HP XP7 Remote Web Console User Guide Abstract This document provides information and instructions to help you set up Remote Web Console for HP XP7 Storage, set up end-user computers and web browsers, and establish user accounts and permissions. It explains the GUI features and provides basic navigation information.
© Copyright 2014 Hewlett-Packard Development Company, L.P. Confidential computer software. Valid license from HP required for possession, use or copying. Consistent with FAR 12.211 and 12.212, Commercial Computer Software, Computer Software Documentation, and Technical Data for Commercial Items are licensed to the U.S. Government under vendor's standard commercial license. The information contained herein is subject to change without notice.
Contents 1 Remote Web Console overview..................................................................10 Managing the storage system...................................................................................................10 GUI feature highlights.............................................................................................................10 Multitaskinig.....................................................................................................................
Prerequisites.................................................................................................................33 Procedure....................................................................................................................33 Returning an SMI-S provider configuration file to default..........................................................34 Installing the report configuration tool........................................................................................
Deleting user accounts........................................................................................................62 Managing certificates for HP Systems Insight Manager................................................................62 Required role for single sign-on............................................................................................63 Importing a tool definition file into HP Systems Insight Manager...............................................
Viewing storage system information...........................................................................................91 Viewing basic information...................................................................................................91 Viewing specific information................................................................................................92 Viewing other system information.........................................................................................
SSD Endurance report......................................................................................................126 Storage System Summary report........................................................................................127 Reports in graphical view .....................................................................................................129 Cache Memories report....................................................................................................
Edit User wizard...................................................................................................................163 Edit User window.............................................................................................................163 Confirm window (Edit User) ...................................................................................................165 Add User wizard.......................................................................................................
Add Address window.......................................................................................................223 Change Settings window..................................................................................................223 Confirm window (Edit Alert Settings)...................................................................................224 Edit System Options wizard....................................................................................................
1 Remote Web Console overview Remote Web Console provides a unified GUI for managing and optimizing the HP XP7 Storage system. You access a system with Remote Web Console from any computer with a web browser. Remote Web Console can be set up in either Windows or UNIX environments. Managing the storage system With Remote Web Console, you can perform the following tasks: • Provision storage. • Set up data replication for restoring lost data. • View and manage the configuration of the storage system.
Figure 1 Remote Web Console GUI features Item Description 1. Main menu The menu contains six main functions. These are described in “Using Remote Web Console secondary windows” (page 141) and “Remote Web Console system reference GUI reference ” (page 230). 2. Explorer tree The Explorer tree contains sets of menu items that you use to accomplish the setup, administrations, and general tasks to set up and maintain the storage system. 3.
Reporting Remote Web Console provides views of various aspects of your storage system. In addition to these views, you can generate a report for specific areas of the system. Reports can be generated for a summary of the system data, ports, Channel Adapters, and disk adapters. Reports are formatted in either CSV or HTML. Use these reports to determine if the storage system configurations have changed properly.
2 Setting up Remote Web Console This section provides Remote Web Console requirements and set up procedures. Setup workflow The following workflow describes the set up tasks for Remote Web Console: • An HP representative attaches the SVP in your storage system to the LAN. Remote Web Console is already set up on the SVP and is therefore ready for access by client computers. • Ensure that the correct LAN cabling and connections are in place. If needed, see “Cable connection requirements” (page 13).
3. 4. In the Networking dialog box, clear the Internet Protocol Version 4 (TCP/IPv4) check box. Click OK to save he changes and close the dialog box. Configuring IPv6 communication in Solaris 10 To configure a Remote Web Console computer to use IPv6 for communication with an SVP: 1. Start a command window / system console. 2.
If you enable SSL, you must make sure that the key pair and associated server certificate do not expire. If either the key pair or the server certificate expires, users will be unable to connect to the SVP. Flow of SSL communication settings The following shows a flow of required settings for SSL communication. Note that creation of private and public keys requires a dedicated program. Download one from the OpenSSL website (http://www.openssl.org/).
Creating a private key (.key file) A private key is required to create an SSL keypair. The following procedure is for the Windows Vista operating system. Before you begin, download openssl.exe from the OpenSSL website. To create a private key (.key file) in a Windows Vista environment: 1. If the read-only attribute is set, release it from the c:\openssl folder. 2. Open a command prompt. 3.
For some fields there will be a default value. If you enter '.', the field will be left blank. ----Country Name (2 letter code) [AU]:JP State or Province Name (full name) [Some-State]:Kanagawa Locality Name (eg, city) []:Odawara Organization Name (eg, company) [Internet Widgits Pty Ltd]:Hitachi Organization Unit Name (eg, section) []:ITPD Common Name (eg, YOUR name) []:192.168.0.
Prerequisites • A private key (.key file) has been created. Change the file name to server.key unless the file is already named that. See “Creating a private key (.key file) ” (page 16). • A signed public key certificate (.crt file) has been acquired. Change the file name to server.crt unless the file is already named that. See “Creating a public key (.csr file) ” (page 16). • The private key (.key file) and the signed public key certificate (.crt file) are in X509 PEM format.
8. In the error message box, click OK. If the Security Alert dialog box for the certificate opens, click View Certificate to display the certificate. Confirm that the certificate is correct, and click Yes. NOTE: If an error occurs during the certificate update, an error message displays. Resolve the problem described in the error message and then repeat this procedure, starting with Step 4 (log in) above.
Importing the certificate to the SVP If the public key certificate uploaded to SVP is self-signed or not signed by certificate authority which is in the browser by default, the browser displays a warning message when it connects to an SSL-enabled SVP. You can disable this by importing the certificate to the browser. To import the certificate to the browser: 1. Log on to the Remote Web Console SVP using a secure connection (specify the URL using https). The Security Alert dialog box opens.
Figure 5 Certificate window 6. Click Install Certificate.... The welcome window of the Certificate Import Wizard opens. Figure 6 Certificate Import Wizard dialog box (Welcome to the Certificate Import Wizard) 7. Click Next. The Certificate Store window of the wizard opens.
Figure 7 Certificate Import Wizard dialog box (Certificate Store) 8. Select Automatically select the certificate store based on the type of certificate and click Next. The completion window opens. Figure 8 Certificate Import Wizard dialog box (Completing the Certificate Import Wizard) 9. 22 Click Finish. If the import was successful, the confirmation window opens.
Figure 9 Certificate Import wizard dialog box 10. Click OK. Blocking HTTP communication to the storage system If the web server supports SSL (HTTPS), the HTTP setting tool allows you to block access to port 80. When you block access to port 80, the connection used to import the certificate from the web browser to the web server occurs on port 443 (HTTPS). If you are using Command View Advanced Edition Suite to access Remote Web Console, blocking HTTP communication might interfere with that access.
Releasing HTTP communication blocking To release the HTTP communication blocking: 1. Close all Remote Web Console sessions on the SVP. 2. On the Remote Web Console computer, open a web browser. Enter the following URL to open the Tool Panel dialog box. https://IP-address-or-host-name-of-SVP/cgi-bin/utility/toolpanel.cgi 3. 4. 5. 6. In the Tool Panel dialog box, click Release HTTP Blocking. Enter the User ID and Password for the root storage administrator, then click Login.
General requirement A maximum of 32 Remote Web Console users can access the same storage system concurrently. Requirements for Windows-based computers NOTE: The operating system/architecture/browser/Java Runtime Environment/Flash Player combinations and versions in this table are fixed requirements. Using other combinations or versions might produce unpredictable results such as the inability to operate GUI windows.
Table 2 Software requirements for Windows-based computers (continued) Operating system1 Flash Player2 (Internet Explorer) Java Runtime Environment (JRE) 32 bit, 64 bit 9.0 JRE 7.0 Update 17 11.7 Windows 8 32 bit, 64 bit 10.0 JRE 7.0 Update 17 11.7 Windows 8.1 64 bit 11.0 JRE 7.0 Update 51 12.0 Windows 7 Architecture Browser SP1 Notes: 1. None of these operating systems is supported as a guest OS on a virtual server.
Configuring a Windows Server If you are using a Windows Server and Internet Explorer, set the following options before logging in to an SVP: • Navigate to Tools > Internet Options > Advanced, and then click the Do not save encrypted pages to disk check box to enable it. • Navigate to Tools > Internet Options > Security and register the URL of the SVP. For more information on configuring these settings, see the Internet Explorer help documentation.
1. 2. 3. 4. 5. Launch the web browser that you normally use and go to the Adobe website http:// www.adobe.com. Scroll upward as needed to display the top of the Adobe web page. In the Adobe search box in the upper right corner of the web page (not the browser search box) enter archived flash player and click Search. In the search results, select Archived Flash Player versions. The Archived Flash Player version web page on the Adobe website opens.
5. 6. 7. In the dialog box, enter the certificate file for HCS (.crt file) in the Certificate file (.crt file) box. You can enter the file name directly or by clicking Browse and searching for the file name. Click Register. The execution confirmation dialog for Set or Delete Certificate File for HCS opens. Click OK to register the certificate. Registration of the certificate starts. When the certificate is registered, the registration completion dialog box for Set or Delete Certificate File for HCS opens.
3. In the Tool Panel dialog box, click Set or Delete Certificate File for HCS. The login dialog box opens. If SSL communication has been established, the Security Alert dialog box opens before the login dialog box. In the Security Alert dialog box, click OK. 4. 5. 6. 7. In the login dialog box, enter the administrator user ID and password, and click Login. The Set or Delete Certificate File for HCS dialog box opens. In the dialog box, click Delete. A confirmation dialog box opens.
Prerequisites • SMI-S Provider software application must be installed. Procedure 1. 2. Create a Remote Web Console user account in the management software. The user account must belong to one of the following built-in user groups: • Storage Administrator (View & Modify) User Group. Users have full permissions to access the SMI-S function from the management software. • Storage Administrator (View Only) User Group.
3. In the Tool Panel dialog box, click Update Certificate Files for SMI-S. The login dialog box for Update Certificate Files for SMI-S opens. If SSL communication has been established, the Security Alert dialog box opens before the login dialog box. In the Security Alert dialog box, click OK. 4. 5. 6. 7. In the login dialog box for Update Certificate Files for SMI-S, enter the administrator's user ID and password, and click Login. The upload dialog box for Update Certificate Files for SMI-S opens.
3. In the Tool Panel dialog box, click Upload Configuration Files for SMI-S. The Upload Configuration Files Login dialog box opens. If SSL communication has been established, the Security Alert dialog box opens before the login dialog box. In the Security Alert dialog box, click OK. 4. 5. 6. In the Login dialog box, enter the administrator's user ID and password, and click Login. The upload dialog box for Update Certificate Files for SMI-S opens.
3. In the Tool Panel dialog box, click Upload Configuration Files for SMI-S. The Login dialog box opens. If SSL communication has been established, the Security Alert dialog box opens before the Login dialog box. In the Security Alert dialog box, click OK to confirm and open the Login dialog box. 4. 5. In the Login dialog box, enter the administrator user ID and password, and click Login. The Upload dialog box opens. In the Upload dialog box, enter the SMI-S provider configuration file (user-defined.
