P2X0-1090-10ENZ0 ETERNUS Web GUI User’s Guide ETERNUS DX80 S2/DX90 S2, ETERNUS DX410 S2/DX440 S2, ETERNUS DX8100 S2/DX8700 S2
This page is intentionally left blank.
Preface This manual provides a variety of basic information about Web GUI for the ETERNUS DX80 S2/DX90 S2, the ETERNUS DX410 S2/DX440 S2, and the ETERNUS DX8100 S2/DX8700 S2. It should be referred to when setting up and maintaining the ETERNUS DX80 S2/DX90 S2, the ETERNUS DX410 S2/DX440 S2, and the ETERNUS DX8100 S2/DX8700 S2 Disk storage systems. Knowledge of UNIX or Windows® system management is required. This manual is written for controller firmware version V10L50 or later.
Preface ● Chapter 8 Advanced Copy Management This chapter describes Advanced Copy status and management. ● Chapter 9 Connectivity Management This chapter describes connectivity settings between the host and the ETERNUS DX80 S2/DX90 S2, the ETERNUS DX410 S2/DX440 S2, and the ETERNUS DX8100 S2/DX8700 S2. ● Chapter 10 Component Management This chapter describes component status in the ETERNUS DX80 S2/DX90 S2, the ETERNUS DX410 S2/DX440 S2, and the ETERNUS DX8100 S2/DX8700 S2 and hardware maintenance.
Preface Related Documents Other manuals for the ETERNUS DX80 S2/DX90 S2, the ETERNUS DX410 S2/DX440 S2, and the ETERNUS DX8100 S2/DX8700 S2 are as follows: • ETERNUS DX80 S2/DX90 S2 Disk storage system Overview • ETERNUS DX80 S2/DX90 S2 Disk storage system User's Guide -Site Planning• ETERNUS DX80 S2/DX90 S2 Disk storage system User's Guide -Installation• ETERNUS DX80 S2/DX90 S2 Disk storage system User's Guide -Operation• ETERNUS DX410 S2/DX440 S2 Disk storage system Overview • ETERNUS DX410 S2/DX440 S2 D
Preface Acknowledgments • Microsoft, Windows, Windows Server, and Internet Explorer are either registered trademarks or trademarks of Microsoft Corporation in the United States and other countries. • UNIX is a registered trademark of The Open Group in the United States and other countries. • Oracle and Java are registered trademarks of Oracle and/or its affiliates. • IBM, AIX, and Tivoli are trademarks of International Business Machines Corporation, registered in many jurisdictions worldwide.
Preface Naming Conventions Product names The following products will be represented throughout this manual by the following abbreviations. • The following abbreviations are used for Microsoft® Windows Server®.
Table of Contents Chapter 1 Outline 17 1.1 Outline .............................................................................................................................. 17 1.2 Features ............................................................................................................................ 18 1.3 Operating Environment .................................................................................................... 18 1.4 User Management ..............................
Table of Contents 4.3 Configuration Settings for Using Thin Provisioning Functions ........................................... 71 Chapter 5 5.1 5.1.1 5.1.2 5.1.3 5.1.4 5.1.5 5.1.6 5.1.7 5.1.8 5.1.9 5.1.10 5.1.11 5.1.12 5.1.13 5.1.14 5.2 5.2.1 5.2.2 5.2.3 5.2.4 5.2.5 5.2.6 5.2.7 5.2.8 5.2.9 5.2.10 5.2.11 5.2.12 5.2.13 5.2.14 5.2.15 5.2.16 5.2.17 5.2.18 5.2.19 5.2.20 5.2.21 5.2.22 5.2.23 Volume Management 73 Volume Status .................................................................................
Table of Contents Chapter 6 6.1 6.1.1 6.1.2 6.1.3 6.1.4 6.1.5 6.1.6 6.1.7 6.2 6.2.1 6.2.2 6.2.3 6.2.4 6.2.5 6.2.6 6.2.7 6.2.8 6.2.9 7.1.1 7.1.2 7.1.3 7.1.4 7.1.5 7.1.6 7.1.7 7.1.8 7.1.9 7.1.10 7.2 7.2.1 7.2.2 7.2.3 7.2.4 7.2.5 7.2.6 7.2.7 7.2.8 7.2.9 160 RAID Group Status ........................................................................................................... 160 RAID Group (Basic Information) ..........................................................................................
Table of Contents 7.2.10 7.2.11 7.2.12 7.2.13 Register Thin Provisioning License ............................................................................................................... 245 Delete Thin Provisioning License ................................................................................................................. 247 Start Balancing Flexible Tier Pool ................................................................................................................
Table of Contents Chapter 9 9.1 9.1.1 9.1.2 9.1.3 9.1.4 9.1.5 9.1.6 9.1.7 9.1.8 9.1.9 9.1.10 9.1.11 9.1.12 9.1.13 9.2 9.2.1 9.2.2 9.2.3 9.2.4 9.2.5 9.2.6 9.2.7 10.1.1 10.1.2 10.1.3 10.1.4 10.1.5 10.1.6 10.1.7 10.1.8 10.1.9 10.1.10 10.1.11 10.1.12 10.1.13 10.1.14 10.1.15 10.1.16 10.1.17 367 Connectivity Status ......................................................................................................... 367 Structures for Host Connection .......................................................
Table of Contents 10.1.18 10.1.19 10.1.20 10.1.21 10.2 10.2.1 10.2.2 10.2.3 10.2.4 10.2.5 10.2.6 10.2.7 10.2.8 10.2.9 10.2.10 QSFP Cable Detail ........................................................................................................................................ 678 Boot and Utility Device Detail ...................................................................................................................... 679 CM Module Management Controller Detail ...............................
Table of Contents 11.2.12 11.2.13 Utility Management .................................................................................................................................... 919 System Management ................................................................................................................................... 927 Appendix A User Roles and Policies 948 A.1 Roles.................................................................................................................
Table of Contents E.2 E.2.1 E.2.2 Input Conditions for MWC .............................................................................................. 1007 Allowed Input for the MWC When Using the Default Stripe Depth Value ................................................... 1007 Allowed Input for the MWC when Performance is Tuned............................................................................
List of Figures Figure 1.1 Figure 9.1 Figure 11.1 Figure E.1 Outline of GUI.............................................................................................................................................. 17 Basic concept of host connection (when using host groups) ..................................................................... 369 Relation between the ETERNUS DX Disk storage system and the key server.............................................. 834 Basic size when creating volumes ...
Chapter 1 Outline This chapter describes the outlines, features, operating environment, user management function, and operation screens for ETERNUS DX Disk storage system Web GUI (hereinafter referred to as "GUI"). GUI is installed in controllers of the ETERNUS DX Disk storage systems (hereinafter also referred to as "ETERNUS DX Disk storage system" or "the storage system"), and used for performing settings and maintenance via web browser. 1.
Chapter 1 Outline 1.2 Features 1.2 Features The features for GUI are as follows: ● Initial settings by the wizard The wizard provides instructions for the basic settings that are required to run the ETERNUS DX Disk storage system. ● Status Display This function displays the storage system installation image. ● Checking the extent of a failure If a drive failure occurs, host port, LUN group, volume, RAID group, and installation location can be referenced to determine the extent of the failure.
Chapter 1 Outline 1.3 Operating Environment • Furthermore, when using GUI with Microsoft Internet Explorer 7.0, note the following: - [Automatic prompting for file downloads] and [Allow websites to open windows without address or status bars] must be enabled. Click the [Custom Level] button under the Internet Options Security tab and select the radio buttons for both of these items. - [Show friendly HTTP error messages] must be disabled.
Chapter 1 Outline 1.4 User Management 1.4 User Management Appropriate user management is important to ensure that security is maintained within the system. The user management function applies roles with multiple policies when user accounts are created to specify the functions that are allowed for each user. The following table shows the difference between user roles. Default role Available functions Default account Admin "Admin" is a system administrator privilege.
Chapter 1 Outline 1.5 Screen Operations 1.5 Screen Operations This section provides a description about GUI screen operations. Click the [ ] icon or the [Help] link for a detailed explanation of the functions used during operation. An explanation (help) screen of the function is displayed. • Be sure to log out after all necessary operations are completed. • If the operation screen is not updated when accessing the GUI, close the web browser, and log in again. 1.5.
Chapter 1 Outline 1.5 Screen Operations ■ Auto Refresh The [Overview] screen is refreshed at the specified update interval. Select the update interval to refresh the [Overview] screen from "OFF", "60 sec.", "120 sec.", or "180 sec.". The monitoring time is reset to "0" when the update interval is changed or the [ ] icon is clicked. If the specified interval is a value other than "OFF", the new update interval is applied after the monitoring time is reset.
Chapter 1 Outline 1.5 Screen Operations • ETERNUS DX8700 S2: An LCD message is displayed if a component with failed status, a component with warning status, a storage system with failed status, or a storage system with warning status is detected. The contents of a message that is to be displayed are the same as the contents of the LCD panel messages on the Operation panel.
Chapter 1 Outline 1.5 Screen Operations *1: A user account with the "Status Display" policy or the "Maintenance Operation" policy can display detailed component information. When logged in with a user account that has a "Monitor", "Admin", "StorageAdmin", "SecurityAdmin", or "Maintainer" default role, a link is displayed on the storage system name. • Model Name The model name of the ETERNUS DX Disk storage system is displayed. • Serial No.
Chapter 1 Outline 1.5 Screen Operations • Status The status of the ETERNUS DX Disk storage system is displayed. - Normal - Maintenance - Warning - Error - Not Ready (*) *: This number indicates the cause of the Not Ready status. ■ RAID Groups The usage of RAID groups is displayed. • Pie chart The pie chart indicates the total used capacity and the total free capacity in the RAID groups.
Chapter 1 Outline 1.5 Screen Operations ■ Thin Provisioning Pool The usage of TPP is displayed. • Pie chart The pie chart indicates the total used physical capacity and the total free physical capacity in the TPPs. Blue: Total used physical capacity Gray: Total free physical capacity • Thin Provisioning Pool Count The number of TPPs registered in the ETERNUS DX Disk storage system is displayed. • Volume Count The number of volumes registered in the ETERNUS DX Disk storage system is displayed.
Chapter 1 Outline 1.5 Screen Operations 1.5.2 Screen Structures This section describes screen layouts for functions other than Overview screen. Header Navigation Bread crumb list Category Main Action ■ Header User ID, [Logout] link, general status, storage system name, model name, date, [ ] icon (Refresh), and [ ] icon (Help) are displayed in the header. When maintenance is being performed for the ETERNUS DX Disk storage system, the "Maintenance Mode ON" is displayed.
Chapter 1 Outline 1.5 Screen Operations ■ Category The subordinate items are displayed for an item that is clicked in the navigation. The category directory is used for switching the contents that are displayed in the Main screen. Click the item for the function that is to be used. The horizontal width of the category area can be changed. ■ Main A list of items is displayed for an item that is clicked on the navigation or in the category. The filter setting area may also be displayed for some lists.
Chapter 1 Outline 1.5 Screen Operations ■ Detailed screen Click the link for each item in the list screen to display a detailed screen. Click the tabs that are displayed to switch the display. Tabs to change detailed screens For some items, the same information may be displayed for the list screen and the detailed screen. From Chapter 5 onward, only the information for items in the detailed screen that is different from the list screen is described. 1.5.
Chapter 1 Outline 1.5 Screen Operations ■ Selecting an operation When an item in the navigation or category is clicked, a list items for the selected item is displayed. Select the checkbox or checkboxes of the listed items for the desired operation. Note that some operations, such as creating new volumes, do not require the item to be selected.
Chapter 1 Outline 1.5 Screen Operations ■ Updating the screen display When the [ ] icon in the global header is clicked or a category, a navigation, or an action is selected, the most recently updated screen is obtained. If a tab is clicked, the screen is not updated. Note that only the [Overview] screen automatically updates periodically according to the specified update interval.
Chapter 2 Startup and Shutdown This chapter describes how to start, exit, log in, and log out from GUI. 2.1 Startup of GUI Startup the login screen for GUI. Connect the PC and the ETERNUS DX Disk storage system using a LAN cable, and display the login screen via the web browser. The procedure to start up the login screen for GUI is as follows: Procedure 1 Directly connect the PC and MNT port of the ETERNUS DX Disk storage system via LAN cable.
Chapter 2 Startup and Shutdown 2.1 Startup of GUI • Refer to "11.2.3.1 Setup Network Environment" (page 745) for procedure to set the IP address of the MNT port. • The default number of port that is used for http connection is "80".
Chapter 2 Startup and Shutdown 2.2 Login 2.2 Login Log in to GUI to start the operation. The GUI operation screen appears. The menu that is displayed depends on the role that is applied for the user account. If a login is attempted while 16 users are already logged in to the GUI, an error screen appears. When this occurs, note the error message and try logging in again after completing the required operation.
Chapter 2 Startup and Shutdown 2.2 Login Up to 16 users can be logged in concurrently from the GUI (the number of users that are logged from CLI is not included). Logging in 17 or more users is not allowed. Also note that when another user is already logged in and performing one of the following operations, a warning message appears and some functions cannot be used. Confirm the current GUI usage state and start operation.
Chapter 2 Startup and Shutdown 2.3 Logout 2.3 Logout Log out from GUI to finish the operation. A logout is performed automatically under the following conditions: • When a different user executes a forcible logout (*1) • When the ETERNUS DX Disk storage system is turned off • When no operation is performed for 60 minutes or longer after logging in *1: When the user name is the same as a user who is already logged in, the user who was previously logged in is forcibly logged out.
Chapter 2 Startup and Shutdown 2.4 Exit 2.4 Exit Exit from GUI. Make sure to perform "2.3 Logout" (page 36) operation before exiting GUI. If exiting GUI without logging out, the login status is not released. The procedure to exit is as follows: Procedure 1 Click the [Close] button for the web browser. → Exit from GUI. The login screen does not appear.
Chapter 3 Initial Setup This chapter describes the Initial Setup function for the ETERNUS DX Disk storage system. This function performs the required initial settings that must be set before operating the ETERNUS DX Disk storage system on a series of wizard screens. Initial Setup is divided into "Initial Setup 1" and "Initial Setup 2". • Initial Setup 1 Performs the minimum settings required before using the ETERNUS DX Disk storage system.
Chapter 3 Initial Setup 3.1 Initial Setup 1 3.1 Initial Setup 1 The flow of wizard operations in Initial Setup 1 is shown below. (1) Set Storage Name Register the name, administrator, and installation site of the ETERNUS DX Disk storage system. Refer to "11.2.13.1 Modify Storage System Name" (page 927) for details. (2) Set Date and Time Set the date/time and time zone (storage system location) of the internal clock in the ETERNUS DX Disk storage system. Refer to "11.2.13.
Chapter 3 Initial Setup 3.1 Initial Setup 1 The procedure to perform Initial Setup 1 is as follows: Procedure 1 Click [Start Initial Setup] in [Action]. The [Start Initial Setup] screen is displayed after logging in for the first time. 2 Click the [Next >>] button. → Initial Setup starts.
Chapter 3 Initial Setup 3.1 Initial Setup 1 3 Proceed to [Set Storage System Name]. 3-1 Specify the following items, and click the [Next >>] button. - Name - Installation Location - Administrator - Description → A confirmation screen appears. • If logging in for the first time, be sure to set the name of the ETERNUS DX Disk storage system. • If not logging in for the first time, click the [Skip] button to proceed to the next screen without setting. 3-2 Click the [OK] button.
Chapter 3 Initial Setup 3.1 Initial Setup 1 4 Proceed to [Set Date and Time]. 4-1 Specify the following items, and click the [Next >>] button. - Date/Time Information - Time Zone - Daylight Saving Time - NTP Service → A confirmation screen appears. Click the [Skip] button to proceed to the next screen without setting. 4-2 Click the [OK] button. → Setting of the Date/time starts.
Chapter 3 Initial Setup 3.1 Initial Setup 1 5 Proceed to [Change Password]. 5-1 Specify the following items, and click the [Next >>] button. - Old Password - New Password - Confirm New Password Click the [Skip] button to proceed to the next screen without setting. → A confirmation screen appears. 5-2 Click the [OK] button. → Changing of the password starts. 5-3 Click the [Done] button.
Chapter 3 Initial Setup 3.1 Initial Setup 1 6 Proceed to [Register Thin Provisioning License]. 6-1 Specify the following items, and click the [Next >>] button. - License Key (if not already registered) → A confirmation screen appears. • If the Thin Provisioning license key is already registered, proceed to [Register Copy License]. • Click the [Skip] button to proceed to the next screen without setting. 6-2 Click the [OK] button. → Thin Provisioning license is registered.
Chapter 3 Initial Setup 3.1 Initial Setup 1 7 Proceed to [Register Copy License]. 7-1 Specify the following items, and click the [Next >>] button. - Registration Method - License Key → A confirmation screen appears. • When using ETERNUS SF AdvancedCopy Manager or ETERNUS SF Express, perform the required settings described in the documents that are supplied with ETERNUS SF AdvancedCopy Manager or ETERNUS SF Express.
Chapter 3 Initial Setup 3.1 Initial Setup 1 8 Proceed to [Register SED Authentication Key]. 8-1 Click the [Next >>] button. → A confirmation screen appears. • If the SED Authentication Key is already registered, proceed to [Set Network Environment]. • Click the [Skip] button to proceed to the next screen without setting. 8-2 Click the [OK] button. → SED Authentication Key registration starts. 8-3 Click the [Done] button.
Chapter 3 Initial Setup 3.1 Initial Setup 1 9 Proceed to [Set Network Environment]. 9-1 Specify the following items, and click the [Next >>] button. - Select Network Port - Interface - DNS - LAN (only for IPv4) - Allowed IP List → A confirmation screen appears. Click the [Skip] button to proceed to the next screen without setting. 9-2 Click the [OK] button. → Setting of the network environment starts. 9-3 Click the [Finish] button. → A completed screen appears.
Chapter 3 Initial Setup 3.1 Initial Setup 1 10 Click the [Close] button. → The browser is closed, and Initial Setup 1 is complete. • Follow the on-screen instructions to reboot the ETERNUS DX Disk storage system if needed. • Restart the browser, and wait a few minutes before logging into the GUI again. After logging in again, continue with the initial setup. Proceed to Initial Setup 2.
Chapter 3 Initial Setup 3.2 Initial Setup 2 3.2 Initial Setup 2 This sets the various reports that are generated when an error occurs in the ETERNUS DX Disk storage system. If monitoring the ETERNUS DX Disk storage system, use this wizard to build an environment. The flow of wizard operations in Initial Setup 2 is shown below. Some functions do not need to be specified depending on the SNMP version. (1) Set SNMP Agent Basic Set up the SNMP Agent basic interface in the ETERNUS DX Disk storage system.
Chapter 3 Initial Setup 3.2 Initial Setup 2 The procedure to perform Initial Setup 2 is as follows: Procedure 1 Click [Start Initial Setup] in [Action]. • When logging in again after Initial Setup 1 is complete, the [Initial Setup 2] screen appears. • If all of the settings of Initial Setup 2 are not performed, click the [All Skip] button to exit the Initial Setup wizard. 2 Click the [Next >>] button. → Initial Setup restarts.
Chapter 3 Initial Setup 3.2 Initial Setup 2 3 Proceed to [Set SNMP Agent Basic]. 3-1 Specify the following items, and click the [Next >>] button. - SNMP Function - LAN Port used for SNMP - Authentication Failure - Engine ID - MIB-II RFC Version Click the [Skip] button to proceed to the next screen without setting. → A confirmation screen appears. 3-2 Click the [OK] button. → Setting of the SNMP Agent basic starts. 3-3 Click the [Done] button.
Chapter 3 Initial Setup 3.2 Initial Setup 2 4 Proceed to [Set SNMP Manager]. 4-1 Click the [Add] button. Click the [Skip] button to proceed to the next screen without setting. 4-2 Specify the following items, and click the [OK] button. - IP Version - Manager IP Address (IPv4) - Manager IP Address (IPv6) → Returns to the original screen. 4-3 Repeat Step 4-1 and Step 4-2 to configure multiple IP addresses.
Chapter 3 Initial Setup 3.2 Initial Setup 2 4-4 When the IP addresses are set, click the [Next >>] button. → A confirmation screen appears. 4-5 Click the [OK] button. → Setting of the SNMP Manager starts. 4-6 Click the [Done] button. 5 Proceed to [Set SNMP Agent MIB Access View]. 5-1 Click the [Add] button. Click the [Skip] button to proceed to the next screen without setting.
Chapter 3 Initial Setup 3.2 Initial Setup 2 5-2 Specify the following items, and click the [OK] button. - View Name - Subtree → Returns to the original screen. 5-3 Repeat Step 5-1 and Step 5-2 to configure multiple MIB Access Views. 5-4 When the setting of the MIB Access Views is complete, click the [Next >>] button. → A confirmation screen appears. 5-5 Click the [OK] button. → Setting of the SNMP Agent MIB Access View starts. 5-6 Click the [Done] button.
Chapter 3 Initial Setup 3.2 Initial Setup 2 6 Proceed to [Set SNMP Agent User]. 6-1 Click the [Add] button. The [Set SNMP Agent User] function must be set when using SNMPv3 in SNMP communication between the SNMP Agent and SNMP Manager. Click the [Skip] button to proceed to the next screen without setting.
Chapter 3 Initial Setup 3.2 Initial Setup 2 6-2 Specify the following items, and click the [OK] button. - User Name - MIB View Setting - Authentication - Authentication Method - Authentication Password - Retype Authentication Password - Encryption - Encryption Password - Retype Encryption Password → Returns to the original screen. 6-3 Repeat Step 6-1 and Step 6-2 to configure information for multiple users. 6-4 When the setting of the user information is complete, click the [Next >>] button.
Chapter 3 Initial Setup 3.2 Initial Setup 2 6-5 Click the [OK] button. → Setting of the SNMP Agent User starts. 6-6 Click the [Done] button. 7 Proceed to [Set SNMP Agent Community]. 7-1 Click the [Add] button. The [Set SNMP Agent Community] function must be set when using SNMPv1 or SNMPv2c in SNMP communication between the SNMP Agent and SNMP Manager. The SNMP Agent Community setting is not necessary when using SNMPv3 only. Click the [Skip] button to proceed to the next screen without setting.
Chapter 3 Initial Setup 3.2 Initial Setup 2 7-2 Specify the following items, and click the [OK] button. - Community Name - View Name - Allowed SNMP Manager List → Returns to the original screen. 7-3 Repeat Step 7-1 and Step 7-2 to configure multiple communities. 7-4 When the setting of the community is complete, click the [Next >>] button. → A confirmation screen appears. 7-5 Click the [OK] button. → Setting of the SNMP Agent Community starts. 7-6 Click the [Done] button.
Chapter 3 Initial Setup 3.2 Initial Setup 2 8-1 Click the [Add] button. Click the [Skip] button to proceed to the next screen without setting. 8-2 Specify the following items, and click the [OK] button. - Manager No. - SNMP Version - Community Name - User Name - Port No. → Returns to the original screen. 8-3 Repeat Step 8-1 and Step 8-2 to configure information for multiple traps.
Chapter 3 Initial Setup 3.2 Initial Setup 2 8-4 When the setting of the trap information is complete, click the [Next >>] button. → A confirmation screen appears. 8-5 Click the [OK] button. → Setting of the SNMP Agent Trap starts. 8-6 Click the [Done] button. 9 Proceed to [Set E-Mail Notification]. 9-1 Specify the following items, and click the [Next >>] button. - Notification E-Mail - Mail Server Settings - Retry Setting → A confirmation screen appears.
Chapter 3 Initial Setup 3.2 Initial Setup 2 Click the [Skip] button to proceed to the next screen without setting. 9-2 Click the [OK] button. → Setting of the E-Mail Notification starts. 9-3 Click the [Done] button. 10 Proceed to [Set Syslog Notification]. 10-1 Specify the following items, and click the [Next >>] button. - Send Log Domain Name / IP Address Port No. LAN Port → A confirmation screen appears. Click the [Skip] button to proceed to the next screen without setting.
Chapter 3 Initial Setup 3.2 Initial Setup 2 11 Click the [Finish] button. → Initial Setup 2 is complete, and the [Overview] screen appears.
Chapter 4 Configuration Settings This chapter describes the following configuration settings: • Configuration settings for using Standard volumes (when using host affinity settings) • Configuration settings for using Standard volumes (when using host affinity settings, previously referred to as LUN mapping) • Configuration settings for using Thin Provisioning functions 4.
Chapter 4 Configuration Settings 4.1 Configuration Settings for Using Standard Volumes (When Using Host Affinity Settings) Create Volume Create a volume (drive area in the RAID group). A volume is a structural unit of RAID that can be recognized from the server. Select "Standard" for "Type". Refer to: - Create Volume Add Host Group Add the information of any server that accesses the ETERNUS DX Disk storage system via the ports.
Chapter 4 Configuration Settings 4.1 Configuration Settings for Using Standard Volumes (When Using Host Affinity Settings) Add LUN Group Create a LUN group (a group of volumes that are recognized from the server, which is conventionally referred to as an "affinity group"). Correspond the volume number to the Logical Unit Number (LUN) that can be recognized by the host for each LUN group.
Chapter 4 Configuration Settings 4.1 Configuration Settings for Using Standard Volumes (When Using Host Affinity Settings) 4.1.2 When Host Groups are not Created (when Using the [Add Host] Function) The following section describes the series of settings when using Standard volumes without creating host groups. Not only can new RAID groups be created, adding or changing volumes that are registered in existing RAID groups can also be performed.
Chapter 4 Configuration Settings 4.1 Configuration Settings for Using Standard Volumes (When Using Host Affinity Settings) Add LUN Group Create a LUN group (a group of volumes that are recognized from the server, which is conventionally referred to as an "affinity group"). Correspond the volume number to the Logical Unit Number (LUN) that can be recognized by the host for each LUN group.
Chapter 4 Configuration Settings 4.2 Configuration Settings for Using Standard Volumes (When Using Host Affinity Settings, Previously Referred to as LUN Mapping) 4.2 Configuration Settings for Using Standard Volumes (When Using Host Affinity Settings, Previously Referred to as LUN Mapping) LUNs can be allocated to either CA port groups or CA ports. 4.2.
Chapter 4 Configuration Settings 4.2 Configuration Settings for Using Standard Volumes (When Using Host Affinity Settings, Previously Referred to as LUN Mapping) Create CA Port Group Create a CA port group (a group of CA ports that are connected to the specified host group) that is used for the server to access the ETERNUS DX Disk storage system.
Chapter 4 Configuration Settings 4.2 Configuration Settings for Using Standard Volumes (When Using Host Affinity Settings, Previously Referred to as LUN Mapping) 4.2.2 When Allocating the CA port to the LUN Group The following section describes the series of settings when using Standard volumes without creating CA port groups. Not only can new RAID groups be created, adding or changing volumes that are registered in existing RAID groups can also be performed.
Chapter 4 Configuration Settings 4.3 Configuration Settings for Using Thin Provisioning Functions 4.3 Configuration Settings for Using Thin Provisioning Functions The following section shows the series of settings that need to be performed to use Thin Provisioning functions. Not only can new Thin Provisioning Pool be created, adding or changing volumes that are registered in the existing Thin Provisioning Pools can also be performed.
Chapter 4 Configuration Settings 4.3 Configuration Settings for Using Thin Provisioning Functions When using Thin Provisioning functions, monitoring of Thin Provisioning Pool usage is important. Make sure that the Thin Provisioning Pool usage does not exceed the threshold. Refer to "7.1.1 Thin Provisioning Pool (Basic Information)" (page 200) for details.
Chapter 5 Volume Management This chapter describes volume management. 5.1 Volume Status Volume status displays the status information of volumes.
Chapter 5 Volume Management 5.1 Volume Status 5.1.1 Volume (Basic Information) This function displays the basic information of volumes. The following items are displayed in the Main area: • No. The volume number is displayed. During volume creation, the volume number can be allocated automatically or specified manually. When the volume number is allocated automatically, the volume number is allocated from the smallest unused decimal number in ascending order.
