home page. 2. Click Setup. 3. Select Step 1 at the top of the page. 4. Do one of the following: • Select the IP addresses and/or IP ranges you want to remove from the list. Then, click the Delete button. • Click the button corresponding to the elements you want to remove from the Addresses to Discover list.
To prevent re-entering the information for each management server instance, you can import the same file for multiple management server instances. IMPORTANT: When you import a file, your previous settings are overwritten. If you are shown an error message when you try to import the discovery settings, verify you are using the right password. If you are using the correct password, there could be a possibility that the file is corrupt. To import discovery settings from a file: 1.
• System type and then by System name. This option loads the systems being managed by HP Systems Insight Manager into the Contents window. 4. If you did not select Empty File, click Initialize Now to load the hosts file. Otherwise, enter the contents of the hosts file in the Contents section. 5. Click OK to save the hosts file, or click Cancel to cancel any changes you have made.
Step 1 - Discover Switches This section describes the following: • ”SMI-S Switches Must Be Removed and Rediscovered After Upgrading” on page 33 • ”Discovering Brocade Switches” on page 34 • ”Discovering CNT Switches” on page 38 • ”Discovering Cisco Switches” on page 40 • ”Discovering Sun StorEdge and QLogic Switches” on page 42 • ”Changing the SNMP Trap Listener Port for Sun StorEdge Switches” on page 44 • ”Discovering McDATA and EMC Connectrix Switches” on page 45 • ”(Discovery from SE Only) Excluding McDA
Table 6 Discovery Requirements for Switches (continued) Element Discovery Requirements Additional Information Cisco switches (SNMP) Enter the IP address/DNS name of the Cisco switch. Enter the SNMP read-only community string as the user name. You do not need to enter a password if you discover it in HP SE. HP SIM requires a password. See ”Discovering Cisco Switches” on page 40.
IMPORTANT: Refer to the support matrix for information on which models and firmware revisions are supported through SMI-S. HP SIM 1. To remove elements from the HP SIM database: a. On the HP SIM home page, click Systems in the left pane. b. Select the elements you want to delete. c. Click Delete. 2. Rediscover the Brocade, Cisco, QLogic, or CNT switches in HP SIM. See ”Step 1 - Discover Switches” on page 31. 3. Perform Discovery Data Collection.
IMPORTANT: When using the Brocade Fabric Access API, Brocade recommends that the switch with the most recent version of Brocade API firmware (newer than v.2.6.x) is configured as the proxy switch. When discovering Brocade SMI-S hosts the IP address of the Brocade SMI-S proxy server must be entered for Discovery Step 1. Be sure to see the Support Matrix for the latest details on firmware requirements.
3. When prompted for the user name and password, supply them. 4. Type the following to see what is supported on the switch or Brocade SMI-S agent: configshow The output is displayed in a page-by-page format. 5. Select all of the output. 6. Paste the output in a text editor, for example Notepad. Use the Find command to search for rpc.rapid. 7. Verify Rapid is set to one, as displayed below: rpc.
• IP address or system name of the Brocade SMI-S proxy server you want to discover. See ”Adding an IP Range for Scanning” on page 24 or ”Adding a Single IP Address or DNS Name for Discovery” on page 25 for more information. • User Name for the SMI-S proxy server for the Admin account • Password for the SMI-S proxy server for the Admin account NOTE: These instructions specify discovery using the standard port (5988 - non secure or 5989 - secure) for the Brocade SMI-S provider. For example: https://16.18.236.
• The element does not require authentication. • Fabric Access API This field can be left blank if one or more of the following conditions are fulfilled: • The element's user name and password are one of the default user names and passwords. • The element does not require authentication. 7. In the Password field, do one of the following: • SMI-S Type the password for the SMI-S proxy server.
This provider communicates with CNT InVsn Enterprise Manager to obtain information about the switch. The provider requires a certain version of InVsn depending on the switch model. See the following table for more information. Table 8 Required Switch Models and InVsn Versions for Discovery Switch Model InVsn Software Version FC/9000 9.0 or later UMD 9.5 or later IMPORTANT: The InVsn credentials are used by the SMI-S provider.
• IP Address or System name of the primary IP address of the host running the InVsn software you want to discover. See ”Adding an IP Range for Scanning” on page 24 or ”Adding a Single IP Address or DNS Name for Discovery” on page 25 for more information. • Namespace - If the //root/cntfabric namespace for the InVSN software is not already included in the wbemportlist.xml file on the server running HP SIM, add this namespace as described in the HP SIM documentation. • Port number for the InVsn software.
NOTE: The Cisco MDS 9020 Multilayer Fabric Switch does not support VSANs. Keep in mind the following for Cisco SNMP switches: • When you discover a Cisco SNMP switch, you do not need to provide a password if you discover it in HP SE. HP SIM requires a password. • You can view zones, zone sets and zone aliases on a Cisco switch; however, you cannot use the management server to create, modify or remove them from a Cisco switch.
• For Cisco switches with SNMP connections: Provide the user name for the switch. This is the public community SNMP string for the switch. • For Cisco switches with SMI-S connections: Provide the SMI-S user name. • HP SIM does not allow blank passwords. Do one of the following: • Enter anything for the password for Cisco SNMP switches. • A password is required on SMI-S switches. Enter the password. Refer to the HP SIM documentation for more details. Discovery from HP SE To discover a Cisco switch: 1.
Discovering Sun StorEdge and QLogic Switches The management server discovers Sun StorEdge switches through an SNMP connection and QLogic switches—depending on the model—are discovered through SNMP or SMI-S. See the Support Matrix for details on supported switch models and firmware revisions. Keep in mind the following for Sun StorEdge and QLogic SNMP switches: • When you discover a Sun StorEdge or QLogic SNMP switch in HP SE, you do not need to provide a password if you discover it in HP SE.
• For QLogic switches with SMI-S connections: Provide the SMI-S user name. • HP SIM does not allow blank passwords. Do one of the following: • Enter anything for the password for Sun StorEdge and QLogic SNMP switches. • A password is required on SMI-S switches. Enter the password. See the HP SIM documentation for more details. Discovery from HP SE To discover Sun StorEdge or QLogic switches: 1. Click Tools > Storage Essentials > Home > Discovery > Setup.