3. In the Tool Panel dialog box, click Upload Configuration Files for SMI-S. The Login dialog box opens. If SSL communication has been established, the Security Alert dialog box opens before the Login dialog box. In the Security Alert dialog box, click OK to confirm and open the Login dialog box. 4. 5. 6. In the Login dialog box, enter the administrator user ID and password, and click Login. The Upload dialog box opens. In the Upload dialog box, click Return to the default configuration.
SET HTTP_PROXY=http://proxy.xx.co.jp:8080 • A user account for exclusive use of the report configuration tool. To use the report configuration tool, you must create a user account that is used exclusively for the report configuration tool. Assign the storage administrator role (initial configuration) to this user account. For information on user accounts, see “Creating user accounts” (page 59).
3 Getting started using Remote Web Console This section describes login and restrictions when using Remote Web Console. For instructions on navigating to storage system information, see “Viewing and managing the storage system” (page 91).
Procedure 5 To log in to a Remote Web Console: 1. In your web browser, specify the following URL: https://IP-address-or-host-name-of-SVP/ 2. 3. 4. 5. 38 The following actions might be required to open the login dialog box, depending on your environment: • If a message indicates that the enhanced security configuration is enabled on the computer, select In the future, do not show this message and click OK.
6. If a local storage area pop-up dialog box of Adobe Flash Player Setting appears, click Allow to open the Remote Web Console main window. The cache function of Flash Player optimizes the process of Remote Web Console. Denial of the request might delay the processing speed of Remote Web Console. Figure 10 Flash Player local storage area dialog box NOTE: The roles and resource groups for each user are set up ahead of time and will be available to you when you log in to Remote Web Console.
2. 3. 4. In Add this web site to the zone, enter the URL of the SVP that you want to log in to. For example, if the host name is host01, the URL is http://host01. If the IP address is 127.0.0.1, the URL is http://127.0.0.1. Click Add to add the URL of the SVP to the web sites list. Click Close to close the dialog box.
• Do not disable Flash Player because Flash Player is necessary for Remote Web Console and works as an add-on to a web browser. If you use Internet Explorer, do not change the settings in Tools > Manage Add-ons. • Do not use the following web browser functions: character encoding, text size, the zoom function, the Ctrl + F (search), Ctrl + A (select all). • Use only the Tab key to move the focus to the Flash Player window.
If the error occurs while you are either switching between Modify and View mode, or switching tabs, wait a few minutes, click Refresh on the File menu, and then retry the operation. • When the microcode is being updated on the SVP, you must exit and restart all web client sessions on the Remote Web Console computer. • When you use Remote Web Console on Windows, the Add or Remove Programs window in the Windows’ Control Panel might or might not display Remote Web Console.
place the cursor over the clock, the system displays the number of minutes that have passed since the screen was refreshed. To see changes that others might have made, click refresh on the far right title bar in the top right corner of the screen. Setting the view back to default You can adjust Remote Web Console settings for column width and order, table options, filter conditions, and similar parameters. Remote Web Console saves these settings after you logout.
Remote Web Console main window Menu Bar The following illustration shows the menu bar in the Remote Web Console main window. The table below the illustration describes the menu items and their functions. Item Description Click to return to the previous window Click to advance to the next window File • Refresh All: Acquires all the information about the storage system and updates both the SVP and Remote Web Console.
Item Description Reports • Task Management: Manages the tasks that will be applied to the storage system. • Configuration Report: Creates and downloads the configuration report about the storage system. • Performance Monitor: Monitors performance of the storage system. • Shredding Report: Downloads the shredding report. Settings • User Management: Manages user accounts of Remote Web Console including changing password. • Security: Performs audit log or encryption operations.
1. Click a function in the resource tree in the Explorer. 2. If necessary, choose a tab and use a filter to reduce the number of items in the table. 3. Select an item in the table and click a button to open a wizard. 4. 5. Set options in the wizard and click Finish to confirm the setting. Enter a task name and click Apply to apply the setting to the storage system. The setting is queued as a task and performed in order.
Figure 15 Buttons at upper right of main window Table Controls The following figures shows the controls used to view and filter the results in a main window table: Figure 16 Table options in main window To scroll through pages of the table, use the left and right arrows or type a page number into the number field. To select all rows in the table, click Select All Pages. To display a table column, click Column Settings. If filter is ON, the filtered rows are selected.
Figure 18 Filtering in main window Tooltip When text displays in the main window, ellipses (...) may be displayed to show that the text is truncated. If you place the mouse cursor over an ellipsis (...), the full text displays in a tooltip (a small “hover box”).
Window part Item State after reset Open/Closed Closed Wizard Option part Open/Closed Default state (*) LUN ID notation - - Decimal integer (*) The default state varies from window to window. Balloon dialog box When you click an underlined link on the Remote Web Console screen, additional information may appear as a pop-up, which is called a "balloon dialog box." The following illustration shows an example of a balloon dialog box.
4 Setting up and managing user accounts When Remote Web Console has been set up on the SVP, and the client computers are set up, you create user accounts for Remote Web Console users and define their roles. This section provides information for setting up and managing user accounts. Workflow for creating and managing user accounts Administrators use Remote Web Console to create accounts for all users.
Figure 22 Logging in when an authentication server and an authorization server are used in combination You can use the authentication server without knowing the host names and port numbers, if you register the information of the authentication server as an SRV record in the DNS server. If you register multiple numbers of authentication servers to the SRV record, you can determine the authentication server to be used, based on the priority that has been set in advance.
Prerequisite software • Active Directory Authentication protocol for user for searching • LDAP v3 Simple bind Connecting two authentication servers Two authentication servers can be connected. When the servers are connected, the server configurations must be the same, except for the IP address and the port.
2. 3. 4. 5. 6. 7. 8. Click Setup Server to open the Setup Server window Select the type of the authentication server. Specify options to connect to the authentication server. If you use more than one authentication server or an authorization server, specify an option for each server. To test the connection, in the Server Configuration Test field, click Check. Click Finish. Enter a task name and then click Apply.
For details about resource groups, see the HP XP7 Provisioning for Open Systems User Guide. User registering example • The setting operations that affect the security of the whole system must be done by the administrator. • The setting operations on the resource group 10 must be done by user A. • The setting operations on the resource group 20 must be done by user B. To implement the above configuration, assign the users to the user groups as shown below.
Table 8 Roles and Capabilities Role Capabilities Security Administrator (View Only) • Viewing information about user accounts and encryption settings • Viewing information about encryption key in the key management server Security Administrator (View & • Configuring user accounts Modify) • Creating encryption keys and configuring encryption settings • Viewing and switching where encryption keys are generated • Backing up and restoring encryption keys • Deleting encryption keys backed up in the key manag
Table 8 Roles and Capabilities (continued) Role Capabilities • Configuring access attributes for LDEVs • Configuring LUN security Storage Administrator • Configuring monitoring (performance management) • Starting and stopping monitoring Storage Administrator • Performing pair operations for local copy (local copy) • Configuring environmental settings for local copy • Splitting Auto LUN V2 pairs when using RAID Manager Storage Administrator • Remote copy operations in general (remote copy) Suppor
Table 9 Roles and resource groups configured in built-in groups Built-in Group Role Resource group Administrator • Security Administrator (View & Modify) All Resource Groups Assigned • Audit log Administrator (View & Modify) • Storage administrator (Initial Configuration) • Storage Administrator (System Resource Management) • Storage Administrator (Provisioning) • Storage Administrator (Performance Management) • Storage Administrator (Local Copy) • Storage Administrator (Remote Copy) • User Maintenanc
Table 9 Roles and resource groups configured in built-in groups (continued) Built-in Group Role Resource group • Storage Administrator (Performance Management) • Storage Administrator (Local Copy) • Storage Administrator (Remote Copy) • Support Personnel • User Maintenance Maintenance • Storage Administrator (View Only) • User Maintenance All Resource Groups Assigned Creating a new user group This section explains how administrators can create a user group.
• “Disabling user accounts” (page 62) • “Deleting user accounts” (page 62) Creating user accounts This section explains how to create a user account and register the account to a user group with appropriate permissions. Prerequisites • You must have the Security Administrator (View & Modify) role to perform this task. • You can log in to the SVP and the RAID Manager with user accounts that are created by Remote Web Console. You must have Support Personnel role to log in to the SVP.
Table 12 User name and password for logging in to RAID Manager Item Length in characters Characters that can be used User name 1-63 • Alphanumeric (ASCII code) characters • Following symbols (see Note below) : -.@_ Password 6- 63 • Alphanumeric (ASCII code) characters • Following symbols (see Note below) : -.@_ NOTE: When you use a Windows computer for RAID Manager, you can also specify a backslash (\). When you use a UNIX computer for RAID Manager, you can also specify a slash (/).
Procedure 10 To change the password of a Remote Web Console user: 1. 2. 3. 4. 5. 6. 7. 8. In the Administration tree, select User Groups. In the User Groups tab, select the user group to which the user belongs. In the User tab, select the user whose password you want to change. Open the Change Password window in one of the following ways: • In the User tab, click Change Password. • From Settings, click User Management > Change Password. Specify a new password for the user in the two password fields.
Disabling user accounts Security Administrators can disable a user account to temporarily prevent the user from logging in to Remote Web Console. Prerequisites • Log into an account that is different from the user whose account that you want to disable. • You must have Security Administrator role with View & Modify role to perform this task. Procedure 12 To disable a user account: 1. 2. 3. 4. 5. 6. 7. 8. In the Administration tree, click User Groups. In the User Group tab, select the user group.
To stop using single sign-on function, delete the certificate from SVP, and then remove the tool definition file from HP Systems Insight Manager. Required role for single sign-on All users who are allowed to log in to HP Systems Insight Manager can also log in to Remote Web Console. The user group for Remote Web Console depends on what kind of role the user has when the user logs in to HP Systems Insight Manager.
Procedure 15 To register certificates to SVP: 1. Specify the following URL to open the Register Certificate window. https://IP-address-or-host-name-of-SVP/cgi-bin/utility/sceEntry.cgi 2. Enter the IP address or the host name of the HP Systems Insight Manager for which you want to implement single sign-on. NOTE: 3. The IP address must be an IPv4 address. Click Search. The information of the certificate appears on the Register Certificate window. Figure 23 Register Certificate window 4. 5. 6. 7.
2. 3. 4. Select the check box of the certificates which you want to delete. To display the certificate, click Detail. The IP address, the host name, or the alias name which you specified when you registered the certificate(s), appears on the list in the Delete Certificates window. Enter administrator, which is the user name and password of Remote Web Console. Click Delete.
3. 4. 5. 6. 7. 8. Click the Roles tab. Open the Edit Role Assignment window in one of the following ways: • Click Edit Role Assignment. • From Settings, click User Management > Edit Role Assignment In the Edit Role Assignment window, change roles to be assigned to the user group. • Select roles to add, and then click Add. • Select a role to remove, and then click Remove. Click Finish. In the Confirm window, check the settings and enter a task name in Task Name. Click Apply.