Chapter 5 Volume Management 5.1 Volume Status - Temporary A migration source volume that failed to delete after RAID migration is complete, a work volume that failed to delete after TPV balancing is complete, or a work volume that failed to delete after FTRP balancing is complete. • Capacity The volume capacity is displayed. The capacity is displayed in units of "MB", "GB", or "TB". Even when volumes are created in units of "MB", if the volume capacity exceeds 1023.
Chapter 5 Volume Management 5.1 Volume Status • Process A process that is being performed for the volume is displayed. If multiple processes are being performed, the processes are separated with a ": (colon)" and displayed using ("xx:yy"). "Encrypting", "Formatting", "Migrating", or "Balancing" is displayed as "xx". "Zero Reclaiming" or "Reserved Zero Reclaim" is displayed as "yy". If no process is being performed, a "-" (hyphen) is displayed. - Encrypting Volume encryption is being performed.
Chapter 5 Volume Management 5.1 Volume Status 5.1.2 Performance (Host I/O) This function displays the performance information of the volumes for Host I/O. • Performance information is obtained when performance monitoring is operated from GUI, CLI, or any other monitoring software. Refer to "11.2.12.4 Start/Stop Performance Monitoring" (page 925) for details on how to start performance monitoring with GUI. • The interval for acquiring performance information can be specified when starting the monitoring.
Chapter 5 Volume Management 5.1 Volume Status • Write Throughput The amount of transferred data that is written per second is displayed. • Read Response Time The average response time (for read) per millisecond is displayed. • Write Response Time The average response time (for write) per millisecond is displayed. • Read Cache Hit Rate The cache hit rate (for read) is displayed. • Write Cache Hit Rate The cache hit rate (for write) is displayed.
Chapter 5 Volume Management 5.1 Volume Status Filter setting Filter 5.1.3 Description Name Input the volume name that is to be displayed. When not using the volume name for filtering, leave this item blank. Type Select the volume type that is to be displayed. Performance (Advanced Copy) This function displays the performance information of the volumes for Advanced Copy. • Performance information is obtained when performance monitoring is operated from GUI, CLI, or any other monitoring software.
Chapter 5 Volume Management 5.1 Volume Status • Read IOPS The read count per second is displayed. • Write IOPS The write count per second is displayed. • Read Throughput The amount of transferred data that is read per second is displayed. • Write Throughput The amount of transferred data that is written per second is displayed. • Read Cache Hit Rate The cache hit rate (for read) is displayed. • Write Cache Hit Rate The cache hit rate (for write) is displayed.
Chapter 5 Volume Management 5.1 Volume Status • Name The volume name is displayed. • LUN Group Count The total number of LUN groups for the volume and the number of ports to which the volume is allocated is displayed. • LUN Group The LUN group names of the volume are displayed. If the host, ports, and LUNs are allocated without specifying a host group or CA port group, the location information of the ports is displayed.
Chapter 5 Volume Management 5.1 Volume Status The following items are displayed in the Main area: • No. The volume number is displayed. Click this item to display the [Volume Detail] screen. Refer to "5.1.10 Volume Detail (Reservation)" (page 90) for display items. • Name The volume name is displayed. Click this item to display the [Volume Detail] screen. Refer to "5.1.10 Volume Detail (Reservation)" (page 90) for display items.
Chapter 5 Volume Management 5.1 Volume Status Filter setting Filter 5.1.6 Description Name Input the volume name that is to be displayed. When not using the volume name for filtering, leave this item blank. LUN Group Input the LUN group name or the port location information that is to be displayed. When not using the LUN group name or port location information for filtering, leave this item blank.
Chapter 5 Volume Management 5.1 Volume Status The following items are displayed in the Main area: • No. The volume number is displayed. Click this item to display the [Volume Detail] screen. Refer to "5.1.11 Volume Detail (Pinned Data)" (page 91) for display items. • Name The volume name is displayed. Click this item to display the [Volume Detail] screen. Refer to "5.1.11 Volume Detail (Pinned Data)" (page 91) for display items. • Pinned Data Count The number of pinned data is displayed.
Chapter 5 Volume Management 5.1 Volume Status 5.1.7 Bad Sector The bad sector information is displayed. Drives are not monitored for bad sectors when the drives configure the REC Disk Buffer. • When data for rebuild, copyback, or redundant copy is not read normally, bad sector information is recorded.
Chapter 5 Volume Management 5.1 Volume Status • Type The volume type is displayed. - Standard - WSV - TPV - FTV - SDV - SDPV - Temporary • Error LBA The start position of the bad sector information in the volume is displayed using the Logical Block Address (LBA). - When bad sector information is detected in the TPV or the FTV: "-" (hyphen) - When the "Error Type" is "Dispersion": "-" (hyphen) • Error LBA Count The number of LBAs from Error LBA of the bad sector information in the volume is displayed.
Chapter 5 Volume Management 5.1 Volume Status The following items are displayed in the Main area: • No. The volume number is displayed. Click this item to display the [Volume Detail] screen. Refer to "5.1.12 Volume Detail (Balancing TPV)" (page 92) for display items. • Name The volume name is displayed. Click this item to display the [Volume Detail] screen. Refer to "5.1.12 Volume Detail (Balancing TPV)" (page 92) for display items. • Status The volume status is displayed. Refer to "B.
Chapter 5 Volume Management 5.1 Volume Status • Balancing Process When "Process" is not "Balancing", a "-" (hyphen) is displayed. - Status The status of TPV balancing is displayed. • Active Running normally • Error Stopped due to an error - Progress The progress of TPV balancing is displayed. - Work Vol. No. The volume number undergoing TPV balancing is displayed. - Work Vol. Name The volume name undergoing TPV balancing is displayed.
Chapter 5 Volume Management 5.1 Volume Status The following items are displayed in the Main area: • Status The volume status is displayed. When the volume status is normal, " Available" is displayed. Refer to "B.2 Volume Status" (page 974) for detailed information of RAID group status. • Capacity The volume capacity is displayed. • Used Capacity The used capacity of volume is displayed. This item is not displayed when the volume type is other than "TPV" or "FTV". • RAID Group No.
Chapter 5 Volume Management 5.1 Volume Status • Reserved Deletion The "Reserved Deletion" status of the SDPV is displayed. If the SDPV is currently being used, the target SDPV status is changed to "Reserved Deletion". A "-" (hyphen) is displayed when the volume type is other than "SDPV". Refer to "5.2.11 Delete Snap Data Pool Volume" (page 141) for details. - Yes SDPVs are in "Reserved Deletion" status. - No SDPVs are not in "Reserved Deletion" status. • UID The UID is displayed.
Chapter 5 Volume Management 5.1 Volume Status • Hold Reservation Whether the target reservation key is used for persistent reservation is displayed. When the volume is in reservation status other than persistent reservation status, "No" is displayed. - Yes In persistent reservation status - No Not in persistent reservation status 5.1.11 Volume Detail (Pinned Data) The detailed information of pinned data is displayed.
Chapter 5 Volume Management 5.1 Volume Status Filter setting Filter 5.1.12 Description LBA Input the LBA that is to be displayed. When not using the LBA for filtering, leave this item blank. RC Input the RC that is to be displayed. When not using the RC for filtering, leave this item blank. SK Input the SK that is to be displayed. When not using the SK for filtering, leave this item blank. ASC Input the ASC that is to be displayed. When not using the ASC for filtering, leave this item blank.
Chapter 5 Volume Management 5.1 Volume Status 5.1.13 Volume Detail (LUN Concatenation) The detailed information of LUN Concatenation is displayed. The following items are displayed in the Main area: • Concatenation No. The concatenation number of the volume is displayed. • Capacity The capacity of the volume that is concatenated to the target volume is displayed. • RAID Group The RAID group name in which the volume that is concatenated to the target volume belongs is displayed. 5.1.
Chapter 5 Volume Management 5.1 Volume Status The following items are displayed in the Main area: • Concatenation No. The concatenation number of the WSV (the order for allocating WSV Units to RAID groups) is displayed between 1 and 64. • RAID Group Name The RAID group name to which the concatenated WSV Unit belongs is displayed.
Chapter 5 Volume Management 5.2 Functions in the Action Area for Volume 5.2 Functions in the Action Area for Volume When using functions in the Action area, select the desired function from the Action area that is displayed in the status display screen.
Chapter 5 Volume Management 5.2 Functions in the Action Area for Volume 5.2.1 Create Volume This function creates new volumes in the existing RAID group or Thin Provisioning Pool (TPP). Standard volumes, Wide Striping Volumes (WSV), Thin Provisioning Volumes (TPV), Snap Data Volumes (SDV), and Snap Data Pool Volumes (SDPV) can be created. Volumes are formatted automatically when they are created. Standard, WSV, TPV, and SDV can be accessed from the host when host affinity is set after volume creation.
Chapter 5 Volume Management 5.2 Functions in the Action Area for Volume • If an area with the necessary capacity cannot be acquired from the free space available, use the LUN Concatenation function to concatenate multiple space into a volume. • Creating SDPVs in RAID groups with the same RAID type, drive type, number of drives is recommended. • WSVs are volumes that are created by concatenating multiple RAID groups with striping. Use RAID migration to add or reduce the number of concatenated RAID groups.
Chapter 5 Volume Management 5.2 Functions in the Action Area for Volume • Capacity Specify the volume capacity and select the unit of capacity. Up to a 15-digit number including the "." (decimal point) can be input. Note that when "MB" is selected, the specified value is rounded down to the nearest whole number. When "GB" or "TB" is selected, the specified value is converted to "MB" and rounded down to the nearest whole number.
Chapter 5 Volume Management 5.2 Functions in the Action Area for Volume • Disk Type Specify the drive type. - Online - Nearline - SSD - SED • RAID Type Select the RAID type. The specified volume type and disk type determine the selectable RAID types that are displayed as options.
Chapter 5 Volume Management 5.2 Functions in the Action Area for Volume → A confirmation screen appears.
Chapter 5 Volume Management 5.2 Functions in the Action Area for Volume Manually selecting drives to create volumes The procedure to create a volume by selecting drives manually is as follows: Procedure 1 Click [Create] in [Action]. 2 Select "Manual" for "RAID Group/TPP Selection". 3 Specify the detailed information of new volumes and select the RAID group or TPP in which the volumes are to be created. Click the [Create] button. • Name Specify the volume name.
Chapter 5 Volume Management 5.2 Functions in the Action Area for Volume • Type Specify the volume type. When the [Create Volume] function is selected from the RAID group list, "Standard", "Snap Data Volume", or "Snap Data Pool Volume" is displayed. When the [Create Volume] function is selected from the Thin Provisioning Pool list, only "Thin Provisioning" is displayed. - Standard Normal volumes that are created in the RAID group. - Thin Provisioning Volumes that are created in Thin Provisioning Pools.
Chapter 5 Volume Management 5.2 Functions in the Action Area for Volume An existing volume number cannot be specified. • Encryption by CM Select whether to encrypt (On) or not encrypt (Off) the new volumes. When the encryption mode is disabled, "On" cannot be selected. When creating a volume (when specifying "1" or more for "Number of Volumes") in the RAID group for which "Disk Type" is "SED", select "Off" for this item.
Chapter 5 Volume Management 5.2 Functions in the Action Area for Volume • When specifying the volume number, select the "Set Value" checkbox and input the volume number. • When using the maximum free space in the RAID group to create volumes without specifying the capacity, select the "Enable" checkbox for "Use all Largest Free Space", and then input the number of volumes. This setting is available for "Standard" and "SDPV" type volumes.
Chapter 5 Volume Management 5.2 Functions in the Action Area for Volume 5 Click the [Done] button to return to the [Volume] screen. End of procedure ■ When creating WSV type volumes WSVs are created by concatenating volumes that are the same size in multiple RAID groups. Input the volume information for WSVs and the selection information for RAID groups, and specify the RAID groups that are to be concatenated.
Chapter 5 Volume Management 5.2 Functions in the Action Area for Volume • Capacity Specify the volume capacity and select the unit of capacity. Up to a 15-digit number including the "." (decimal point) can be input. Note that when "MB" is selected, the specified value is rounded down to the nearest whole number. When "GB" or "TB" is selected, the specified value is converted to "MB" and rounded down to the nearest whole number.
Chapter 5 Volume Management 5.2 Functions in the Action Area for Volume • Number of Volumes The number of volumes that are to be created is displayed. Note that "1" is displayed when "Manual" is selected for "Concatenation Order". When volume numbers are manually specified, only one volume can be created at a time. Input "1" for "Number of Volumes". • Volume No. When specifying the volume number for a new volume, select the "Set Value" checkbox and input the volume number.
Chapter 5 Volume Management 5.2 Functions in the Action Area for Volume • If the basic size of the RAID group is 2MB or more, the basic size is specified for Wide Stripe Size even when "Small" is selected. • This function cannot be used to change the "Wide Stripe Size" setting after WSVs are created. To change the "Wide Stripe Size" value, use the [RAID Migration] function. Refer to "5.2.7 Start RAID Migration" (page 123) for details.
Chapter 5 Volume Management 5.2 Functions in the Action Area for Volume • RAID Type Select the RAID type. If there are no RAID groups in which volumes can be created, the field is blank. - High Performance (RAID1+0) - High Capacity (RAID5) - High Reliability (RAID6) - Reliability (RAID5+0) - Mirroring (RAID1) - Striping (RAID0) • Number of Member Disks Select the number of member disks in the RAID group. The selectable number of member disks, which is determined by the specified RAID type, is displayed.
Chapter 5 Volume Management 5.2 Functions in the Action Area for Volume → The [Select RAID Groups] screen appears. • When specifying the volume number, select the "Set Value" checkbox and input the volume number. • When using the maximum free space in the selected RAID group to create WSVs without specifying the capacity, select the "Enable" checkbox for "Use all Largest Free Space", and then input the number of WSVs.
Chapter 5 Volume Management 5.2 Functions in the Action Area for Volume When "Disk Type" is "SED", setting the same "Encryption" settings (the setting status of the key group) is recommended for all of the RAID groups that configure the WSV. 4 After selecting RAID groups is complete, click the [Create] button. → A confirmation screen appears.
Chapter 5 Volume Management 5.2 Functions in the Action Area for Volume To change the concatenation order of the RAID groups, select "Manual" for "Concatenation Order" in the Volume Information field. Click the [Concatenation Order] link to display the [Setting Concatenation Order] screen. The concatenation order of the RAID groups can be changed in the [Setting Concatenation Order] screen. 5 Click the [OK] button. → Volume creation starts. 6 Click the [Done] button to return to the [Volume] screen.
Chapter 5 Volume Management 5.2 Functions in the Action Area for Volume • When deleting SDPVs, refer to "5.2.11 Delete Snap Data Pool Volume" (page 141) or "5.2.12 Force Delete Snap Data Pool Volume" (page 142). • This function can be used to delete an ODX Buffer volume. • When volumes are registered in LUN groups, or a message "The specified volumes have already been mapped. They cannot be deleted." is displayed, use the following procedure to delete the volumes from LUN groups.
Chapter 5 Volume Management 5.2 Functions in the Action Area for Volume When a TPV is deleted, the physical allocating capacity of the relevant TPV is formatted. The physical allocating capacity is released after formatting is complete. 3 Click the [Done] button to return to the [Volume] screen. End of procedure 5.2.3 Rename Volume This function changes the volume name. When using the ETERNUS DX8700 S2, up to 1024 volumes can be renamed at once.
Chapter 5 Volume Management 5.2 Functions in the Action Area for Volume → A confirmation screen appears.
Chapter 5 Volume Management 5.2 Functions in the Action Area for Volume 5.2.4 Format Volume This function formats the selected volume. The data stored in the volume will be deleted by formatting. • • • • Formatting newly created volumes is not required since these volumes are formatted automatically. This function formats "Standard", "WSV", "SDV", "SDPV", "TPV", and "FTV" type volumes. When formatting a TPV, the physical allocating area that is used by the target TPV is released.
Chapter 5 Volume Management 5.2 Functions in the Action Area for Volume 5.2.5 Expand Volume This function concatenates a new volume to the selected volume by using the LUN Concatenation function to expand the volume capacity that can be used from the server. Volume expansion provides the following features: • Volume capacity can be expanded by using the free space in an existing RAID group. • Free space that is 1GB or more can be concatenated. • A volume with a maximum capacity of 128TB can be created.
Chapter 5 Volume Management 5.
Chapter 5 Volume Management 5.2 Functions in the Action Area for Volume The procedure to expand volume capacity is as follows: Procedure 1 Select the volume to be expanded and click [Expand Volume] in [Action]. 2 Click the [Add] button. → The [Add Capacity] screen is displayed. 3 Select the RAID group to obtain the free space from, specify the capacity to be concatenated, and click the [OK] button. • Capacity Input the capacity that is to be concatenated and select the units of capacity (MB/GB/TB).
Chapter 5 Volume Management 5.2 Functions in the Action Area for Volume → Returns to the [Expand Volume] screen. 4 Repeat Step 2 and Step 3 to select RAID groups and specify the capacity. After completing these settings, click the [Expand] button. → A confirmation screen appears. 5 Click the [OK] button. → Expansion of a volume starts.
Chapter 5 Volume Management 5.2 Functions in the Action Area for Volume 6 Click the [Done] button to return to the [Volume] screen. End of procedure 5.2.6 Expand Thin Provisioning Volume This function expands the capacity of Thin Provisioning Volumes.
Chapter 5 Volume Management 5.2 Functions in the Action Area for Volume The procedure to expand Thin Provisioning Volume capacity is as follows: Procedure 1 Select the TPV to be expanded and click [Expand TPV] in [Action]. 2 Input the TPV capacity after expansion, and click the [Expand] button. • Volume Capacity after expand Input the TPV capacity after expansion and select the units of capacity (MB/GB/TB). Up to a 15-digit number including the "." (decimal point) can be input.
Chapter 5 Volume Management 5.2 Functions in the Action Area for Volume 4 Click the [Done] button to return to the [Volume] screen. End of procedure 5.2.7 Start RAID Migration RAID migration (hereinafter also referred to as migration) moves an existing volume in a RAID group, TPP, or FTRP to a free space in another RAID group, TPP, or FTRP. After migration is complete, the migration source volume is automatically deleted.
Chapter 5 Volume Management 5.2 Functions in the Action Area for Volume Combinations of Volume Types for which Capacity Expansion is Available The combinations of volume types for which capacity expansion can be performed are shown in the following table.
Chapter 5 Volume Management 5.
Chapter 5 Volume Management 5.
Chapter 5 Volume Management 5.
Chapter 5 Volume Management 5.2 Functions in the Action Area for Volume • Progress of migration can be checked on the [Volume Detail] screen (Basic). Refer to "5.1.9 Volume Detail (Basic)" (page 88) for details. • If the migration source and migration destination are both "WSV", not only can the migration of a WSV to other multiple RAID groups be performed, but also the number of concatenations for the existing RAID group can be changed.
Chapter 5 Volume Management 5.2 Functions in the Action Area for Volume • FTSP Priority Select either "Auto" or the FTSP number that belongs to the migration destination FTRP for the FTSP number to which priority is given. When FTRP is not selected from the migration destination list, only "Auto" is displayed as the available option. If FTRP is specified, "Auto" and the FTSP numbers that belong to the migration destination FTRP are displayed.
Chapter 5 Volume Management 5.2 Functions in the Action Area for Volume • Select Destination Migration Specify the destination RAID group, the TPP, or the FTRP with the radio button. The RAID groups, TPPs, or FTRPs that can be used for migration are displayed (this is determined by the volume capacity and the encryption status). → A confirmation screen appears. • If the migration source is an ODX Buffer volume, select "RAID Group / Thin Provisioning Pool / Flexible Tier Pool" for "Destination Migration".
Chapter 5 Volume Management 5.2 Functions in the Action Area for Volume ■ When the migration destination volume is "WSV" When changing the number of concatenations for a WSV, check "Wide Stripe Size" for the WSV, the specifications of the existing RAID groups (RAID type, Stripe Depth, disk type, disk speed, and number of member drives), and the name of all the concatenated RAID groups. The following describes how to check the specifications. (1) Click the [No.
Chapter 5 Volume Management 5.2 Functions in the Action Area for Volume 2 Select "Wide Striping Volume" for "Destination Migration". Input the volume capacity, the encryption status, the detailed information of volumes, and the selection information for the RAID groups, and click the [Select RAID Groups] button. ● Setting Volume • Volume Capacity The capacity of the migration source volume is displayed as the initial state.
Chapter 5 Volume Management 5.2 Functions in the Action Area for Volume ● Wide Striping Volume Setting WSVs are created by concatenating volumes that are the same size in multiple RAID groups. Input the volume information for the migration destination WSV and the selection information for the RAID groups, and then specify the RAID groups that are to be concatenated.
Chapter 5 Volume Management 5.2 Functions in the Action Area for Volume *1: The basic size (stripe size) when creating a volume. Refer to "E.1 Basic Size for each RAID Group" (page 995) for details. • If the basic size of the RAID group is 2MB or more, the basic size is specified for Wide Stripe Size even when "Small" is selected. • When changing the number of concatenations for a WSV, select the same "Wide Stripe Size" as the migration source WSV.
Chapter 5 Volume Management 5.2 Functions in the Action Area for Volume • Disk Type Specify the drive type. The installed drive determine the selectable disk types that are displayed. If there are no RAID groups in which volumes can be created, the field is blank. - Online - Nearline - SSD - SED - Online/Nearline • RAID Type Select the RAID type. If there are no RAID groups in which volumes can be created, the field is blank.
Chapter 5 Volume Management 5.2 Functions in the Action Area for Volume → The [Select RAID Groups screen] screen appears. 3 Select the RAID group that is to be concatenated (multiple selections can be made) and click the [OK] button. • Select RAID Groups Select the checkbox for the RAID group that is to be concatenated. → The display returns to the initial screen. • When increasing the number of concatenations for a WSV, select all of the existing RAID groups for concatenation and the new RAID groups.
Chapter 5 Volume Management 5.2 Functions in the Action Area for Volume 4 After selecting RAID groups is complete, click the [Start] button. → A confirmation screen appears.
Chapter 5 Volume Management 5.2 Functions in the Action Area for Volume 5.2.8 Stop RAID Migration This function stops RAID migration. This function cannot be executed when migration is not being performed for the selected volume. • If migration is canceled, the reservation for Zero Reclamation is released. • When migration is stopped, data in the migration source volume can be accessed normally.
Chapter 5 Volume Management 5.2 Functions in the Action Area for Volume 5.2.9 Start Zero Reclamation "Zero Reclamation" is a function that releases the allocated physical area when data in the physical area that is allocated to a TPV or an FTV is filled with zeros. This function starts Zero Reclamation.
Chapter 5 Volume Management 5.2 Functions in the Action Area for Volume 2 Click the [OK] button. → Zero Reclamation starts. 3 Click the [Done] button to return to the [Volume] screen. End of procedure 5.2.10 Stop Zero Reclamation This function stops Zero Reclamation. • Zero Reclamation cannot be suspended and restarted (restarting Zero Reclamation from where it was stopped).
Chapter 5 Volume Management 5.2 Functions in the Action Area for Volume 2 Click the [OK] button. → Zero Reclamation stops. 3 Click the [Done] button to return to the [Volume] screen. End of procedure 5.2.11 Delete Snap Data Pool Volume An SDPV is a logical volume that is created in the SDP. This function deletes SDPVs to reduce SDP capacity. If the target SDPV is currently being used, it will be deleted after the SDPV is released.
Chapter 5 Volume Management 5.2 Functions in the Action Area for Volume 3 Click the [Done] button to return to the [Volume] screen. End of procedure 5.2.12 Force Delete Snap Data Pool Volume An SDPV is a logical volume that is created in the SDP. This function forcibly deletes an SDPV regardless of whether it being used or not to reduce SDP capacity. • If the target SDPV is being used by a copy session, an error stops the copy session, and then the SDPV is deleted.
Chapter 5 Volume Management 5.2 Functions in the Action Area for Volume 5.2.13 Modify Threshold Thin Provisioning Volume This function changes the threshold for monitoring the used capacity of Thin Provisioning Volume. There is an "Attention" threshold. This function cannot be performed when there are no TPVs in the ETERNUS DX Disk storage system. • This function changes the threshold of a TPV that is created by using the procedure in "5.2.1 Create Volume" (page 96).
Chapter 5 Volume Management 5.2 Functions in the Action Area for Volume 3 Click the [OK] button. → Thin Provisioning threshold modification starts. 4 Click the [Done] button to return to the [Volume] screen. End of procedure 5.2.14 Initialize Snap Data Volume This function initializes an SDV. An SDV is a copy destination volume for SnapOPC and SnapOPC+ that includes a data area and a copy control information area.
Chapter 5 Volume Management 5.2 Functions in the Action Area for Volume The procedure to initialize an SDV is as follows: Procedure 1 Select the SDV to be initialized (multiple selections can be made) and click [Initialize SDV] in [Action]. → A confirmation screen appears. 2 Click the [OK] button. → Initialization of the SDV starts. 3 Click the [Done] button to return to the [Volume] screen. End of procedure 5.2.15 Encrypt Volume This function encrypts existing volumes.
Chapter 5 Volume Management 5.
Chapter 5 Volume Management 5.2 Functions in the Action Area for Volume 5.2.16 Forbid Advanced Copy This function protects a volume so that the volume cannot be registered as the copy destination volume of Advanced Copy. The [Forbid Advanced Copy] is a function that protects the data in the selected volumes by forbidding the volume to be the copy destination of the Advanced Copy sessions or restoration setting.
Chapter 5 Volume Management 5.2 Functions in the Action Area for Volume 5.2.17 Permit Advanced Copy This function releases the protected volumes. Released volumes can be used as the copy destination volume. The procedure to release a volume protection is as follows: Procedure 1 Select the protected volume to be released (multiple selections can be made) and click [Permit Advanced Copy] in [Action]. → A confirmation screen appears. 2 Click the [OK] button. → Releasing copy destination protect starts.
Chapter 5 Volume Management 5.2 Functions in the Action Area for Volume • Multi Writeback Count (MWC) Specify the number of processes that can be written back at the same time. • Prefetch Sequential Detect Count (PSDC) Specify the number of times for sequential data detection to determine the sequentiality of data access (Read IO). • Sequential Dirty Detect Count (SDDC) Specify the number of times for sequential data detection to determine the sequentiality of data access (Write I/O).
Chapter 5 Volume Management 5.2 Functions in the Action Area for Volume When "-" (hyphen) is selected, the cache capacity is not limited. It is not necessary to change the default setting for normal use. If multiple volumes with different settings are selected and [Modify Cache Parameters] is clicked, a "-" (hyphen) is displayed for the field. Data in low I/O load volumes may not be stored in the cache memory if volumes with a high I/O load exist.
Chapter 5 Volume Management 5.2 Functions in the Action Area for Volume • Multi Writeback Count (MWC) Specify the Multi Writeback Count between "1" and "16". It is not necessary to change the default setting for normal use. If multiple volumes with different settings are selected and [Modify Cache Parameters] is clicked, the field is blank. The Multi Writeback Count cannot be specified for volumes that are concatenated by the LUN concatenation function.
Chapter 5 Volume Management 5.2 Functions in the Action Area for Volume The following can be also determined as sequential access: - A sequential access that does not have successive LBAs and skips some addresses - A sequential access that issues multiple host I/Os at the same time and is unable to be received in the order of LBAs A larger SDS may cause random access to be determined as sequential access, resulting in reduced performance due to incorrect prefetching.
Chapter 5 Volume Management 5.
Chapter 5 Volume Management 5.2 Functions in the Action Area for Volume The procedure to export cache parameters is as follows: Procedure 1 Click [Export Cache Parameters] in [Action]. 2 Click the [Create Data] button. → Exporting of the cache parameters is executed. After the cache parameters are exported, a dialog box to download the file appears. 3 Click the [Download] button. → A dialog box to download the file appears. 4 Save the setting information file of the cache parameter.
Chapter 5 Volume Management 5.2 Functions in the Action Area for Volume 5 Click the [Done] button to return to the screen when starting this function in Step 1. End of procedure 5.2.20 Export Performance Information This function exports the following performance information in a single operation and saves it as a text file.
