Installation Manual

HP Storage Essentials SRM 6.0 Installation Guide 3
3 Install a CIM Extension on each host
(other than the management server)
from which you want the management
server to be able to obtain
information. The CIM Extension
gathers information from the operating
system and host bus adapters on the
host. It then makes the information
available to the management server.
It is possible to install, upgrade, and
manage CIM Extensions remotely
across any number of hosts. See
Deploying and Managing CIM
Extensions” on page 181.
HP Storage Essentials Standard
Edition supports a subset of the
devices supported by Enterprise
Edition. See the HP Storage Essentials
Standard Edition Support Matrix for a
list of supported devices. The support
matrix is accessible from the
Documentation Center (Help >
Documentation Center in Storage
Essentials).
IMPORTANT: Do not install CIM
extensions on the management
server.
1
IBM AIX - See ”Installing the CIM Extension
for IBM AIX” on page 191.
SGI ProPack for Linux - See ”Installing the
CIM Extension for SGI ProPack for Linux
on page 201.
HP-UX - See ”Installing the CIM Extension
for HP-UX” on page 209.
SGI IRIX - See ”Installing the CIM Extension
for SGI IRIX” on page 219.
SUSE and Red Hat Linux - See ”Installing
the CIM Extension for SUSE and Red Hat
Linux” on page 227.
HP OpenVMS (Alpha) - See ”Installing the
CIM Extension for OpenVMS” on
page 249.
HP Tru64 UNIX - See ”Installing the CIM
Extension for HP Tru64 UNIX” on
page 261.
Sun Solaris - See ”Installing the CIM
Extension for Sun Solaris” on page 271.
Microsoft Windows - See ”Installing the
CIM Extension for Microsoft Windows” on
page 281.
NonStop - See ”Installing the CIM
Extension for NonStop” on page 237
4 The Windows Proxy is required when
the management server is on Linux
and you want to obtain information
from Microsoft Windows hosts that do
not have a CIM extension installed.
See ”Installing and Discovering the Windows
Proxy” on page 291.
4 Configure the applications and hosts
for monitoring. This step includes
discovering applications, master
backup servers, and hosts.
See ”Discovering Applications, Backup Hosts
and Hosts” on page 297.
5 Change the password of the system
accounts.
See ”Changing the Password of System
Accounts” on page 368.
Table 2 Roadmap for Installation and Initial Configurations (continued)
Step Description Where to Find