2. Click Show Default Properties at the bottom of the page. 3. Copy the cimom.snmpTrapListenerPort property. How you copy the text depends on your Web browser. If you are using Microsoft Explorer or Netscape Navigator, select the text and then right-click the selected text. Then, select Copy. 4. Return to the Advanced page (Options > Storage Essentials > Manage Product Health. Then, click Advanced in the Disk Space tree). 5. Paste the copied text into the Custom Properties field.
Table 9 Discovery Settings for McDATA and Connectrix Switches (continued) Discovery SWAPI setting through a Proxy SNMP setting Through a Proxy Contacting the switch directly Provisioning Limitations The SWAPI setting lets you activate a zone set, in addition to creating, editing, and deleting zones and zone sets. You cannot manage or view information about zone aliases. This SNMP setting through a proxy does not let you manage or access information about zones, zone sets or zone aliases.
• If you discovered Connectrix Manager or EFC Manager, only enable SNMP trap forwarding to the management server on the Connectrix Manager or EFC Manager, not on the individual switches.Connectrix Manager or EFC Manager should be configured to forward SNMP traps to the IP address of the management server, and the community string should match the user ID you used to discover Connectrix Manager or EFC Manager.
Step 2 - Verify the Discovery Setting for McDATA and Connectrix Switches is Set to SWAPI By default the discovery settings for McDATA and Connectrix switches is set to SWAPI. If you believe it has been changed to SNMP, you can perform the following steps to change it back to SWAPI. 1. Click Options > Storage Essentials > Manage Product Health. Then, click Advanced in the Disk Space tree. 2. Click Show Default Properties at the bottom of the page. 3. Copy the following property.
2. Select Step 1 at the top of the page. 3. Click the IP Addresses tab. 4. Click the Add Address button. 5. In the IP Address/DNS Name field, type the IP address or DNS name of the EFC Manager/Connectrix Manager you want to discover. 6. In the User Name field, type the user name for EFC Manager/Connectrix Manager. This field can be left blank if one or more of the following conditions are fulfilled: • The element's user name and password are one of the default user names and passwords.
(Discovery from HP SE only) To fix this problem, use the Test button on the discovery screen to check the status of the SWAPI connection. If necessary, re-discover the EFCM to re-establish the SWAPI connection. Once the connection is working, the provisioning operation should succeed. If it continues to fail because the active zone set information is out of date, do a Get Details for this element to update the zoning information.
• IP address or system name of the EFC Manager/Connectrix Manager you want to discover. See ”Adding an IP Range for Scanning” on page 24 or ”Adding a Single IP Address or DNS Name for Discovery” on page 25 for more information. • User name - The default user name, which is “public” (the read-only community string). This is the user name of the proxy. • HP SIM does not allow blank passwords. Enter anything for the password. See the HP SIM documentation for more detailed information.
IMPORTANT: To obtain more information about the switch, you need to map the topology and obtain element details. See the topics, ”Building the Topology View” on page 85 and ”Get Details or Discovery Data Collection” on page 90. (Only applies to Discovery from HP SE)Step 3 - Make Sure There Are No Port Conflicts for Receiving SNMP Traps IMPORTANT: This step does not apply to discovery from HP SIM.
Contacting a McDATA or Connectrix Switch Directly The management server uses SWAPI to discover a McDATA or Connectrix switch by its IP address or DNS name. SWAPI is the default setting. If you want to discover McDATA or Connectrix switches by SNMP, you must change to SNMP before you begin the following steps. See ”(Discovery from HP SE only) Changing the Discovery Settings” on page 54.
12.To start discovering elements on the network, click the Start Discovery button on the IP Addresses tab. Discovery is complete when the software displays the DISCOVERY COMPLETED message in the Log Messages field. IMPORTANT: To obtain more information about the switch, you need to map the topology and obtain element details. See the topics ”Building the Topology View” on page 85 and ”Get Details or Discovery Data Collection” on page 90.
(Discovery from HP SE only) Changing the Discovery Settings To change the discovery settings from SWAPI to SNMP or vice versa: 1. Delete all McDATA and Connectrix switches in the application by going to the Get Topology for Discovered Elements table (Tools > Storage Essentials > Home > Discovery > Topology) and selecting the switches you want to delete. Then, click the Delete button. See ”Accessing the Discovery Pages for HP SIM and HP SE” on page 17 if needed. 2.
(Discovery from SE Only) Excluding McDATA and EMC Connectrix Switches from Discovery IMPORTANT: This step only applies to discovery from SE only. Specific McDATA and Connectrix switches can be excluded from discovery by using system properties. To exclude one or more switches from discovery, you must modify the cimom.mcdata.exclude property. Set the property cimom.mcdata.
7. Add the Worldwide Names corresponding to the switches you want to exclude from discovery. Separate additional Worldwide Names with a comma, as shown by the following example: cimom.mcdata.exclude=1000080088A07024,1000080088A0D0B6 where 1000080088A07024 and 1000080088A0D0B6 are the Worldwide Names for McDATA and Connectrix switches. 8. When you are done, click Save. While AppStorManager is restarting, users are not able to access the management server.
The following task statuses are provided by the Task Dashboard: Table 10 Task Status Descriptions Status Description Not Found This task can not be found on this server. Completed This task has been completed successfully. Failed This task failed with an error. Aborted This task has been aborted by the user or other automated actions. In Progress This task is in progress. CPU and disk activities are active on this server. Queued This task is scheduled to be executed in the future.
• ”Discovering EMC Solutions Enabler 5.
Table 11 Discovery Requirements for Storage Systems, Tape Libraries & NAS Devices (continued) Element Discovery Requirements Additional Information Engenio storage systems Can be discovered two ways: See ”Discovering Engenio Storage Systems” on page 65. • Entering the IP address/DNS name, user name and password of a controller for an Engenio storage system. Discovers only the corresponding IP address of the controller.
Table 11 Discovery Requirements for Storage Systems, Tape Libraries & NAS Devices (continued) Element Discovery Requirements Additional Information Xiotech Storage Systems Discover the storage system directly. See ”Discovering Xiotech Storage Systems” on page 78. HP NAS Devices Discover the device directly. See ”Discovering HP NAS Devices on Windows” on page 79 and ”Discovering HP NAS Devices on Linux” on page 80. NetApp Devices Discover the device directly.