Chapter 5 Volume Management 5.2 Functions in the Action Area for Volume 3 Click the [Download] button. → A dialog box to download the file appears. 4 Save the downloaded performance information file. The default file name is "Perform_serial number for the ETERNUS DX Disk storage system_YYYY-MMDD_hh-mm-ss.txt". (YYYY-MM-DD_hh-mm-ss: the date and time when the download screen (Step 3) is displayed.) → Downloading the performance information file starts.
Chapter 5 Volume Management 5.2 Functions in the Action Area for Volume The procedure to release the reservation status is as follows: Procedure 1 Select the volumes to release the reservation (multiple selections can be made), and click [Release Reservation] in [Action]. → A confirmation screen appears. 2 Click the [OK] button. → Releasing volume reservation status starts. 3 Click the [Done] button to return to the [Volume] screen. End of procedure 5.2.
Chapter 5 Volume Management 5.2 Functions in the Action Area for Volume Requirements for a TPP in which the target TPV is registered: • The "Status" is " Available" • The free space in the TPP is larger than the capacity of the TPV that is to be balanced • If a Thin Provisioning license is not registered, this function cannot be used.
Chapter 5 Volume Management 5.2 Functions in the Action Area for Volume 5.2.23 Stop Balancing Thin Provisioning Volume This function stops TPV balancing • This function cannot be used when balancing is not being performed for a TPV. • This function cannot be used when the specified TPV balancing is already complete. When TPV balancing is stopped, data in volumes that are not balanced yet can be accessed normally.
Chapter 6 RAID Group Management This chapter describes RAID group management. 6.1 RAID Group Status RAID group status displays the status information of volumes.
Chapter 6 RAID Group Management 6.1 RAID Group Status 6.1.1 RAID Group (Basic Information) This function displays the basic information of RAID groups. The following items are displayed in the Main area: • No. The RAID group number is displayed. Click this item to display "6.1.5 RAID Group (Basic)" (page 169). The RAID group number is allocated when a volume is created from the smallest unused decimal number in ascending order. • Name The RAID group name is displayed. Click this item to display "6.1.
Chapter 6 RAID Group Management 6.1 RAID Group Status • RAID Type The type of RAID group is displayed. - High Performance (RAID1+0) - High Capacity (RAID5) - High Reliability (RAID6) - Reliability (RAID5+0) - Mirroring (RAID1) - Striping (RAID0) • Total Capacity The total capacity of the RAID groups is displayed. The capacity is displayed in units of "GB" or "TB". Even when volumes are created in units of "GB", if the volume capacity exceeds 1023.99GB, the capacity is displayed in units of "TB".
Chapter 6 RAID Group Management 6.1 RAID Group Status 6.1.2 Tuning The RAID group tuning information is displayed. The following items are displayed in the Main area: • No. The RAID group number is displayed. Click this item to display "6.1.5 RAID Group (Basic)" (page 169). • Name The RAID group name is displayed. Click this item to display "6.1.5 RAID Group (Basic)" (page 169). • Status The RAID group status is displayed. Refer to "B.
Chapter 6 RAID Group Management 6.1 RAID Group Status • RAID Type The type of RAID group is displayed. - High Performance (RAID1+0) - High Capacity (RAID5) - High Reliability (RAID6) - Reliability (RAID5+0) - Mirroring (RAID1) - Striping (RAID0) • Total Capacity The total capacity of the RAID groups is displayed. • DCMF The Drive Command Multiplying Factor (DCMF) is displayed.
Chapter 6 RAID Group Management 6.1 RAID Group Status Filter setting Filter 6.1.3 Description Name Input the RAID group name that is to be displayed. When not using the RAID group name for filtering, leave this item blank. Status Select the RAID group status that is to be displayed. RAID Type Select the RAID type that is to be displayed. ECO Mode Schedule (RAID Group) This function displays the setting status of the ECO mode that is applied for the RAID group.
Chapter 6 RAID Group Management 6.1 RAID Group Status • Usage The usage of the RAID group is displayed. - Standard A RAID group that is used for creating "Standard", "SDV", or "SDPV" type volumes - Standard / WSV A RAID group that is used for creating "Standard", "WSV", "SDV", or "SDPV" type volumes - WSV A RAID group that is used for creating "WSV" type volumes • RAID Type The type of RAID group is displayed.
Chapter 6 RAID Group Management 6.1 RAID Group Status 6.1.4 SED Key Group This function displays the key group settings for the RAID groups that are configured with SEDs. The key group combines all of the RAID groups that use the same SED authentication key. • One key group can be created in the ETERNUS DX Disk storage system. • Use the [Key Group] screen to check the SED authentication key information and the SSL/KMIP certificate information that is used for the key group. Refer to "11.1.5.
Chapter 6 RAID Group Management 6.1 RAID Group Status • Usage The usage of the RAID group is displayed.
Chapter 6 RAID Group Management 6.1 RAID Group Status 6.1.5 RAID Group (Basic) Click the [No.] link or the [Name] link in the "6.1.1 RAID Group (Basic Information)" (page 161) to display the detailed information of the target RAID group. The following items are displayed in the Main area: • Status The RAID group status is displayed. Refer to "B.3 RAID Group Status" (page 975) for detailed information of RAID group status. • RAID Type The type of RAID group is displayed.
Chapter 6 RAID Group Management 6.1 RAID Group Status • Stripe Depth The Stripe Depth (*1) of the RAID group is displayed. If the RAID type is "Mirroring (RAID1)", a "-" (hyphen) is displayed. *1: - 6.1.6 The number of logical blocks that are assigned to a drive for each stripe when configuring a stripe volume in a RAID group. Normally, it is 64KB. 64 KB 128 KB 256 KB 512 KB 1024 KB RAID Group (Volume Layout) Detailed information of the volume layout is displayed.
Chapter 6 RAID Group Management 6.1 RAID Group Status • Volume Type The volume type is displayed. - Standard - WSV - SDV - SDPV 6.1.7 RAID Group Detail (Disk) Detailed information of disks that configure the RAID group is displayed. The following items are displayed in the Main area: • Enclosure The number of the enclosure where the drive is installed is displayed. • Slot No. The number of the slot where the drive is installed is displayed. • Disk Type The drive type is displayed. - 2.5" Online 2.
Chapter 6 RAID Group Management 6.1 RAID Group Status • Capacity The capacity of the drive is displayed. • Speed The drive speed is displayed. For SSDs, a "-" (hyphen) is displayed. • Usage The usage of the drive is displayed.
Chapter 6 RAID Group Management 6.2 Functions in the Action Area for RAID Group 6.2 Functions in the Action Area for RAID Group When using functions in the Action area, select the desired function from the Action area that is displayed in the status display screen.
Chapter 6 RAID Group Management 6.2 Functions in the Action Area for RAID Group 6.2.1 Create RAID Group This function creates RAID groups. A RAID group is a group of drives that configure a RAID type. Features and required number of drives for each RAID type The following table shows the features and the required number of drives for each RAID type. Note that "Striping (RAID0)" has no data redundancy.
Chapter 6 RAID Group Management 6.2 Functions in the Action Area for RAID Group Drive combinations that can configure a RAID group The following table shows the drive combinations that can configure a RAID group.
Chapter 6 RAID Group Management 6.2 Functions in the Action Area for RAID Group • Number of RAID Group Input the number of RAID groups that is to be created. When creating multiple RAID groups at a time, the new RAID groups are named automatically. Refer to "Naming conventions for creating volumes" (page 993) for details. • Disk Type Select the type of drive that configures a RAID group from the list box.
Chapter 6 RAID Group Management 6.2 Functions in the Action Area for RAID Group 4 Click the [OK] button. → RAID group creation starts. 5 Click the [Done] button to return to the [RAID Group] screen. End of procedure ■ Manually selecting drives to create RAID groups Procedure 1 Click [Create] in [Action]. 2 Select "Manual" for "Create Mode". 3 Specify the RAID group detailed information, and click the [Create] button. • Name Input a RAID group name that is to be created.
Chapter 6 RAID Group Management 6.2 Functions in the Action Area for RAID Group • RAID Group Capacity The capacity of RAID group that is to be created is displayed. The "RAID Group Capacity" is automatically calculated from the selected RAID type and drives. • Checkbox to select drives Select the checkbox for the drive that is to be used. When using the ETERNUS DX8100 S2/DX8700 S2, the restrictions that apply to the drive layout for RAID group configuration vary depending on the RAID type.
Chapter 6 RAID Group Management 6.2 Functions in the Action Area for RAID Group An error screen appears in the following conditions: • When the "Name" overlaps with an existing RAID group name • When the "Name" does not satisfy the input conditions • When the conditions described in "Restrictions of drive layout" are not satisfied • When an invalid Stripe Depth for the RAID type is specified 4 Click the [OK] button. → RAID group creation starts.
Chapter 6 RAID Group Management 6.2 Functions in the Action Area for RAID Group When using the ETERNUS DX8700 S2, the following restrictions for each RAID type apply to the drive layout for RAID group configuration. A RAID group that does not satisfy the required conditions cannot be created. RAID Type High Performance (RAID1+0) High Capacity (RAID5) Selection Conditions Required Allocate mirroring pair drives to different SAS cascades (*1). No restrictions are applied for BRT.
Chapter 6 RAID Group Management 6.2 Functions in the Action Area for RAID Group 6.2.2 Delete RAID Group This function deletes the registered RAID groups in the ETERNUS DX Disk storage system. When a RAID group is deleted, the status of the drives that configured the RAID group change to data drives that are not used by any RAID group. • RAID groups that have volumes registered cannot be deleted. When deleting a RAID group, delete the volumes beforehand.
Chapter 6 RAID Group Management 6.2 Functions in the Action Area for RAID Group 6.2.3 Rename RAID Group This function changes the name of RAID groups that are registered in the ETERNUS DX Disk storage system. Multiple RAID groups can be renamed with a single operation. Renaming RAID groups that configure FTRPs is not available. The procedure to rename RAID group is as follows: Procedure 1 Select the RAID group to be renamed (multiple selections can be made) and click [Rename] in [Action].
Chapter 6 RAID Group Management 6.
Chapter 6 RAID Group Management 6.2 Functions in the Action Area for RAID Group 6.2.4 Change Controlling CM This function changes the controlling CM that is allocated to the RAID group. Unequal loading between the CMs can be resolved by changing the controlling CM. • While changing the controlling CM, the storage system status is changed from Write Back mode to Write Through mode, reducing the I/O performance for the ETERNUS DX Disk storage system.
Chapter 6 RAID Group Management 6.2 Functions in the Action Area for RAID Group 2 Select the controlling CM after changing, and click the [Change] button. • New Controlling CM Specify the new controlling CM and CPU. "Automatic" and the installed "CM#x CPU#y" in normal status are displayed as options. - Automatic - CM#x CPU#y (x: CM number, y: CPU number) Select "Automatic" for normal operations. When "Automatic" is selected, the CM-CPU that is to be assigned is determined by the RAID group number.
Chapter 6 RAID Group Management 6.2 Functions in the Action Area for RAID Group 6.2.5 Expand RAID Group This function adds drives to the existing RAID group by using the Logical Device Expansion (LDE) function to dynamically expand RAID group capacity. This function can also dynamically change the RAID type of an existing RAID group.
Chapter 6 RAID Group Management 6.
Chapter 6 RAID Group Management 6.2 Functions in the Action Area for RAID Group Requirements for selecting drives when changing the RAID type: • When the RAID type before and after LDE is not changed, the drives that are used in the RAID group before LDE was performed cannot be deleted. • When the RAID type is changed after LDE: - The number of RAID group data drives (*1) after LDE cannot be less than the number before LDE.
Chapter 6 RAID Group Management 6.2 Functions in the Action Area for RAID Group An error screen appears in the following conditions: • When the drive layout is incorrect • The number of selected drives exceeds the available maximum number 3 Click the [OK] button. → RAID group expansion starts. 4 Click the [Done] button to return to the [RAID Group] screen. End of procedure 6.2.6 Modify RAID Group Parameters This function tunes the following parameters of each RAID group.
Chapter 6 RAID Group Management 6.2 Functions in the Action Area for RAID Group • When the "Rebuild Priority" setting is changed, the priority is changed not only for a rebuild, copyback, and redundant copy that will be performed after the setting is changed, but also for any rebuild, copyback, and redundant copy operations that are currently being performed. • When the target RAID group is registered as an REC Disk Buffer, do not select "High" for the "Rebuild Priority" setting.
Chapter 6 RAID Group Management 6.2 Functions in the Action Area for RAID Group - Low Perform rebuild, copyback, and redundant copy with a normal priority. - Middle Give the same priority as the host access to rebuild, copyback, and redundant copy. - High Give priority to rebuild, copyback, and redundant copy over host access. • Disk Tuning Parameter Setting Specify whether to enable or disable the following disk tuning parameters.
Chapter 6 RAID Group Management 6.2 Functions in the Action Area for RAID Group → A confirmation screen appears. 3 Click the [OK] button. → The RAID group parameter modification starts. When enabling the "Disk Tuning Parameter Setting", a confirmation screen with a warning message appears. 4 Click the [Done] button to return to the [RAID Group] screen. End of procedure 6.2.
Chapter 6 RAID Group Management 6.2 Functions in the Action Area for RAID Group ECO Mode General Setting ECO Mode Schedule Setting ON Control Status Enabled During scheduled event term Disk motor is activated. (ECO mode is running) Times other than scheduled event term Disk motor is stopped. (ECO mode is running) If the RAID group is accessed, disk motors are activated within 1 - 5 minutes. The target disk motor is operating constantly.
Chapter 6 RAID Group Management 6.2 Functions in the Action Area for RAID Group • When selecting multiple RAID groups as the target of the ECO mode, the same ECO mode schedule can be specified for all the selected RAID groups. • RAID groups that configure a WSV can be checked in the [Volume Detail] screen ([WSV Concatenation] Tab). Refer to "5.1.14 Volume Detail (WSV Concatenation)" (page 93) for details.
Chapter 6 RAID Group Management 6.2 Functions in the Action Area for RAID Group 3 Click the [OK] button. → Setting of the ECO mode schedule starts. 4 Click the [Done] button to return to the [RAID Group] screen. End of procedure 6.2.8 Set Key Group (RAID Group) This function registers or deletes any RAID groups that are configured with SEDs in the key group. The key group combines all of the RAID groups that use the same SED authentication key.
Chapter 6 RAID Group Management 6.2 Functions in the Action Area for RAID Group The procedure to register or delete the RAID groups in the key group is as follows: Procedure 1 Select which RAID group to add to or delete from the key group (multiple selections can be made), and click [Set Key Group] in [Action]. Settings for the selected RAID groups are applied in a single process.
Chapter 6 RAID Group Management 6.2 Functions in the Action Area for RAID Group 3 Click the [OK] button. → Key group setting starts.
Chapter 6 RAID Group Management 6.2 Functions in the Action Area for RAID Group • SED recovery from locked status is performed according to the "Recovery Mode" setting of the key group. The "Recovery Mode" setting can be checked in the [Key Group] screen. Refer to "11.1.5.1 Key Group" (page 723) for details. - When "Recovery Mode" is "Auto", the ETERNUS DX Disk storage system monitors the RAID group periodically.
Chapter 7 Thin Provisioning Pool Management This chapter describes Thin Provisioning Pool management. 7.1 Thin Provisioning Pool Status Thin Provisioning Pool status displays the status information of volumes.
Chapter 7 Thin Provisioning Pool Management 7.1 Thin Provisioning Pool Status 7.1.1 Thin Provisioning Pool (Basic Information) This function shows the list of TPPs. • Registering the license for the Thin Provisioning feature is required to use the Thin Provisioning function. To check the registration status of the license, refer to "7.1.4 License (Thin Provisioning)" (page 206). • When " Attention" or " Warning" is displayed in "Used Status" in the TPP list, the TPP used capacity exceeds the threshold.
Chapter 7 Thin Provisioning Pool Management 7.1 Thin Provisioning Pool Status • Disk Type The type of drive that configures the TPP is displayed. - Online SAS disks - Nearline Nearline SAS disks - SSD - SED • RAID Type The type of RAID group that configures the TPP is displayed. - High Performance (RAID1+0) - High Capacity (RAID5) - High Reliability (RAID6) - Mirroring (RAID1) - Striping (RAID0) • Status The TPP status is displayed. Refer to "B.
Chapter 7 Thin Provisioning Pool Management 7.1 Thin Provisioning Pool Status 7.1.2 Threshold (Thin Provisioning Pool) This function shows the threshold for monitoring the used capacity of a Thin Provisioning Pool. Registering the license for the Thin Provisioning feature is required to use Thin Provisioning function. To check the registration status of the license, refer to "7.1.4 License (Thin Provisioning)" (page 206).
Chapter 7 Thin Provisioning Pool Management 7.1 Thin Provisioning Pool Status • RAID Type The type of RAID group that configures the TPP is displayed. - High Performance (RAID1+0) - High Capacity (RAID5) - High Reliability (RAID6) - Mirroring (RAID1) - Striping (RAID0) • Status The TPP status is displayed. Refer to "B.4 Thin Provisioning Pool Status" (page 976) for detailed information of TPP status. • Total Capacity The total capacity of TPP is displayed.
Chapter 7 Thin Provisioning Pool Management 7.1 Thin Provisioning Pool Status • To use the ECO mode, follow the procedure in "11.2.8.1 Modify ECO Mode General Setting" (page 869) and "11.2.8.2 Create ECO Mode Schedule" (page 871) to perform the general ECO mode setup and create an ECO mode schedule. • To assign the ECO mode to a TPP, refer to "7.2.9 Assign ECO Mode Schedule (Thin Provisioning Pool)" (page 242). The following items are displayed in the Main area: • No. The TPP number is displayed.
Chapter 7 Thin Provisioning Pool Management 7.1 Thin Provisioning Pool Status • Total Capacity The total capacity of TPP is displayed. • ECO Mode Schedule The ECO mode schedule that is assigned to the TPP is displayed. If the ECO mode schedule is not assigned, the field is blank. • ECO Mode Action When the ECO mode is enabled in TPP, "ON" is displayed. If the ECO mode is disabled, "OFF" is displayed. If the ECO mode is not assigned, a "-" (hyphen) is displayed.
Chapter 7 Thin Provisioning Pool Management 7.1 Thin Provisioning Pool Status 7.1.4 License (Thin Provisioning) The registration status of the Thin Provisioning license is displayed. Registering the license for the Thin Provisioning feature is required to use Thin Provisioning function. Registering or deleting the Thin Provisioning license can be performed depending on the license registration status. To register the license, refer to "7.2.10 Register Thin Provisioning License" (page 245).
Chapter 7 Thin Provisioning Pool Management 7.1 Thin Provisioning Pool Status 7.1.5 Flexible Tier Pool (Basic Information) This function shows the list of Flexible Tier Pools (FTRPs). • To use the Flexible Tier function (auto storage layering), the following operations are required: - Registering the license for the Thin Provisioning feature is required to use the Thin Provisioning function. To check the registration status of the license, refer to "7.1.4 License (Thin Provisioning)" (page 206).
Chapter 7 Thin Provisioning Pool Management 7.1 Thin Provisioning Pool Status The following items are displayed in the Main area: • No. The FTRP number is displayed. Click this item to display the screen shown in "7.1.7 Flexible Tier Pool Detail (Basic)" (page 212). - ETERNUS DX80 S2/DX90 S2: 0 - 29 - ETERNUS DX410 S2: 0 - 59 - ETERNUS DX440 S2: 0 - 63 - ETERNUS DX8100 S2: 0 - 11 - ETERNUS DX8700 S2: 0 - 63 • Name The FTRP name is displayed. Click this item to display the screen shown in "7.1.
Chapter 7 Thin Provisioning Pool Management 7.1 Thin Provisioning Pool Status • Balancing Level The balancing level of the FTRP is displayed. If multiple FTSPs exists in the FTRP, the lowest balancing level among the FTSPs is displayed. A "-" (hyphen) is displayed when the physically allocated capacity cannot be checked due to the storage system status or when the balancing level cannot be obtained due to the FTRP status (*1).
Chapter 7 Thin Provisioning Pool Management 7.1 Thin Provisioning Pool Status The following items are displayed in the Main area: • Disk Type The type of drive that configures the TPP is displayed. - Online: SAS disks - Nearline Nearline SAS disks - SSD - SED • RAID Type The type of RAID group that configures the TPP is displayed. - High Performance (RAID1+0) - High Capacity (RAID5) - High Reliability (RAID6) - Mirroring (RAID1) - Striping (RAID0) • Status The TPP status is displayed. Refer to "B.
Chapter 7 Thin Provisioning Pool Management 7.1 Thin Provisioning Pool Status • Encryption The TPP encryption status is displayed. - CM The TPP that is encrypted by CM. - "-" (hyphen) The TPP that is not encrypted. - SED The TPP that is encrypted by SED. • MWC Multi Writeback Count (MWC) of the TPP is displayed. • Usage "TPV" is displayed when a TPV is registered in the TPP. If there are no TPVs in the Thin Provisioning Pool, a "-" (hyphen) is displayed.
Chapter 7 Thin Provisioning Pool Management 7.1 Thin Provisioning Pool Status 7.1.7 Flexible Tier Pool Detail (Basic) Click the [No.] link or the [Name] link on the "7.1.5 Flexible Tier Pool (Basic Information)" (page 207) to display the detailed information of the corresponding FTRP. Click the [Basic] tab on the [Flexible Tier Pool Detail] to display the basic information of the corresponding FTRP. The following items are displayed in the Main area: • Status The FTRP status is displayed. Refer to "B.
Chapter 7 Thin Provisioning Pool Management 7.1 Thin Provisioning Pool Status • Encryption The FTRP encryption status is displayed. - CM The FTRP that is encrypted by CM. - "-" (hyphen) The FTRP that is not encrypted. • Process A process that is being performed for the FTRP is displayed. If no process is being performed, a "-" (hyphen) is displayed. • Progress The progress rate for the FTRP is displayed. If no process is being performed, a "-" (hyphen) is displayed.
Chapter 7 Thin Provisioning Pool Management 7.1 Thin Provisioning Pool Status 7.1.8 Flexible Tier Pool Detail (Flexible Tier Sub Pool) Click the [No.] link or the [Name] link on the "7.1.5 Flexible Tier Pool (Basic Information)" (page 207) to display the corresponding Flexible Tier Pool Details screen. Click the [Flexible Tier Sub Pool] tab on the [Flexible Tier Pool Detail] to display a list of Flexible Tier Sub Pools (FTSPs) that are registered in the corresponding FTRP.
Chapter 7 Thin Provisioning Pool Management 7.1 Thin Provisioning Pool Status • Total Capacity The total capacity of FTSP is displayed. • Used Capacity The used capacity of FTSP is displayed. • Balancing Level The balancing level of the FTSP is displayed. A "-" (hyphen) is displayed when the physically allocated capacity cannot be checked due to the storage system status or when the balancing level cannot be obtained due to the FTRP status (*1).
Chapter 7 Thin Provisioning Pool Management 7.1 Thin Provisioning Pool Status • Type The volume type is displayed. This volume list displays only the volumes whose type is "FTV". • FTSP Priority The FTSP number, to which a volume is assigned on a priority basis in the FTRP, is displayed. When the setting is omitted, "-" (hyphen) is displayed.
Chapter 7 Thin Provisioning Pool Management 7.1 Thin Provisioning Pool Status 7.1.10 Flexible Tier Sub Pool Detail (Basic) Click the [No.] link or the [Name] link on the "7.1.8 Flexible Tier Pool Detail (Flexible Tier Sub Pool)" (page 214) to display the corresponding Flexible Tier Sub Pool Detail screen. Click the [Basic] tab on the [Flexible Tier Sub Pool Detail] to display the basic information of the corresponding FTSP.
Chapter 7 Thin Provisioning Pool Management 7.2 Functions in the Action Area for Thin Provisioning 7.2 Functions in the Action Area for Thin Provisioning When using functions in the Action area, select the desired function from the Action area that is displayed in the status display screen.
Chapter 7 Thin Provisioning Pool Management 7.2 Functions in the Action Area for Thin Provisioning 7.2.1 Create Thin Provisioning Pool This function creates a Thin Provisioning Pool.
Chapter 7 Thin Provisioning Pool Management 7.2 Functions in the Action Area for Thin Provisioning ■ Automatically selecting drives to create TPPs To create a new TPP automatically, select Disk Type, RAID Type, and input TPP capacity. The controlling CM of the RAID groups that configure the TPP is determined automatically. The procedure to create a TPP by selecting drives automatically is as follows: Procedure 1 Click [Create] in [Action].
Chapter 7 Thin Provisioning Pool Management 7.2 Functions in the Action Area for Thin Provisioning • Thin Provisioning Pool Total Capacity Input a TPP capacity using numeric characters. Select the capacity unit from "TB" or "GB". A TPP is automatically created with a capacity of the entered value or higher. Refer to "The maximum number of TPP and maximum TPP capacity for each model" (page 219) for details on the maximum TPP capacity.
Chapter 7 Thin Provisioning Pool Management 7.2 Functions in the Action Area for Thin Provisioning • Specify the threshold so that "Warning" is the same or larger than "Attention". • The "Attention" threshold can be omitted. When setting the "Attention" threshold, specify a threshold while the checkbox is selected. 3 Click the [OK] button. → Create Thin Provisioning Pool starts. 4 Click the [Done] button to return to the [Thin Provisioning Pool] screen.
Chapter 7 Thin Provisioning Pool Management 7.2 Functions in the Action Area for Thin Provisioning • The following shows the recommended drive configuration of the RAID group: - Select drives with the same capacity. If drives of different capacities exist in a RAID group, the smallest drive becomes the standard, and all other drives are regarded as the same capacity as the smallest drive. In this case, the remaining drive space will NOT be used. - Select drives with the same speed.
Chapter 7 Thin Provisioning Pool Management 7.2 Functions in the Action Area for Thin Provisioning - Striping (RAID0) RAID0(4D) configuration is available • Refer to "The number of member drives in each RAID group" (page 222) for details on the number of member drives for each RAID type. • "Striping (RAID0)" has no data redundancy. Select "High Performance (RAID1+0)", "High Capacity (RAID5)", "High Reliability (RAID6)" or "Mirroring (RAID1)" for the RAID type.
Chapter 7 Thin Provisioning Pool Management 7.2 Functions in the Action Area for Thin Provisioning 3 Click the [Add] button, and set the information of the RAID group that configures the TPP. 4 Select the controlling CM of the RAID group and all the drives to be registered in the RAID group, and click the [OK] button. • Controlling CM Select the controlling CM and CPU of the RAID group that is to be created. "Automatic" and the installed "CM#x CPU#y" in normal status are displayed as options.
Chapter 7 Thin Provisioning Pool Management 7.2 Functions in the Action Area for Thin Provisioning Drives can be selected from the list of drives that is displayed for Tabular or from the drive images that are displayed for Graphic. Click the Tabular tab to display a list of the drives or click the Graphic tab to display drive images. → The screen returns to the previous screen. The created RAID group is displayed in the RAID group list.
Chapter 7 Thin Provisioning Pool Management 7.2 Functions in the Action Area for Thin Provisioning 6 After creating a RAID group that configures the TPP, click the [Create] button. → A confirmation screen appears.
Chapter 7 Thin Provisioning Pool Management 7.2 Functions in the Action Area for Thin Provisioning Available Stripe Depth value The following table shows the available Stripe Depth value for each RAID type.
Chapter 7 Thin Provisioning Pool Management 7.2 Functions in the Action Area for Thin Provisioning 2 Click the [OK] button. → Delete Thin Provisioning Pool starts. 3 Click the [Done] button to return to the [Thin Provisioning Pool] screen. End of procedure 7.2.3 Rename Thin Provisioning Pool This function changes a Thin Provisioning Pool name. Multiple TPPs can be renamed with a single operation.
Chapter 7 Thin Provisioning Pool Management 7.2 Functions in the Action Area for Thin Provisioning → A confirmation screen appears.
Chapter 7 Thin Provisioning Pool Management 7.2 Functions in the Action Area for Thin Provisioning 7.2.4 Expand Thin Provisioning Pool This function expands the capacity of Thin Provisioning Pool.