Procedure 20 To delete a user group: 1. 2. 3. 4. In the Administration tree, select User Groups. In the User Groups tab, select user groups that you want to delete. Open the Delete User Groups window in one of the following ways: • Click More Actions > Delete User Groups. • From Settings, click User Management > Delete User Groups. Check the settings and click Apply. Account lock policy A user account is automatically locked after three unsuccessful logins to Remote Web Console or RAID Manager.
5 Configuring the Remote Web Console environment This section provides instructions for setting customized behaviors on Remote Web Console, including timeout and polling periods, email notifications, and so on. Also, instructions are included for saving your Remote Web Console configuration settings and restoring them as needed. Configuration overview You can set up the following Remote Web Console behaviors: • Create a message to display on the Remote Web Console login screen.
Related Topics • “Login Message window” (page 212) Setting storage system information This topic explains how to set the name, contact information, and location of the storage system. CAUTION: The configured values are required to use SNMP agents. Make sure to document the information, because the settings will be cleared when the SVP is replaced. CAUTION: You can change more than one parameter, multiple times, but change only one at a time. Wait until the current task finishes before starting a new task.
Requirements of the new Syslog protocol (TLS1.2/RFC5424) The new Syslog protocol (TLS1.2/RFC5424) requires the following: • Operation confirmed Syslog server (rsyslog version 4.6.2) • Syslog server certificate. The IP address of the Syslog server in ”Subject Alternative Name: IP Address” of the Syslog server certificate. • Client certificate. Upload the following: Certificate type Format Notes Syslog server root certificate X.
1. 2. 3. 4. Click Settings > Environmental Settings > Edit Alert Settings. In Notification Alert, select the destination of the alert notification. • Host Report: Reports alerts only to the host(s) for which SIM report setting is made. • All: Reports alerts to all hosts. In Transfer Protocol, select the protocol for Syslog transfer.
Table 14 SIM reference codes reported by email (continued) Reference code Description Alert level SIM 22 SIM 23 SIM 13 62 2x xx Pool became full. MODERATE 62 6x xx Exceeded the pool usage depletionthreshold. MODERATE Related Topics • “Edit Alert Settings window” (page 214) Configuring email notification Prerequisites • You must have a Storage Administrator account with an Initial Configuration role to perform this task.
6. Enter the following email server information: • Identifier. To specify a host name, select Identifier. You can use up to 63 alphanumeric characters (ASCII codes) and symbols ("! # $ ` + - * ' { } _ . ). • IPv4. To set an IPv4 address, select IPv4, and enter four numbers within the range of 0 to 255. Example: XXX.XXX.XXX.XXX (X indicates a numeral) • IPv6. To set an IPv6 address, select IPv6, and enter eight hexadecimal alphanumeric characters within the range of 0 to FFFF.
Table 15 Email details for system failures notice (continued) # Item Description 4 Reply-To Email address to which replies from the receivers will be sent. Optional. 5 Subject Email title (Name of the storage system) + (Report) 6 Date Date when a system failure occurred. 7 Time Time when a system failure occurred. 8 Machine Name and serial number of the storage system. 9 RefCode Reference code. The same code as the one reported by SNMP traps. 10 Detail Failure details.
• Time period that a user is logged out of the SVP because of a network error • Time period when no changes are made that access the RMI server and the user is released from Modify mode as a result You can also specify whether to show or hide the Alerts tab. Prerequisites You must have the Storage Administrator (Initial Configuration) role to perform this task. See Table 8 (page 55). Procedure 23 To set time periods: 1. Start a web browser and enter the following URL to open the tool panel.
Table 16 Environment parameters (continued) Item Description B = Polling period for checking obstacles, and min [A, B] indicates the minimum value selected from A and B. • The default is 1 minute. You can specify 1 minute, 5 – 60 minutes in 5-minute increments, 70 to 120 minutes in 10-minute increments, or one day (24 hours). • This parameter cannot be disabled.
Table 17 Roles required to back up and restore configuration files (continued) Configuration file Description Required role to back up a file Required role to restore a file External Application Link Connection to the authentication application.
Procedure 25 To restore the configuration files: 1. Start a web browser and enter the following URL to open the tool panel: http://IP-address-or-host-name-of-SVP/cgi-bin/utility/toolpanel.cgi 2. 3. 4. 5. 6. 7. 8. 9. Click Control Panel to open the Control Panel. Enter the user ID and password and click Login. Click the Restore tab to open the Restore file window. Click the files and click Browse to specify the directory of the file. You can restore only the files for which you have permission.
6 License keys Accessing software functionality requires a license key. This section provides information on license keys and instructions for installing, disabling, enabling, and uninstalling license keys. License keys overview When you install a license key, it is also enabled. The functionality for the software that you installed is available in Remote Web Console. The license key can be disabled. This allows you to conserve time on a term key, for example.
Using the permanent key You can purchase the permanent key to use a software application indefinitely. You must estimate a licensed capacity required for using the software application and purchase a license key for the amount of the required capacity. • If insufficient license capacity is installed, Not Enough License displays in the status field of the License Keys window, and the software application is not enabled.
key for trial purposes, you can restore the changed configuration to the original status by temporarily enabling the software application with the emergency key. CAUTION: • If the emergency key is installed in the software application in which the permanent key, , the term key or the meter key is installed, the effective term of the license key is 30 days. However, because the emergency key can be reinstalled during the effective term, the effective term can be restored to 30 days.
Example of licensed capacity of permanent key + licensed capacity of meter key >= used capacity The meter license is used, and the licensed capacity of the meter key is subtracted. Meter is displayed in the key type field, and Installed is displayed in the status field. If the used capacity is 4TB, the licensed capacity of the permanent key is 3TB, the licensed capacity of the meter key is 2TB, and the effective term is 2 days.
If the license key for the deficient amount of capacity is not installed within the 30 days, the status changes to Not Enough License, and the software application is disabled. If a permanent key with more licensed capacity than the used capacity is installed, the meter license is deleted. Estimating licensed capacity The licensed capacity is volume capacity that you are licensed to use with the software application.
Table 20 Software and licensed capacity (continued) Option name Licensed capacity Cont Access Journal 3DC and 4x4 Open Unlimited MF Notes To use Continuous Access Journal 3DC and 4x4 Open MF, first install Continuous Access Journal and Continuous Access Journal Z.
Table 20 Software and licensed capacity (continued) Option name Licensed capacity Notes • Continuous Access Journal • Business Copy Z • Continuous Access Synchronous Z • Continuous Access Journal Z • Compatible FlashCopy Calculating licensed capacity for a normal volume The calculation of the normal volume capacity depends on the volume emulation type. Use the formula in the following table to estimate capacity for purchase.
Installing and uninstalling software This topic provides the following tasks: • “Installing the software” (page 86) • “When the status is Installed (Disabled)” (page 87) • “Enabling a license” (page 87) • “Disabling a license” (page 87) • “Removing a software application” (page 87) • “Updating license status” (page 88) • “Viewing license information” (page 88) • “Cautions on licenses” (page 89) Installing the software Prerequisites • You must have Storage Administrator (Initial Configuratio
When the status is Installed (Disabled) If you do not install the prerequisite software before you install the license key software, the software will install correctly but will be disabled. To enable a license key, install the prerequisite software, then enable the key. Detailed instructions to install the prerequisite software, are located in “Software and licensed capacity” (page 83). Instructions to enable a license key are located in “Enabling a license” (page 87).
2. 3. 4. In the License Keys window, select the license to uninstall. You can select more than one license to uninstall at the same time. Display the Uninstall Licenses window in either of the following ways: • In the License Keys window, click Uninstall Licenses. • From the Settings menu, click Environmental Settings > Uninstall Licenses. Check the settings and click Apply.
Table 23 Example of window display (continued) License key status (example) Status Key type Licensed capacity Term (days) installed with the emergency key. Installed emergency - Number of remaining days before expiration A temporary key was installed, but has expired. Expired temporary - Number of remaining days before expiration A term key or an emergency key was installed, but has expired.
1. 2. 3. 4. Click Actions > Other Function > Data Retention to open the Data Retention window. In the Data Retention window, find logical volumes that are unusable as S-VOLs (secondary volumes). Change the settings so that the logical volumes are usable as S-VOLs. Uninstall Data Retention.
7 Viewing and managing the storage system This section describes how to navigate to storage system information, create and download system configuration reports, and manage Remote Web Console tasks. Viewing and managing overview This topic shows you how to do the following tasks in Remote Web Console: • Perform basic navigation to storage system information. See “Viewing storage system information” (page 91). • Create, download, and delete system configuration up to 20 reports.
Viewing specific information You can view more specific information when you make a selection in the resource tree in the left pane. Viewing other system information You can also find other system information such as a port status and data regarding used and unused resources. This information displays in a Remote Web Console secondary window. Procedure 26 To view other system information: 1. 2. 3. 4. 5. Click Settings > Environmental Settings > License Keys. Java starts.
Figure 25 Port Condition window Status icons for certain resources The status of certain resources is indicated by the following icons: Status Description The resource can be used normally. The resource has the following status: • The resource can be used, but has a limit on I/O performance and so on. • The status of the resource is changing. • The status of the resource is being confirmed. • The resource has subresources of different status.
Prerequisites • The SVP must be configured to load Remote Web Console data to another application. Contact your service representative. • To add an application, you must specify information about the application in the application information file. Contact your service representative to ask about how to obtain the application information file. Procedure 27 To view Remote Web Console data in another application: 1. 2. Open a Remote Web Console window and select the rows that you want to view.
2. Click the report name to display in the Reports window. The report is displayed in the Reports window. In the Reports window, click the reports name in the list at the left, and you can view the report at the right. For details about each report, see “Storage configuration reports” (page 116). Creating a configuration report You can use the report configuration tool to create up to 20 configuration reports and then view or download them.
• Shred LDEVs • Shrink Pool • Edit Encryption Tasks window The Tasks window can display 384 tasks, including up to 128 tasks with a status of In Progress, Waiting, and Suspended, and up to 256 tasks with a status of Completed and Failed. If the number exceeds these limits, the oldest completed tasks are automatically removed from the window. Managing your tasks Remote Web Console allows you to suspend, resume, cancel, and prevent tasks from being automatically deleted.
Setting the status refresh interval of the Tasks window The Tasks window automatically updates every 60 seconds by default. This interval can be changed using the following procedure. Procedure 31 To change the refresh interval: 1. 2. 3. Click Settings > Environmental Settings > Edit Information Display Settings. Specify the interval for Task Screen Refresh Interval. If No Update is specified, the Tasks window will not be automatically updated.