Discovery from HP SE To discover a 3PAR storage system: 1. Click Tools > Storage Essentials > Home. See ”Accessing the Discovery Pages for HP SIM and HP SE” on page 17 if needed. Discovery > Setup. 2. Select Step 1 at the top of the page. 3. Click the IP Addresses tab. 4. Click the Add Address button. 5. In the IP Address/DNS Name field, the following for the 3PAR storage system you want to discover. where is the IP address or DNS name of the 3PAR storage system you want to discover. 6.
2. Add the following lines to the nethost file: [management server name] SYSTEM [management server IP] SYSTEM where • [management server name] is the DNS name of the management server • [management server name] is the IP address of the management server 3. Add the following line to the /opt/emc/API/symapi/config/netcnfg file: SYMAPI_SERVER - TCPIP 2707 4. Use the following command to start the daemon: /opt/emc/SYMCLI/V5.5.0/bin/symapisrv -service SYMAPI_SERVER start -background 5.
If the cimom.symmetrix.exclude property, the management server discovers and obtains details from all EMC Symmetrix Storage Systems managed by discovered Solutions Enablers.
for the Navisphere CLI belong to EMC. For Solaris, you must install the Navisphere Disk Array Management Tool CLI (NAVICLI). Contact your EMC representative for more information about obtaining the Navisphere CLI. Distribution rights for the Navisphere CLI belong to EMC. IMPORTANT: Before you discover your CLARiiON storage systems, you must have already installed all required software components for your CLARiiON storage system, such as the Navisphere Host Agent.
Authenticate option. The management server will still monitor the Engenio storage system; however, you will not be able to do provisioning tasks. Discovery from HP SIM To discover Engenio storage systems, provide the following information in HP Systems Insight Manager: • IP address or system name of the controller or proxy you want to discover. See ”Adding an IP Range for Scanning” on page 24 or ”Adding a Single IP Address or DNS Name for Discovery” on page 25 for more information.
for the server running HiCommand Device Manager. Do not point to the disk array for the storage system. To obtain information about HDS storage systems, the management server must be able to access the port HiCommand Device Manager uses to listen. By default, HiCommand Device Manager listens on port 2001, and the management server assumes this configuration at discovery time. If HiCommand Device Manager uses a different port, specify this other port when you discover HiCommand Device Manager.
1. Access the Discovery Setup page (Tools > Storage Essentials > Home > Discovery > Setup). 2. Click the Add Address button. 3. In the IP Address/DNS Name field, type the name of the server and the port HiCommand Device Manager uses to listen separated by a colon, as shown in the following example: proxy2:1234 where • proxy2 is the name of the server running HiCommand Device Manager • 1234 is the port HiCommand Device Manager uses to listen 4.
1. Select Options > Storage Essentials > Manage Product Health. Then, click Advanced in the Disk Space tree. 2. Click Show Default Properties at the bottom of the page. 3. Copy the following command. How you copy the text depends on your Web browser. If you are using Microsoft Explorer or Netscape Navigator, select the text and then right-click the selected text. Then, select Copy. #cimom.hds.exclude=61038,61037 4. Return to the Advanced page. 5. Paste the copied text into the Custom Properties field.
• IP address or system name of the HP CIMOM you want to discover. See ”Adding an IP Range for Scanning” on page 24 or ”Adding a Single IP Address or DNS Name for Discovery” on page 25 for more information. • User name for accessing the HP CIMOM • Password for accessing HP CIMOM. Discovery from HP SE To discover HP EVA or MSA storage systems: 1. Click Tools > Storage Essentials > Home on the HP SIM home page menu. The HP SE home page opens in a separate web browser window.
• IP address of the server containing the HP CIMOM The following should be installed on a server before you discover an HP XP storage system if you are discovering the storage system by using Command View XP: • HP Storage Management Appliance software • HP OpenView Storage Operations Manager • HP StorageWorks Command View XP Discovery from HP SIM by Using Command View XP To discover HP storage systems by using Command View XP, provide the following information in HP Insight Manager: • IP address or system n
12.To start discovering elements on the network, click the Start Discovery button on the IP Addresses tab.
11.Click OK. 12.To start discovering elements on the network, click the Start Discovery button on the IP Addresses tab.
Discovering IBM Storage Systems Before you can discover an IBM storage system, you must install the IBM CIM Agent. For Enterprise Storage Server (ESS) devices, the CIM Agent is called “CIM Agent for ESS”; for DS devices and mixed DS and ESS environments, use the “CIM Agent for DS Open (API)”. It is recommended not to install the IBM CIM Agent on the management server. Refer to the “CIM Agent for DS Open (API) Installation and Configuration Guide” for details on configuring the CIM Agent.
NOTE: You do not need to provide the interop namespace because the management server includes the interop namespace for IBM storage systems in its default list. Discovery from HP SIM IMPORTANT: First discover the host running the IBM CIMOM. See ”Adding an IP Range for Scanning” on page 24 or ”Adding a Single IP Address or DNS Name for Discovery” on page 25 for more information. Then, select Options > Protocol Settings > System Protocol Settings and select the host you discovered as a target.
11.Click OK. 12.To start discovering elements on the network, click the Start Discovery button on the IP Addresses tab. Discovering Sun StorEdge 3510 Storage Systems Before you can discover a Sun StorEdge 3510 storage system, you must set up a Sun StorEdge 3510 SMI-S provider and a Sun StorEdge™ Configuration Service. The provider cannot be installed on the same computer as the management server due to a port conflict.
• User Name of the system running the Sun StorEdge 3510 SMI-S provider. • Password of the Sun StorEdge 3510 SMI-S provider. Refer to the HP SIM documentation for more information about discovering storage systems with HP SIM. Discovery from HP SE To discover Sun StorEdge 3510 storage systems: 1. Click Tools > Storage Essentials > Home on the HP SIM home page menu. The HP SE home page opens in a separate web browser window. Click Discovery > Setup in the upper-right pane of the HP SE home page window. 2.
1. Click Tools > Storage Essentials > Home on the HP SIM home page menu. The HP SE home page opens in a separate web browser window. Click Discovery > Setup in the upper-right pane of the HP SE home page window. 2. Select Step 1 at the top of the page. 3. Click the IP Addresses tab. 4. Click the Add Address button. 5. In the IP Address/DNS Name field, type the IP address or DNS name of the storage system you want to discover. 6. Enter the User Name of the storage system. 7.