Chapter 7 Thin Provisioning Pool Management 7.2 Functions in the Action Area for Thin Provisioning ■ Automatically selecting drives to expand a TPP The procedure to expand a TPP by selecting drives automatically is as follows: Procedure 1 Select the TPP to be expanded and click [Expand] in [Action]. 2 Select "Automatic" for the expansion mode, specify the TPP capacity after expanded, and click the [Expand] button.
Chapter 7 Thin Provisioning Pool Management 7.2 Functions in the Action Area for Thin Provisioning 3 Click the [OK] button. → Expand Thin Provisioning Pool starts. 4 Click the [Done] button to return to the [Thin Provisioning Pool] screen. End of procedure ■ Manually selecting drives to expand a TPP Select drives manually to expand the TPP. Check the specifications of the existing RAID groups (number of member drives and disk type) in the TPP in advance.
Chapter 7 Thin Provisioning Pool Management 7.2 Functions in the Action Area for Thin Provisioning The same Stripe Depth value as the existing RAID groups is applied for the newly added RAID group. Check the RAID group specifications Check the specifications of the existing RAID groups (number of member drives and disk type) in the TPP in advance. The following describes how to check the specifications. (1) From the TPP list in "7.1.
Chapter 7 Thin Provisioning Pool Management 7.2 Functions in the Action Area for Thin Provisioning 4 Select the controlling CM of the RAID group and all the drives to be registered in the RAID group, and click the [OK] button. • Controlling CM Select the controlling CM and CPU of the RAID group that is to be created. "Automatic" and the installed "CM#x CPU#y" in normal status are displayed as options. - Automatic - CM#x CPU#y (x: CM number, y: CPU number) Select "Automatic" for normal operations.
Chapter 7 Thin Provisioning Pool Management 7.2 Functions in the Action Area for Thin Provisioning • Click the [RAID Type] link to change the controlling CM and configuration drives of the newly added RAID group. • Click the [Delete] button in the target RAID group area to delete the newly added RAID group. 5 When creating multiple RAID groups, repeat Step 3 and Step 4. 6 After creating a RAID group to be added to the TPP, click the [Expand] button. → A confirmation screen appears.
Chapter 7 Thin Provisioning Pool Management 7.2 Functions in the Action Area for Thin Provisioning 7.2.5 Format Thin Provisioning Pool (All Area) This function formats all of the areas in the Thin Provisioning Pool. • When formatting all area in the TPPs, data stored in the Thin Provisioning Volumes in TPP will be deleted. Format TPV to use them again, after deleting data. • When a TPP is created using the procedure in "7.2.1 Create Thin Provisioning Pool" (page 219), the TPP is formatted automatically.
Chapter 7 Thin Provisioning Pool Management 7.2 Functions in the Action Area for Thin Provisioning 2 Click the [OK] button. → Format all area in the Thin Provisioning Pool starts. 3 Click the [Done] button to return to the [Thin Provisioning Pool] screen. To use a TPV in the TPP again after formatted with "All Area" selected for the mode, format the TPV. End of procedure 7.2.6 Format Thin Provisioning Pool (Unformatted Area) This function formats unformatted area in the Thin Provisioning Pool.
Chapter 7 Thin Provisioning Pool Management 7.2 Functions in the Action Area for Thin Provisioning The procedure to format an unformat area in the Thin Provisioning Pool is as follows: Procedure 1 Select the TPP to be formatted (multiple selections can be made) and click [Format Unformatted Area] in [Action]. → A confirmation screen appears. 2 Click the [OK] button. → Format of unformat area in the Thin Provisioning Pool starts.
Chapter 7 Thin Provisioning Pool Management 7.2 Functions in the Action Area for Thin Provisioning 2 Select a new threshold, and click the [Modify] button. • Warning Change the warning threshold (%) for monitoring the TPP used capacity between 5 and 99. Specify the warning threshold so that the "Warning" threshold is the same or larger than the "Attention" threshold. • Attention Specify the attention threshold (%) for monitoring the TPP used capacity between 5 and 80.
Chapter 7 Thin Provisioning Pool Management 7.2 Functions in the Action Area for Thin Provisioning 4 Click the [Done] button to return to the [Thin Provisioning Pool] screen. End of procedure 7.2.8 Modify Cache Parameters (Thin Provisioning Pool) This function changes the cache parameters of each Thin Provisioning Pool. Device performance varies depending on the cache hit ratio.
Chapter 7 Thin Provisioning Pool Management 7.2 Functions in the Action Area for Thin Provisioning → A confirmation screen appears. If the [Default] button is clicked before the [Modify] button, the default cache parameters are restored. 3 Click the [OK] button. → The cache parameter modification starts. 4 Click the [Done] button to return to the [Threshold] screen. End of procedure 7.2.
Chapter 7 Thin Provisioning Pool Management 7.2 Functions in the Action Area for Thin Provisioning ECO Mode General Setting ECO Mode Schedule Setting Control Status ON Enabled During scheduled event term Disk motor is activated. (ECO mode is running) Times other than scheduled event term Disk motor is stopped. (ECO mode is running) If the RAID group is accessed, disk motors are activated within 1 - 5 minutes. OFF Disabled Disk motor runs regardless of schedule settings.
Chapter 7 Thin Provisioning Pool Management 7.2 Functions in the Action Area for Thin Provisioning The procedure to set the ECO mode for Thin Provisioning Pool is as follows: Procedure 1 Select the TPP for which the ECO mode setting status is to be changed (multiple selections can be made) and click [Assign ECO Mode] in [Action]. 2 Select the ECO mode schedule and action to be assigned and click the [Assign] button. • ECO Mode Schedule Select the ECO mode schedule that is to be applied.
Chapter 7 Thin Provisioning Pool Management 7.2 Functions in the Action Area for Thin Provisioning 3 Click the [OK] button. → Assign ECO Mode starts. 4 Click the [Done] button to return to the [Thin Provisioning Pool] screen. End of procedure 7.2.10 Register Thin Provisioning License This function registers the Thin Provisioning License. • If a Thin Provisioning license is not registered, the Thin Provisioning function cannot be used.
Chapter 7 Thin Provisioning Pool Management 7.2 Functions in the Action Area for Thin Provisioning 2 Input the Thin Provisioning license key, and click the [Register] button. • License Key Input the Thin Provisioning license key. The following input condition applies: - Up to 16 capital letters and numeric characters → A confirmation screen appears. If the entered Thin Provisioning license key does not satisfy the input conditions, an error screen appears. 3 Click the [OK] button.
Chapter 7 Thin Provisioning Pool Management 7.2 Functions in the Action Area for Thin Provisioning 7.2.11 Delete Thin Provisioning License This function deletes a Thin Provisioning license.
Chapter 7 Thin Provisioning Pool Management 7.2 Functions in the Action Area for Thin Provisioning 7.2.12 Start Balancing Flexible Tier Pool This function starts Flexible Tier Pool (FTRP) balancing sessions. The FTRP balancing function equalizes unevenly allocated physical area in the Flexible Tier Sub Pools (FTSPs) that configure an FTRP. By using this function, the physical allocated areas are reallocated equally among the RAID groups in the FTSPs.
Chapter 7 Thin Provisioning Pool Management 7.2 Functions in the Action Area for Thin Provisioning • FTRP balancing can be performed during the work I/O. • The balancing levels of FTRPs and FTSPs, and the progress of the FTRP balancing sessions can be checked. Refer to "7.1.5 Flexible Tier Pool (Basic Information)" (page 207), "7.1.7 Flexible Tier Pool Detail (Basic)" (page 212), and "7.1.8 Flexible Tier Pool Detail (Flexible Tier Sub Pool)" (page 214)for details.
Chapter 7 Thin Provisioning Pool Management 7.2 Functions in the Action Area for Thin Provisioning If FTRP balancing has stopped, the following conditions apply. • All of the balancing sessions that are currently being performed (*1) for the FTVs registered in the target FTRP are stopped. Even when balancing sessions are being stopped, FTVs that are not being balanced can be accessed normally.
Chapter 8 Advanced Copy Management This chapter describes Advanced Copy management. 8.1 Advanced Copy Status Advanced Copy status displays the status information of volumes.
Chapter 8 Advanced Copy Management 8.1 Advanced Copy Status 8.1.1 Advanced Copy (Basic Information) This function displays the status of all the Advanced Copy sessions. • To display the Advanced Copy session information (Local/Remote Copy sessions) and the Advanced Copy information, register the Advanced Copy license. • Registering an Advanced Copy license is not required to display the Advanced Copy Session Information (ODX Session) or the Advanced Copy Session Information (XCOPY Session).
Chapter 8 Advanced Copy Management 8.1 Advanced Copy Status ● Advanced Copy Session Information (ODX Session) • Session Count The number of ODX sessions (0 - 4096) that are currently being performed is displayed. The "Session Count" is a total of copy sessions in all the statuses including "Reserved". Click the [Session Count] link to display the list of sessions. • Status The status for each Advanced Copy session is displayed. - Normal All the copy sessions are in normal status.
Chapter 8 Advanced Copy Management 8.1 Advanced Copy Status 8.1.2 Advanced Copy (All Local Sessions) This function displays status for local copy sessions. The following session types are available: Equivalent Copy (EC), One Point Copy (OPC), QuickOPC, SnapOPC, SnapOPC+, and Monitor. The following items are displayed in the Main area: • Session ID The session ID is displayed. Click this item to display the screen shown in "8.1.7 Advanced Copy (Property)" (page 277) or "8.1.
Chapter 8 Advanced Copy Management 8.1 Advanced Copy Status • Status The copy session status is displayed. - Active Operating normally - Reserve Session ID reserved - Suspend Suspended by an instruction from the host - Error Suspend Copy canceled due to an error - Unknown A status other than the ones listed above • Phase The copy session phase is displayed. If the status is " Reserved", a "-" (hyphen) is displayed.
Chapter 8 Advanced Copy Management 8.1 Advanced Copy Status - EC The time stamp is updated at Suspend and when an error occurs. The following information is displayed: • When "Status" is " Active" and the copy session is not suspended yet, "0" is displayed for all of the display items. When suspend is requested and "Status" is " Active", the backup time of the previous suspend that was requested is displayed. • When "Status" is " Suspend", the backup time when the copy was suspended is displayed.
Chapter 8 Advanced Copy Management 8.1 Advanced Copy Status Filter Setting Filter 8.1.2.1 Description Status Select the copy session status that is to be displayed. Phase Select the copy session phase that is to be displayed. Session ID Input the session ID of the copy session that is to be displayed. When not using the session ID for filtering, leave this item blank. EC This function displays detailed information for EC sessions. Refer to "8.1.
Chapter 8 Advanced Copy Management 8.1 Advanced Copy Status 8.1.2.2 OPC This function displays detailed information for OPC sessions. Refer to "8.1.2 Advanced Copy (All Local Sessions)" (page 254) for display items. 8.1.2.3 QuickOPC This function displays detailed information for Quick OPC sessions. The following items are displayed in the Main area: • Modified Data Size The differential data size when QuickOPC is executed is displayed.
Chapter 8 Advanced Copy Management 8.1 Advanced Copy Status Refer to "8.1.2 Advanced Copy (All Local Sessions)" (page 254) for the display items that are not described in this section. 8.1.2.4 SnapOPC This function displays detailed information for SnapOPC sessions. The following items are displayed in the Main area: • SDP No. The Snap Data Pool number, which is used when the copy destination SDV capacity is insufficient, is displayed. If the status is " Reserved", a "-" (hyphen) is displayed.
Chapter 8 Advanced Copy Management 8.1 Advanced Copy Status 8.1.2.5 SnapOPC+ This function displays detailed information for SnapOPC+ sessions. The following items are displayed in the Main area: • Generation The generation and total number of generations of the copy session are displayed. • SDP No. The Snap Data Pool number, which is used when the copy destination SDV capacity is insufficient, is displayed. If the status is " Reserved", a "-" (hyphen) is displayed.
Chapter 8 Advanced Copy Management 8.1 Advanced Copy Status 8.1.2.6 Monitor This function displays detailed information for Monitor sessions. Refer to "8.1.2 Advanced Copy (All Local Sessions)" (page 254) for display items. 8.1.3 Advanced Copy (All Remote Sessions) This function displays the status for remote copy sessions. The following items are displayed in the Main area: • Session ID The session ID is displayed. Click this item to display the screen shown in "8.1.
Chapter 8 Advanced Copy Management 8.1 Advanced Copy Status • Source Volume No. The copy source volume number is displayed. If the status is " Reserved", a "-" (hyphen) is displayed. • Destination Volume No. The copy destination volume number is displayed. If the status is " displayed. Reserved", a "-" (hyphen) is • Remote Session ID The session ID for the remote device is displayed. • Type The copy session type is displayed using an abbreviation (REC). • Status The copy session status is displayed.
Chapter 8 Advanced Copy Management 8.1 Advanced Copy Status • Time Stamp The time when backup has been completed, and the time when an error occurred, are displayed. The time stamp is updated when the process is suspended, when an error occurs, and when the status is changed. The following information is displayed for "Time Stamp". - When "Status" is " Reserved", a "-" (hyphen) is displayed.
Chapter 8 Advanced Copy Management 8.1 Advanced Copy Status Filter Setting Filter 8.1.3.1 Description Status Select the copy session status that is to be displayed. Phase Select the copy session phase that is to be displayed. Session ID Input the session ID of the copy session that is to be displayed. When not using the session ID for filtering, leave this item blank. REC This function displays detailed information for REC sessions. Refer to "8.1.
Chapter 8 Advanced Copy Management 8.1 Advanced Copy Status 8.1.4 Advanced Copy (ODX) This function displays the status for ODX sessions. ODX sessions are created when the ODX function is used for a server with "Windows Server 2012". The ODX function offloads the workload for copying or migrating data from the server to the ETERNUS DX Disk storage system. The following items are displayed in the Main area: • Session ID The session ID is displayed. Click this item to display the screen shown in "8.1.
Chapter 8 Advanced Copy Management 8.1 Advanced Copy Status • Time Stamp The time when backup is complete and the time when an error occurred are displayed. The time stamp is updated when starting a copy session or an error occurs. The following information are displayed for this item: - If the status is " Reserved", a "-" (hyphen) is displayed. - If the status is " Active", the previous backup time is displayed. - If the status is " Error Suspend", the time when an error occurred is displayed.
Chapter 8 Advanced Copy Management 8.1 Advanced Copy Status The following items are displayed in the Main area: • Session ID The session ID is displayed. Click this item to display the screen shown in "8.1.7 Advanced Copy (Property)" (page 277) or "8.1.8 Advanced Copy (Extent information)" (page 283). • Source Volume No. The copy source volume number is displayed. If the status is " Reserved", a "-" (hyphen) is displayed. • Destination Volume No. The copy destination volume number is displayed.
Chapter 8 Advanced Copy Management 8.1 Advanced Copy Status Filter Setting Filter 8.1.6 Description Status Select the copy session status that is to be displayed. Session ID Input the session ID of the copy session that is to be displayed. When not using the session ID for filtering, leave this item blank. Setting (Advanced Copy) This function displays the current Advanced Copy license registration status and the Advanced Copy setting status.
Chapter 8 Advanced Copy Management 8.1 Advanced Copy Status - VAAI VAAI-use license is registered. The Full Copy function of VMware VAAI can be used. "VAAI" is displayed only for the ETERNUS DX410 S2/ ETERNUS DX440 S2 or the ETERNUS DX8100 S2/DX8700 S2. - Trial A trial license is registered. All of the Advanced Copy functions can be used for a limited time. - Full A paid license is registered. All of the advanced copy functions can be used.
Chapter 8 Advanced Copy Management 8.1 Advanced Copy Status 8.1.6.1 Snap Data Pool This function displays the SDP status. SDP is the area used when in case executing SnapOPC and SnapOPC+ increases the amount of copy data and exceeds the SDV capacity. SDP becomes available when creating an SDPV. Created SDPV is automatically added to the SDP. The following items are displayed in the Main area: • SDP No. The SDP number (fixed as "0") is displayed.
Chapter 8 Advanced Copy Management 8.1 Advanced Copy Status • Encrypted - Total Capacity The total capacity of encrypted SDP is displayed. - Total Used Capacity The total used capacity of encrypted SDP is displayed. - Total Used Capacity (%) The usage rate of encrypted SDP is displayed. - Used Host Capacity The total capacity of the SDPE that is allocated for an encrypted SDV where a capacity shortage caused by data writing from the host has occurred is displayed.
Chapter 8 Advanced Copy Management 8.1 Advanced Copy Status The following items are displayed in the Main area: ● Local Device Information • Box ID The Box ID for the local device is displayed. "Box ID" is an identifier used to identify individual storage systems. This ID is a unique name in the user system and consists of 40-digit code. The initial Box ID is a device ID consisting of device information (such as series name, model name, and serial number).
Chapter 8 Advanced Copy Management 8.1 Advanced Copy Status • Multiplicity When the local device and the remote device are connected by remote connection, the multiplicity is displayed. If the "Connection Type" is "Direct", a "-" (hyphen) is displayed. - Automatic REC is performed with the recommended multiplicity that is calculated using the procedure in "8.2.17 Measure Round Trip Time" (page 349). - 1 - 1024 REC is performed with the multiplicity that is manually specified using the procedure in "8.2.
Chapter 8 Advanced Copy Management 8.1 Advanced Copy Status The following items are displayed in the Main area: • Group The management group number of the REC Buffer is displayed. - ETERNUS DX90 S2: 0 - 3 - ETERNUS DX410 S2/DX440 S2: 0 - 7 - ETERNUS DX8100 S2/DX8700 S2: 0 - 7 • Usage The REC Buffer usage is displayed. - Unused - Send - Receive • Remote Box ID The Box ID for the remote device is displayed. If the copy path information is deleted, "???" is displayed.
Chapter 8 Advanced Copy Management 8.1 Advanced Copy Status • Monitoring Time The monitoring time, before transition to the "Halt" status for a copy session when an REC Buffer shortage occurs, is displayed. When the monitoring time" is "0 min.", the ETERNUS DX Disk storage system is not being monitored. When the REC Buffer usage is "Unused", a "-" (hyphen) is displayed. • HALT Wait Timer The maximum non-responding time is displayed.
Chapter 8 Advanced Copy Management 8.1 Advanced Copy Status 8.1.6.4 REC Disk Buffer This function displays the existing REC Disk Buffers in the ETERNUS DX Disk storage system. The following items are displayed in the Main area: ● REC Disk Buffer List • No. The RAID group number of the REC Disk Buffer is displayed. Click this item to display the [REC Disk Buffer Detail] screen. • Name The REC Disk Buffer name is displayed. Click this item to display the [REC Disk Buffer Detail] screen.
Chapter 8 Advanced Copy Management 8.1 Advanced Copy Status • Encryption The encryption status of the REC Disk Buffer is displayed. - CM An REC Disk Buffer that is encrypted by CM - "-" (hyphen) An REC Disk Buffer that is not encrypted (unencrypted volume) - SED An REC Disk Buffer that is encrypted by SED • Processing Function A process that is being performed for the REC Disk Buffer is displayed. If no process is being performed, a "" (hyphen) is displayed.
Chapter 8 Advanced Copy Management 8.1 Advanced Copy Status The following items are displayed in the Main area: • Session ID The session ID selected in the [Local Copy] screen is displayed. • Source Volume Name The copy source volume name is displayed. If the status is " Reserved", a "-" (hyphen) is displayed. • Destination Volume Name The copy destination volume name is displayed. When the "Status" is " displayed. When the "Type" is "MON", a "-" (hyphen) is displayed.
Chapter 8 Advanced Copy Management 8.1 Advanced Copy Status ■ For Remote Copy The following items are displayed in the Main area: • Session ID The session ID selected in the [Remote Copy] screen is displayed here. • Source Volume Name The following is displayed depending on the "Direction". If the status is " displayed. - When the "Direction" is "From Local/To Remote" The copy source volume name is displayed.
Chapter 8 Advanced Copy Management 8.1 Advanced Copy Status • Sync The operation mode of the copy session is displayed. If the status is " played. - Sync (synchronous) - Async (asynchronous) Reserved", a "-" (hyphen) is dis- • Transfer Mode The transfer mode of the copy session is displayed. If the "Status" is " played. If the "Sync" is "Sync", a "-" (hyphen) is displayed.
Chapter 8 Advanced Copy Management 8.1 Advanced Copy Status • Concurrent Suspend Status When an instruction to collectively and tentatively separate multiple pairs of a copy source volume and a copy destination volume (Concurrent Suspend request) is received in REC session, transition status to "Suspend" is displayed. If the status is " Reserved", a "-" (hyphen) is displayed. If the Concurrent Suspend Status cannot be obtained, "Unknown" is displayed.
Chapter 8 Advanced Copy Management 8.1 Advanced Copy Status Refer to "8.1.4 Advanced Copy (ODX)" (page 265) for the display items that are not described in this section. ■ For XCOPY The following items are displayed in the Main area: • Session ID The session ID selected in the [XCOPY] screen is displayed here. • Source Volume Name The copy source volume name is displayed. If the "Status" is " Reserved", a "-" (hyphen) is displayed.
Chapter 8 Advanced Copy Management 8.1 Advanced Copy Status 8.1.8 Advanced Copy (Extent information) Detailed information (Extent information) about the Advanced Copy is displayed. This screen is available only when the "Copy Range" is "Extent". The following items are displayed in the Main area: • Offset The array number of extent information is displayed. • Source LBA The copy source start Logical Block Address (LBA) of copy with range specification is displayed.
Chapter 8 Advanced Copy Management 8.1 Advanced Copy Status 8.1.9 Copy Path Detail Detailed information of copy path is displayed. The following items are displayed in the Main area: ● Storage System Information • Local Device Box ID The Box ID of the local device is displayed. • Remote Device Box ID The Box ID of the selected remote device is displayed. • Connection Type The connection type between the local device and the selected remote device is displayed.
Chapter 8 Advanced Copy Management 8.1 Advanced Copy Status ● Advanced Copy Path Status • Local Port The port information of the local device is displayed. • Status The port path status between the local and remote devices is displayed with an icon and a character string. - Normal The copy path is in normal status. - Error The copy path is in error status • Remote Port WWN/iSCSI Name The port WWN or iSCSI name of the remote device is displayed.
Chapter 8 Advanced Copy Management 8.1 Advanced Copy Status • Detail Information Detailed information about the copy path is displayed. If an error occurs in the copy path, the error details or location is displayed using the following abbreviations. If there are multiple error locations, multiple abbreviations are displayed. - Connectable The copy path is in normal status. - Path Unstable The copy path between the local device and remote device is in unstable status.
Chapter 8 Advanced Copy Management 8.2 Functions in the Action Area for Advanced Copy 8.2 Functions in the Action Area for Advanced Copy When using functions in the Action area, select the desired function from the Action area that is displayed in the status display screen.
Chapter 8 Advanced Copy Management 8.2 Functions in the Action Area for Advanced Copy 8.2.1 Required Settings for the Advanced Copy Function This section describes the necessary preparation that must be performed to use the Advanced Copy function and copy session management. Perform the required settings in the following order.
Chapter 8 Advanced Copy Management 8.2 Functions in the Action Area for Advanced Copy Specify the automatic notification parameter when the SDP capacity is insufficient during a SnapOPC+ session. (1) Copy parameter setting Set the SDP capacity threshold for each policy level. Refer to "8.2.11 Modify Copy Parameters" (page 316). (2) Event notification setting Select whether to notify when the SDP capacity exceeds the threshold. When notifying, select the notification method. Refer to "11.2.9.
Chapter 8 Advanced Copy Management 8.2 Functions in the Action Area for Advanced Copy ● Copy session management After preparation for Advanced Copy is complete, create a copy session to start copying volumes. Check the copy session status during the copy operation. (1) Copy session creation Note that GUI can only create the SnapOPC+ sessions that are performed in volume units. To create other copy sessions, use the copy management software. Refer to "8.2.2 Start SnapOPC+" (page 291).
Chapter 8 Advanced Copy Management 8.2 Functions in the Action Area for Advanced Copy ● Stop ODX The following items must be prepared after all the ODX sessions are complete or stopped: (1) Delete an ODX Buffer volume Delete the dedicated volumes for the ODX function. Refer to "5.2.2 Delete Volume" (page 112) for details. (2) Disable ODX Disable the ODX function. Refer to "8.2.9 Disable ODX" (page 311) for details. Reboot any servers that are connected to the ETERNUS DX Disk storage system. 8.2.
Chapter 8 Advanced Copy Management 8.2 Functions in the Action Area for Advanced Copy 2 Click the [Browse...] button. 3 Select the radio button for the volume to be used, and click the [OK] button. Perform Step 2 and Step 3 in the [Select Source Volume] screen and in the [Select Destination Volume] screen.
Chapter 8 Advanced Copy Management 8.2 Functions in the Action Area for Advanced Copy 4 Check the displayed contents, and click the [Start] button. → A confirmation screen appears. 5 Click the [OK] button. → SnapOPC+ session starts.
Chapter 8 Advanced Copy Management 8.2 Functions in the Action Area for Advanced Copy 8.2.3 Stop Copy Session This function stops the selected copy session. This function is used when a session cannot be stopped due to a host error or other causes. • If one SnapOPC+ session is stopped, all the sessions started earlier than that session are also stopped. • If one SnapOPC+ session is stopped, all the Restore OPC sessions started earlier than that session become in error status.
Chapter 8 Advanced Copy Management 8.2 Functions in the Action Area for Advanced Copy 8.2.4 Register Advanced Copy License This function registers the Advanced Copy license for EC, OPC, QuickOPC, SnapOPC, SnapOPC+, and REC. There are two types of Advanced Copy licenses: • Paid License All of the Advanced Copy functions can be used. • Free License For the ETERNUS DX80 S2/DX90 S2, up to eight sessions with the local Advanced Copy function can be used.
Chapter 8 Advanced Copy Management 8.2 Functions in the Action Area for Advanced Copy • Input License key Input the Advanced Copy license key. → A confirmation screen appears. • Only when registering a paid license, the Advanced Copy license key entry is required. • When the entered Advanced Copy license key does not satisfy the input conditions, an error screen appears. 3 Click the [OK] button. → The Advanced Copy license registration is executed.
Chapter 8 Advanced Copy Management 8.2 Functions in the Action Area for Advanced Copy Availability of Copy Functions The following table shows the availability of copy functions when "Use Free License/ VAAI" or "Use VAAI" is selected. Copy Type Advanced Copy Local ETERNUS DX80 S2/DX90 S2 ETERNUS DX410 S2/DX440 S2 ETERNUS DX8100 S2/DX8700 S2 Use Free License/VAAI Use VAAI OK (Up to eight sessions) NG NG NG OK OK Remote Full Copy by VAAI 8.2.
Chapter 8 Advanced Copy Management 8.2 Functions in the Action Area for Advanced Copy 2 Click the [OK] button. → Deletion of an Advanced Copy license is executed. 3 Click the [Done] button to return to the [Setting] screen. End of procedure 8.2.6 Modify EC/OPC Priority This function sets the copy speed when using EC and OPC. The EC/OPC speed is usually set in consideration of the host's I/O load and copy processing load.
Chapter 8 Advanced Copy Management 8.2 Functions in the Action Area for Advanced Copy 2 Select the EC/OPC priority, and click the [Set] button. • EC/OPC Priority - Automatic Priority This mode changes the EC/OPC priority automatically in response to the operating load status. - High Priority This mode operates by making maximum use of internal resources. This mode greatly affects host access performance, thus should not be used during normal operation. Use when the operation load is low.
Chapter 8 Advanced Copy Management 8.2 Functions in the Action Area for Advanced Copy → A confirmation screen appears. Click [Advanced Setting] to specify the copy schedule mode. 3 Click the [OK] button. → The selected EC/OPC priority is set. 4 Click the [Done] button to return to the [Setting] screen.
Chapter 8 Advanced Copy Management 8.2 Functions in the Action Area for Advanced Copy 8.2.7 Modify Copy Table Size This function sets the copy table size, which is used by the firmware for the ETERNUS DX Disk storage system, on the CM cache memory. When the EC, OPC or REC function is in use, this copy table is used as the area that manages the progress of the copy. • Registering the license for the Advanced Copy function is required to set the copy table size.