GOTO LOGIN_RETRY ) SET /a CNT_DEL=0 :DEL_RETRY REM ############################# DELETE %CNT_DEL% SET /a CNT_DEL=%CNT_DEL% + 1 %RAIDINF_PATH%\raidinf delete report -servername %SERVER% ^ -report %REPORT_NAME% -fill if ERRORLEVEL 1 ( IF %CNT_DEL% GTR %LOOP% GOTO :ABEND CALL :SLEEP GOTO :DEL_RETRY ) SET /a CNT_ADD=0 :ADD_RETRY REM ############################# ADD %CNT_ADD% SET /a CNT_ADD=%CNT_ADD% + 1 %RAIDINF_PATH%\raidinf add report -servername %SERVER% -report ^ %REPORT_NAME% if ERRORLEVEL 1 ( IF %CNT_ADD
REM LOOP:0-2 3Times SET TIMEOUT=121 REM TIMEOUT 2[minutes]=120[s] SET TARGETFOLDER=C:\Reports\tmp SET REPORTFOLDER=C:\Reports SET RAIDINF_PATH="C:\Program Files\raidinf" REM REM Create Report Folder REM IF NOT EXIST %REPORTFOLDER% ( MKDIR %REPORTFOLDER% IF NOT EXIST %TARGETFOLDER% ( MKDIR %TARGETFOLDER% ) ) SET /a CNT_LOGIN=0 :LOGIN_RETRY REM ####################################### Login %CNT_LOGIN% SET /a CNT_LOGIN=%CNT_LOGIN% + 1 %RAIDINF_PATH%\raidinf -login %USER% %PASS% -servername %SERVER% if ERRORLEV
%REPORTFOLDER%\Report_%REPORT_NAME%_3.tgz ) IF EXIST %REPORTFOLDER%\Report_%REPORT_NAME%_1.tgz ( COPY %REPORTFOLDER%\Report_%REPORT_NAME%_1.tgz ^ %REPORTFOLDER%\Report_%REPORT_NAME%_2.tgz ) IF EXIST %TARGETFOLDER%\Report_%REPORT_NAME%.tgz ( COPY %TARGETFOLDER%\Report_%REPORT_NAME%.tgz ^ %REPORTFOLDER%\Report_%REPORT_NAME%_1.tgz DEL %TARGETFOLDER%\Report_%REPORT_NAME%.tgz ) ) GOTO :END EXIT /B :SLEEP REM ####################################### SLEEP with %TIMEOUT% ping 127.0.0.
codes, see HP XP7 Remote Web Console Messages. The error codes unique to the Report Configuration Tool and the corresponding actions are as follows. Error code Error message Cause of error and action Return value EW_COMERR A certificate does not become effective. A certain period of time elapsed after a login. Log in again. 131 Please login again. EW_COMERR Login is necessary. Please login again. EW_ENFILE No such folder. Please refer to the help. EW_ENOMEM Memory allocate error.
Error code Error message Cause of error and action EW_SYSERR The file is illegal. The installation directory includes a file that 131 will overlap with another file to be created by the Report Configuration Tool and the Report Configuration Tool cannot start. Please move 'raidinfcer' file from the installation directory. Return value Remove the overlapping file from the installation directory. EW_SYSERR Log file invalid. Please call to service center. EW_UNWCMD Unknown command.
Registration example • Create a configuration report at 21:00 every day (CreateReport.bat). • Download a configuration report at 22:00 every day (DownloadReport.bat). Procedure 1. Store the two script files in the C:\Reports folder. C:\Reports CreateReport.bat DownloadReport.bat 2. Run the Windows schtasks command to register the two script files as a task of Windows. Make sure that the parameter of this command is a user who has write permissions to the following two folders.
8 Troubleshooting This section provides information for identifying and correcting problems with Remote Web Console. General troubleshooting A system administrator is responsible for the operation and normal maintenance of the Remote Web Console web client. The following are guidelines for troubleshooting the Remote Web Console web client: • Check the cabling and the LAN. Verify that both the computer and LAN cabling are firmly attached, and that the LAN is operating properly. • Reboot the computer.
Figure 26 Troubleshooting workflow Checking alerts The Remote Web Console main window opens an icon indicating whether service information messages (SIMs) occurred in the storage system. Procedure 32 To check details of a SIM: 1. In the Remote Web Console main window, click Alert. The Alerts window opens. Figure 27 Alert icon on Remote Web Console main window 2. To check the details of each alert, select and right-click one row, and then click Detail in the pop-up menu. The detail dialog box opens.
3. If the following SIM reference codes appear, you must resolve the error (XXX indicates the pool ID): • 601XXX, 602XXX, 602FFE, and 624000 (for Fast Snap) • 620XXX, 621XXX, 622XXX, 624000, 625000, and 626XXX (for Thin Provisioning and Thin Provisioning Z). For details on how to resolve the error, see the HP XP7 Fast Snap User Guide, the HP XP7 Provisioning for Open Systems User Guide, or the HP XP7 Provisioning for Mainframe Systems User Guide.
Table 25 No-response errors Error condition Probable cause / Recommended action 1 The SVP web server might have been restarted. Close Remote Web Console, wait 10 minutes, and then restart Remote Web Console. The following errors occur when using Remote Web Console: • 20121-107024 2 3 Error (20121-107096) occurs repeatedly while you are using Remote Web Console. A timeout error may have occurred on Flash Player.
Table 25 No-response errors (continued) Error condition Probable cause / Recommended action 11 A Remote Web Console window is forcibly closed during Close all windows, wait until processing finishes, and then restart a time-consuming process, such as LDEV formatting. Remote Web Console. 12 A Remote Web Console window is incorrectly closed when you do one of the following: Restart Remote Web Console. If you cannot log in, wait for one minute and try again.
Table 26 Incorrect display errors Error condition Probable cause / Recommended action 1 • When the question mark appears in the View Tier Properties window, see the topic describing this window in the HP XP7 Provisioning for Open Systems User Guide. If the problem still persists, contact HP Technical Support. A question mark (?) displays in a table or other area of the window.
Table 28 Other errors (continued) Error condition Probable cause / Recommended action microcode on the SVP is upgraded or downgraded, clear the browser cache. 2 Remote Web Console processing is temporarily delayed. Internal processing (such as, configuration change, P.P. check, or operational information acquisition) might be running on the SVP. 3 Remote Web Console processing is delayed. The local storage value for Adobe Flash Player might decrease. Follow these steps: 1.
Firefox web browser problems on UNIX Note the following when using Firefox web browser on UNIX: • If a Mozilla process or a Firefox web browser process becomes unavailable, Remote Web Console performance is affected. Delete the abnormal process and continue with Remote Web Console operations.
Procedure 33 To download dump files from the SVP: 1. Start a web browser and specify the following URL to open the Tool Panel: https://IP-address-or-host-name-of-SVP/cgi-bin/utility/toolpanel.cgi 2. 3. 4. Click Download Dump Files. The Login dialog box opens. Enter the user ID and password and click Login. The Download Dump Files dialog box opens. Select a file that you want to download. • Existing Dump Files indicates the last dump file that you downloaded.
9 Support and other resources Contacting HP For worldwide technical support information, see the HP support website: http://www.hp.
HP websites For additional information, see the following HP websites: • http://www.hp.com • http://www.hp.com/go/storage • http://www.hp.com/service_locator • http://www.hp.com/support/manuals • http://www.hp.com/support/downloads • http://www.hp.
Table 29 Document conventions (continued) Convention Element Monospace text • File and directory names • System output • Code • Commands, their arguments, and argument values Monospace, italic text • Code variables • Command variables Monospace, bold text WARNING! CAUTION: IMPORTANT: NOTE: TIP: Emphasized monospace text Indicates that failure to follow directions could result in bodily harm or death. Indicates that failure to follow directions could result in damage to equipment or data.
A Storage configuration reports This section describes the configuration reports you can generate in Remote Web Console. They are grouped in this appendix according to the way they display: in tables, graphs, or CSV files. To create, download, and delete reports, see “Viewing a Remote Web Console report” (page 94). Reports in table view The reports described in this appendix appear in table format, as seen in the following example. icons are displayed before the names of the reports in table view.
Table 30 Disk Adapters report (continued) Item Description Number of LDEVs (Total) The number of the logical volumes belonging to the parity groups that the disk adapter controls. Number of LDEVs (Unallocated) The number of the logical volumes that are inaccessible from the host and belong to the parity groups controlled by the disk adapter. Total LDEV Capacity (MB) Total capacity of the logical volumes belonging to the parity groups that the disk adapter controls.
Table 31 Host Group report (continued) Item Description Number of DKAs The number of disk adapters controlling the parity groups where the logical volumes that are accessible from the hosts in the host group belong. Total LDEV Capacity (MB) Total capacity of the logical volumes accessible from the hosts in the host group. This is the total capacity of LDEVs referred to in “Number of LDEVs”. Port Security Security of the port. Host Mode Host mode of the host group.
Logical Devices report The following illustration shows an example of a logical volumes report. The table following the illustration describes the items in the report Figure 32 Logical Devices report Table 33 Logical Devices report Item Description LDEV ID The logical volume number. LDEV Name The logical volume name. Capacity (MB) Capacity of the logical volume. Emulation Type Emulation type of the logical volume. Resource Group Name Resource group name where LDEV belongs.
Table 33 Logical Devices report (continued) Item Description Attribute The attribute of the logical volume. Provisioning Type Provisioning type of the logical volume. Pool Name • For V-VOLs of Thin Provisioning, the name of the pool related to the logical volume is displayed (see Note below). • If the logical volume attribute is Pool, the name of the pool where the logical volume belongs is displayed. • When neither of the above are displayed, the pool name is blank.
Figure 33 LUNs report Table 34 LUNs report Item Description Port Location Name of the port. Port Internal WWN WWN of the port. Port Security The name of the type of security of the port. Host Group The name of the host group. Host Mode Host mode of the host group. Host Mode Option Host mode option of the host group. Host mode options are separated by semicolons (;) when more than one option is specified. LUN Logical unit number. LDEV ID Logical volume number.
Figure 34 MP Blades report Table 35 MP Blades report Item Description MP Blade ID MP blade ID. MP Blade Name MP blade Name. Module Module number. Auto Assignment Auto assignment attribute for the MP blade. Number of Resources (LDEV) The number of logical volumes that the MP blade controls. Number of Resources (Journal) The number of journals that the MP blade controls. Number of Resources (External Volume) The number of external volumes that the MP blade controls, including FICON DM volumes.
Table 36 MP Blades Details report Item Description MP Blade ID MP blade ID. MP Blade Name MP blade Name. Auto Assignment Auto assignment attribute for the MP blade. Resource ID ID of this resource that the MP blade controls. Resource Name The name of the resource that the MP blade controls. If "Type" is LDEV, the LDEV name that is set is displayed. A hyphen (-) displays for journal volumes or external volumes. Type The type of the resource that the MP blade controls.
Table 37 Parity Groups report (continued) Item Description Emulation Type Emulation type of the parity group 1. Number of LDEVs (Total) The number of the logical volumes in the parity group. Number of LDEVs (Unallocated) The number of the logical volumes in the parity group that the host cannot access. Total LDEV Capacity (MB) Capacity of the logical volumes in the parity group. Unallocated LDEV Capacity (MB) Capacity of the logical volumes in the parity group that the host cannot access.