6. Leave the User Name field blank. 7. Leave the Password field blank if you do not want to do provisioning on the storage systems. If you want to do provisioning, type the corresponding password for controller or proxy. 8. If you typed a password in the previous step, retype the password in the Verify Password field. 9. In the Comment field (optional), type a comment for additional information.
• /root/cimv2 is its namespace. 6. You can leave the user name and password for the Xiotech storage system blank. 7. In the Comment field (optional), type a comment for additional information. The information typed into this field is displayed under the Comment column in the Addresses to Discover list (Tools > Storage Essentials > Home > Discovery > Setup). 8. Do not select the Do Not Authenticate option. 9. Click OK. 10.
1. Click Tools > Storage Essentials > Home on the HP SIM home page menu. The HP SE home page opens in a separate web browser window. Click Discovery > Setup in the upper-right pane of the HP SE home page. 2. Select Step 1 at the top of the page. 3. Click the IP Addresses tab. 4. Click the Add Address button. 5. In the IP Address/DNS Name field, type the IP address or DNS name of the HP NAS device you want to discover. 6. Enter the User Name of the HP NAS device. You must provide a privileged login. 7.
• IP address or system name of the HP NAS device to discover. See ”Adding an IP Range for Scanning” on page 24 or ”Adding a Single IP Address or DNS Name for Discovery” on page 25 for more information. • User name of the HP NAS device. You must provide a privileged login. • Password used to access the HP NAS device. Refer to the HP SIM documentation for more information about HP SIM. Discovery from HP SE To discover an HP NAS device on Linux: 1.
• the root user • a user belonging to the “Administrators” group. This is a predefined group by NetApp. • a user belonging to a group that has the following roles: api-*, cli-*, login-http-admin, and at least one of the following: login-console, login-telnet, login-rsh, or login-ssh • Administrative HTTP access to the device can be restricted through the httpd.access and httpd.admin.access options. If that is the case, then the management server needs to be registered with the device.
Discovering Sun NAS Devices NOTE: You do not need to provide the interop namespace because it is included in the management servers list of default namespaces. Discovery from HP SIM To discover a Sun NAS Device, provide the following information in HP Insight Manager: • IP address or system name of the server running the SMI-S provider for the Sun NAS devices you want to discover.
Discovering HP and IBM Tape Libraries Discovery from HP SIM To discover a tape library, provide the following information in HP Systems Insight Manager: • IP address or system name for the tape library. See ”Adding an IP Range for Scanning” on page 24 or ”Adding a Single IP Address or DNS Name for Discovery” on page 25 for more information. • For HP tape libraries you do not need to provide a namespace. • For IBM tape libraries the namespace (/root/ibm) is already provided in the wbemportlist.
• ”Modifying the Properties of a Discovered Address” on page 86 • ”Deleting Elements from the Product” on page 87 Building the Topology View After you discover elements, the management server requires you to build a topology view, which is a graphical representation of port-level connectivity information. If a switch has more than one connection to an element, the number of connections is displayed above the line linking the switch and the element.
5. If you see errors in the topology, look at the log messages, which can provide an indication of what went wrong. See the topic, ”Viewing Log Messages” on page 56 for more information about the messages that appear in this tab. Look at Event Manager for additional information. Access Event Managerby clicking the Event Manager button in the left pane. To obtain troubleshooting information, see the topic, ”Troubleshooting Topology Issues” on page 665.
1. Click Options > Storage Essentials > Discovery > Run Discovery Data Collection. 2. Click the button corresponding with the element you want to modify. 3. To move an element to another discovery group, select its new discovery group from the Discovery Group drop-down menu. 4. Click OK in the Edit Discovered Element window. Discovery from HP SE To change the discovery properties of an element: 1. Click Tools > Storage Essentials > Home on the HP SIM home page menu.
proxies that were used to discover the element, the element may reappear the next time you Get Details/Discovery Data Collection. For example, assume you want to delete Switch_A. Switch_B and Switch_C were used to discover Switch_A. If you delete only Switch_B and Switch_A, Switch_A will most likely reappear when you Get Details/Discovery Data Collection because it is still accessible by Switch_C.
(Discovery from HP SE Only)Deleting Elements Using Discovery Step 2 (Topology) IMPORTANT: These steps are only accessible from Discovery from HP SE. To delete multiple elements using Discovery Step 2 (Topology): 1. Click Tools > Storage Essentials > Home from the HP SIM home page. The Storage Essentials home page opens in a separate web browser window. Click Discovery > Topology in the upper-right pane of the HP Storage Essentials home page. 2.
• ”Excluding EMC Symmetrix Storage Systems from Force Device Manager Refresh” on page 92 • ”Excluding HDS Storage Systems from Force Device Manager Refresh” on page 93 Get Details or Discovery Data Collection Get Details or Discovery Data Collection is required to obtained detailed information from discovered elements. Get Details/Discovery Data Collection must be performed before you can do provisioning and/or obtain provisioning information, such as data about zone sets and LUN numbers.
Details/Discovery Data Collection table. These UNIX hosts appear as missing until they are removed from quarantine. See ”Removing an Element from Quarantine” on page 99 for information on how to remove an element from quarantine. To obtain details about the devices on the network: 1. Do one of the following: • Discovery from HP SIM - Click Options > Storage Essentials > Discovery > Run Discovery Data Collection. • Discovery from HP SE - Click Tools > Storage Essentials > Home on the HP SIM home page menu.
IMPORTANT: If you stop the gathering of details, you should reschedule it. This type of collection obtains detailed information of devices in the network. To stop the gathering of details: 1. Do one of the following: • Discovery from HP SE - Click Tasks & Logs > View Storage Essentials Logs. • Discovery from HP SIM - Click Options > Storage Essentials > Discovery > View Logs. 2. On the View Logs page, click the “Click here” portion of the following message: Click here if you wish to stop getting details.
6. Make sure the property is not commented out by removing the hash (#) symbol in front of the property. Add the serial numbers corresponding to the Symmetrix storage systems you want the refresh to skip. Separate additional serial numbers with a comma, as shown by the following example: cimom.emc.skipRefresh=000183500570,000183500575 where 000183500570 and 000183500575 are serial numbers for Symmetrix storage systems.