Chapter 8 Advanced Copy Management 8.2 Functions in the Action Area for Advanced Copy There are two methods to set the copy table size: manually and automatically. The procedure to set the copy table size is as follows: ■ Manually setting the copy table size Specify the copy table size manually. Procedure 1 Click [Modify Copy Table Size] in [Action]. 2 Specify "Resolution" and "Table Size" and click the [Set] button. • Resolution Select the resolution.
Chapter 8 Advanced Copy Management 8.2 Functions in the Action Area for Advanced Copy → A confirmation screen appears. 3 Click the [OK] button. → Setting of the copy table size starts. 4 Click the [Done] button to return to the [Setting] screen. End of procedure ■ Automatically setting the copy table size Specify the copy table size automatically. Procedure 1 Click [Modify Copy Table Size] in [Action].
Chapter 8 Advanced Copy Management 8.2 Functions in the Action Area for Advanced Copy 2 Click the [Calculation of recommended values] button. → The [Calculation of recommended values] dialog box appears. 3 Input the necessary information and click the [Calculation] button. • Total Copy Capacity (Restore OPC is not used) Input the total copy capacity (*1) when Restore OPC is not used (unit: GB).
Chapter 8 Advanced Copy Management 8.2 Functions in the Action Area for Advanced Copy The following input conditions apply: - ETERNUS DX80 S2: 0 - 1024 - ETERNUS DX90 S2: 0 - 2048 - ETERNUS DX410 S2/DX440 S2: 0 - 8192 - ETERNUS DX8100 S2: 0 - 8192 - ETERNUS DX8700 S2: 0 - 32768 • Sessions (Restore OPC is used) Input the total number of sessions (*1) for using Restore OPC.
Chapter 8 Advanced Copy Management 8.2 Functions in the Action Area for Advanced Copy → "Resolution" and "Table Size" are automatically calculated. • The calculated parameters are "Resolution" and "Table Size". It is assumed that almost 100% of the copy table size is used. • When [Calculation of recommended values] is used, the calculation of "Resolution" and "Table Size" makes allowances for a slight increase of the copy capacity.
Chapter 8 Advanced Copy Management 8.2 Functions in the Action Area for Advanced Copy 5 Click the [Set] button. → A confirmation screen appears. 6 Click the [OK] button. → Setting of the copy table size starts. 7 Click the [Done] button to return to the [Setting] screen.
Chapter 8 Advanced Copy Management 8.2 Functions in the Action Area for Advanced Copy ■ How to calculate the copy table size A dedicated memory area is required for Advanced Copy management and is allocated as a table size. The table size and resolution settings are determined by the copy capacity and the number of sessions (volumes) that will be run simultaneously.
Chapter 8 Advanced Copy Management 8.2 Functions in the Action Area for Advanced Copy ● The table size for EC/REC and for OPC/QuickOPC/SnapOPC/SnapOPC+ without OPC Restoration (S1) M: Resolution (The same value is used in the ETERNUS DX Disk storage system. Set "×1" if possible.) C1: The total copy capacity (GB) for EC/REC, and OPC/QuickOPC/SnapOPC/SnapOPC+ without OPC Restoration (*1) N1: The number of sessions EC/REC, and OPC/QuickOPC/SnapOPC/SnapOPC+ without OPC Restoration.
Chapter 8 Advanced Copy Management 8.2 Functions in the Action Area for Advanced Copy 8.2.8 Enable ODX This function enables the ODX function. This function supports ODX, which is provided for servers with "Windows Server 2012". ODX is a function that offloads the load on data copying and migration to the storage system. • To start using the ODX function, the server must recognize that ODX is enabled in the ETERNUS DX Disk storage system. After enabling ODX with this function, reboot the server.
Chapter 8 Advanced Copy Management 8.2 Functions in the Action Area for Advanced Copy 8.2.9 Disable ODX This function disables the ODX function. • To stop using the ODX function, the server must recognize that ODX is disabled in the ETERNUS DX Disk storage system. After disabling ODX with this function, reboot the server. • The ODX function cannot be disabled when ODX Buffer volumes exist in the ETERNUS DX Disk storage system. Delete the ODX Buffer volume before disabling the ODX function. Refer to "5.
Chapter 8 Advanced Copy Management 8.2 Functions in the Action Area for Advanced Copy ODX Buffer Volume • One ODX Buffer volume can be created in the ETERNUS DX Disk storage system. • The type of the ODX Buffer volume is "Standard", "TPV", or "FTV". • The capacity of an ODX Buffer volume is 1GB - 1TB. • An ODX Buffer volume can be created when the ODX function is enabled. • The ODX Buffer volume must be created with the ODX function.
Chapter 8 Advanced Copy Management 8.2 Functions in the Action Area for Advanced Copy • The volume capacity that is required for an ODX Buffer volume varies depending on the server system configuration and the applications that are being used. When using the ODX function for normal file copying or file migration with Microsoft Windows Server, creating a 10GB ODX Buffer volume is recommended. • An ODX Buffer volume can be created by using the maximum free space that is available in a RAID group.
Chapter 8 Advanced Copy Management 8.2 Functions in the Action Area for Advanced Copy • Use all Largest Free Space Select the "Enable" checkbox to create an ODX Buffer volume with the largest available free space in the RAID group. This checkbox can be selected or cleared only when "Type" is "Standard". If "Enable" is selected, an ODX Buffer volume with a capacity of up to 1TB is created with the available space displayed in the "Largest Free Space" field for the selected RAID group.
Chapter 8 Advanced Copy Management 8.2 Functions in the Action Area for Advanced Copy • When "Type" is "Thin Provisioning" - Radio buttons to select a TPP Select the TPP in which the ODX Buffer volume is created. TPPs that are registered in FTRPs are not displayed in the target Thin Provisioning Pool list. When using the maximum free space in the RAID group to create an ODX Buffer volume without specifying the capacity, select the "Enable" checkbox for "Use all Largest Free Space".
Chapter 8 Advanced Copy Management 8.2 Functions in the Action Area for Advanced Copy 3 Click the [OK] button. → ODX Buffer volume creation starts. 4 Click the [Done] button to return to the [Setting] screen. End of procedure 8.2.11 Modify Copy Parameters This function sets the parameters to enable automatic reporting when the SDP capacity is insufficient during a SnapOPC+ session and specifies the unit of the area allocation to the SDV (SDPE).
Chapter 8 Advanced Copy Management 8.2 Functions in the Action Area for Advanced Copy 2 Specify the threshold for each policy level, and click the [Modify] button. ● Policy of Snap Data Pool • Policy Level 1 (Informational) Threshold If the usage of SDP exceeds the specified threshold, the ETERNUS DX Disk storage system notifies that effect as the Policy Level 1 (Informational). Specify between 1% and 97% for the threshold.
Chapter 8 Advanced Copy Management 8.2 Functions in the Action Area for Advanced Copy 3 Click the [OK] button. → The specified copy parameters are registered. 4 Click the [Done] button to return to the [Snap Data Pool] screen. End of procedure 8.2.12 Set Copy Path This function sets copy path information between the ETERNUS Disk storage systems required for performing REC using the wizard screen.
Chapter 8 Advanced Copy Management 8.2 Functions in the Action Area for Advanced Copy • To create copy path information between different models of ETERNUS Disk storage systems (such as ETERNUS DX440 S2 and ETERNUS4000), be sure to create the information on the newer model of ETERNUS Disk storage system (ETERNUS DX440 S2 in the above example).
Chapter 8 Advanced Copy Management 8.2 Functions in the Action Area for Advanced Copy • Only copy path information files created/saved with this function can be loaded with this function.
Chapter 8 Advanced Copy Management 8.2 Functions in the Action Area for Advanced Copy 2 Select the operation mode, and click the [Next >>] button. • Operation Mode - Create Copy Path Create a copy path and apply to the ETERNUS DX Disk storage system. - Apply Copy Path Apply the existing copy path information file to the ETERNUS DX Disk storage system. The displayed screen is different depending on the selected operation. ■ When selecting "Create Copy Path" The [Base Information Selection] screen appears.
Chapter 8 Advanced Copy Management 8.2 Functions in the Action Area for Advanced Copy Register Device Information In this screen, register the device information to which the copy path is created. Procedure 1 Select a device information selection method in the [Base Information Selection] screen, and click the [Next >>] button. • Base Information - Backup Path File The copy path information file previously applied is used.
Chapter 8 Advanced Copy Management 8.2 Functions in the Action Area for Advanced Copy 2 Input the location where the copy path information file that to be used, and click the [Next >>] button. • Copy Path Information File Input the location where the copy path information file that to be used. Click the [Browse...] button to specify the location, or input the location directly. → The [Check Registered Device Information] screen appears.
Chapter 8 Advanced Copy Management 8.2 Functions in the Action Area for Advanced Copy 4 Click the [OK] button. → The [Device Configuration Setting] screen appears. When no storage system to register the information is selected, the [Device Information File Selection] screen appears. Proceed to Step 7. 5 Set the port to be used for the copy path, and click the [Next >>] button. • Port Type Select the port type to set a copy path. The displayed contents vary depending on the device type.
Chapter 8 Advanced Copy Management 8.2 Functions in the Action Area for Advanced Copy • Initiator / Target Setting Select the port mode to set a copy path as RA. - Initiator - Target The displayed screen is different depending on the port settings. ■ When "FC 1-Port", "FC 2-Port", or "FC 4-Port" is selected in the "Port Type" field • When a device for which port setting is not completed exists → The [Device Configuration Setting] screen appears again. Proceed to Step 5.
Chapter 8 Advanced Copy Management 8.2 Functions in the Action Area for Advanced Copy 6 Set the iSCSI port in the [iSCSI Port Information Setting] screen, and click the [Next >>] button. • IP Version Select the IP version of the port to set a copy path. If the copy path is already specified for the port when the copy path information file is being loaded, the IP version that is set for the port is selected as the default setting. For other ports, "IPv4" is set as the default setting.
Chapter 8 Advanced Copy Management 8.2 Functions in the Action Area for Advanced Copy • iSCSI Name Specify the iSCSI name of the iSCSI port (required). If not specified, the field is blank. Specify a unique iSCSI name in the same device. The following input conditions apply: - Alphabetic characters (lower case) and numeric characters - Symbols "-" (hyphen), "." (period) and ":" (colon) - The name starts with "iqn." or "eui.
Chapter 8 Advanced Copy Management 8.2 Functions in the Action Area for Advanced Copy 7 Specify whether to use the device information file, and click the [Next >>] button. ● Operation Method Selection • Operation Method Select whether to continue the device registration. - Finish of Registration by File Reading - Registration from File When selecting "Registration from file", specify a file in the "Device Information File Selection" field.
Chapter 8 Advanced Copy Management 8.2 Functions in the Action Area for Advanced Copy 8 Select whether to continue registration of device information, and click the [Next >>] button. ● Operation Method Selection • Operation Method Select whether to continue the device registration. - Registration by manual operation When selecting "Registration by manual operation", specify parameters in the "Device Information Setting" field.
Chapter 8 Advanced Copy Management 8.2 Functions in the Action Area for Advanced Copy • Unique Number Input the unique number of the device to be registered. Input conditions vary depending on the device type. Unique number that is already registered in another ETERNUS Disk storage system cannot be specified. The following input conditions apply: - For all device types: 4-digit hexadecimal (fixed) - ETERNUS DX90 S2: Input the value of the fifth and sixth bytes of the WWN.
Chapter 8 Advanced Copy Management 8.2 Functions in the Action Area for Advanced Copy • The unique number can be checked by the WWN of the FC port. All of the FC ports in a storage system have the same unique number.
Chapter 8 Advanced Copy Management 8.2 Functions in the Action Area for Advanced Copy Set Copy Path In this screen, set a copy path. Specify the Box ID of the target device in which the copy path is created, and set the line information between devices. Procedure 1 Click the [Remote Device Box ID] link to create a copy path. → The [Copy Path Setting] dialog box appears. 2 Set a copy path in the [Copy Path Setting] dialog box and click the [OK] button.
Chapter 8 Advanced Copy Management 8.2 Functions in the Action Area for Advanced Copy ● Line Setting • Connection Type Select the connection type for the remote device. - Remote Connecting the local and remote devices via a line. - Direct Connecting the local and remote devices without a line. Even in connection via a switch, select "Direct" when not using a line. • Link Speed Specify the link speed (*1) for connection with the remote device. This item can be set when the "Connection Type" is "Remote".
Chapter 8 Advanced Copy Management 8.2 Functions in the Action Area for Advanced Copy → The [Copy Path Creation Device Selection] screen appears. 3 Repeat Step 1 and Step 2 the same number of times as the number of storage systems to set copy paths. 4 When setting a copy path is completed for all the storage systems, click the [Next >>] button. → The [Download File] screen appears. Proceed to "Save Copy Path" (page 335).
Chapter 8 Advanced Copy Management 8.2 Functions in the Action Area for Advanced Copy Save Copy Path In this screen, save the copy path information that is created in the procedure in "Set Copy Path" (page 332). Procedure 1 Click the [Save] button to save the copy path information. → A dialog box to download the file appears. 2 Save the copy path information file. The default file name is "RecPath_serial number for the ETERNUS DX Disk storage system_YYYY-MMDD_hh-mm-ss.bin".
Chapter 8 Advanced Copy Management 8.2 Functions in the Action Area for Advanced Copy Clicking the [Done] button displays the [Finish Copy Path Setting Wizard] screen. Click the [OK] button to finish the [Set Copy Path] function. End of procedure Copy Path Information File Selection In this screen, select the copy path information file to be used. Perform this procedure only when "Apply Copy Path" is selected in the procedure in "Operation Method Selection" (page 329).
Chapter 8 Advanced Copy Management 8.2 Functions in the Action Area for Advanced Copy Apply Copy Path Information In this screen, apply the copy path information. Procedure 1 Confirm that the copy path is set between the devices in the [Device Connection List] screen, and click the [Next >>] button. → A confirmation screen appears. Click the Box ID of the remote device to display the [Check Copy Path Information Setting] dialog box where you can check the details of copy path information.
Chapter 8 Advanced Copy Management 8.2 Functions in the Action Area for Advanced Copy • If the port mode does not match between the device configuration and the applied copy path information file configuration ("CA" in the storage system and "RA" in the copy path information file), an error screen appears. • The [Finish Copy Path Setting Wizard] screen appears in the following conditions. Click the [Done] button to return to the [Copy Path] screen.
Chapter 8 Advanced Copy Management 8.2 Functions in the Action Area for Advanced Copy 2 Click the [OK] button. → Measurement of the round trip time starts. After measurement completes, the [Measure Round Trip Time Result] screen appears. 3 Check the measured round trip time, and click the [Next >>] button. → A confirmation screen appears. 4 Click the [OK] button. → Setting the round trip time starts. 5 After setting the time, click the [Done] button to return to the [Copy Path] screen.
Chapter 8 Advanced Copy Management 8.2 Functions in the Action Area for Advanced Copy ■ Applying copy path information files with IPv6 The following storage systems and copy path information files are used in this example.
Chapter 8 Advanced Copy Management 8.
Chapter 8 Advanced Copy Management 8.
Chapter 8 Advanced Copy Management 8.2 Functions in the Action Area for Advanced Copy 8.2.13 Delete All Copy Path This function deletes all of the copy path information between local and remote devices registered in the ETERNUS DX Disk storage system. • If a copy path, which is being used in an REC, was deleted, it may affect operations, such as the REC being stopped. Confirm that REC is not in use before modifying the information. To check whether REC is in use, refer to "8.1.
Chapter 8 Advanced Copy Management 8.2 Functions in the Action Area for Advanced Copy 8.2.14 Export All Copy Path This function exports the copy path information registered in the ETERNUS DX Disk storage system, and saves the information in a file. The saved file can be used as path information when creating a copy path, so that manual registration of the path information will not be required.
Chapter 8 Advanced Copy Management 8.2 Functions in the Action Area for Advanced Copy 3 Click the [Download] button. → A dialog box to download the file appears. 4 Save the copy path information file. The default file name is "RecPath_serial number for the ETERNUS DX Disk storage system_YYYY-MMDD_hh-mm-ss.bin". (YYYY-MM-DD_hh-mm-ss: the date and time when the download screen (Step 3) is displayed.) 5 Click the [Close] button to return to the [Copy Path] screen. End of procedure 8.2.
Chapter 8 Advanced Copy Management 8.2 Functions in the Action Area for Advanced Copy 2 Click the [Create Data] button. → The REC device information, which has been registered in the ETERNUS DX Disk storage system, is exported. After the REC device information export has been finished, a screen to execute downloading the file is displayed. 3 Click the [Download] button. → A dialog box to download the file appears. 4 Save the REC device information file.
Chapter 8 Advanced Copy Management 8.2 Functions in the Action Area for Advanced Copy 8.2.16 Convert Copy Path This function outputs the copy path information file for past ETERNUS Disk storage system (hereinafter, referred to as "previous models").
Chapter 8 Advanced Copy Management 8.2 Functions in the Action Area for Advanced Copy → The copy path information, which has been registered in the ETERNUS DX Disk storage system, is exported. After the copy path information export has been finished, a screen to execute downloading of the file is displayed.
Chapter 8 Advanced Copy Management 8.2 Functions in the Action Area for Advanced Copy 4 Save the copy path information file. The default file name is "RecPathConvt_serial number for the ETERNUS DX Disk storage system_YYYYMM-DD_hh-mm-ss.bin". (YYYY-MM-DD_hh-mm-ss: the date and time when the download screen (Step 3) is displayed.) 5 Click the [Close] button to return to the [Copy Path] screen. End of procedure 8.2.
Chapter 8 Advanced Copy Management 8.2 Functions in the Action Area for Advanced Copy 2 Click the [Measure] button. → Measurement of round trip time starts. 3 Change the "Round Trip Time (msec)" value if necessary, and click the [Modify] button. • Round Trip Time (msec) The round trip time measurement result between the local device and the remote device is displayed. If a measurement error has occurred, the field is blank. The value can be changed.
Chapter 8 Advanced Copy Management 8.2 Functions in the Action Area for Advanced Copy 4 Click the [OK] button. → The round trip time measurement result is updated in the ETERNUS DX Disk storage system. 5 Click the [Done] button to return to the [Copy Path] screen. End of procedure 8.2.18 Modify REC Multiplicity This function specifies multiplicity or priority level when performing Remote Equivalent Copy (REC). It is not necessary to change the default setting (Auto) for normal use.
Chapter 8 Advanced Copy Management 8.2 Functions in the Action Area for Advanced Copy The procedure to modify REC multiplicity is as follows: Procedure 1 Click the [Modify REC Multiplicity] in [Action]. 2 Specify the multiplicity, and click the [Set] button. ● Remote Box ID List • Priority Level Select the priority level between "1" and "8". When the "Connection Type" is "Remote", a "-" (hyphen) is displayed.
Chapter 8 Advanced Copy Management 8.2 Functions in the Action Area for Advanced Copy • Copy performance is not improved by selecting "Destination RAID Group Balancing" in the following conditions: - When the type of the copy destination volume is not "Standard" - When the copy destination volume "Standard" and concatenated • Specify the same copy schedule mode for copy source and copy destination storage systems. If different modes are specified, the copy performance may not improve as expected.
Chapter 8 Advanced Copy Management 8.2 Functions in the Action Area for Advanced Copy 8.2.19 Modify REC Buffer This function sets parameters of the REC Buffer for copying data via the REC Buffer (in Asynchronous Consistency mode). The "Consistency mode" secures the order of data transfer to the remote device for all of the specified REC sessions. This mode requires constant securement of the dedicated REC Buffer in the cache memory.
Chapter 8 Advanced Copy Management 8.2 Functions in the Action Area for Advanced Copy 2 Change the REC Buffer configurations, and click the [Set] button. ● REC Buffer Setting List • Usage Specify the usage of the REC Buffer. When setting the REC Buffer for sending, select "Send". When setting the REC Buffer for receiving, select "Receive". When the target REC Buffer is not used, select "Unused". • Remote Box ID Select the Box ID for the remote device.
Chapter 8 Advanced Copy Management 8.2 Functions in the Action Area for Advanced Copy • This mode should only be used by users who want to maintain host I/O performance as much as possible during REC. • If "Enable" is selected and host I/O with a high load continues, it may take an extended period of time for the data to reach an equivalent state. Reduce throughput by as much as possible to avoid exceeding the line bandwidth of REC during initial copying.
Chapter 8 Advanced Copy Management 8.
Chapter 8 Advanced Copy Management 8.2 Functions in the Action Area for Advanced Copy 8.2.20 Assign REC Disk Buffer This function reassigns REC Disk Buffers to an REC Buffer. • The REC Disk Buffer can be assigned to an REC Buffer only when the REC Buffer's usage is "Send".
Chapter 8 Advanced Copy Management 8.2 Functions in the Action Area for Advanced Copy 2 Click the [Add] button. → The screen to add REC Disk Buffer assignment appears. 3 Select the checkbox for the additional REC Disk Buffer to be assigned, and click the [OK] button. → The selected REC Disk Buffer is added. • When assigning multiple REC Disk Buffers to an REC Buffer, select ones with the same capacity.
Chapter 8 Advanced Copy Management 8.2 Functions in the Action Area for Advanced Copy • To delete the assignment of the REC Disk Buffer, click the [Delete] button for the target REC Disk Buffer (RAID group). • When RAID groups in the REC Disk Buffer are configured with both "Online" and "Nearline" drives, "Online" is displayed. 4 When the REC Disk Buffer assignment has been completed, click the [Modify] button. → A confirmation screen appears. 5 Click the [OK] button.
Chapter 8 Advanced Copy Management 8.2 Functions in the Action Area for Advanced Copy 2 To delete the assignment of the REC Disk Buffer, click the [Delete] button for the target REC Disk Buffer (RAID group). → The selected REC Disk Buffer is deleted from the list. 3 Click the [Modify] button. → A confirmation screen appears. 4 Click the [OK] button. → Deletion of an REC Disk Buffer starts.
Chapter 8 Advanced Copy Management 8.2 Functions in the Action Area for Advanced Copy 5 Click the [Done] button to return to the [REC Buffer] screen. End of procedure 8.2.21 Create REC Disk Buffer This function creates an REC Disk Buffer. When using the REC Consistency mode, REC Buffer shortage may occur due to errors (such as a bad line). Note that the copy session will be halted if the REC Buffer shortage extends for a certain period of time.
Chapter 8 Advanced Copy Management 8.2 Functions in the Action Area for Advanced Copy • The following shows the recommended drive configuration of the ETERNUS DX8100 S2/DX8700 S2: - A mirroring pair should be distributed over drives that are connected to different SAS cascades (*1). *1: The "SAS cascade" indicates the DEs that are connected to a single BRT port.
Chapter 8 Advanced Copy Management 8.2 Functions in the Action Area for Advanced Copy ● Advanced Setting Specify the Stripe Depth only when performing the advanced performance tuning for each RAID group that configures a TPP. It is not necessary to change the default setting (64KB) for normal use. - Stripe Depth Select the Stripe Depth value of the RAID group from 64KB, 128KB, 256KB, 512KB, or 1024KB. → A confirmation screen appears.
Chapter 8 Advanced Copy Management 8.2 Functions in the Action Area for Advanced Copy 8.2.22 Delete REC Disk Buffer This function deletes an REC Disk Buffer. REC Disk Buffers that have been assigned to the REC Buffer cannot be deleted. The procedure to delete an REC Disk Buffer is as follows: Procedure 1 Select the REC Disk Buffer that is to be deleted (multiple selections can be made) and click the [Delete REC Disk Buffer] button in [Action]. → A confirmation screen appears.
Chapter 8 Advanced Copy Management 8.2 Functions in the Action Area for Advanced Copy 8.2.23 Format REC Disk Buffer This function formats an REC Disk Buffer. • If an in-use REC Disk Buffer is formatted, the data stored in the REC Disk Buffer will be deleted. • The following REC Disk Buffers cannot be formatted: - The status is other than " Available" or " Readying" - The REC Disk Buffer is blocked The newly created REC Disk Buffer will be formatted automatically.
Chapter 9 Connectivity Management This chapter describes connectivity management. 9.1 Connectivity Status Connectivity status displays the status information of volumes.
Chapter 9 Connectivity Management 9.1 Connectivity Status Detailed information of the LUN groups can be displayed from the following screens: • Host Affinity Detail • Host Group Detail • LUN Group Detail • LUN Group : LU QoS Group Detail • Host-LU QoS Performance Information 9.1.1 Structures for Host Connection This section describes structures for host connection. • Host Group A host group combines HBAs of the hosts that access the same LUN group into a group (HBAs configure the multipaths).
Chapter 9 Connectivity Management 9.1 Connectivity Status Figure 9.
Chapter 9 Connectivity Management 9.1 Connectivity Status • CA port group settings (Refer to "9.2.3.1 Create FC Port Group" (page 517), "9.2.3.2 Create iSCSI Port Group" (page 519), "9.2.3.3 Create SAS Port Group" (page 522), or "9.2.3.4 Create FCoE Port Group" (page 525) for details). No.
Chapter 9 Connectivity Management 9.1 Connectivity Status 9.1.2 Connectivity (Basic Information) A list of the host affinity groups is displayed. When the target connection is "Host Group - CA Port Group", a host affinity is a group that defines an association between a "Host Group", a "CA Port Group", and a "LUN Group". When the target connection is "Host - CA Port", a host affinity is a group that defines an association between a "Host", a "CA Port", and a "LUN Group".
Chapter 9 Connectivity Management 9.1 Connectivity Status • LUN Group The names of the LUN groups with host affinity settings are displayed. When LUNs are directly associated to CA ports (when LUN mapping is created) by an application other than GUI, the field is blank. • Host Response One of the following host responses is displayed.
Chapter 9 Connectivity Management 9.1 Connectivity Status Display Examples of Host Affinities Display examples for the host affinity are shown in the following table. Example No. Display contents Host Group Host CA Port Group CA Port Description LUN Group Host Response Example 1 Host_ Group_ xxx – Port_ Group_ xxx – LUN_ Group_ xxx Host_ Response1 The host affinity setting has been configured in "Host_Group_xxx", "Port_Group_xxx" and "LUN_Group_xxx".
Chapter 9 Connectivity Management 9.1 Connectivity Status 9.1.3 Host Group The list of the host groups is displayed. A host group uses the same interface type, and groups the hosts (HBAs), which access the same LUN group. The following items are displayed in the Main area: • Name The host group name is displayed. By clicking this item, the [Host Group Detail] screen is displayed. Refer to "9.1.10 Host Group Detail" (page 404) for display items.
Chapter 9 Connectivity Management 9.1 Connectivity Status Filter setting The filter setting field is displayed only for ETERNUS DX8700 S2. Filter 9.1.3.1 Description Name Input the host group name that is to be displayed. When not using the host group name for filtering, leave this item blank. Type Select the interface type for the host group that is to be displayed. Status Select the host group status that is to be displayed. Host Response Select the host response name that is to be displayed.
Chapter 9 Connectivity Management 9.1 Connectivity Status • Status Whether the host affinity setting is applied to the FC host is displayed. "Host Affinity Setting" is to specify association between "Host Group", "CA Port Group", and "LUN Group" or association between "Host", "CA Port", "and "LUN Group". The host affinity setting specifies the path between each host and port. - Active The host affinity setting is applied to the FC host. The LUN group can be accessed from the FC host.
Chapter 9 Connectivity Management 9.1 Connectivity Status • Host Group The host group name, to which the iSCSI host belongs, is displayed. When the iSCSI host belongs to two host groups, the host group names are separated with a ", (comma)" and displayed. If the iSCSI host belongs to three or more host groups, the names of the first two groups and a [more...] link are displayed. If the iSCSI host does not belong to an host group, a "-" (hyphen) is displayed.
Chapter 9 Connectivity Management 9.1 Connectivity Status Filter Description IP Address Input the IP address that is to be displayed. ETERNUS DX Disk storage system compares the input IP address and the existing IP address by starting from the first letter. The iSCSI hosts with the same IP address are displayed. An abbreviation for the IPv6 address can be used. When not using the IP address for filtering, leave this item blank. Alias Name Input the Alias Name that is to be displayed.