Figure 37 Ports report Table 38 Ports report Item Description CHA Name of the channel adapter. Type Package type of the channel adapter. Port Location Name of the port on the channel adapter. Port Attribute Port attribute. Port Internal WWN WWN of the port.* Fabric One of the Fibre topology settings indicating the setting status of the Fabric switch. Connection Type One of the Fibre topology settings. • Point to Point • FC-AL* Address (Loop ID) Fibre port address and Loop ID of the port.
Spare Drives report The following illustration shows an example of a spare drives report. The table following the illustration describes the items in the report. Figure 38 Spare Drives report Table 39 Spare Drives report Item Description Drive Capacity Capacity of the spare drive. Drive Type-Code Type code of the spare drive. Location Location of the spare drive. SSD Endurance report The following illustration shows an example of an SSD endurance report.
Figure 39 SSD Endurance report Table 40 SSD Endurance report Item Description Drive Type-Code Type code of the SSD Drive Capacity Capacity of the SSD Location Location of the SSD Used Endurance Indicator (%) Used endurance of the SSD Storage System Summary report The following illustration shows an example of part of a report of a summary of the storage system. The actual report includes several more rows of information. The table following the illustration describes the items in the report.
Figure 40 Storage System Summary report Table 41 Storage System Summary report Item Description Storage System Type Type of the storage system. Full Serial Number Serial number of the storage system. IP Address IP address of the SVP. Microcode Versions Version of the following programs.
Table 41 Storage System Summary report (continued) Item Description • Config • CFM • HDD • HDD (SVP) • Printout Tool Number of CUs The number of control units in the storage system. Shared Memory Size (GB) Capacity of shared memory. Cache Size (GB) Capacity of the cache. Number of DKAs The number of disk adapters on the module. System Options List of the system options specified for the storage system.
Figure 41 Cache Memories report Total capacity of the cache memory and shared memory is displayed separately for each module. Channel Adapters report This report shows the channel adapters and the ports and types of channel adapters for each channel adapter. The keys (green = installed, gray= not installed) show which channel adapters are installed and which are not installed.
Figure 43 Physical View report Reports in graphical view 131
B Report Configuration Tool command reference (raidinf commands) This section describes the raidinf commands, symbols, and reports used in Remote Web Console. raidinf command list and command description The following lists the raidinf commands and symbols. Table 42 raidinf command list Command Description raidinf add report Creates a report. raidinf delete report Deletes a report. raidinf download report Downloads a report. raidinf get reportinfo Displays a list of reports.
Syntax raidinf [-h]
Options: -h -login -logout Help/Usage Specify LOGIN explicitly Specify LOGOUT
CreateConfigurationReport ReportName UserName CreateTime 101009-CreateConfigurationReport user01 2010/10/09-12:43:10 The respective items of the output example are explained next. • ReportName The report name is displayed (up to 32 characters). • UserName The user name is displayed (up to 16 characters). If the user name exceeds 16 characters, an ellipsis (...) is displayed. • CreateTime The time of creating a report is displayed (up to 19 characters).
The name of the downloaded file is Report_report name.tgz. Note that the files are overwritten if reports of the same name has already existed. Example: the name of the downloaded file when the report name is 110309-CreateConfigurationReport Report_110309-CreateConfigurationReport.
Options and parameters Option Description -servername Specifies the host name or the IP address of the Web server (SVP). Examples Displays a list of reports. # raidinf get reportinfo -servername 10.213.74.
C SMI-S provider configuration file This section describes the SMI-S provider configuration files. User-defined.properties file This section describes the description format and organization format of SMI-S provider user configuration files and parameters to be defined. The user-defined.properties file is an SMI-S provider user configuration file. File description format The format of the user-defined.
The CipherSuites parameter can use any of the following values: • TLS_DHE_RSA_WITH_AES_128_CBC_SHA • TLS_DHE_DSS_WITH_AES_128_CBC_SHA • TLS_RSA_WITH_AES_128_CBC_SHA • SSL_DHE_RSA_WITH_3DES_EDE_CBC_SHA • SSL_DHE_DSS_WITH_3DES_EDE_CBC_SHA • SSL_RSA_WITH_3DES_EDE_CBC_SHA Setting up the CipherSuites parameter Connect cipher suites with a comma (,) as a delimiter.
In this example, a virtual volume having one of the following LDEV IDs is used as the snapshot target: • From 00:00:00 (LDKC=0,CU=0,LDEV=0) to 00:00:FF (LDKC=0,CU=0,LDEV=255) • 00:02:00 (LDKC=0,CU=2,LDEV=0) • From 00:04:00 (LDKC=0,CU=4,LDEV=0) to 00:04:FF (LDKC=0,CU=4,LDEV=255) PoolIDForSnapshot parameter Use the PoolIDForSnapshot parameter to specify pools that the SMI-S provider can use when you run Fast Snap from CreateElementReplica of HITACHI_ReplicationService.
D Using Remote Web Console secondary windows This section describes requirements, operation methods, notes, and troubleshooting required to use Remote Web Console secondary windows. Requirements for using Remote Web Console secondary windows This topic describes the prerequisites for using the Remote Web Console secondary windows. Installing and configuring JRE Complete the steps in the following procedures to install JRE in a Windows or Unix environment.
Procedure 1. 142 Start the Java Control Panel. • In Windows, from Windows Control Panel, double-click the Java icon. • In Unix, run one of the following executable files: /jre/bin/ControlPanel /jre/ControlPanel /jre/ControlPanel • Alternatively, use a web browser to display one of the following Control Panel pages: /jre/ControlPanel.html /ControlPanel.html 2. 3.
6. 7. 8. In the Temporary Files Settings dialog box: 1. For JRE 7.0, click the Keep temporary files on my computer checkbox to enable it. 2. In the Disk Space area, enter 1 MB. 3. Click OK to close the dialog box. Configure the proxy settings as required. 1. In the Java Control Panel, select the General tab. 2. Click Network Settings to display the Network Settings dialog box . In the Java Control Panel, click OK to close it.
Item Description Title bar Provides information about the connected storage system. • IP indicates the IP address of the SVP. • S/N indicates the serial number. • D/N indicates the device name specified in the Edit storage system window. File > Refresh All Updates the information on the SVP. All information displayed on the Remote Web Console secondary window is reacquired from the storage system. We recommend that you use this command only when error recovery is required.
Item Description Note: The operational status might not be displayed correctly when the exclusive lock is effective or SVP maintenance is in progress. View Modify Allows users to switch the operation mode between Modify and View. The button always shows the current user operation mode. To change the modes, click the button. You cannot switch to the Modify mode while any other user is operating in the Modify mode. Make sure to confirm the exclusive lock icon before switching to the Modify mode.
Remote Web Console secondary windows and Modify mode A secondary window opens when you click a command from the Remote Web Console menu. To make settings in a secondary window, you must change to Modify mode by clicking . Modify mode prohibits other users or programs from changing the storage system setting. As soon as you close the secondary window, Modify mode is released. Modify mode has a timeout period. If you do not access SVP before the end of the timeout period, Modify mode is released.
Note the following: • Update is recommended. • If you click either Update or Block, you must close the web browser and restart Remote Web Console. • To use Remote Web Console with the current Java version, click Later. • To prevent this dialog box from appearing again, check Do not ask again until the next update is available and then click Later. • If an error occurs, repeat the procedure. Troubleshooting This topic describes cautions peculiar to the Remote Web Console secondary window.
Table 46 Java application errors (continued) 3 Error condition Probable cause / recommended action • The application errors (20020-108000 and 10-6027) occur when you click the Remote Web Console menu. If the problem continues after you perform the operation multiple times, see the probable causes listed below. • The application error (10-6027) occurs and Remote Web For Windows: Exit all applications using Java, and then terminate the javaw.exe and javaws.
Table 46 Java application errors (continued) Error condition Probable cause / recommended action 8 A message remains displayed when the Remote Web The SVP may be set as an exception on the proxy setting of Console secondary window opens and the system does not the web browser. Make the settings the same on the Network respond. Configuration dialog box, which is located in the Java Control Panel's General dialog box.
Table 47 No response errors 1 Error condition Probable cause / recommended action Remote Web Console hangs and does not respond. From the Remote Web Console secondary window, press Ctrl + Alt + Shift + D all at once to exit Remote Web Console.
Table 48 Incorrect display errors Error condition Probable cause / recommended action 1 Only the Exit button and the Refresh and Refresh All commands are effective when accessing the SVP from Remote Web Console. The SVP might not be ready to perform some write processes from the other system. Wait a few minutes and then click File > Refresh. If the SVP is not restored, click Refresh All.
Table 49 Other errors Error condition Probable cause / recommended action 1 If you click in a Remote Web Console secondary window while a dialog box is open, the dialog box disappears behind the Remote Web Console secondary window. Click the dialog box again. 2 An error occurs because a digital signature or security certificate has expired. You can continue using Remote Web Console even though the digital signature for the Remote Web Console Java application is expired.
E Remote Web Console user management GUI reference This section describes the Remote Web Console windows and wizards that you use to manage user security and to set up and manage user accounts on HP XP7 Storage systems. User Groups window This section includes the following: • “Summary” • “User Groups tab” This window lists all user groups created in Remote Web Console. Summary The following table describes the fields in the summary section in the User Groups window.
Item Description Add Users Adds the created users to the selected user group. Edit Resource Group Assignment Assigns the created resource groups to the selected user groups. Edit Role Assignment* Assigns the created roles to the selected user groups. Delete User Groups* Deletes the selected user groups. Edit User Group* Edits the user group name. Export* Displays the window for outputting table information. * Appears when you click More Actions.
Item Description User Group Type Displays the user group type. Built-in: Indicates a built-in user group. User-created: Indicates a user group that a user created. All Resource Groups Assigned Displays whether all the resource groups are assigned. Yes: All the resource groups are assigned to the user group. No: All the resource groups are not assigned to the user group. Users tab The following table describes the fields and settings in the Users tab of the selected user group window.
The following table describes the fields and settings in the Roles tab of the selected user group window. Role displays the roles assigned to the user group, which determines the operations the user can perform. Role Permitted operations Roles Displays the roles that are assigned to the user group. Edit Role Assignment Assigns the created roles to the selected user groups. Export Displays the window for outputting table information.
Item Description Edit Resource Group Assignment Assigns the created resource groups to the user groups. Export Displays the window for outputting table information. Virtual Storage Machine1 Displays the model type of the virtual storage machine and serial number set for the resource group. Notes: 1. This content is not displayed as default. If you want to display this content, please change the settings at Column Settings window of table option.
Related Topics • “Creating a new user group” (page 58) Confirm window (Create User Group) Create User Group The following table describes the fields in the Create User Group section of the Create User Group Window. Item Description User Group Name Displays the name of user groups to be created. Number of Roles Displays the number of roles that are assigned to the user group to be created.
Assigned Roles The following table describes the fields in the Assigned Roles section of the Create User Group Window. Item Description Role Displays the roles that are assigned the user group to be created. Assigned Resource Groups The following table describes the fields in the Assigned Resource Group section of the Create User Group Window. Item Description Resource Group Name (ID) Displays the name and ID of the resource group not assigned to the user group to be created.