3. Copy the following command. How you copy the text depends on your Web browser. If you are using Microsoft Explorer or Netscape Navigator, select the text and then right-click the selected text. Then, select Copy. # cimom.HdsSkipRefresh=61038,61037 4. Return to the Advanced page (Options > Storage Essentials > Manage Product Health. Then, click Advanced in the Disk Space tree). 5. Paste the copied text into the Custom Properties field. How you paste the text depends on your Web browser.
“Discovery->Setup in Troubleshooting mode” link located in the step 1 error message. Clicking this link will bring you to the step 1 page with Troubleshooting Mode enabled. NOTE: Step 3 Troubleshooting Mode only identifies quarantined hosts.
IMPORTANT: Obtaining details takes some time. You might want to perform this process when the network and the managed elements are not busy. To Get Details/Discovery Data Collection: 1. Do one of the following: • Discovery from HP SE - Start the HP SE home page, click Tools > Storage Essentials > Home. The HP SE home page opens in a separate web browser window. Click Discovery > Details on the HP SE home page.
(Discovery from HP SE Only)Swapping McDATA and EMC Connectrix Switches After replacing switches in the service processor, you must make the management server aware of your changes by removing the old switches from the user interface and then performing Get Details/Discovery Data Collection so the management server can discover the new switches. If you are adding switches to a service processor that has not been discovered yet, see the topic, ”Discovering McDATA and EMC Connectrix Switches” on page 45.
1. Click the download file link or button in the software. 2. Click the Advanced button in the lower-left corner. 3. In the Description of type field, delete the existing text and type a description of the file. 4. In the File extension field, delete the existing text and type the file extension. 5. Click OK. The next time Netscape 7 sees the associated MIME type, it will assign the extension you typed in the File Extension field. 6. Click OK.
Discovery Data Collection for Discovery from HP SIM or Get Details and getting the topology for Discovery from HP SE. For example, you could specify that the management server gets Get Details/Discovery Data Collection for only the elements in Discovery Group 1, thus, saving you time. This feature is sometimes referred to as segmented replication because you can specify gettingGet Details/Discovery Data Collection for a segment of the discovered elements.
Removing an Element from Quarantine To remove an element from quarantine: 1. Select the check boxes for the elements you want to remove from quarantine on the Discovery Data Collection page for Discovery from HP SIM or Get Details page for Discovery from HP SE. Quarantined elements appear with a flag ( ) in the Quarantined column on the Discovery Data Collection page for Discovery from HP SIM or Get Details page for Discovery from HP SE. 2. Click the Clear Quarantine button. 3.
topics for more information: ”Excluding EMC Symmetrix Storage Systems from Discovery” on page 63 and ”Excluding EMC Symmetrix Storage Systems from Force Device Manager Refresh” on page 92. 4. Click the Get Details button. 5. View the status of the gathering of element details by looking in the View Logs page. See the topic, ”Viewing Log Messages” on page 56 for more information about the messages viewed in this tab. 6. Verify the topology is displayed correctly by accessing System Manager.
Notifying the Software of a New Element When you add a new element to the network, such as a host, perform discovery to make the management server aware of the new element. Keep in mind the following while performing discovery: • If you change the password of a host after you discover it, you must change the password for the host in the discovery list. Then, you must stop and restart the CIM Extension running on that host. • If you started a CIM Extension on a Sun Solaris host with the .
104 Discovering NAS Devices, Tape Libraries, Switches and Storage Systems
3 Discovering Applications, Backup Servers and Hosts IMPORTANT: Information about Systems Insight Manager (SIM), such as discovery instructions, are for SIM version 5.0.
• (Discovery from HP SE only) If your license lets you discover UNIX and/or Linux hosts, the Test button for discovery reports SUCCESS from any UNIX and/or Linux hosts on which the management server can detect a CIM Extension. The CIM Extension must be running. The management server reports “SUCCESS” even if your license restricts you from discovering certain types of hosts. For example, assume your license lets you discover Solaris hosts but not AIX hosts.
1. Confirm that a CIM Extension is installed on the server on which Veritas NetBackup or HP Data Protector is installed. See the HP Storage Essentials Installation Guide for information about installing CIM Extensions. IMPORTANT: As noted in ”Requirements for Using Backup Manager” on page 384, Backup Manager does not support Veritas NetBackup and HP Data Protector on the same host. The CIM Extension only supports one backup solution on a host.
Discovery from HP SIM 1. Discover your hosts. Refer to the HP SIM documentation for more information. See Table 12 on page 108. 2. Run Discovery Data Collection. See ”Step D - Obtain Details” on page 113. Use the following table as a guideline. Table 12 (Discovery from HP SIM) Discovering Hosts Step Description 1 If you have several hosts that use the same password and user name, set that password and user name as the default.
Table 13 Making the Management Server Aware of Hosts (SE Discovery Only) Step Description 1 If several of the elements in the same domain use the same name and password, click the Set Default User name and Password link and provide up to three user names and passwords. 2 To enter an IP address range, click the IP Ranges tab and then the Add Range button. If necessary, enter a user name and password for the devices in the range.
where • domain_name is the domain name of the element • username is the name of the account used to access that element • You can configure the management server to obtain information about your master backup servers at a set interval. See the topic, “Scheduling Backup Collection for Master Servers” in the HP SE User Guide for more information about collectors. Discovery from HP SE To make the software aware of the devices on the network: 1. Click Tools > Storage Essentials > Home > Discovery > Setup. 2.
g. Type the password from the previous step in the Verify Password field. h. In the Comment field, type a brief description of the servers. For example, Servers in Marketing. i. Click OK. j. Repeat steps b through i until all of the IP ranges have been entered. k. Click the Start Scanning button. The elements the management server detects during the scan are added to the Addresses to Discover list on the IP Addresses tab. 4. To add a single IP address or DNS name to discover: a. Click the IP Address tab. b.
• You are shown the Log Messages page. To view the status of discovery, click Discovery > View Logs. Discovery is complete when the software displays the DISCOVERY COMPLETED message in the Log Messages field. Step B - (Discovery from HP SE Only) Build the Topology After you discover elements, the management server requires you build a topology view, which is a graphical representation of port-level connectivity information. IMPORTANT: recalculated.