Chapter 9 Connectivity Management 9.1 Connectivity Status 9.1.3.3 SAS Host In this screen, registered SAS hosts in the ETERNUS DX Disk storage system are displayed. The following items are displayed in the Main area: • Name The SAS host name is displayed. • SAS Address The SAS address of the SAS host is displayed. • Host Group The host group name, to which the SAS host belongs, is displayed. When the SAS host belongs to two host groups, the host group names are separated with a ", (comma)" and displayed.
Chapter 9 Connectivity Management 9.1 Connectivity Status Filter setting Filter 9.1.4 Description Name Input the SAS host name that is to be displayed. When not using the SAS host name for filtering, leave this item blank. SAS Address Input the SAS address that is to be displayed. When not using the SAS address for filtering, leave this item blank. Host Response Select the host response name that is to be displayed.
Chapter 9 Connectivity Management 9.1 Connectivity Status • Status Whether the CA port group is used ("Active") or not ("Inactive") for the host affinity settings is displayed. "Host affinity setting" is to specify association between "Host Group", "CA Port Group" and "LUN Group". - Active The CA port group is used for the host affinity settings. The LUN group can be accessed from the host group via the CA port group. - Inactive The CA port group is not used for the host affinity settings.
Chapter 9 Connectivity Management 9.1 Connectivity Status • Connection The connection type of the target port is displayed. - Fabric A connection type that enables simultaneous communication among multiple nodes through a Fibre Channel switch. This connection type can also be used for a direct connection when "Transfer Rate" is "16 Gbit/s". - FC-AL A connection type that connects multiple nodes in a loop. • Loop ID If the connection type of the target port is "FC-AL", the Loop ID is displayed.
Chapter 9 Connectivity Management 9.1 Connectivity Status • REC Transfer Mode Whether the REC synchronous transfer mode, the REC asynchronous stack mode, the REC asynchronous consistency mode, or the REC asynchronous through mode is enabled or disabled for the target port is displayed. A "-" (hyphen) is displayed when the port mode is "CA" or "Initiator". - Sync When the REC synchronous transfer mode is enabled, the target port can be used as an REC synchronous transfer mode path.
Chapter 9 Connectivity Management 9.1 Connectivity Status • Status The status of the target port is displayed. • Port Mode The mode of the target port is displayed. - CA - RA - CA/RA • Transfer Rate The transfer speed of the target port is displayed. All transfers are full-duplex. - Auto-negotiation - 1Gbit/s - 10Gbit/s - 100Mbit/s • Reset Scope The reset scope of the target port is displayed.
Chapter 9 Connectivity Management 9.1 Connectivity Status • REC Line No. The REC line number of the target port is displayed. The REC line number is used to switch the communication path when a line fails. A "-" (hyphen) is displayed when the port mode is "CA". • REC Transfer Mode Whether the REC synchronous transfer mode, the REC asynchronous stack mode, the REC asynchronous consistency mode, or the REC asynchronous through mode is enabled or disabled for the target port is displayed.
Chapter 9 Connectivity Management 9.1 Connectivity Status • Transfer Rate The transfer speed of the target port is displayed. - Auto-negotiation - 1.5 Gbit/s - 3 Gbit/s - 6 Gbit/s • Reset Scope The reset scope of the target port is displayed. Reset scope is the range where the command reset from the server is performed, when the target port is connected to multiple servers. - I_T_L (I: Initiator, T: Target, L: LUN) Reset (cancel) the command request from the server that sent the command reset request.
Chapter 9 Connectivity Management 9.1 Connectivity Status • Transfer Rate The transfer speed (fixed at "10 Gbit/s") of the target port is displayed. • FC Frame Size The frame size of the target port is displayed. "FC Frame Size" specifies the length of the communication information. - 512 bytes - 1024 bytes - 2048 bytes • VLAN ID The VLAN ID of the target port is displayed. • Fabric Name The fabric name of the target port is displayed. • Reset Scope The reset scope of the target port is displayed.
Chapter 9 Connectivity Management 9.1 Connectivity Status The following items are displayed in the Main area: • Name The LUN group name is displayed. By clicking this item, the [LUN Group Detail] screen is displayed. Refer to "9.1.11 LUN Group Detail" (page 405) for display items. • Status Whether the LUN group is used ("Active") or not ("Inactive") for the host affinity settings is displayed.
Chapter 9 Connectivity Management 9.1 Connectivity Status 9.1.6 Host Response The registered host responses are displayed. The host response configures the appropriate operation mode on which the host makes connection. The usual host connection uses a recommended pattern or the default setting which have been arranged in advance in accordance with each OS type. When customizing the host response in accordance with the OS type or the operating environment, refer to "9.2.5.1 Add Host Response" (page 581).
Chapter 9 Connectivity Management 9.1 Connectivity Status • Status Whether the host response is used ("Active") or not ("Inactive") for the host affinity settings is displayed. - Active The host response is used for the host affinity settings. - Inactive The host response is not used for the host affinity settings. 9.1.7 CA Reset Group A list of the registered CA reset groups is displayed. A "CA reset group" is a group of ports which are released simultaneously under the instruction of a server.
Chapter 9 Connectivity Management 9.1 Connectivity Status • The operation status of Host-LU QoS can be confirmed with the displayed action name. - If [Enable Host-LU QoS] is displayed, the Host-LU QoS has been disabled. Host-LU QoS is not running. - If [Disable Host-LU QoS] is displayed, the Host-LU QoS has been enabled. Host-LU QoS is running. • Host-LU QoS starts its operation by configuring the bandwidth limit on a "Host", "CA Port", or "LUN Group", and enabling the Host-LU QoS.
Chapter 9 Connectivity Management 9.1 Connectivity Status • CA Port : Bandwidth Limit - CA Port The location information of the CA port with the host affinity setting is displayed. - Bandwidth Limit The maximum performance is displayed in IOPS (throughput value). If the bandwidth limit has not been configured (the bandwidth has not been limited), "Unlimited" is displayed. • CA Port Group If a CA port belongs to a CA port group, the CA port group name is displayed.
Chapter 9 Connectivity Management 9.1 Connectivity Status 9.1.8.2 FC/FCoE Host QoS The bandwidth limit of the FC/FCoE hosts that are registered in the ETERNUS DX Disk storage system is displayed. This function displays all the hosts that are registered in the ETERNUS DX Disk storage system regardless of whether the hosts belong to host groups or not. The following items are displayed in the Main area: • Name The FC/FCoE host name is displayed. • WWN The FC/FCoE host WWN is displayed.
Chapter 9 Connectivity Management 9.1 Connectivity Status 9.1.8.3 iSCSI Host QoS The bandwidth limit of the iSCSI hosts that are registered in the ETERNUS DX Disk storage system is displayed. This function displays all the hosts that are registered in the ETERNUS DX Disk storage system regardless of whether the hosts belong to host groups or not. The following items are displayed in the Main area: • Name The iSCSI host name is displayed. • IP Version The IP version of the iSCSI host is displayed.
Chapter 9 Connectivity Management 9.1 Connectivity Status 9.1.8.4 SAS Host QoS The bandwidth limit of the SAS hosts that are registered in the ETERNUS DX Disk storage system is displayed. This function displays all the hosts that are registered in the ETERNUS DX Disk storage system regardless of whether the hosts belong to host groups or not. The following items are displayed in the Main area: • Name The SAS host name is displayed. • SAS address The SAS address of the SAS host is displayed.
Chapter 9 Connectivity Management 9.1 Connectivity Status 9.1.8.5 Port QoS (Basic) Follow the message in the Information area to configure a bandwidth limit on each port. 9.1.8.6 FC Port QoS This function displays the bandwidth limit and the performance information of the FC ports that are registered in the ETERNUS DX Disk storage system.
Chapter 9 Connectivity Management 9.1 Connectivity Status The following items are displayed in the Main area: • Port The location information of the target port is displayed. • Type The type of the target port is displayed. - 8G FC An 8Gbit/s (maximum) FC. - 16G FC A 16Gbit/s (maximum) FC. • Bandwidth Limit The maximum performance of the target port is displayed in IOPS (throughput value). If the bandwidth limit has not been configured (the bandwidth has not been limited), "Unlimited" is displayed.
Chapter 9 Connectivity Management 9.1 Connectivity Status If performance monitoring is restarted during an active performance monitoring session, the performance information that is already obtained is deleted and the collection of performance information starts again. • IOPS The performance information from when performance monitoring is started until performance monitoring is ended (or performance information is displayed) is displayed. - Ave The average I/O count per second is displayed.
Chapter 9 Connectivity Management 9.1 Connectivity Status The following items are displayed in the Main area: • Port The location information of the target port is displayed. • Type The type of the target port is displayed. - 1G iSCSI 1Gbit/s iSCSI. - 10G iSCSI 10Gbit/s iSCSI. • Bandwidth Limit The maximum performance of the target port is displayed in IOPS (throughput value). If the bandwidth limit has not been configured (the bandwidth has not been limited), "Unlimited" is displayed.
Chapter 9 Connectivity Management 9.1 Connectivity Status 9.1.8.8 SAS Port QoS This function displays the bandwidth limit and the performance information of the SAS ports that are registered in the ETERNUS DX Disk storage system. • The ports that are registered by the ETERNUS DX Disk storage system are displayed regardless of whether the ports belong to CA port groups or not.
Chapter 9 Connectivity Management 9.1 Connectivity Status 9.1.8.9 FCoE Port QoS This function displays the bandwidth limit and the performance information of the FCoE ports that are registered in the ETERNUS DX Disk storage system. • The ports that are registered by the ETERNUS DX Disk storage system are displayed regardless of whether the ports belong to CA port groups or not.
Chapter 9 Connectivity Management 9.1 Connectivity Status 9.1.8.10 LU QoS Group A list of the registered LU QoS groups is displayed. An LU QoS group is a group of the bandwidth limit (the maximum performance) configured for each Host LUN. By assigning an LU QoS group to a LUN group with the host affinity setting, the bandwidth limit can be configured for each LUN. Refer to "9.2.7.2 Set Host-LU QoS" (page 599) for details. The following items are displayed in the Main area: • LU QoS Group No.
Chapter 9 Connectivity Management 9.1 Connectivity Status 9.1.9 Host Affinity Detail The details of the host affinity are displayed. The following items are displayed in the Main area: ● Host Group - CA Port Group - LUN Group Setting • Host Group The selected host group name or "All" is displayed. • CA Port Group The CA port group that is allocated to the selected host group is displayed. • LUN Group The LUN group that is allocated to the selected host group is displayed.
Chapter 9 Connectivity Management 9.1 Connectivity Status 9.1.10 Host Group Detail The details of the host group are displayed. The following items are displayed in the Main area: ● Host Group Information • Name The host group name is displayed. • Host Response The host response name, which has been assigned to a host group, is displayed. • Status Whether the host group is "Active" or "Inactive" in the host affinity setting is displayed.
Chapter 9 Connectivity Management 9.1 Connectivity Status 9.1.11 LUN Group Detail The detailed information of a LUN group is displayed. The following items are displayed in the Main area: • Host LUN The host LUN is displayed. • Volume No. The volume number, which is allocated to the LUN, is displayed. • Name The volume name is displayed. • Type The volume type is displayed. - Standard - WSV - TPV - FTV - SDV • Capacity The volume capacity is displayed.
Chapter 9 Connectivity Management 9.1 Connectivity Status 9.1.12 LUN Group : LU QoS Group Detail The bandwidth limit for each LUN is displayed. The following items are displayed in the Main area: • LUN Group The LUN group name is displayed. If the CLI command ("set mapping") is used for LUN mapping, a "-" (hyphen) is displayed. • LU QoS Group No. The LU QoS group number is displayed. If a LU QoS group number is not configured, a "-" (hyphen) is displayed.
Chapter 9 Connectivity Management 9.1 Connectivity Status 9.1.13 Host-LU QoS Performance Information When a host affinity setting with a specific host group is already configured, the total performance information for the host and the performance information of each LUN are displayed. If a host affinity setting with all of the host groups is configured ("All" is specified as the target host group), the performance information of each host LUN is displayed.
Chapter 9 Connectivity Management 9.1 Connectivity Status • iSCSI Name The iSCSI name for the selected host is displayed. This item is displayed when the host affinity setting is configured and the selected host is "iSCSI". • IP Version The IP version of the iSCSI host is displayed. This item is displayed when the host affinity setting is configured and the selected host is "iSCSI". - IPv4 - IPv6 • IP Address The IP address of the selected iSCSI host is displayed.
Chapter 9 Connectivity Management 9.1 Connectivity Status ● Performance information • Login IP Address IP address that is logged in is displayed. The performance information is displayed for each specified IP address. Note that the IPv6 address is displayed as an abbreviation. If there is no IP address, a "-" (hyphen) is displayed. This item is displayed for the iSCSI host when the host affinity setting is configured, the iSCSI name is specified, and the IP address is not specified.
Chapter 9 Connectivity Management 9.1 Connectivity Status If performance monitoring is restarted during an active performance monitoring session, the performance information that is already obtained is deleted and the collection of performance information starts again. ● Host Total Performance When the host affinity setting is configured by a port and a specific host group, the total performance information for the specific host that is connected to the port is displayed.
Chapter 9 Connectivity Management 9.1 Connectivity Status ● Host LUN Performance The performance information of each LUN is displayed for the specific host (when "All" is specified for the host, all of the hosts) that is connected to the port. • Host LUN The host LUN is displayed. - 0 - 1023 • Volume Name The volume name is displayed. • IOPS The performance information from when performance monitoring is started until performance monitoring is ended (or performance information is displayed) is displayed.
Chapter 9 Connectivity Management 9.2 Functions in the Action Area for Connectivity 9.2 Functions in the Action Area for Connectivity When using functions in the Action area, select the desired function from the Action area that is displayed in the status display screen.
Chapter 9 Connectivity Management 9.
Chapter 9 Connectivity Management 9.2 Functions in the Action Area for Connectivity 9.2.1 Host Affinity Management Host Affinity management provides the following functions: • Create Host Affinity • Delete Host Affinity • Modify Host Affinity 9.2.1.1 Create Host Affinity This function creates a new host affinity. When "Host Group - CA Port Group" is selected for "Target Connection", specify the existing "Host Group", "CA Port Group", and "LUN Group" settings.
Chapter 9 Connectivity Management 9.2 Functions in the Action Area for Connectivity ■ When "Host Group - CA Port Group" is selected for "Target Connection" The procedure to create a host affinity is as follows: Procedure 1 Click [Create Host Affinity] in [Action]. 2 Click the [Browse...] button for the host group. → The [Select Host Group] screen appears. 3 Select the connection target. ■ When "Host Group" is selected (1) Select a host group to configure a host affinity, and click the [OK] button.
Chapter 9 Connectivity Management 9.2 Functions in the Action Area for Connectivity ■ When "All" is selected (1) Select a host response, and click the [OK] button. → The display returns to the initial screen. The following modifications are applied for the host response settings with firmware version V10L15 or later. • "Others" is changed to "Default". • "Windows EMPD", "Linux EMPD", and "Solaris EMPD" are deleted from the "Host Response" value.
Chapter 9 Connectivity Management 9.2 Functions in the Action Area for Connectivity 4 Click the [Browse...] button for the CA port group. → The [Select CA Port Group] screen appears. 5 Select a CA port group to configure a host affinity, and click the [OK] button. → The display returns to the initial screen. • If a specific host group has been selected in the "Host Group" field, CA port groups for which the affinity mode is "OFF" are not displayed.
Chapter 9 Connectivity Management 9.2 Functions in the Action Area for Connectivity 6 Click the [Browse...] button for the LUN group. → The [Select LUN Group] screen appears. 7 Select a LUN group to configure a host affinity, and click the [OK] button. → The display returns to the initial screen.
Chapter 9 Connectivity Management 9.2 Functions in the Action Area for Connectivity The LUN range that can be recognized from a host depends on the "Host Specific Mode" setting of the host response that is applied to the selected "Host Group" (specific host group) or "All" (all of the hosts). A host does not recognize any LUNs that are not included within the following ranges. The following table shows the LUN range that can be recognized from a host for each "Host Specific Mode".
Chapter 9 Connectivity Management 9.2 Functions in the Action Area for Connectivity 9 Select whether to enable or disable the path between a host and a CA port, and click the [OK] button. • Checkbox to select paths To enable the path between a host and a CA port, select the checkbox of the CA port. To disable the path between a host and a CA port, clear the checkbox of the CA port. 10 Confirm the host affinity setting and the path between the host and the CA port, click the [Create] button.
Chapter 9 Connectivity Management 9.2 Functions in the Action Area for Connectivity An error screen appears in the following conditions: • When the host interface type of the host group and the CA type of the CA port group do not match Note that the CA types of "FCoE" and "FC" are regarded as the same CA type.
Chapter 9 Connectivity Management 9.2 Functions in the Action Area for Connectivity 2 Click the [Browse...] button for the host. → The [Select Host] screen appears. 3 Select the connection target. ■ When "Host" is selected (1) Select a host to configure a host affinity, and click the [OK] button. → The display returns to the initial screen.
Chapter 9 Connectivity Management 9.2 Functions in the Action Area for Connectivity ■ When "All" is selected (1) Select a host response, and click the [OK] button. → The display returns to the initial screen. The following modifications are applied for the host response settings with firmware version V10L15 or later. • "Others" is changed to "Default". • "Windows EMPD", "Linux EMPD", and "Solaris EMPD" are deleted from the "Host Response" value.
Chapter 9 Connectivity Management 9.2 Functions in the Action Area for Connectivity 4 Click the [Browse...] button for the CA port. → The [Select CA Port] screen appears. 5 Select a CA port to configure a host affinity, and click the [OK] button. → The display returns to the initial screen. • If a specific host has been selected in the "Host" field, CA ports for which the affinity mode is "OFF" are not displayed.
Chapter 9 Connectivity Management 9.2 Functions in the Action Area for Connectivity 6 Click the [Browse...] button for the LUN group. → The [Select LUN Group] screen appears. 7 Select a LUN group to configure a host affinity, and click the [OK] button. → The display returns to the initial screen.
Chapter 9 Connectivity Management 9.2 Functions in the Action Area for Connectivity The LUN range that can be recognized from a host depends on the "Host Specific Mode" setting of the host response that is applied to the selected "Host" (specific host) or "All" (all of the hosts). A host does not recognize any LUNs that are not included within the following ranges. The following table shows the LUN range that can be recognized from a host for each "Host Specific Mode".
Chapter 9 Connectivity Management 9.2 Functions in the Action Area for Connectivity 9 Click the [OK] button. → The host affinity creation starts. 10 Click the [Done] button to return to the [Connectivity] screen. End of procedure 9.2.1.2 Delete Host Affinity This function deletes the registered host affinity in the ETERNUS DX Disk storage system.
Chapter 9 Connectivity Management 9.2 Functions in the Action Area for Connectivity 3 Click the [Done] button to return to the [Connectivity] screen. End of procedure 9.2.1.3 Modify Host Affinity This function is used to perform the following modifications to the existing host affinity.
Chapter 9 Connectivity Management 9.2 Functions in the Action Area for Connectivity ■ When selecting a host affinity for "Host Group - CA Port Group" The procedure to modify a host affinity is as follows: Procedure 1 Select the host affinity to be modified, and click [Modify Host Affinity] in [Action]. 2 Check the display contents of the host group. The next step that needs to be performed depends on the display contents of the host group.
Chapter 9 Connectivity Management 9.2 Functions in the Action Area for Connectivity 3 Select the host response that is to be assigned to all of the hosts and click the [OK] button. → The display returns to the initial screen. 4 Click the [Browse...] button for the CA port group. → The [Select CA Port Group] screen appears.
Chapter 9 Connectivity Management 9.2 Functions in the Action Area for Connectivity 5 Select a CA port group to configure a host affinity, and click the [OK] button. → The display returns to the initial screen.
Chapter 9 Connectivity Management 9.2 Functions in the Action Area for Connectivity 7 Select a LUN group to configure a host affinity, and click the [OK] button. → The display returns to the initial screen. • The LUN range that can be recognized from a host is determined by which of the following settings is used. A host does not recognize any LUNs that are not included within the following ranges.
Chapter 9 Connectivity Management 9.2 Functions in the Action Area for Connectivity 8 To edit the path between a host and a CA port, click the [Edit] button for the path to be edited. → The [Select CA Port] screen appears. 9 Select whether to enable or disable the path between a host and a CA port, and click the [OK] button. • Checkbox to select paths To enable the path between a host and a CA port, select the checkbox of the CA port.
Chapter 9 Connectivity Management 9.2 Functions in the Action Area for Connectivity 10 Confirm the modified host affinity setting and the path between the host and the CA port, click the [Modify] button. → A confirmation screen appears. An error screen appears in the following conditions: • When the host interface type of the host group and the CA type of the CA port group do not match Note that the CA types of "FCoE" and "FC" are regarded as the same CA type.
Chapter 9 Connectivity Management 9.2 Functions in the Action Area for Connectivity ■ When selecting a host affinity for "Host - CA Port" The procedure to modify a host affinity is as follows: Procedure 1 Select the host affinity to be modified, and click [Modify Host Affinity] in [Action]. 2 Check the display contents of the host. The next step that needs to be performed depends on the display contents of the host. ■ When the selected host is "All (host response name)" (1) Click the [Browse...
Chapter 9 Connectivity Management 9.2 Functions in the Action Area for Connectivity 3 Select the host response that is to be assigned to all of the hosts and click the [OK] button. → The display returns to the initial screen. 4 Click the [Browse...] button for the CA port. → The [Select CA Port] screen appears.
Chapter 9 Connectivity Management 9.2 Functions in the Action Area for Connectivity 5 Select a CA port to configure a host affinity, and click the [OK] button. → The display returns to the initial screen.
Chapter 9 Connectivity Management 9.2 Functions in the Action Area for Connectivity 7 Select a LUN group to configure a host affinity, and click the [OK] button. → The display returns to the initial screen. • The LUN range that can be recognized from a host is determined by which of the following settings is used. A host does not recognize any LUNs that are not included within the following ranges.
Chapter 9 Connectivity Management 9.2 Functions in the Action Area for Connectivity 8 After confirming the host affinity settings, click the [Modify] button. → A confirmation screen appears. An error screen appears in the following conditions: • When the host interface type of the host and the CA type of the CA port do not match Note that the CA types of "FCoE" and "FC" are regarded as the same CA type.
Chapter 9 Connectivity Management 9.2 Functions in the Action Area for Connectivity 9.2.2 Host Group Management Host group management provides the following functions: • • • • • • • • • • • • • • • • • 9.2.2.
Chapter 9 Connectivity Management 9.2 Functions in the Action Area for Connectivity • Registration of the host is necessary to create a host group. Create a new host group when registering a host with GUI by using this function. • A host can be a member of several host groups. However, only one LUN group can be allocated to host and port combinations when configuring host affinity. • To assign an appropriate host response to a created host group, refer to "User's Guide -Server Connection" for each OS type.
Chapter 9 Connectivity Management 9.2 Functions in the Action Area for Connectivity 2 Input a host group name to be created, and select a host response to be assigned to the host group. • Host Group Name Specify the host group name. An existing host group name cannot be specified. Refer to "Naming conventions for adding hosts" (page 994) for details.
Chapter 9 Connectivity Management 9.2 Functions in the Action Area for Connectivity 3 Register a host in a host group in the following procedures. ■ When registering a host by selecting from the host list (1) Click the [Now Connected] tab. (2) Select a host that is to be registered from the FC host list, and click the [Add] button. - Checkbox to select a host Select the FC host checkbox to be registered in a host group. → A confirmation screen appears.
Chapter 9 Connectivity Management 9.2 Functions in the Action Area for Connectivity • If the WWN is not displayed when clicking the [Rediscover] button, make sure that there is no error in the connection environment, such as the connection between the host and the switch, and the CA port settings of the ETERNUS DX Disk storage system. If there is no error in the connection environment, contact the Support Department, or specify the WWN manually.
Chapter 9 Connectivity Management 9.2 Functions in the Action Area for Connectivity (3) Manually specify the WWN of the host that is to be registered, and click the [OK] button. - WWN Input the WWN for the FC host. The following input conditions apply: • 16 hexadecimal numbers • "F (f)" or "0" used in entire 16 characters are not allowed. → Returns to the [Manual Input] screen.
Chapter 9 Connectivity Management 9.
Chapter 9 Connectivity Management 9.
Chapter 9 Connectivity Management 9.2 Functions in the Action Area for Connectivity The following table shows the host response after new hosts are added. Host group (Host response) Host_G1 (HR_1) Host_G2 (HR_1) Host_G3 (HR_1) 9.2.2.2 Member host Host response that is allocated to the host Host-1 HR_1 Host-2 HR_1 Host-2 HR_1 Host-3 HR_1 Host-3 HR_1 Host-4 HR_1 Add iSCSI Host Group This function creates a new iSCSI host group and registers which hosts are members of this group.
Chapter 9 Connectivity Management 9.2 Functions in the Action Area for Connectivity • Unlike GUI, CLI can register two iSCSI hosts that have the same iSCSI name by setting an IP address for one of these iSCSI hosts and by not setting an IP address for the other iSCSI host. However, if iSCSI hosts are registered in the ETERNUS DX Disk storage system in this way, iSCSI hosts cannot be added using GUI. Avoid this configuration when using GUI and CLI together.
Chapter 9 Connectivity Management 9.2 Functions in the Action Area for Connectivity The following modifications are applied for the host response settings with firmware version V10L15 or later. • "Others" is changed to "Default". • "Windows EMPD", "Linux EMPD", and "Solaris EMPD" are deleted from the "Host Response" value. • The setting parameters for "Windows EMPD", "Linux EMPD", and "Solaris EMPD" are the same as "Default".
Chapter 9 Connectivity Management 9.2 Functions in the Action Area for Connectivity (2) Select a host to be registered from the iSCSI host list, register the iSCSI host information (the IP address and the Alias name, etc.) to the selected host, and click the [Add] button. - Checkbox to select a host Select the iSCSI host checkbox to be registered in a host group. • If the iSNS server has not been configured in "9.2.3.
Chapter 9 Connectivity Management 9.2 Functions in the Action Area for Connectivity - Alias Name Specify the Alias name of the iSCSI host. If the iSCSI host has already been registered in the ETERNUS DX Disk storage system, the Alias name is displayed. It is not necessary to specify this item if Alias name is not used. An existing Alias name cannot be specified.
Chapter 9 Connectivity Management 9.2 Functions in the Action Area for Connectivity Filter setting Filter Description iSCSI Name Input the iSCSI name that is to be displayed. iSCSI hosts matching or partially matching the input iSCSI name are displayed. When not using the iSCSI name for filtering, leave this item blank. Host Group Input the host group name that is to be displayed. iSCSI hosts which belong to any host groups that match or partially match the entered name are displayed.
Chapter 9 Connectivity Management 9.2 Functions in the Action Area for Connectivity ■ When registering a host by manually specifying the host (1) Click the [Manual Input] tab. (2) Click the [Add] button. → The [Add iSCSI Host] screen appears. (3) Specify the iSCSI host information of the host to be registered, and click the [OK] button. - iSCSI Name Specify an iSCSI name of the iSCSI host (required).
Chapter 9 Connectivity Management 9.
Chapter 9 Connectivity Management 9.2 Functions in the Action Area for Connectivity • When no hosts are registered in a host group, or when nine or more hosts are registered in a host group (for ETERNUS DX8700 S2, 65 or more hosts are registered in a host group) • When the total number of host groups has exceeded the maximum number for the ETERNUS DX Disk storage system • When the total number of hosts has exceeded the maximum number for the ETERNUS DX Disk storage system 4 Click the [OK] button.
Chapter 9 Connectivity Management 9.2 Functions in the Action Area for Connectivity • Registration of the host is necessary to create a host group. Create a new host group when registering a host with GUI by using this function. • A host can be a member of several host groups. However, only one LUN group can be allocated to host and port combinations when configuring host affinity. • To assign an appropriate host response to a created host group, refer to "User's Guide -Server Connection" for each OS type.
Chapter 9 Connectivity Management 9.2 Functions in the Action Area for Connectivity • Host Response Select a host response to be assigned to a host group. The host response list created in the ETERNUS DX Disk storage system is displayed.