Create User wizard Create User window Use this window to create a new user account. Create User The following table describes the fields and settings in the Create User window. Item Description User Name Enter the user name to be created. The allowable characters and length of user names depend on the application that the user uses. Account Status Account statuses. The following statuses are available: Enabled: The user can use the account.
Confirm window (Create User) Selected Users The following table describes the fields and settings used to create a new user account. Item Description User Name User name to be created. Account Status Account statuses. The following statuses are available: Enabled: The user can use the account. Disabled: The user cannot use the account or log in to Remote Web Console. Authentication Authentication methods. The following methods are available: Local: Does not use authentication server.
Change Password The following table describes the fields and settings used to change a password. Item Description User Name Selected user name. Current Password Current password of your user account. Required only when you change your own password. New Password New password that the selected user enters for login. The allowable characters and length of passwords depend on the application that the user uses. Re-enter New Password 162 Same password as above.
Related Topics • “Changing user passwords” (page 60) Confirm window (Change Password) The following table describes the fields and settings used to change user passwords. Item Description User Name Selected user name. Current Password Current password. A hyphen (-) indicates no current password is specified. New Password New password. Edit User wizard Edit User window Use this window to change the setting for authentication or for the account status.
Edit User The following table describes the fields and settings used to edit user account information. Item Description User Name Selected user name. Account Status Account statuses. The following statuses are available: Enabled: The user can use the account. Disabled: The user cannot use the account or log in to Remote Web Console. Authentication Authentication method. The following methods are available: Local: Does not use authentication server. Uses a dedicated password for Remote Web Console.
Related Topics • “Changing user permissions” (page 61) Confirm window (Edit User) Selected User The following table describes the fields and settings in the Edit Users window. Item Description User Name Selected user name. Account Status Account status. The following statuses are available: Enabled: The user can use the account. Disabled: The user cannot use the account or log in to Remote Web Console. Authentication Authentication method.
Related Topics • “Changing user permissions” (page 61) Available Users The following table lists all the candidate users who do not belong to the selected user group. Item Description User Name Selected user name. Account Status Account status. The following statuses are available: Enabled: The user can use the account. Disabled: The user cannot use the account or log in to Remote Web Console. Authentication Authentication method.
Add button Adds the selected users in the Available Users list to the Selected Users list. Remove button Removes the selected users from the Selected Users list and relocates the selected users to the Available User list. Selected Users table Lists users to be added to the user group. Item Description User Name Selected user name. Account Status Account status. The following statuses are available: Enabled: The user can use the account.
Confirm window (Add Users) Selected User Group Item Description User Group Name Displays the user group name where the user is added. Selected Users table Item Description User Name Selected user name. Account Status Account status. The following statuses are available: Enabled: The user can use the account. Disabled: The user cannot use the account or log in to Remote Web Console. Authentication Authentication method.
Related Topics • “Changing user permissions” (page 61) Remove Users window Selected User Group table Item Description User Group Name Displays the name of the user group where the user is removed. Selected Users table Item Description User Name Selected user name. Account Status Account status. the following statuses are available: Enabled: The user can use the account. Disabled: The user cannot use the account or log in to Remote Web Console. Authentication Authentication method.
Delete Users window Selected Users Item Description User Name Selected user name. Account Status Account status. the following statuses are available: Enabled: The user can use the account. Disabled: The user cannot use the account or log in to Remote Web Console. Authentication Authentication method. The following methods are available: Local: Does not use authentication server. Uses a dedicated password for Remote Web Console. External: Uses authentication server.
Edit User Group The following table describes the fields and settings used to edit user group information. Item Description User Group Name Enter the new name of the user group. You can use ASCII code characters, spaces, and the following symbols: !#$%&'()+-.=@[]^_`{}~ Check Check whether the entered user group name is registered to the authorization server when you use an authorization server.
Edit User Group The following table describes the fields and settings used to edit user group information. Item Description User Group Name Displays the new name of the user group. Number of Roles Displays the number of roles that are assigned to the user group. Number of Resource Groups Displays the number of resource groups that are assigned to the user group. Number of Users Displays the number of users that belong to the user group.
Edit Resource Group Assignment wizard Edit Resource Group Assignment window Use this window to assign created resource groups to the user group and to assign created resource groups to the user group in the Create User Group. The following table describes the fields and settings used to assign resource groups with the Create User Group wizard. Item Description All Resource Groups Assigned Displays whether all the resource groups are assigned to the user group.
Unassigned Resource Groups table The following table lists the resource groups that are not assigned to the user group. Item Description Resource Group Name (ID) Displays the name and ID of the resource group that is not assigned to the user group to be created. Number of User Groups Displays the number of user groups that are not assigned to the resource group. Number of Parity Groups Displays the number of parity groups that are not assigned to the resource group.
Assigned Resource Groups table Lists the resource groups to be assigned to the user group. Item Description Resource Group Name (ID) Displays the name and ID of the resource group assigned to the user group to be created. Number of User Groups Displays the number of user groups that are assigned to the resource group. Number of Parity Groups Displays the number of parity groups that are assigned to the resource group.
Confirm window (Edit Resource Group Assignment) The following tables describe the fields and settings used to assign user group names with the Create User Group wizard. Item Description User Group Name Displays the new name of the user group. Selected Resource Groups as Assigned Table The following table describes the fields and settings used to assign resource groups with the Create User Group wizard.
Selected Resource Groups as Unassigned Table The following table lists the resource groups that are not assigned to the user group. Item Description Resource Group Name (ID) Displays the name and ID of the resource group not assigned to the user group to be created. Number of User Groups Displays the number of user groups that are not assigned to the resource group. Number of Parity Groups Displays the number of parity groups that are not assigned to the resource group.
Unassigned Roles Lists roles that are not assigned to the user group. Item Description Role Displays roles. Add button Adds the selected roles in the Unassigned Roles list to the Assigned Roles list. Remove button Removes the selected roles from the Assigned Roles list and relocates the selected roles to the Unassigned Roles list. Assigned Roles The following window shows the roles that can be assigned to the selected user group.
Item Description Role Displays roles.
Related Topics • “Changing user group permissions” (page 65) Confirm window (Edit Role Assignment) Selected User Group Item Description User Group Name Displays the new name of the user group. All Resource Groups Assigned Displays whether all the resource groups are assigned. Yes: All the resource groups are assigned to the user group. No: All the resource groups are not assigned to the user group.
Setup Server wizard Select Authentication Server window To open this window, select Server Setup from the LDAP, RADIUS, or Kerberos properties window. The following tables describe the fields and settings used to set up external authentication in the Select Authentication Server window. Item Description External Authentication Select the type of authentication server. • Disable: Does not use any authentication server. Users are authenticated with user information registered in the SVP.
Selected Server The following table describes the fields and settings in the Disable authentication server setup window. Item Description External Authentication Displays the type of the authentication server. • Disable: Does not use any authentication server. Users are authenticated with user information registered in the SVP. • LDAP: Users are authenticated with user information registered in the LDAP server. • RADIUS: Users are authenticated with user information registered in the RADIUS server.
LDAP Properties Item Description DNS Lookup Displays whether to search for the LDAP server using the information registered in the SRV records in the DNS server. • Enable: Performs the search using information registered in the SRV records in the DNS server. • Disable: Performs the search using the host name and the port number. Authentication Protocol Displays the LDAP protocol to use. External User Group Mapping Displays whether to connect an authentication server to an authorization server.
Item Description Timeout Displays the number of seconds before connection to the LDAP server times out. Retry Interval Displays the retry interval in seconds when the connection to the LDAP server fails. Number of Retries Displays the retry times when the connection to the LDAP server fails. Secondary Host Name Displays the host name of the secondary LDAP server. Secondary Port Number Displays the port number of the secondary LDAP server. Setup Server Displays the Setup Server window.
RADIUS Properties settings The following table describes the fields and settings in the RADIUS properties window. Item Description Authentication Protocol Displays the RADIUS protocol to use. • PAP: Password authentication protocol that transmits plaintext user ID and password. • CHAP: Challenge-handshake authentication protocol that transmits encrypted password. Primary Host Name Displays the host name, the IPv4 address, or the IPv6 address of the RADIUS server.
Kerberos Properties window To open this window, select Kerberos in the External Authentication window. Kerberos Properties The following table describes the fields and settings used to edit the Kerberos properties. Item Description DNS Lookup Displays whether to search for the Kerberos server using the information registered in the SRV records in the DNS server. • Enable: Performs the search using information registered in the SRV records in the DNS server.
Item Description External User Group Mapping Authentication Protocol Displays the LDAP protocol to use. External User Group Mapping Primary Port Number Displays the port number of the LDAP server. External User Group Mapping Base DN Displays the base domain name to search for users to authenticate. External User Group Mapping Search User's DN Displays the search user's domain name. External User Group Mapping Password Displays asterisks (*) to mask the password of the user for searching.
Setup Server The following table describes the fields and settings used to edit the server information. Item Description Certificate File Name Specify a certificate file. Click Browse to find the file. DNS Lookup Specify whether to search for the LDAP server using the information registered in the SRV records in the DNS server. • Enable: Performs the search using information registered in the SRV records in the DNS server. • Disable: Performs the search using the host name and the port number.
Item Description External User Group Mapping Host Name Specify a host name of the LDAP server. ASCII code characters, hyphens (-), and periods (.) can be specified. If you select Enable in DNS Lookup, this item is disabled. External User Group Mapping Port Number Specify a port number of the LDAP server. External User Group Mapping Domain Name Specify a domain name that the LDAP server manages.
Item Description If you select Disable in Secondary Server, this item is disabled. Test User Name Specify a user name for a server connection test. You can specify ASCII code characters and the following symbols: !#$%&'*+-./=?@^_`{|}~ Password Specify a password of the user name for a server connection test. You can specify ASCII code characters and the following symbols: ! # $ % & ' ( ) * + , -.
Setup Server Item Description Certificate File Name Displays the certificate file. DNS Lookup Displays whether to search for the LDAP server using the information registered in the SRV records in the DNS server. • Enable: Performs the search using information registered in the SRV records in the DNS server. • Disable: Performs the search using the host name and the port number. Authentication Protocol Displays the LDAP protocol.
Setting RADIUS information The following table describes the fields and settings used to edit server RADIUS information. Item Description Authentication Protocol Specify a RADIUS protocol to use. • PAP: Password authentication protocol that transmits plaintext user ID and password. • CHAP: Challenge-handshake authentication protocol that transmits encrypted password. Host Name Specify a name of the RADIUS server. You can specify ASCII code characters, hyphens (-), and periods (.).
Item Description !"#$%&'()*+,-./;:<>=?@[\]^_(}~ • To specify an IPv4 address, select IPv4 and enter 4 numbers (0-255). For example: XXX.XXX.XXX.XXX (X indicates a digit) Specify only numbers. Do not specify any periods. • To specify an IPv6 address, select IPv6 and enter 8 hexadecimal numbers (0-FFFF). For example: YYYY:YYYY:YYYY:YYYY:YYYY:YYYY:YYYY:YYYY (Y indicates a hexadecimal digit) Enter 0 to omit a segment. Port Number Specify a port number of the RADIUS server.