If a switch has more than one connection to an element, the number of connections is displayed above the line linking the switch and the element. For example, assume the number two is shown between a switch and a storage system. This means the elements have two connections to each other. To view the port details for the connection, right-click the element and select Show Port Details from the drop-down menu.
removed from quarantine. See ”Removing an Element from Quarantine” on page 101 for information on how to remove an element from quarantine. To obtain details: 1. Do the following: • Discovery from HP SE - Click Tools > Storage Essentials > Home > Discovery > Details • Discovery from HP SIM - Click Options > Storage Essentials > Discovery > Run Discovery Data Collection. 2. Verify the Include backup details option is selected if you want to monitor and manage backup applications in Backup Manager. 3.
• ”Monitoring Microsoft SQL Server” on page 120 • ”Monitoring Sybase Adaptive Server Enterprise” on page 125 • ”Monitoring Microsoft Exchange” on page 128 Monitoring Oracle To monitor and manage Oracle, you must do the following: • ”Step A - Create the APPIQ_USER Account for Oracle” on page 115 • ”Step B - Provide the TNS Listener Port” on page 117 • ”Step C - Set up Discovery for Oracle 10g” on page 118 After you complete these steps, you must discover Oracle,and perform Discovery Data Collection or Get D
auto-mounted), and go to the /DBIQ/Oracle/unix directory by typing the following: # cd /cdrom/cdrom0/DBIQ/Oracle/unix where /cdrom/cdrom0 is the name of the CD-ROM drive • To run the script on Microsoft Windows, go to the DBIQ\Oracle\win directory on the CIM Extensions CD-ROM. IMPORTANT: You must complete the following steps. 2. Verify you have the password to the SYS user account. You are prompted for the password for this user account when you run the script. 3. Run the CreateOracleAct.
you removed the APPIQ_USER account for Oracle, discover and perform Discovery Data Collection/Get Details for the host if you want to continue monitoring it. • If you receive a message about not being able to drop a user that is currently connected while you are removing the APPIQ_USER account for Oracle, re-run the script for removing APPIQ_USER. To remove the APPIQ_USER account for that Oracle instance: 1. If you plan to remove the management software for Oracle from a Solaris host, do the following: a.
4. If necessary, click the button to remove the old port number. IMPORTANT: Monitoring Oracle 10g and Oracle clusters require an additional step. If you are not monitoring Oracle 10g and Oracle clusters, see ”Step 3 - Discovering Applications” on page 129. Step C - Set up Discovery for Oracle 10g NOTE: If you are discovering an Oracle cluster, see ”Discovering Oracle Clusters” on page 119. To monitor Oracle 10g, provide additional information as described in the following steps: 1.
6. Select ORACLE from the Database Type menu. 7. Click OK. Discovering Oracle Clusters Perform the following steps for each node in the cluster: 1. Install the CIM Extension on each node in the cluster. 2. Create the appiq_user account on each node in the cluster. See ”Step A - Create the APPIQ_USER Account for Oracle” on page 115. 3. Do one of the following: • Discovery from HP SE - Click Tools > Storage Essentials > Home > Discovery > Setup.
The port can be found in the following code: LISTENER = (DESCRIPTION_LIST = (DESCRIPTION = (ADDRESS_LIST = (ADDRESS = (PROTOCOL = TCP)(HOST = localhost)(PORT = 1521)) (ADDRESS = (PROTOCOL = IPC)(KEY = EXTPROC0)) ) ) ) f. Select ORACLE from the Database Type menu. g. Click OK. 5. Repeat Steps 3 and 4 for each node in the cluster.
Step A - Create the APPIQ_USER for the SQL Server The management server accesses SQL Server through the APPIQ_USER account. This account is created when you run the CreateSQLServerAct.bat script on Microsoft Windows on the computer running the SQL Server database you want to monitor. The account has create session and select dictionary privileges to be used with the management server. Keep in mind the following: • The script must run under SA user.
c. Double-click Logins and view the list of users authorized to access the SQL Server. d. If appiq_user is not listed, the management server is not able to discover the database. 6. To determine if the SQL Server is ready to accept connections from the management server: a. Connect to the SQL Server installation through Query Analyzer using the account “appiq_user” and the password “password.” b. Create a sample ODBC datasource for the SQL Server installation using the appiq_user account. c.
automatically lists the DNS name or IP address of the host under the Host IP/DNS Name column and Management IP/DNS Name column. 5. In the Database Server field, type the SQL database server name you want to monitor. The SQL Server name is either the Windows system name (default) or the name specified when the SQL server was installed. SQL Enterprise Manager displays the SQL server name as one of the following: • As the name specified at the time the SQL server was installed.
IMPORTANT: Perform Get Details/Discovery Data Collection for your inputs to take effect. See ”Step 3 - Discovering Applications” on page 129. Removing the APPIQ_USER Account for SQL Server IMPORTANT: Before you remove the APPIQ_USER account for the SQL Server databases on a host, make sure no processes are running APPIQ_USER for that SQL Server database. The management server uses APPIQ_USER to obtain information about a SQL Server database.
2. In the Database Information table, click the button, corresponding to the SQL Server instance you do not want the management server to monitor. 3. Perform Get Details/Discovery Data Collection to make the management server aware of your changes. Monitoring Sybase Adaptive Server Enterprise If you want to monitor Sybase Adaptive Server Enterprise you must: • Create APPIQ_USER account on the database for Sybase • Provide the database server name and port number • Discover the application.
IMPORTANT: You must complete the following steps. 2. Verify you have the password to the SA user account. You are prompted for the password for this user account when you run the script. 3. Run the CreateSybaseAct.bat script on Microsoft Windows or CreateSybaseAct.sh script on the UNIX operating system on the computer with the Sybase database. The script creates a user with login to master and select privilege on data dictionary tables on a managed Sybase instance.
IMPORTANT: You must complete the following steps. 2. Verify you have the password to the SA user account. You are prompted for the password for this user account when you run the script. 3. Run the UninstallSybaseAct.bat script on Microsoft Windows or UninstallSybaseAct.sh script on the UNIX operating system on the computer with the Sybase database. 4. Type the name of the Sybase server. 5. Type the password for the SA account. The account for APPIQ_USER is removed.