Chapter 9 Connectivity Management 9.2 Functions in the Action Area for Connectivity ■ When registering a host by selecting from the host list (1) Click the [Now Connected] tab. (2) Select a host to be registered from the SAS host list, and click the [Add] button. - Checkbox to select a host Select the SAS host checkbox to be registered in a host group. → A confirmation screen appears. Filter setting Filter Description SAS Address Input the SAS address to be displayed.
Chapter 9 Connectivity Management 9.2 Functions in the Action Area for Connectivity ■ When registering a host by manually specifying the host (1) Click the [Manual Input] tab. (2) Click the [Add] button. → The [Add SAS Host] screen appears. (3) Manually specify the SAS address of the host to be registered, and click the [OK] button. - SAS Address Specify the SAS address of the SAS host.
Chapter 9 Connectivity Management 9.2 Functions in the Action Area for Connectivity An error screen appears in the following conditions: • When the "SAS Address" is not input • When the "SAS Address" does not satisfy the input conditions (4) Repeat Step (2) and Step (3) to set more SAS addresses. (5) After adding the SAS host is complete, click the [Add] button. → A confirmation screen appears.
Chapter 9 Connectivity Management 9.2 Functions in the Action Area for Connectivity 4 Click the [OK] button. → Registration of the SAS host group starts. 5 Click the [Done] button to return to the [Host Group] screen. Click the [Continue] button to continue adding SAS hosts. End of procedure 9.2.2.4 Delete Host Group This function deletes a host group. When a host group is deleted, the hosts, which belong to the host group, are also deleted.
Chapter 9 Connectivity Management 9.2 Functions in the Action Area for Connectivity 2 Click the [OK] button. → Deletion of the host group starts. 3 Click the [Done] button to return to the [Host Group] screen. End of procedure 9.2.2.5 Modify Host Group This function performs the following modifications to the existing host group.
Chapter 9 Connectivity Management 9.2 Functions in the Action Area for Connectivity The number of hosts that can be registered Model ETERNUS DX80 S2 Number of hosts (HBAs) (*1) per storage system Number of hosts (HBAs) per CA port Number of hosts (HBAs) per host group 1024 256 8 ETERNUS DX90 S2 ETERNUS DX410 S2 ETERNUS DX440 S2 ETERNUS DX8100 S2 ETERNUS DX8700 S2 *1: 8192 64 The total number of hosts irrespective of the interface types.
Chapter 9 Connectivity Management 9.2 Functions in the Action Area for Connectivity The procedure to edit an FC host group is as follows: Procedure 1 Select the FC host group to be changed, and click [Modify Host Group] in [Action]. 2 Input a new host group name, or re-select a host response to be assigned to the host group. ● Host Group Setting • Host Group Name Specify the host group name. An existing host group name cannot be specified.
Chapter 9 Connectivity Management 9.2 Functions in the Action Area for Connectivity • If the host response is changed for a host group that is configured with the host affinity setting, the LUNs may not be able to be accessed from the host. Make sure to check the current LUN settings and select a host response with an appropriate "Host Specific Mode" to change the host response.
Chapter 9 Connectivity Management 9.2 Functions in the Action Area for Connectivity 3 Add or delete a host in a host group in the following procedures. ■ When adding or deleting a host by selecting from the host list (1) Click the [Registered And Now Connected] tab. (2) Add or delete hosts, and click the [Modify] button. - Checkbox to select a host Select the corresponding host checkbox in the FC host list, to add a host. Clear the corresponding host checkbox in the FC host list, to delete a host.
Chapter 9 Connectivity Management 9.2 Functions in the Action Area for Connectivity • If the WWN is not displayed when clicking the [Rediscover] button, make sure that there is no error in the connection environment, such as the connection between the host and the switch, and the CA port settings of the ETERNUS DX Disk storage system. If there is no error in the connection environment, contact the Support Department, or specify the WWN manually.
Chapter 9 Connectivity Management 9.2 Functions in the Action Area for Connectivity (3) Manually specify the WWN of the host to be added, and click the [OK] button. - WWN Input the WWN for the FC host. The following input conditions apply: • Hexadecimal numbers (0 - 9, A - F, a - f) • 16 characters • "F (f)" or "0" used in entire 16 characters are not allowed. → Returns to the [Manual Input] screen.
Chapter 9 Connectivity Management 9.2 Functions in the Action Area for Connectivity An error screen appears in the following conditions: • When the "Host Group Name" is not entered • When the "Host Group Name" does not satisfy the input conditions • When the "Host Group Name" overlaps with an existing host group name (Host group names cannot overlap with any other host group names, irrespective of the interface types.
Chapter 9 Connectivity Management 9.2 Functions in the Action Area for Connectivity The number of hosts that can be registered Model ETERNUS DX80 S2 Number of hosts (HBAs) (*1) per storage system Number of hosts (HBAs) per CA port Number of hosts (HBAs) per host group 1024 256 8 ETERNUS DX90 S2 ETERNUS DX410 S2 ETERNUS DX440 S2 ETERNUS DX8100 S2 ETERNUS DX8700 S2 *1: 8192 64 The total number of hosts irrespective of the interface types.
Chapter 9 Connectivity Management 9.2 Functions in the Action Area for Connectivity The procedure to edit an iSCSI host group is as follows: Procedure 1 Select the iSCSI host group to be changed, and click [Modify Host Group] in [Action]. 2 Input a new host group name, or re-select a host response to be assigned to the host group. ● Host Group Setting • Host Group Name Specify the host group name. An existing host group name cannot be specified.
Chapter 9 Connectivity Management 9.2 Functions in the Action Area for Connectivity • If the host response is changed for a host group that is configured with the host affinity setting, the LUNs may not be able to be accessed from the host. Make sure to check the current LUN settings and select a host response with an appropriate "Host Specific Mode" to change the host response.
Chapter 9 Connectivity Management 9.2 Functions in the Action Area for Connectivity 3 Add or delete a host in a host group in the following procedures. ■ When adding or deleting a host by selecting from the host list (1) Click the [Registered And Now Connected] tab.
Chapter 9 Connectivity Management 9.2 Functions in the Action Area for Connectivity - IP Version Select the IP version of the iSCSI host from "IPv4" and "IPv6".
Chapter 9 Connectivity Management 9.2 Functions in the Action Area for Connectivity - Change CHAP Password To register or change the CHAP Authentication password, select the checkbox. - CHAP Password The password for the member host, on which CHAP Authentication will be used, is displayed with "*". To use CHAP Authentication on the iSCSI host to be added, enter the password. It is not necessary to specify this item if CHAP Authentication is not used.
Chapter 9 Connectivity Management 9.2 Functions in the Action Area for Connectivity An error screen appears in the following conditions: • When the "Host Group Name" is not entered • When the "Host Group Name" does not satisfy the input conditions • When the "Host Group Name" overlaps with an existing host group name (Host group names cannot overlap with any other host group names, irrespective of the interface types.
Chapter 9 Connectivity Management 9.2 Functions in the Action Area for Connectivity (3) Manually specify the iSCSI host information of the host to be added, and click the [OK] button. - iSCSI Name Specify an iSCSI name of the iSCSI host (required). The following input conditions apply: • Alphabetic characters (lower case) and numeric characters • Symbols "-" (hyphen), "." (period), and ":" (colon) • The name starts with "iqn." or "eui." • 4 - 223 characters → Returns to the [Manual Input] screen.
Chapter 9 Connectivity Management 9.2 Functions in the Action Area for Connectivity (5) After adding or deleting iSCSI hosts is complete, click the [Modify] button. → A confirmation screen appears.
Chapter 9 Connectivity Management 9.2 Functions in the Action Area for Connectivity 5 Click the [Done] button to return to the [Host Group] screen. End of procedure 9.2.2.8 Modify Host Group (SAS) This function performs the following modifications to the existing SAS host group.
Chapter 9 Connectivity Management 9.2 Functions in the Action Area for Connectivity • When a host was added to a host group, of which the host affinity setting has been configured, paths between all the ports with the host affinity setting and the added host will be configured. To modify the path between a host and a port, refer to "9.2.1.3 Modify Host Affinity" (page 428).
Chapter 9 Connectivity Management 9.2 Functions in the Action Area for Connectivity • If the host response is changed for a host group that is configured with the host affinity setting, the LUNs may not be able to be accessed from the host. Make sure to check the current LUN settings and select a host response with an appropriate "Host Specific Mode" to change the host response.
Chapter 9 Connectivity Management 9.2 Functions in the Action Area for Connectivity 3 Add or delete a host in a host group in the following procedures. ■ When adding or deleting a host by selecting from the host list (1) Click the [Registered And Now Connected] tab. (2) Add or delete hosts, and click the [Modify] button. - Checkbox to select a host Select the corresponding host checkbox in the SAS host list, to add a host. Clear the corresponding host checkbox in the SAS host list, to delete a host.
Chapter 9 Connectivity Management 9.2 Functions in the Action Area for Connectivity An error screen appears in the following conditions: • When the "Host Group Name" is not entered • When the "Host Group Name" does not satisfy the input conditions • When the "Host Group Name" overlaps with an existing host group name (Host group names cannot overlap with any other host group names, irrespective of the interface types.
Chapter 9 Connectivity Management 9.2 Functions in the Action Area for Connectivity (3) Manually specify the SAS address of the host to be added, and click the [OK] button. - SAS Address Specify the SAS address of the SAS host. The following input conditions apply: • 16 hexadecimal numbers • "F (f)" or "0" used in entire 16 characters are not allowed. → Returns to the [Manual Input] screen.
Chapter 9 Connectivity Management 9.2 Functions in the Action Area for Connectivity An error screen appears in the following conditions: • When the "Host Group Name" is not entered • When the "Host Group Name" does not satisfy the input conditions • When the "Host Group Name" overlaps with an existing host group name (Host group names cannot overlap with any other host group names, irrespective of the interface types.
Chapter 9 Connectivity Management 9.2 Functions in the Action Area for Connectivity 9.2.2.9 Add FC/FCoE Host This function registers a new FC/FCoE host (HBA). The total number of all the interface type hosts that can be registered in the ETERNUS DX Disk storage system is 1024 (8192 for the ETERNUS DX8700 S2). • This action item is only displayed when the "Use "Add Host"" checkbox is selected for the "Function to Add Host" field in "Web GUI Settings". This item is not selected (not displayed) by default.
Chapter 9 Connectivity Management 9.2 Functions in the Action Area for Connectivity (2) Select the host that is to be registered from the FC host list, input the FC host information, and click the [Add] button. - Checkbox to select a host Select the checkbox of the FC host that is to be registered in the ETERNUS DX Disk storage system. The host name and host response can only be specified for the selected FC host. - Name Input the name for the FC host.
Chapter 9 Connectivity Management 9.2 Functions in the Action Area for Connectivity • If the WWN is not displayed when clicking the [Rediscover] button, make sure that there is no error in the connection environment, such as the connection between the host and the switch, and the CA port settings of the ETERNUS DX Disk storage system. If there is no error in the connection environment, contact the Support Department, or specify the WWN manually.
Chapter 9 Connectivity Management 9.2 Functions in the Action Area for Connectivity - Host Response Select a host response to be assigned to an FC host. The host response list created in the ETERNUS DX Disk storage system is displayed. • Solaris MPxIO • HP-UX • AIX EMPD (*1) • AIX VxVM • AIX Single Path • VS850/SVC • Host responses created in the ETERNUS DX Disk storage system • Default *1: EMPD: ETERNUS Multipath Driver → Returns to the [Manual Input] screen.
Chapter 9 Connectivity Management 9.2 Functions in the Action Area for Connectivity → A confirmation screen appears.
Chapter 9 Connectivity Management 9.2 Functions in the Action Area for Connectivity 9.2.2.10 Add iSCSI Host This function registers a new iSCSI host (HBA). The total number of all the interface type hosts that can be registered in the ETERNUS DX Disk storage system is 1024 (8192 for the ETERNUS DX8700 S2). • This action item is only displayed when the "Use "Add Host"" checkbox is selected for the "Function to Add Host" field in "Web GUI Settings". This item is not selected (not displayed) by default.
Chapter 9 Connectivity Management 9.2 Functions in the Action Area for Connectivity 2 Add a host in the ETERNUS DX Disk storage system in the following procedures. ■ When registering a host by selecting from the host list (1) Click the [Now Connected] tab. All of the unregistered hosts that are connected to the iSCSI-CAs or the iSCSI-CA/RAs and that can be recognized by the ETERNUS DX Disk storage system (*1) are displayed.
Chapter 9 Connectivity Management 9.2 Functions in the Action Area for Connectivity - Host Response Select a host response to be assigned to an iSCSI host. The host response list created in the ETERNUS DX Disk storage system is displayed. • Solaris MPxIO • HP-UX • AIX EMPD (*1) • AIX VxVM • AIX Single Path • VS850/SVC • Host responses created in the ETERNUS DX Disk storage system • Default *1: EMPD: ETERNUS Multipath Driver - IP Version Select the IP version of the iSCSI host from "IPv4" and "IPv6".
Chapter 9 Connectivity Management 9.2 Functions in the Action Area for Connectivity - CHAP User ID Specify the user ID for the CHAP Authentication. It is not necessary to specify this item if the CHAP Authentication is not used. Configure a user ID and a password as a pair. The following input conditions apply: • Up to 255 alphanumeric characters and symbols (except ", (comma)" and "?") • Space - CHAP Password Specify the password for the CHAP Authentication.
Chapter 9 Connectivity Management 9.
Chapter 9 Connectivity Management 9.2 Functions in the Action Area for Connectivity (3) Specify the host information of the iSCSI host that is to be registered, and click the [OK] button. - iSCSI Name Specify an iSCSI name of the iSCSI host (required). The following input conditions apply: • Alphabetic characters (lower case) and numeric characters • Symbols "-" (hyphen), "." (period), and ":" (colon) • The name starts with "iqn." or "eui.
Chapter 9 Connectivity Management 9.2 Functions in the Action Area for Connectivity (4) Repeat Step (2) and Step (3) when registering several iSCSI hosts. (5) After registering the iSCSI host is complete, click the [Add] button. → A confirmation screen appears.
Chapter 9 Connectivity Management 9.2 Functions in the Action Area for Connectivity 4 Click the [Done] button to return to the screen when starting this function in Step 1. Click the [Continue] button to continue registering iSCSI hosts. End of procedure 9.2.2.11 Add SAS Host This function registers a new SAS host (HBA). The total number of all the interface type hosts that can be registered in the ETERNUS DX Disk storage system is 1024.
Chapter 9 Connectivity Management 9.2 Functions in the Action Area for Connectivity 2 Add a host in the ETERNUS DX Disk storage system in the following procedures. ■ When registering a host by selecting from the host list (1) Click the [Now Connected] tab. (2) Select the host that is to be registered from the SAS host list, input the SAS host information, and click the [Add] button.
Chapter 9 Connectivity Management 9.
Chapter 9 Connectivity Management 9.2 Functions in the Action Area for Connectivity - Host Response Select a host response to be assigned to a SAS host. The host response list created in the ETERNUS DX Disk storage system is displayed. • Solaris MPxIO • HP-UX • AIX EMPD (*1) • AIX VxVM • AIX Single Path • VS850/SVC • Host responses created in the ETERNUS DX Disk storage system • Default *1: EMPD: ETERNUS Multipath Driver → Returns to the [Manual Input] screen.
Chapter 9 Connectivity Management 9.2 Functions in the Action Area for Connectivity (5) After registering the SAS host is complete, click the [Add] button. → A confirmation screen appears.
Chapter 9 Connectivity Management 9.2 Functions in the Action Area for Connectivity 9.2.2.12 Delete FC/FCoE Host This function deletes an FC/FCoE host. When an FC/FCoE host belongs to a host group, the FC/FCoE host can be deleted, irrespective of its host affinity settings. • Not all of the hosts can be deleted from a host group. • When an FC host does not belong to a host group, the FC host, of which host affinity settings have been configured, cannot de deleted.
Chapter 9 Connectivity Management 9.2 Functions in the Action Area for Connectivity 3 Click the [Done] button to return to the [FC/FCoE Host] screen. End of procedure 9.2.2.13 Delete iSCSI Host This function deletes an iSCSI host. When an iSCSI host belongs to a host group, the iSCSI host can be deleted, irrespective of its host affinity settings. • Not all of the hosts can be deleted from a host group.
Chapter 9 Connectivity Management 9.2 Functions in the Action Area for Connectivity 3 Click the [Done] button to return to the [iSCSI Host] screen. End of procedure 9.2.2.14 Delete SAS Host This function deletes a SAS host. When a SAS host belongs to a host group, the SAS host can be deleted, irrespective of its host affinity settings. • Not all of the hosts can be deleted from a host group.
Chapter 9 Connectivity Management 9.2 Functions in the Action Area for Connectivity 3 Click the [Done] button to return to the [SAS Host] screen. End of procedure 9.2.2.15 Modify FC/FCoE Host This function changes the FC/FCoE host information. • When no FC/FCoE hosts are registered, the [Modify FC/FCoE Host] function cannot be used. • When changing the WWN of an FC/FCoE host that is currently being used, make sure to stop access to that FC/FCoE host.
Chapter 9 Connectivity Management 9.2 Functions in the Action Area for Connectivity • Host Response Select a new host response that is to be assigned to the FC host. The host response list created in the ETERNUS DX Disk storage system is displayed. This item is available only when an FC host is not registered in the host group.
Chapter 9 Connectivity Management 9.
Chapter 9 Connectivity Management 9.2 Functions in the Action Area for Connectivity The procedure to change the iSCSI information is as follows: Procedure 1 Select the iSCSI host to changed the host information for, and click [Modify iSCSI Host] in [Action]. 2 Input new iSCSI host information and click the [Modify] button. • Name Input a new iSCSI host name. An existing host name cannot be specified.
Chapter 9 Connectivity Management 9.2 Functions in the Action Area for Connectivity If the host response is changed for an iSCSI host that is configured with the host affinity setting, the LUNs may not be able to be accessed from the iSCSI host. Make sure to check the current LUN settings and select a host response with an appropriate "Host Specific Mode" to change the host response.
Chapter 9 Connectivity Management 9.2 Functions in the Action Area for Connectivity • Change CHAP Password To change the CHAP Authentication password, select the checkbox. Only when the "CHAP User ID" is registered, the field is available. • CHAP Password Specify the password for CHAP Authentication. It is not necessary to specify this item if CHAP Authentication is not used. Configure the user ID and the password as a pair.
Chapter 9 Connectivity Management 9.
Chapter 9 Connectivity Management 9.2 Functions in the Action Area for Connectivity 9.2.2.17 Modify SAS Host This function changes the SAS host information. • When no SAS hosts are registered, the [Modify SAS Host] function cannot be used. • When changing the SAS address of a SAS host that is currently being used, make sure to stop access to that SAS host. • The [Rename SAS Host] function that is provided with controller firmware version V10L24 or earlier is integrated in this function.
Chapter 9 Connectivity Management 9.2 Functions in the Action Area for Connectivity • Host Response Select a new host response that is to be assigned to the SAS host. The host response list created in the ETERNUS DX Disk storage system is displayed. This item is available only when a SAS host is not registered in the host group.
Chapter 9 Connectivity Management 9.
Chapter 9 Connectivity Management 9.2 Functions in the Action Area for Connectivity 9.2.3.1 Create FC Port Group This function creates a new FC port group, and registers the port to be a member. An FC port group is a group of FC-CA type ports that are connected to the specified host group. This function configures the host affinity setting for each FC port group. • The maximum number of port groups per storage system is 128, irrespective of the CA types. • The maximum number of ports per port group is 8.
Chapter 9 Connectivity Management 9.2 Functions in the Action Area for Connectivity 2 Specify the name of the port group to be created, select all the ports to be registered in the port group, and click the [Create] button. • Name Specify the port group name. An existing port group name cannot be specified.
Chapter 9 Connectivity Management 9.2 Functions in the Action Area for Connectivity 3 Click the [OK] button. → Registration of the FC port group starts.
Chapter 9 Connectivity Management 9.2 Functions in the Action Area for Connectivity • Registration of the port is necessary to create a port group. A port group cannot be created if the port to be a member has not been registered from GUI. • Only ports with "CA" or "CA/RA" as the port mode can be added to a port group. Ports with "RA" as the port mode cannot be added to a port group.
Chapter 9 Connectivity Management 9.2 Functions in the Action Area for Connectivity 2 Specify the name of the port group to be created, select all the ports to be registered in the port group, and click the [Create] button. • Name Specify the port group name. An existing port group name cannot be specified.
Chapter 9 Connectivity Management 9.2 Functions in the Action Area for Connectivity 3 Click the [OK] button. → Registration of the iSCSI port group starts.
Chapter 9 Connectivity Management 9.2 Functions in the Action Area for Connectivity • Registration of the port is necessary to create a port group. A port group cannot be created if the port to be a member has not been registered from GUI. • A port with the affinity mode enabled ("ON") and a port with the affinity mode disabled ("OFF") cannot exist together in a port group.
Chapter 9 Connectivity Management 9.2 Functions in the Action Area for Connectivity → A confirmation screen appears. An error screen appears in the following conditions: • When the port group name does not satisfy the input conditions • When the port group name has not been entered 3 Click the [OK] button. → Registration of the SAS port group starts.
Chapter 9 Connectivity Management 9.2 Functions in the Action Area for Connectivity 4 Click the [Done] button to return to the [CA Port Group] screen. End of procedure 9.2.3.4 Create FCoE Port Group This function creates a new FCoE port group, and registers the port to be a member. An FCoE port group is a group of FCoE-CA type ports that are connected to the specified host group. This function configures the host affinity setting for each FCoE port group.
Chapter 9 Connectivity Management 9.2 Functions in the Action Area for Connectivity 2 Specify the name of the port group to be created, select all the ports to be registered in the port group, and click the [Create] button. • Name Specify the port group name. An existing port group name cannot be specified.
Chapter 9 Connectivity Management 9.2 Functions in the Action Area for Connectivity 3 Click the [OK] button. → Registration of the FCoE port group starts.
Chapter 9 Connectivity Management 9.2 Functions in the Action Area for Connectivity The CA port group, of which host affinity settings have been configured (the status of the port group is "Active"), cannot be deleted. 2 Click the [OK] button. → Deletion of the CA port group starts. 3 Click the [Done] button to return to the [CA Port Group] screen. End of procedure 9.2.3.
Chapter 9 Connectivity Management 9.2 Functions in the Action Area for Connectivity • Registration of the port is necessary to create a CA port group. Not all of the ports can be deleted from a CA port group. • Only ports with "CA" or "CA/RA" as the port mode can be added to a CA port group. The ports, of which port mode is "RA", cannot be added to the CA port group. • A port with the affinity mode enabled ("ON") and a port with the affinity mode disabled ("OFF") cannot exist together in a CA port group.
Chapter 9 Connectivity Management 9.2 Functions in the Action Area for Connectivity 2 Specify the new name of the CA port group, add a port to the CA port group (select the checkbox), or delete a port from the CA port group (clear the checkbox), and click the [Modify] button. • Name Specify the CA port group name. An existing CA port group name cannot be specified.
Chapter 9 Connectivity Management 9.2 Functions in the Action Area for Connectivity 3 Click the [OK] button. → Modification of the CA port group starts.
Chapter 9 Connectivity Management 9.2 Functions in the Action Area for Connectivity • There are four types of port modes for FC ports; CA, RA, CA/RA, and Initiator. CA is used for connecting to a server, RA is used for REC, CA/RA is used for connecting to a server and for REC, and Initiator is used for Storage Migration. To change the port mode, refer to "9.2.3.11 Modify Port Mode" (page 571). The default value is "CA".
Chapter 9 Connectivity Management 9.2 Functions in the Action Area for Connectivity Select "Fabric" for a direct connection when "Transfer Rate" is "16 Gbit/s". • Set Loop ID When "Connection" is "FC-AL", select "Manual" or "Auto" as the specification method for the Loop ID. "Loop ID" is an identification number of a node in a loop. • Loop ID - Manual When the "Set Loop ID" is "Manual", enter the Loop ID. The Loop ID must have a value that is different from the values of all the ports.
Chapter 9 Connectivity Management 9.2 Functions in the Action Area for Connectivity • Release Reservation if Chip is Reset Select whether to "Enable" or "Disable" the function to release the reserved status of the volume when the target port (chip) is reset. • REC Line No. Select the REC line number of the target port. The REC line number is used to switch the communication path when a line fails. The REC line number is used to recognize failed lines.
Chapter 9 Connectivity Management 9.2 Functions in the Action Area for Connectivity • This item is displayed only when "Port Mode" is "CA/RA". • The REC transfer mode can be changed without suspending a copy session even when an REC is being performed in the target port. The changed settings are applied immediately to the ETERNUS DX Disk storage system.
Chapter 9 Connectivity Management 9.2 Functions in the Action Area for Connectivity ■ When the port mode is "RA" • Port Select the target port or select the copy source port. The selectable port locations are displayed as options: - CM#x CA#y Port#z (x: CM number, y: CA number, z: Port number) • Connection Select the connection topology for the target port from the "Fabric" or "FC-AL". When "FC-AL" is selected, it is necessary to assign a Loop ID to the port.
Chapter 9 Connectivity Management 9.2 Functions in the Action Area for Connectivity • Frame Size Select the frame size of the target port. "Frame Size" specifies the length of the communication information. - 512 bytes - 1024 bytes - 2048 bytes • REC Line No. Select the REC line number of the target port. The REC line number is used to switch the communication path when a line fails. The REC line number is used to recognize failed lines. Set different REC line numbers for each physical communication path.
Chapter 9 Connectivity Management 9.2 Functions in the Action Area for Connectivity • The REC transfer mode can be changed without suspending a copy session even when an REC is being performed in the target port. The changed settings are applied immediately to the ETERNUS DX Disk storage system.
Chapter 9 Connectivity Management 9.2 Functions in the Action Area for Connectivity ■ When the port mode is "Initiator" • Port Select the target port or select the copy source port. The selectable port locations are displayed as options: - CM#x CA#y Port#z (x: CM number, y: CA number, z: Port number) • Connection Select the connection topology for the target port from the "Fabric" or "FC-AL". When "FC-AL" is selected, it is necessary to assign a Loop ID to the port.
Chapter 9 Connectivity Management 9.2 Functions in the Action Area for Connectivity • Frame Size Select the frame size of the target port. "Frame Size" specifies the length of the communication information. - 512 bytes - 1024 bytes - 2048 bytes • WWN (Port Name) When Storage Migration is performed, the ETERNUS DX Disk storage system (destination storage system) is regarded as a server connecting to the migration source storage system.
Chapter 9 Connectivity Management 9.2 Functions in the Action Area for Connectivity • If the Loop ID is changed while a PRIMEPOWER server is operating, reboot the server immediately. If the parameters do not satisfy the input conditions, an error screen appears. • If some parameters do not satisfy the input conditions, an error screen appears. 3 Click the [OK] button. → Modification of the FC port parameters starts. 4 Click the [Done] button to return to the [FC Port Group] screen.
Chapter 9 Connectivity Management 9.2 Functions in the Action Area for Connectivity The procedure to set iSCSI port parameters is as follows: Procedure 1 Select which iSCSI port to set the parameters for (multiple selections can be made) and click [Configure iSCSI Port] in [Action]. The same port mode can be selected for multiple "1G iSCSI" or "10G iSCSI" type iSCSI ports. Multiple selections can also be made for the "iSCSI-RA (for older storage system connection)" type iSCSI ports.
Chapter 9 Connectivity Management 9.2 Functions in the Action Area for Connectivity The following input conditions apply: - Up to 3 numeric characters - First text box: "1" - "255" - Other text boxes: "0" - "255" • Subnet Mask Input the subnet mask of the target port (required when "IPv4" is selected). The following input conditions apply: - Up to 3 numeric characters - All text boxes: "0" - "255" • Gateway Input the gateway IPv4 address of the target port.
Chapter 9 Connectivity Management 9.2 Functions in the Action Area for Connectivity • IPv6 Gateway Input the gateway IPv6 address of the target port. The following IPv6 addresses can be used; "link local address", "global address", "unique local address", and "6to4 address". Refer to "Available IPv6 Address" (page 757) for details. Note that the current setting is displayed by an abbreviation. "IPv6 Gateway" can be directly input or created automatically.