Item Description External User Group Mapping - Port Number Specify a port number of the LDAP server. External User Group Mapping - Domain Name Specify a domain name of the LDAP server. If you select Enable in DNS Lookup, or if you select Disable in External User Group Mapping, this item is disabled. You can specify ASCII code characters, hyphens (-), and periods (.). If you select Disable in External User Group Mapping, this item is disabled.
Item Description External User Group Mapping - Number of Retries Specify retry times when the connection to the LDAP server fails. Test User Name Specify a user name for a server connection test. If you select Disable in External User Group Mapping, this item is disabled. You can specify ASCII code characters and the following symbols: !#$%&'*+-./=?@^_`{|}~ Password Specify a password of the user name for a server connection test.
Item Description • RADIUS: Users are authenticated with user information registered in the RADIUS server. • Kerberos: Users are authenticated with user information registered in the Kerberos server. Setup Server The following table describes the fields and settings in the Setup Server section of the Confirm window for (RADIUS Setup Server) window. Item Description Authentication Protocol Displays the RADIUS protocol to use.
Item Description External User Group Mapping - Timeout Displays the number of seconds before connection to the LDAP server times out. External User Group Mapping - Retry Interval Displays the retry interval in seconds when the connection to the LDAP server fails. External User Group Mapping - Number of Retries Displays the retry times when the connection to the LDAP server fails.
Kerberos Settings The following table describes the fields and settings in the Setup Server section of Kerberos window. Item Description DNS Lookup Specify whether to search for the Kerberos server using the information registered in the SRV records in the DNS server. • Enable: Performs the search using information registered in the SRV records in the DNS server. • Disable: Performs the search using the host name and the port number. Realm Name Specify a default realm name.
Item Description External User Group Mapping - Secondary Port Number Specify a port number of the secondary LDAP server. External User Group Mapping - Base DN Specify a base DN to search for users to authenticate. If you select Disable in Secondary Server, Enable in DNS Lookup, or External User Group Mapping fields, this item is disabled. Available characters: Alphanumeric characters (ASCII characters) and all symbols.
Item Description External User Group Mapping - Number of Retries Specify retry times when the connection to the LDAP server fails. Test User Name Specify a user name for a server connection test. If you select Disable in External User Group Mapping, this item is disabled. You can specify ASCII code characters and the following symbols: !#$%&'*+-./=?@^_`{|}~ Password Specify a password of the user name for a server connection test.
Item Description • RADIUS: Users are authenticated with user information registered in the RADIUS server. • Kerberos: Users are authenticated with user information registered in the Kerberos server. Setup Server The following table describes the fields and settings in the Setup Server section of Confirm window for (Kerberos Setup Server) window. Item Description DNS Lookup Displays whether to search for the Kerberos server using the information registered in the SRV records in the DNS server.
Item Description External User Group Mapping - Number of Retries Displays the retry times when the connection to the LDAP server fails. External User Group Mapping - Secondary Port Number Displays the port number of the secondary LDAP server.
F Remote Web Console software licenses GUI reference This section describes the Remote Web Console windows that you use to view and manage the licenses for the software applications on HP XP7 Storage systems License Keys window Use the License Keys window to install and uninstall license keys. Summary The following table describes the fields and settings in the Summary section of the License Keys window.
Item Description these cases, you can refresh the license status by selecting Update License Status and then installing the software. • Grace Period: The licensed capacity is insufficient because LDEVs are added, or copy pairs are created, or pool volumes are added. The license expires in 30 days. Please purchase the licenses before the license key expires.
Install Licenses window License Key Item Description License Key Select whether to enter a key code or specify a license key file. • Key Code : Enter a key code to install the software. Use the license key code for the software to be installed. • File :Specify a license key file to install software. Click Browse and specify the license key file. Add button Adds the specified license key to the Selected License Keys table, shown below).
Item Description • Not Installed: The software is not installed. • Not Enough License: Installation is complete, but the license capacity is insufficient. Not Enough License might remain displayed when the licensed capacity exceeds the mounted capacity after you reduce the number of LDEVs, or when the licensed capacity exceeds the used capacity after you delete pairs or pool volumes. In these cases, you can refresh the license status by selecting Update License Status and then installing the software.
Confirm window (Install Licenses) This topic describes the Confirm window (Install Licenses) window. Item Description Software name Name of the software application Status Displays the software's installation status. See the Status item in the of the Selected License Keys table in the section “Install Licenses window” (page 205). Key Type The license key type • permanent • term • temporary • emergency A blank displays if no license key has been installed.
The following table describes the fields and settings in the Enable Licenses window. Item Description Software product name Name of the software application Status Displays the software's installation status. See the Status item in the of the Selected License Keys table in the section “Install Licenses window” (page 205). Key Type The license key type: • permanent • term • temporary • emergency This field is blank if no license key is installed.
The following table describes the fields and settings in the Disable Licenses window. Item Description Software product name Name of the software application Status Displays the software's installation status. See the Status item in the of the Selected License Keys table in the section “Install Licenses window” (page 205). Key Type The license key type: • permanent • term • temporary • emergency This field is blank if no license key is installed.
Item Description Software product name Name of the software application Status Displays the software's installation status. See the Status item in the of the Selected License Keys table in the section “Install Licenses window” (page 205). Key Type The license key type: • permanent • term • temporary • emergency This field is blank if no license key is installed. Licensed Capacity • Permitted (TB): Displays the permitted volume capacity for this software in integers.
The following table describes the fields and settings in the Remove Licenses window. Item Description Software product name Name of the software application Status Displays the software's installation status. See the Status item in the of the Selected License Keys table in the section “Install Licenses window” (page 205). Key Type The license key type: • permanent • term • temporary • emergency This field is blank if no license key is installed.
G Configuring storage systems GUI reference This section describes the Remote Web Console windows and wizards that you use to configure storage systems. Login Message window The following table describes the fields and settings in the Login Message window. Item Description Login Message Enter a login message. You can use up to 2,048 alphanumeric characters (ASCII codes) and symbols.
The following table describes the fields and settings in the Edit Storage System window. Item Description Storage System Name Device name of the storage system. Contact Contact information such as personnel and telephone number where you can inquire about the storage system. Location Location of the connected storage system.
Edit Alert Settings window The window for the wizard contains three tabs: • “Syslog tab” • “SNMP tab” • “Email tab” Item Description Notification Alert Select the destination of the alert notification. • Host Report: Reports alerts only to the host(s) for which SIM report setting is made. • All: Reports alerts to all hosts. Alert destinations are common to Syslog, SNMP, and Email. Syslog tab The following table describes the fields and settings in the Syslog tab.
Item Description Primary Server - Enter the IP address of the server that you want to set as the Syslog Server. You cannot set an address with all 0s. Server Setting • To set an IPv4 address, select IPv4, and enter four numbers within the range of 0 to 255. Example: XXX.XXX.XXX.XXX (X indicates a numeral) • To set an IPv6 address, select IPv6, and enter eight hexadecimal alphanumeric characters within the range of 0 to FFFF. You can also use an abbreviated-format IPv6 address.
Item Description Alphanumeric characters (ASCII codes) and symbols (! # $ % & ' ( ) * + , - . / : ; < = > ? @ [ \ ] ^ _ ` { | } ~) Spaces are not allowed. Timeout Enter a value as the time before the timeout for connection to the Syslog Server is detected. The default is 10. Use this field only when you selected New Syslog Protocol (TLS1.2/RFC5424) in Transfer Protocol. Retry Interval Enter a value between 1 and 60 (seconds) as the retry interval when communication with the Syslog Server fails.
The following table describes the fields and settings in the SNMP tab. Item Description Extension SNMP Select whether or not to use the SNMP Agent. • Enable: Reports SIM through SNMP trap • Disable: Does not report SIM through SNMP trap SNMP Trap Settings • Community: Displays the community name for which SNMP trap is reported. • IP Address: Displays the IP address of the SNMP Manager for which an SNMP trap is set. • SNMP Trap - Add: Adds an SNMP trap. The Add SNMP Trap window opens.
Email tab Item Description Mail Notice Select whether or not to report failure information through email. • Enable: Reports SIM through email. • Disable: Does not report SIM through email. Email Settings This field is mandatory when you selected Enable in Mail Notice. • Mail Address: The email address displays. • Attribute: Adds email addresses. The Add Address window opens. • Add: Adds email addresses. The Add Address window opens • Change: Changes the selected email address and attribute. The opens.
Item Description Mail Server Setting - Email Server Enter the Email server information. You cannot set an IP address with all 0s. • Identifier: To specify a host name, select Identifier. You can enter a name of up to 63 characters. • IPv4: To set an IPv4 address, select IPv4, and enter four numbers within the range of 0 to 255. Example: XXX.XXX.XXX.XXX (X indicates a numeral) • IPv6: To set an IPv6 address, select IPv6, and enter eight hexadecimal alphanumeric characters within the range of 0 to FFFF.
The following table describes the fields and settings in the Add SNMP Manager window. Item Description SNMP Manager Specify the IP address of the SNMP Manager. You cannot use an address with all 0s. • IPv4: To set an IPv4 address, select IPv4, and enter four numbers within the range of 0 to 255. Example: XXX.XXX.XXX.XXX (X indicates a numeral) • IPv6:To set an IPv6 address, select IPv6, and enter eight hexadecimal alphanumeric characters within the range of 0 to FFFF.
Change SNMP Traps window The following table describes the fields and settings in the Change SNMP Traps window. Item Description IP Address Specify the IP address of the SNMP Manager. You cannot use an address with all 0s. • IPv4: To set an IPv4 address, select IPv4, and enter four numbers within the range of 0 to 255. Example: XXX.XXX.XXX.XXX (X indicates a numeral) • IPv6: To set an IPv6 address, select IPv6, and enter eight hexadecimal alphanumeric characters within the range of 0 to FFFF.
The following table describes the fields and settings in the Add Community window. Item Description Community Enter community names. You can register up to 32 communities. For community names, you can use up to 180 alphanumeric characters (ASCII codes) excluding these symbols: (\ , / ; : * ? " < > | & % ^ ). Change Community window Use the change community window to change to a different SNMP community.
The following table describes the fields and settings in the Change Community window. Item Description Community Enter community names. You can register up to 32 communities. For community names, you can use up to 180 alphanumeric characters (ASCII codes) excluding these symbols: (\ , / ; : * ? " < > | & % ^ ). Add Address window Use the add address window to add an email address to the list of addresses to notify of a system error.
The following table describes the fields and settings in the Change Settings window. Item Description Mail Address Enter an email address after change and select an attribute.You can select more than one email address. When you select more than one email address, you can change only attributes. For an email address, you can use up to 255 characters.Usable characters: Alphanumeric characters (ASCII codes) and symbols (! # $ % & ` + - * / ' ^ { } _ .
The following tables describe the fields and settings in the Confirm window (Edit Alert Settings) Item Description Notification Alert Displays the destination for alert notification. This table describes the Syslog Server settings. Item Description Primary Server - Syslog Server Displays whether or not to use the Syslog Server. Primary Server - IP Address Displays the IP address of the server specified as the Syslog Server.