IMPORTANT: Perform Get Details/Discovery Data Collection for your inputs to take effect. See ”Step 3 - Discovering Applications” on page 129. Deleting Sybase Information If you do not want the management server to monitor a Sybase instance, you can remove its information, as described in the following steps: 1. Do one of the following: • Discovery from HP SE - Select Tools > Storage Essentials > Home > Discovery > Setup. Then, click the Applications tab.
• Discovery HP SE - Select Tools > Storage Essentials > Home > Discovery > Setup. Then, click the Applications tab. • Discovery HP SIM - Select Options > Protocol Settings > Storage Essentials > Global Application Discovery Settings. The information you provide for the primary domain controller and backup domain controller apply to all Microsoft Exchange servers you discover. 2. In the Microsoft Exchange Configuration section, click the Edit button. 3.
• (Discovery from HP SE Only)Obtain topology information about the application (”Step B (Discovery from HP SE Only) Obtain the Topology” on page 131) • Perform Get Details/Discovery Data Collection (”Step C - Obtain Discovery Data Collection or Get Details” on page 131) Keep in mind the following: • This section assumes you have already set up the discovery configurations for your applications as described in ”Step 2 - Setting Up Discovery for Applications” on page 114.
Step B - (Discovery from HP SE Only) Obtain the Topology IMPORTANT: The following steps apply only to discovery from SE. The user interface in Storage Essentials may load slowly while the topology is being recalculated. It may also take more time to log into the management server during a topology recalculation. To obtain the topology: 1. Click Tools > Storage Essentials > Home > Discovery > Topology. The discovered elements are selected. 2. Click the Get Topology button.
• You can quarantine elements to exclude them from Discovery Data Collection/Get Details. See ”Placing an Element in Quarantine” on page 100 for more information. Let us assume you want to discover all the elements in a discovery group, except for one. Perhaps the element you want to quarantine is being taken off the network for maintenance. You can use the quarantine feature to exclude one or more elements from discovery.
You can use discovery groups to break up getting Get Details. For example, instead of Get Details for all of the elements, you could specify that the management server gets the element details for only the elements in Discovery Group 1, thus, saving you time. You add an element to a discovery group by modifying the properties used to discover the element. See ”Modifying the Properties of a Discovered Address” on page 87. 3. Click the Get Details button.
• The hosts should recognize the management server by name, as a reverse look-up is required by operating system security as well as Microsoft Exchange. • Make sure you provide just the user name and not the domain name when discovering Microsoft Exchange servers. To provide information about the Microsoft Exchange servers: 1. Do one of the following: • Discovery from HP SIM - Click Options > Protocol Settings > Storage Essentials > Global Application.
• You must enter a password in the Password and Verify Password fields. To change the password: 1. Select Options > Protocol Settings > Storage Essentials > Global Application Discovery Settings. 2. Click the Change Password button. 3. Verify you have already changed the password of the databases listed on this page. 4. Type a new password in the Password field.
NOTE: You can always change the proxy host by returning to this page or by going to the Properties tab for an Engenio storage system. Double-click the Engenio storage system in System Manager. Click the Properties tab. Then, click the Browse button on the Properties tab. 10.Saving the proxy host may take time. When you are asked if you want to continue, click OK. 11.Click OK again to set the time for starting the collector. 12.
4 Managing Security IMPORTANT: Depending on your license, role-based security may not be available. See the “List of Features” to determine if you have access to role-based security. The “List of Features” is accessible from the Documentation Center (Help > Documentation Center in Storage Essentials).
IMPORTANT: Roles only apply to features and elements in HP Storage Essentials. For example, assume you assigned a user to the Help Desk role in Storage Essentials. That user will have “view only” privileges only in Storage Essentials.
• Users created in HP Systems Insight Manager are automatically placed in the SIMViewOnly role. This role does not allow users to access any of the features listed in Table 14 on page 138. See ”Adding Users” on page 144 for more information. • Users with access to Global Reporter can view all the elements throughout the enterprise, including those on the server running Global Reporter. Grant access to Global Reporter only to those, who should be allowed to view all elements.
Table 15 Default Role Privileges with Elements (continued) Role Application Host Switch Storage System Tape Library Others Application Administrator Full Control View View View View View Help Desk View View View View View View SIMViewOnly View View View View View View By selecting one of the following options, users belonging to that role are restricted access: • Full Control - Lets you view and modify the record for the element (Asset Management tab) and perform provisioning i
would have access to hosts and switches because those elements are listed in at least one of the organizations. Organizations can also contain other organizations. An organization contained within another is called a child. The organization containing a child organization is called a parent. In the following figure, the BostonWebHosts organization contains two child organizations, BostonWebHost_Windows and BostonWebHost_Solaris. BostonWebHosts is a parent because it contains two organizations.
• US East Coast Figure 7 Children in Multiple Organizations When you remove an element from an organization, users belonging to that organization or to one of its parents can no longer access that element if it is not a member of any other organization. For example, assume an element named MyHost was not only a member of BostonWebHost_Solaris, but also had mistakenly became a member of BostonWebHost_Windows.
hosts in the report. This is also true for e-mailing reports. Let's assume again you do not have permission to access hosts. The reports you e-mail will not contain information about hosts, including the host specific reports. If the users receiving your reports want to be able to view information about hosts, one of the following must happen: • The hosts in question must be added to your organization. • Someone else, who has the hosts in question already in their organization, must send the reports.
• ”Viewing the Properties of an Organization” on page 149 Adding Users To access the management server, users must enter a user name and password. belonging to the Domain Administrator roleKeep in mind the following: • Only users belonging to the Domain Administrator role can add users. • The user name and password should be alpha-numeric. They cannot exceed more than 256 characters. The user name cannot begin with a number.
9. To enable users access to features in Storage Essentials, assign the user to a different role by doing the following: a. Click the Edit button ( ) corresponding to the user account you want to modify. b. To change the role assign the user account, select a new role from the Role drop-down menu. If you don’t find any roles that fit your needs, you can create a new one, as described in ”Adding Roles” on page 149. c. Click OK.
The Everything organization is the default organization that lets users access all current and future elements. 11.Click OK. Deleting Users Keep in mind the following: • You cannot delete the admin account. • Only users belonging to the Domain Administrator role can delete users. To delete a user account: 1. Access Storage Essentials through one of the menu options, such as Options > Storage Essentials > Email Settings. 2. In the upper-right corner, select Security > Users. 3.
3. When you are done with your modifications, click the Save Changes button. Modifying Your User Preferences Use the User Preference tab to modify your user preferences for System Manager, Element Topology, and Event Manager. The User Preference tab controls what is displayed for your user account. To access the User Preferences tab: 1. Click the name of your account in the upper-left corner of Storage Essentials. Figure 9 Accessing the User Preferences Tab 2. Click the User Preferences tab.
Table 16 Changing User Preferences for Event Manager (continued) If you want... Do the following... Change the severities to be included Select a severity level you want displayed in Event Manager from the Severities to be Included drop-down menu. See the topic, ”Selecting a Severity Level” on page 464. If you want to customize the filter for the severity levels, click the Custom button. See the topic, ”Customizing the Severity Level Filter” on page 466 for more information.
• Access to the - Determines which components in the management server the user can access, where is the name of your product. To learn how to edit a role, see the topic, ”Editing Roles” on page 150. Viewing the Properties of an Organization You can quickly determine which elements a user can access by viewing the properties of the user's organization. Only users belonging to the Domain Administrator can view the properties of an organization. 1.
1. Access Storage Essentials through one of the menu options, such as Options > Storage Essentials > Email Settings. 2. In the upper-right corner, select Security > Roles. 3. Click the New Role button. 4. In the Role Name field, type a name for the role. For example: Quality Assurance. The name can contain spaces, but it cannot be longer than 256 characters. 5. In the Description field, type a description for the role. For example: Role for those in quality assurance.
To edit a role: 1. Access Storage Essentials through one of the menu options, such as Options > Storage Essentials > Email Settings. 2. In the upper-right corner, select Security > Roles. 3. Click the Edit button ( ). 4. To edit the name of the role, change the name In the Role Name field. The name can contain spaces, but it cannot be longer than 256 characters. 5. To edit the description of the role, change the description in the Description field.
Managing Organizations This section discusses the following topics: • ”Adding an Organization” on page 152 • ”Viewing Organizations” on page 153 • ”Editing Organizations” on page 154 • ”Deleting an Organization” on page 154 • ”Removing Members from an Organization” on page 155 • ”Filtering Organizations” on page 156 Adding an Organization You can create new organizations to restrict access to certain elements.
You cannot type more than 1024 characters in the Description field. 6. Click the Add or Remove Members button to determine which elements the user will see. 7. To add elements, expand the Element Types node in the tree. Select the element type that you would like to add. Then, in the right-hand pane, select the elements you would like to add by clicking the appropriate check boxes. Next, click the Add button and the selected elements are added to the Organization Members pane.
Editing Organizations See the topic, ”About the Security for the Management Server” on page 137 for more information about roles and organizations. When elements are removed from an organization, users belonging only to that organization are no longer able to access the removed elements. Keep in mind the following: • Depending on your license, role-based security may not be available. See the “List of Features” to determine if you have access to role-based security.
organizations, onlyHosts and onlySwitchesandHosts. The organization onlyHosts contains only hosts, and the organization onlySwitchesandHosts contains only switches and hosts. If you delete the onlySwitchesandHosts organization, you will still have access to hosts because you still belong to the onlyHosts organization. Keep in mind the following: • You cannot remove the Everything organization, which is the default organization.
Filtering Organizations The management server provides a filtering feature that lets you designate which organizations are active in your view. For example, assume you belong to an organization name Hosts and this organization contains two organizations: “Windows Hosts” and “Solaris Hosts.” If you want to view elements only in “Windows Hosts” and not in “Solaris Hosts” organizations, you could use the filtering feature to activate only the “Windows Hosts” organization.
You can now only obtain information about elements in the active organizations. The active organizations are listed in the link next to the filter button, as shown in the following figure. Figure 11 Active Organization Changing the Password of System Accounts The management server uses the following accounts to access and manage the database for the management server. You should change the passwords to these accounts to prevent unauthorized access.
a. Log onto the server running HP Systems Insight Manager. b. Stop the AppStorManager service if it is started. c. Enter the following at the command prompt: C:\> mxpassword -m -x MxDBUserPassword=mynewPass where mynewPass is your new password for the database. d. Stop the HP Systems Insight Manager service so that it cannot access the database. It is very important that the HP Systems Insight Manager service does not access the database before you are finished with changing the password for the database.
• ”Step 2 - Restart the AppStorManager Service and Login as the Designated Admin Account” on page 165 • ”Step 3 - Add Users to the Management Server” on page 166 • ”Step 4 - Provide Login Information to Your Users” on page 167 Step 1 - Configure the Management Server to Use Active Directory or LDAP You must modify the login-handler.xml file if you want to use Active Directory/LDAP. How you modify the login-handler.xml file depends on whether you plan to use LDAP or Active Directory.
• If you are using Active Directory, prefix the user name with the domain name, for example: domain\PrimaryUser 2. In the login-handler.xml file, comment out the section that contains com.appiq.security.server.BasicLoginhandler, which enables internal authentication mode. Only one login handler is allowed at a time. 3.
IMPORTANT: AD servers are not case sensitive for user names so changing this tag to “true” for AD authentication is not recommended. The login-handler.xml file contains two sets of tags: one for Active Directory and one for LDAP. Make sure you change the value of the tags that are children of the tag. 9. Provide the Active Directory search base in which you want the management server to look up AD/LDAP user attributes.
v> --> false false false CN=$NAME$,OU=Engineering,DC=HP,OU=US,DC=COM displayName mail When you are do
NOTE: If you want to go back and forth between internal and external (AD/LDAP) authentication, rename the login-handler.xml file before you modify it. This way you can easily switch back to internal authentication by changing the file name back to login-handler.xml. b. In the login-handler.
The login-handler.xml file contains two sets of tags: one for Active Directory and one for LDAP. Make sure you change the value of the tags that are children of the tags. 8. Provide the LDAP search base in which you want the management server to look up AD/LDAP user attributes. Allow no spaces between commas and put in all components of fully qualified domain name, for example, hds.usa.com would be DC=hds,DC=usa,DC=com.
com.appiq.security.server.LdapLoginHandler LDAP IP address or DNS name of LDAP server