The following table describes the SNMP Trap Settings Item Description Community Displays the name of the community for which the SNMP trap is reported. IP Address Displays the IP address of the SNMP Manager for which SNMP trap setting is made. The following table describes the SNMP Manager settings. Item Description IP Address Displays the IP address of the SNMP Manager for which SNMP trap setting is made. The following table describes the Email Notification settings.
Edit System Options window Environmental Settings table The following table describes the environmental settings fields and settings in the Edit System Options window. Item Description No. Displays the number of function bits for the system option. System Options Displays system option names. • Hide alert information: When you enable this system option, the Alert window does not display.
Confirm window (Edit System Options) Item Description No. Displays the number of function bits for the system option. System Options Displays the name of the system option. Status Displays the status of system option.
Column Settings window Table 50 Setting fields in the Column Settings window Item Description Restore Default Settings Changes the selection of the displayed columns to the factory default settings. Checkbox Selects the columns to display. Click the checkbox next to the name of each column that you want to display. After making the selections, click OK. Only the columns whose checkboxes are selected are displayed. Columns whose checkboxes are not selected are not displayed.
H Remote Web Console system reference GUI reference This section explains the Remote Web Console windows used to view and manage storage system tasks, reports, and alerts.
Item Description Total Cache Size Total size of the cache memory in the storage system. Edit Storage System Allows editing of storage system name, contact, and location. Allocation summary This following table describes the fields and settings in the Allocation summary section of the Storage Systems window. Item Description Internal / External This item switches the displayed items. • Total: Displays information on both the internal volumes and the external volumes.
Item Description When an item other than Total is selected in Internal / External, this item displays the number of logical devices that are actually used in the Thin Provisioning pool volume. The capacity does not display in this item, but is counted as part of Reserved - Other. Reserved - Unused THP Pool When the total is selected in Internal / External, this item displays the capacity that is subtracted Used THP Pool value from total capacity of pool volume of Thin Provisioning.
Item Description When an item other than total is selected in Internal / External, a control cylinder is not included in the capacity and the number of logical devices do not display. THP Unallocated1 When total is selected in Internal / External, this item displays the virtual volume capacity of Thin Provisioning that is not defined paths and the number of logical devices. A virtual volume is not included for either Fast Snap . A control cylinder is not included in the capacity.
Number of Ports The following table describes the fields and settings in the Port Condition window. Item Description Available (Connected) Number of ports in use Available (Not Connected) Number of ports that are installed but not in use Not Available Number of ports that are installed but blocked Not Installed Ports not installed Port Conditions The following table describes the fields and settings in the Port Condition window.
Tasks window This window displays a list of tasks performed on the storage system. Up to 384 tasks can display, including 256 that are Completed and/or Failed. Up to 128 tasks whose statuses are In Progress, Waiting, and Suspended can also display. • “Summary” • “Tasks tab” Summary Item Description Completed Number of completed tasks. In Progress Number of tasks in progress. Waiting Number of tasks waiting. Suspended Number of suspended tasks.
Item Description End time Date and time when the task completed. Blank indicates the task has not completed yet. Auto Delete Enabled: A task is automatically deleted when the following two events occur: • The task is completed • The number of tasks in the Task list reaches the maximum number the window can display (384) Disabled: Tasks will remain displayed until users delete them. Tasks whose status is Failed are automatically Disabled by the system. Suspend Tasks button Suspends the selected tasks.
Suspend Tasks window Use this window to suspend waiting tasks. Selected Tasks table Item Description Task Name Task name specified by a user when the user performed the task. Status Task status. Type General name of the task. User Name User name who performed the task. Submission Time Date and time when the task was submitted.
Resume Tasks window Use this window to resume suspended tasks. Selected Tasks table Item Description Task Name Task name specified by a user when the user performed the task. Status Task status. Type General name of the task. User Name User name who performed the task. Submission Time Date and time when the task was submitted. Delete Tasks window Use this window to delete tasks. If you delete a waiting task, the task will be cancelled.
Selected Tasks table Item Description Task Name Task name specified by a user when the user performed the task. Status Task status. Type General name of the task. User Name User name who performed the task. Submission Time Date and time when the task was submitted. Disable Auto Delete window Use this window to prevent a task from being automatically deleted from the task window.
Selected Tasks table Item Description Task Name Task name specified by a user when the user performed the task. Status Task status. Type General name of the task. User Name User name who performed the task. Submission Time Date and time when the task was submitted. Enable Auto Delete window Use this window to automatically delete completed tasks from the task window when the number of displayed tasks reaches the maximum (384 tasks).
Item Description Top Status Indicator Refresh Interval Interval for the automatic updates of the icons on the upper-right corner of the Remote Web Console main window. (Alerts, Audit log, and Resource You can specify 10–3600 seconds. The default value is 60 seconds. Lock) Task Screen Refresh Interval Interval for the automatic updates of the task window. You can specify 10–3600 seconds, or No Update. The default value is 60 seconds.
Summary Item Description Number of Reports Number of created reports. Reports tab Item Description Report Name Task name specified when users created a report. Click to view the report in HTML format. User Name User name who created the report. Submission Time Date and time when the report was created. Create Configuration Report Creates a new report. Download Reports Downloads the created report in both HTML and CSV format. Delete Reports Deletes the selected report.
Selected Reports table Item Description Report Name Task name specified when users created a report. User Name User name who created the report. Submission Time Date and time when the report was created Alerts window Displays the list of alerts (SIM) that occurred in the storage system.
Figure 44 Alerts window Summary Item Description Number of Uncompleted Alerts Displays the number of alerts that are not authenticated yet. • Acute: Displays total number of Acute level alerts that are not authenticated yet. • Serious: Displays total number of Serious level alerts that are not authenticated yet. • Moderate: Displays total number of Moderate level alerts that are not authenticated yet. • Service: Displays total number of Service level alerts that are not authenticated yet.
Item Description Error Level Displays error level of alerts. • Service: No need to deal with immediately. Errors that are dealt with within periodical maintenance. • Moderate: No need to deal with immediately. Errors that are dealt with within periodical maintenance. • Serious: Contact the HP Technical Support. Take adequate measure as instructed, report and solve the problem. • Acute: Contact the HP Technical Support. Take adequate measure as instructed, report and solve the problem.
Alert properties Item Description Error Code Displays reference codes of SIM. For details about reference codes, contact the HP Technical Support.For information about errors that need to be solved, see “Checking alerts” (page 105). Date Displays the date when alerts occurred. Error Level Displays error level of alerts. • Service: No need to deal with immediately. Errors that are dealt with within periodical maintenance. • Moderate: No need to deal with immediately.
Resource Lock Properties Item Description Number of Resource Groups – Locked Displays the number of locked resource groups. Number of Resource Groups – Unlocked Displays the number of unlocked resource groups. Resource Groups table Item Description Resource Group Name (ID) Displays resource group name and resource group ID that user can operate. Status Displays lock status of resource groups. Locked: Locked user exists. Unlocked: Locked user does not exist.
Item Description Unlock All All locked resource groups are forcibly unlocked. Virtual Storage Machine Displays the model type of the virtual storage machine and serial number set for the resource group.
I Tool Panel GUI Reference This describes the Tool Panel window windows and features. Control Panel This section describes the Tool Panel windows and controls. Environment Parameter window This section describes the Environment Parameter window features and controls. Figure 45 Environment Parameter window Item Description RMI time-out period This parameter specifies the time-out period for forcible logout when a user performs no operation for a certain period of time because of a network error, etc.
Figure 46 Download File window Item Description Configuration File Select the checkbox for the file to be downloaded. Downloadable configuration files differ according to the system configuration. Submit Downloads the configuration file. Reset Cancels downloading the configuration file. Restore File window This section describes the Restore File window features and controls. Figure 47 Restore File window Item Description Upload File (Archive File) Click Browse...
Figure 48 Download Dump Files window Item Description Existing Dump Files Select this when you want to re-download a previously downloaded dump file. This item displays only when one or more compressed dump files exist. If you have not downloaded any dump files, this item does not display even though you have acquired dump files via SVP. Normal Dump Contains all information about the SVP and minimum information about the storage system.
Figure 49 Update Certificate Files window Item Description Certificate file (.crt file) Click Browse... and specify the certificate file (server.crt file). Key file (.key file) Click Browse... and specify the key file (server.key file). Return to the default configuration Returns the SSL certificate to default. Upload Uploads the SSL certificate. Reset Cancels the upload of the SSL certificate.
Item Description Return to the default configuration Returns the SSL certificate to default. Upload Uploads the certificate to the SMI-S provider. Reset Cancels the upload of the SMI-S provider certificate. Set or Delete Certificate File for HCS window This section describes the Set or Delete Certificate File for HCS window features and controls. Figure 51 Set or Delete Certificate File for HCS window Item Description Certificate file (.crt file) Click Browse...
Figure 52 Update Certificate Files for SMIS window Item Description Configuration file Click Browse... and specify the configuration file you want to upload. Return to the default configuration Returns the SMI-S provider configuration file to default Upload Uploads the configuration file to SMI-S provider. Reset Cancels the upload of the SMI-S provider configuration file.
Glossary allocation The ratio of allocated storage capacity versus total capacity as a percentage. Allocated storage refers to those logical devices (LDEVs) that have paths assigned to them. Allocated storage capacity is the sum of the storage of these LDEVs. Total capacity is the sum of the capacity of all LDEVs on the disk array. BC P9000 or XP Business Copy. An HP application that provides volume-level, point-in-time copies in the disk array.
to be associated with 1 to 36 LDEVs. Essentially, LUSE makes it possible for applications to access a single large pool of storage. M-VOL Main volume. MCU Main control unit. OPEN-x A general term describing any of the supported OPEN emulation modes (for example, OPEN-E). There are two types of OPEN-x devices: legacy OPEN-x devices with a fixed size (such as OPEN-3, OPEN-8, OPEN-9, and OPEN-E), and OPEN-V, which has a variable size and is a CVS-based volume.
Index A account lock policy, 67 adding SVP to trusted zone, 39 Adobe Flash, 27 Alerts function, 105 authentication server, connecting to, 50 UNIX, 109 external application, viewing data, 93 external volume, calculating capacity, 85 F B FD Dump Tool downloading trace files, 111 Firefox problems on UNIX, troubleshooting, 111 firewall configuration, 27 Blocking HTTP communications, 23 built-in user, 37 G C GUI highlights, 10 cable connections, 13 Cache Memories report, 129 capacity, calculating, 85 ca
changing a user’s, 60 permissions, changing, 61 Physical View report, 130 port locations, 92 R RADIUS server, accessing, 52 raidinf add report, 134 raidinf command, 132 raidinf delete report, 135 raidinf get reportinfo, 136 registering certificates, Insight Manager, 63 related documentation, 113 Report Configuration Tool Command Reference, 132 Report Viewer window, 94 reports about, 12 Cache Memories, 129 Channel Adapters, 130 Disk Adapters, 116 downloading, 94 Host Groups, 117 Hosts, 118 Logical Devices,