Chapter 9 Connectivity Management 9.2 Functions in the Action Area for Connectivity When "Disable" is selected, the path may be unstable or blocked due to factors such as the path bandwidth or the switch buffer size. However, if a long transmission delay occurs, performance may be improved. Perform sufficient verification of the network environment before specifying "Disable" for the congestion control option.
Chapter 9 Connectivity Management 9.2 Functions in the Action Area for Connectivity The same iSCSI name cannot be set to multiple iSCSI ports except the iSCSI name of the ETERNUS DX Disk storage system. • Alias Name Input the Alias Name of the target port. While the iSCSI name is a formal nomenclature that specifies the target iSCSI port, an Alias Name is used as nickname. An Alias Name that is the same as another port cannot be specified.
Chapter 9 Connectivity Management 9.2 Functions in the Action Area for Connectivity • CmdSN Count Change the number of commands that can be accepted from the host to the target port at the same time. It is not necessary to change the default setting (Unlimited) for normal use. - Unlimited - 180 - 100 - 80 - 40 - 20 ● Security • CHAP Select "ON" to enable unidirectional CHAP authentication or bidirectional CHAP authentication for the target CA port.
Chapter 9 Connectivity Management 9.2 Functions in the Action Area for Connectivity Data transmission might fail when "Header Digest" or "Data Digest" is enabled. In this case, select "OFF" for "Header Digest" and "Data Digest". ■ When the port mode is "RA" When the type is "1G iSCSI" or "10G iSCSI" and the port mode is "RA", specify the following items: ● Select Port • Port Select the target port.
Chapter 9 Connectivity Management 9.2 Functions in the Action Area for Connectivity The following input conditions apply: - Up to 3 numeric characters - First text box: "1" - "255" - Other text boxes: "0" - "255" • Subnet Mask Input the subnet mask of the target port (required when "IPv4" is selected). The following input conditions apply: - Up to 3 numeric characters - All text boxes: "0" - "255" • Gateway Input the gateway IPv4 address of the target port.
Chapter 9 Connectivity Management 9.2 Functions in the Action Area for Connectivity • IPv6 Gateway Input the gateway IPv6 address of the target port. The following IPv6 addresses can be used; "link local address", "global address", "unique local address", and "6to4 address". Refer to "Available IPv6 Address" (page 757) for details. Note that the current setting is displayed by an abbreviation. "IPv6 Gateway" can be directly input or created automatically.
Chapter 9 Connectivity Management 9.2 Functions in the Action Area for Connectivity • Congestion Control Option Specify whether to enable or disable the use of "The New Reno Modification to TCP's Fast Recovery Algorithm" for controlling congestion in the target port. Select "Enable" when using the congestion control option. When not using the congestion control option, select "Disable". It is not necessary to change the default setting (Enable) for normal use.
Chapter 9 Connectivity Management 9.2 Functions in the Action Area for Connectivity ● Security • CHAP Select "ON "to enable CHAP authentication for the target port. Select "OFF" to disable CHAP authentication. For CHAP authentication, an encrypted password based on a random key that the ETERNUS DX Disk storage system receives from the host is sent, and connection possibility is judged on the server side. • CHAP User Name When "ON" is selected for "CHAP", enter the user name to access the target port.
Chapter 9 Connectivity Management 9.2 Functions in the Action Area for Connectivity To set the REC transfer mode for the specific port, enable the appropriate mode. For example, specify different ports for Consistency and Stack to perform data transfers without any interference. The current setting is retained even when an REC path is changed. When "Enable" is selected for all of the REC transfer modes (default setting), a conventional REC is performed.
Chapter 9 Connectivity Management 9.2 Functions in the Action Area for Connectivity ■ When the port mode is "CA/RA" When the type is "1G iSCSI" or "10G iSCSI" and the port mode is "CA/RA", specify the following items: ● Select Port • Port Select the target port. The selectable port locations are displayed as options: - CM#x CA#y Port#z (x: CM number, y: CA number, z: Port number) ● TCP/IP Settings • IP Version Select the IP version for the target port. - IPv4 Specify the IPv4 address.
Chapter 9 Connectivity Management 9.2 Functions in the Action Area for Connectivity • IPv6 Link Local Address Input the IPv6 link local address of the target port (required when "IPv6" is selected). Refer to "Available IPv6 Address" (page 757) for details. Note that the current setting is displayed by an abbreviation. Click the [Test Connection (ping)] button to display the "[Send Ping Command] Screen" (page 565).
Chapter 9 Connectivity Management 9.2 Functions in the Action Area for Connectivity Do not change the TCP port number from 3260 (default value). REC can only be performed when "TCP Port No." is "3260". • TCP Window Scale Select the TCP Window scale of the target port between 0 and 14. "TCP Window Scale" is a parameter that is used to specify the TCP window size. When the I/O load is high, the expected performance may not be achieved even if "0" or "1" is specified for TCP Window Scale.
Chapter 9 Connectivity Management 9.2 Functions in the Action Area for Connectivity • iSNS Server Select whether to enable the use of an iSNS server with IPv4 or IPv6, or disable the use of an iSNS server for the target port. When "IPv4" or "IPv6" is selected, input the IP address of the iSNS server. Internet Storage Name Service (iSNS) is almost equivalent to Domain Name System (DNS) for the Internet. iSNS server is used to convert the iSCSI name to the IP address on the iSCSI network.
Chapter 9 Connectivity Management 9.2 Functions in the Action Area for Connectivity • Alias Name Input the Alias Name of the target port. While the iSCSI name is a formal nomenclature that specifies the target iSCSI port, an Alias Name is used as nickname. An Alias Name that is the same as another port cannot be specified. The following input condition applies: - Up to 31 alphanumeric characters ● General Settings • VLAN ID Select whether to "Enable" or "Disable" the VLAN ID for the target port.
Chapter 9 Connectivity Management 9.2 Functions in the Action Area for Connectivity ● Security • CHAP (CA) Select "ON" to enable unidirectional CHAP authentication or bidirectional CHAP authentication for the target CA port. Select "OFF" to disable unidirectional CHAP authentication and bidirectional CHAP authentication.
Chapter 9 Connectivity Management 9.2 Functions in the Action Area for Connectivity • Confirm new Password (RA) Specify the same password as that entered in the "New Password (RA)" field. The following input conditions apply: - 12 - 32 alphanumeric characters and symbols - Space • Header Digest Select "OFF" to not add the Header Digest of the target port. Select "CRC32C" to add the Header Digest. Header Digest is a check code to be added to the header part of the iSCSI port detailed information.
Chapter 9 Connectivity Management 9.2 Functions in the Action Area for Connectivity • REC Transfer Mode Select which REC transfer mode is enabled or disabled for the target port. When "Enable" is selected, an REC is performed in the selected transfer mode for the target port. When "Disable" is selected, an REC is not performed in the selected transfer mode for the target port. To set the REC transfer mode for the specific port, enable the appropriate mode.
Chapter 9 Connectivity Management 9.2 Functions in the Action Area for Connectivity ■ When the port mode is "iSCSI-RA (for older storage system connection)" When the type is "iSCSI-RA (for older storage system connection)", specify the following items: ● Port Settings • Port Select the target port. The selectable port locations are displayed as options: - CM#x CA#y Port#z (x: CM number, y: CA number, z: Port number) ● TCP/IP Settings • IP Address Input the IP address of the target port (required).
Chapter 9 Connectivity Management 9.2 Functions in the Action Area for Connectivity ● General Settings • Transfer Rate Select the transfer speed of the target port from the following: - Auto-negotiation "100Mbit/s (Full Duplex)" or "1Gbit/s (Full Duplex)" is automatically selected for the transfer rate. - 100Mbit/s 100Mbit/s (Full Duplex) - 1Gbit/s 1Gbit/s (Full Duplex) • MTU Specify the MTU size of the target port.
Chapter 9 Connectivity Management 9.2 Functions in the Action Area for Connectivity • Confirm new Password Specify the same password as that entered in the "New Password" field. The following input conditions apply: - 12 - 32 alphanumeric characters and symbols - Space ● REC Settings • REC Line No. Select the REC line number of the target port. The REC line number is used to switch the communication path when a line fails. The REC line number is used to recognize failed lines.
Chapter 9 Connectivity Management 9.2 Functions in the Action Area for Connectivity ■ [Send Ping Command] Screen Checks the connection status between the target port and the destination storage system. • IP Address Input the IPv4 or IPv6 address of the storage system that is used to check the connection status of the target port. The following IPv6 addresses can be used; "link local address", "global address", "unique local address", and "6to4 address".
Chapter 9 Connectivity Management 9.2 Functions in the Action Area for Connectivity → A confirmation screen appears. An error screen appears in the following conditions: • When "IP Address" and "Subnet Mask" for IPv4 are not specified • When "IPv6 Link Local Address" for IPv6 is not specified • When there are parameters that do not satisfy the input conditions • When "255.255.255.
Chapter 9 Connectivity Management 9.2 Functions in the Action Area for Connectivity 3 Click the [OK] button. → Modification of the iSCSI port parameters starts. 4 Click the [Done] button to return to the [iSCSI Port Group] screen. End of procedure 9.2.3.9 Modify SAS Port Parameters This function sets the connection information for the SAS port that is used to connect the ETERNUS DX Disk storage system and the host.
Chapter 9 Connectivity Management 9.2 Functions in the Action Area for Connectivity • Transfer Rate Select the transfer speed for the target port. - Auto-negotiation - 1.5 Gbit/s - 3 Gbit/s - 6 Gbit/s • Reset Scope Specify the reset scope of the target port. Reset scope is the range where the command reset from the server is performed, when the target port is connected to multiple servers.
Chapter 9 Connectivity Management 9.2 Functions in the Action Area for Connectivity 9.2.3.10 Modify FCoE Port Parameters This function sets the connection information for the FCoE ports that connect the ETERNUS DX Disk storage system and the host. When changing port parameters during operation, stop access from the server that is allocated to the target port. Host access does not need to be stopped to change the port parameters of newly added CA ports.
Chapter 9 Connectivity Management 9.2 Functions in the Action Area for Connectivity • Set Fabric Name Specify "Auto" to enable the automatic setting for the fabric name of the target port. Specify "Fixed" to enable the fixed setting. When "Auto" is specified, the fabric name of the connected FCoE switch is automatically obtained and does not need to be specified. When "Fixed" is specified, enter the fabric name. "Auto" should be set for normal operation.
Chapter 9 Connectivity Management 9.2 Functions in the Action Area for Connectivity 3 Click the [OK] button. → Modification of the FCoE port parameters starts. 4 Click the [Done] button to return to the [FCoE Port Group] screen. End of procedure 9.2.3.11 Modify Port Mode This function changes the port mode of each port among Channel Adapter (CA), Remote Adapter (RA), CA/RA, and Initiator. The port modes of the FC port and the iSCSI port can be changed.
Chapter 9 Connectivity Management 9.2 Functions in the Action Area for Connectivity Retained and deleted information when changing the port mode Port mode after modification CA CA RA CA/RA Initiator – Mapping information is deleted Mapping information is retained Mapping information is deleted Advanced Copy path information is deleted – • Advanced Copy Advanced Copy path information is deleted path information is retained RA • REC Line No.
Chapter 9 Connectivity Management 9.2 Functions in the Action Area for Connectivity 2 Select the port mode to be changed over to, and click the [Set] button. • Port Mode (After) Select from "CA", "RA", "CA/RA", or "Initiator" for the changed port mode. "Initiator" is displayed only for FC ports. The current port mode is displayed by default. - CA - RA - CA/RA - Initiator → A confirmation screen appears.
Chapter 9 Connectivity Management 9.2 Functions in the Action Area for Connectivity 4 Click the [Done] button to return to the [CA Port Group] screen. End of procedure 9.2.4 LUN Group Management LUN group management provides the following functions: • Add LUN Group • Delete LUN Group • Modify LUN Group 9.2.4.1 Add LUN Group This function creates a new LUN group, and allocates a volume number in the ETERNUS DX Disk storage system to the LUN, which can be recognized by the host.
Chapter 9 Connectivity Management 9.2 Functions in the Action Area for Connectivity • Note that if a LUN group to which volumes are mapped from LUN#512 onward exists, the maximum number of LUN groups cannot be created. This is because when volumes are mapped for LUN#512 onward, an additional LUN group is created as an internal resource for every 512 LUNs. For example, when volumes are mapped from LUN#0 to LUN#520, two LUN groups are created (one for LUNs #0 to #511 and one for LUNs #512 to #520).
Chapter 9 Connectivity Management 9.2 Functions in the Action Area for Connectivity 3 Specify the LUNs and the number of LUNs, to allocate volumes to, select the volume numbers to be allocated to the corresponding LUNs, and click the [OK] button. • Start Host LUNs Specify the LUN from which allocation is to be started. The smallest LUN among the available LUNs is used as the default value.
Chapter 9 Connectivity Management 9.2 Functions in the Action Area for Connectivity 4 Check the LUN and the volume allocation information to be registered in the LUN group, click the [Create] button. → A confirmation screen appears.
Chapter 9 Connectivity Management 9.2 Functions in the Action Area for Connectivity 9.2.4.2 Delete LUN Group This function deletes LUN groups. The LUN groups, which are being used in the Host Affinity settings, cannot be deleted. The procedure to delete a LUN group is as follows: Procedure 1 Select the LUN group that is to be deleted, and click [Delete LUN Group] in [Action]. → A confirmation screen appears. 2 Click the [OK] button. → LUN group deletion starts.
Chapter 9 Connectivity Management 9.2 Functions in the Action Area for Connectivity 9.2.4.3 Modify LUN Group This function modifies LUN groups. • When changing or deleting the volume allocation in a running LUN group, stop access from the associated host. • When adding LUNs or volume allocation to a running LUN group, stopping access from the associated host is not necessary. • Only the volumes with "Standard", "WSV", "TPV", "FTV", or "SDV" volume types can be registered in the LUN group.
Chapter 9 Connectivity Management 9.
Chapter 9 Connectivity Management 9.2 Functions in the Action Area for Connectivity 9.2.5 Host Response Management Host Response management provides the following functions: • Add Host Response • Delete Host Response • Modify Host Response 9.2.5.1 Add Host Response This function adds a host response. The maximum number of host responses per storage system is 256, including the recommended patterns.
Chapter 9 Connectivity Management 9.2 Functions in the Action Area for Connectivity Recommended Patterns of Host Responses Make sure to use the appropriate recommended pattern in the following connection environment. Select "Default" in other connection environments. Host Response Name Connection Environment Settings Solaris MPxIO This setting is for a host on which Oracle Solaris has been installed, and which uses OS standard Multipath Driver (MPxIO).
Chapter 9 Connectivity Management 9.2 Functions in the Action Area for Connectivity The following modifications are applied for the recommended patterns of host response with firmware version V10L15 or later. • "Others" is changed to "Default". • "Windows EMPD", "Linux EMPD", and "Solaris EMPD" are deleted from the "Host Response" value. The setting parameters for "Windows EMPD", "Linux EMPD", and "Solaris EMPD" are the same as "Default".
Chapter 9 Connectivity Management 9.2 Functions in the Action Area for Connectivity • Inquiry VPD ID Type Set the Vital Product Data (VPD) information type to respond to the host. VPD information includes the device information (Vendor ID, Product ID for each model, volume number, etc.) for the volume. Type1 and Type3 indicate the data format.
Chapter 9 Connectivity Management 9.2 Functions in the Action Area for Connectivity • Host Specific Mode Select the operation for a specific host. - Normal (Default) Up to 256 LUNs (LUN#0 - LUN#255) can be accessed. - AIX Mode Select this to prevent the command initialization and performance degradation. Up to 512 LUNs (LUN#0 - LUN#511) can be accessed. - HP-UX Mode Up to 1024 LUNs (LUN#0 - LUN#1023) can be accessed. - NR1000V Mode Up to 512 LUNs (LUN#0 - LUN#511) can be accessed.
Chapter 9 Connectivity Management 9.2 Functions in the Action Area for Connectivity • TPGS Mode Select whether to enable or disable the Target Port Group Support (TPGS) mode. - Enable (Default) - Disable The "TPGS Mode" setting is applied only when "Version 5 (Default)" is selected for the "Inquiry Standard Data Version" setting.
Chapter 9 Connectivity Management 9.2 Functions in the Action Area for Connectivity • Sense Data Conversion Select the sense code conversion pattern. - No Conversion (Default) - Customize Customize sense data conversion. Select "Customize" to display the sense data conversion setting field. • Sense Data Conversion - From SK/ASC/ASCQ - To SK/ASC/ASCQ Customize sense data conversion. Click the [Add] button.
Chapter 9 Connectivity Management 9.2 Functions in the Action Area for Connectivity 3 Click the [OK] button. → Addition of the host response starts. An error screen appears in the following conditions: • When the "Name" matches with an existing host response name • When the total number of host responses has exceeded the maximum number of host responses for the ETERNUS DX Disk storage system 4 Click the [Done] button to return to the [Host Response] screen. End of procedure 9.2.5.
Chapter 9 Connectivity Management 9.2 Functions in the Action Area for Connectivity 2 Click the [OK] button. → Deletion of the host response starts. 3 Click the [Done] button to return to the [Host Response] screen. End of procedure 9.2.5.3 Modify Host Response This function modifies host response settings. For more details on setting the host response parameters, refer to "User's Guide -Server Connection-" for each OS type.
Chapter 9 Connectivity Management 9.2 Functions in the Action Area for Connectivity The procedure to edit a host response is as follows: Procedure 1 Select the host response to be modified, and click [Modify Host Response] in [Action]. 2 Modify the host response name or each item, and click the [Modify] button. ● Setting parameters • Name Specify the host response name. An existing host response name cannot be specified.
Chapter 9 Connectivity Management 9.2 Functions in the Action Area for Connectivity • Load Balance Response This field sets the response status when an overload-derived timeout is detected. The server retry reaction is determined by this setting. While the default response should normally be compatible with all systems, the setting may need to be changed if problems occur.
Chapter 9 Connectivity Management 9.2 Functions in the Action Area for Connectivity • Asymmetric / Symmetric Logical Unit Access Select the access type from the host to a volume. - ACTIVE-ACTIVE / PREFERRED_PATH When multiple paths are used for connection between the host and the ETERNUS DX Disk storage system, there are recommended paths and non-recommended paths.
Chapter 9 Connectivity Management 9.2 Functions in the Action Area for Connectivity • TPG Referrals Select whether to enable or disable the TPG Referrals. The TPG Referrals function determines the priority path for each block when accessing volumes via the ETERNUS Multipath Driver in order to prevent cross access. This function can be used for "Standard", "WSV", "TPV", "FTV", and "Standard (LUN concatenated)" type volumes.
Chapter 9 Connectivity Management 9.2 Functions in the Action Area for Connectivity • Sense Data Conversion - From SK/ASC/ASCQ - To SK/ASC/ASCQ Customize sense data conversion. Click the [Add] button. Input SK/ASC/ASCQ of the conversion target in the "From" field, and SK/ ASC/ASCQ of the conversion destination in the "To" field. "From SK/ASC/ASCQ" and "To SK/ASC/ASCQ" values are specified in pairs. The sense data that matches the "From SK/ASC/ASCQ" value is changed to the specified "To SK/ASC/ASCQ" value.
Chapter 9 Connectivity Management 9.2 Functions in the Action Area for Connectivity 3 Click the [OK] button. → Modification of the host response starts.
Chapter 9 Connectivity Management 9.2 Functions in the Action Area for Connectivity • If some ports have been removed from the modification target CA reset group, a different group is created using those ports. For instance, if ports (Port#2 and Port#3) have been removed from the modification target CA reset group A (Port#0, Port#1, Port#2 and Port#3), a CA reset group A (Port#0 and Port#1) and a CA reset group B (Port#2 and Port#3) are created after modification.
Chapter 9 Connectivity Management 9.2 Functions in the Action Area for Connectivity 3 Click the [OK] button. → Modification of the CA reset group starts. 4 Click the [Done] button to return to the [CA Reset Group] screen. End of procedure 9.2.7 Host-LU QoS Management Host-LU QoS management provides the following functions: • • • • • • • • • • • • • • • 9.2.7.
Chapter 9 Connectivity Management 9.2 Functions in the Action Area for Connectivity ■ When enabling the Host-LU QoS The procedure to enable the Host-LU QoS is as follows: Procedure 1 Click [Enable Host-LU QoS] in [Action]. → A confirmation screen appears. If the Host-LU QoS has already been enabled, [Enable Host-LU QoS] cannot be clicked. 2 Click the [OK] button. → The Host-LU QoS is enabled. 3 Click the [Done] button to return to the [Host-LU QoS] screen.
Chapter 9 Connectivity Management 9.2 Functions in the Action Area for Connectivity 2 Click the [OK] button. → The Host-LU QoS is disabled. 3 Click the [Done] button to return to the [Host-LU QoS] screen. End of procedure 9.2.7.2 Set Host-LU QoS This function assigns a LU QoS group to a "Host - CA Port - LUN Group" on which the host affinity setting has been configured. A bandwidth limit (the maximum performance limit) is configured to each host LUN in a LU QoS group.
Chapter 9 Connectivity Management 9.2 Functions in the Action Area for Connectivity The procedure to set the Host-LU QoS is as follows: Procedure 1 Select the "Host - CA Port - LUN Group" to set the Host-LU QoS (multiple selections can be made) and click [Set Host-LU QoS] in [Action]. 2 Click the [Browse...] button in the "LUN Group: LUN QoS Group No." field. → The [Select LU QoS Group] screen is displayed. 3 Select a LUN QoS group, and click the [OK] button.
Chapter 9 Connectivity Management 9.2 Functions in the Action Area for Connectivity 4 After confirming the association between "Host", "CA Port", and "LUN Group : LU QoS Group No.", click the [Set] button. → A confirmation screen appears. 5 Click the [OK] button. → The Host-LU QoS setting starts. 6 Click the [Done] button to return to the [Host-LU QoS] screen. End of procedure 9.2.7.
Chapter 9 Connectivity Management 9.2 Functions in the Action Area for Connectivity The procedure to release Host-LU QoS is as follows: Procedure 1 Select the "Host - CA Port - LUN Group" for which the Host-LU QoS is to be released (multiple selections can be made) and click [Release Host-LU QoS] in [Action]. → A confirmation screen appears. 2 Click the [OK] button. → Releasing of the Host-LU QoS starts. 3 Click the [Done] button to return to the [Host-LU QoS] screen. End of procedure 9.2.7.
Chapter 9 Connectivity Management 9.2 Functions in the Action Area for Connectivity • This function can start performance monitoring regardless of whether the Host-LU QoS mode is enabled or disabled. • Performance monitoring can be started even if other performance information is being obtained. If performance monitoring is restarted, the performance information that is already obtained is deleted and the collection of performance starts again.
Chapter 9 Connectivity Management 9.2 Functions in the Action Area for Connectivity 2 Click the [OK] button. → Acquisition of Host-LU QoS performance information starts. 3 Click the [Done] button to return to the screen when starting this function in Step 1. End of procedure 9.2.7.5 Stop Host-LU QoS Performance Monitoring This function starts performance monitoring of Host-LU QoS.
Chapter 9 Connectivity Management 9.2 Functions in the Action Area for Connectivity 2 Click the [OK] button. → Acquisition of Host-LU QoS performance information stops. 3 Click the [Done] button to return to the [Host-LU QoS] screen. End of procedure ■ When this function is selected in the [Port QoS] screen for each host interface Procedure 1 Select the port to stop the Host-LU QoS performance monitoring for (multiple selections can be made) and click [Stop Perfmon] in [Action].
Chapter 9 Connectivity Management 9.2 Functions in the Action Area for Connectivity • Configure the port bandwidth limit on each port. Refer to the following sections for details: - "9.2.7.9 Set FC Port QoS" (page 610) - "9.2.7.10 Set iSCSI Port QoS" (page 611) - "9.2.7.11 Set SAS Port QoS" (page 613) - "9.2.7.12 Set FCoE Port QoS" (page 614) • The LUN bandwidth limit can be configured in the LU QoS group. Refer to "9.2.7.2 Set Host-LU QoS" (page 599) for details.
Chapter 9 Connectivity Management 9.2 Functions in the Action Area for Connectivity 4 Click the [Done] button to return to the [FC/FCoE Host QoS] screen. End of procedure 9.2.7.7 Set iSCSI Host QoS This function configures the bandwidth limit (the maximum performance limit) of the iSCSI host. This function can be used, irrespective of whether the Host-LU QoS has been enabled or disabled.
Chapter 9 Connectivity Management 9.2 Functions in the Action Area for Connectivity 2 Select the iSCSI host bandwidth limit, and click the [Set] button. • Bandwidth Limit Select the maximum performance in IOPS (throughput value). If the bandwidth limit is not applied, select "Unlimited". → A confirmation screen appears. 3 Click the [OK] button. → The iSCSI host QoS setting starts. 4 Click the [Done] button to return to the [iSCSI Host QoS] screen. End of procedure 9.2.7.
Chapter 9 Connectivity Management 9.2 Functions in the Action Area for Connectivity • Configure the port bandwidth limit on each port. Refer to the following sections for details: - "9.2.7.9 Set FC Port QoS" (page 610) - "9.2.7.10 Set iSCSI Port QoS" (page 611) - "9.2.7.11 Set SAS Port QoS" (page 613) - "9.2.7.12 Set FCoE Port QoS" (page 614) • The LUN bandwidth limit can be configured in the LU QoS group. Refer to "9.2.7.2 Set Host-LU QoS" (page 599) for details.
Chapter 9 Connectivity Management 9.2 Functions in the Action Area for Connectivity 4 Click the [Done] button to return to the [SAS Host QoS] screen. End of procedure 9.2.7.9 Set FC Port QoS This function specifies the bandwidth limit (maximum performance limit) for the FC port. • The bandwidth limit can be configured only for the ports in the port mode of "CA" or "CA/RA". For the ports in the port mode of "RA" and "Initiator", the bandwidth limit cannot be specified.
Chapter 9 Connectivity Management 9.2 Functions in the Action Area for Connectivity 2 Select the FC port bandwidth limit, and click the [Set] button. • Bandwidth Limit Select the maximum performance in IOPS (throughput value). If the bandwidth limit is not applied, select "Unlimited". → A confirmation screen appears. 3 Click the [OK] button. → The FC port QoS setting starts. 4 Click the [Done] button to return to the [FC Port QoS] screen. End of procedure 9.2.7.
Chapter 9 Connectivity Management 9.2 Functions in the Action Area for Connectivity • Configure the port bandwidth limit on each host. Refer to the following sections for details: - "9.2.7.6 Set FC/FCoE Host QoS" (page 605) - "9.2.7.7 Set iSCSI Host QoS" (page 607) - "9.2.7.8 Set SAS Host QoS" (page 608) • The LUN bandwidth limit can be configured in the LU QoS group. Refer to "9.2.7.2 Set Host-LU QoS" (page 599) for details.
Chapter 9 Connectivity Management 9.2 Functions in the Action Area for Connectivity 4 Click the [Done] button to return to the [iSCSI Port QoS] screen. End of procedure 9.2.7.11 Set SAS Port QoS This function specifies the bandwidth limit (maximum performance limit) for the SAS port. This function can be used, irrespective of whether the Host-LU QoS is enabled or disabled.
Chapter 9 Connectivity Management 9.2 Functions in the Action Area for Connectivity 2 Select the SAS port bandwidth limit, and click the [Set] button. • Bandwidth Limit Select the maximum performance in IOPS (throughput value). If the bandwidth limit is not applied, select "Unlimited". → A confirmation screen appears. 3 Click the [OK] button. → The SAS port QoS setting starts. 4 Click the [Done] button to return to the [SAS Port QoS] screen. End of procedure 9.2.7.
Chapter 9 Connectivity Management 9.2 Functions in the Action Area for Connectivity • Configure the port bandwidth limit on each host. Refer to the following sections for details: - "9.2.7.6 Set FC/FCoE Host QoS" (page 605) - "9.2.7.7 Set iSCSI Host QoS" (page 607) - "9.2.7.8 Set SAS Host QoS" (page 608) • The LUN bandwidth limit can be configured in the LU QoS group. Refer to "9.2.7.2 Set Host-LU QoS" (page 599) for details.
Chapter 9 Connectivity Management 9.2 Functions in the Action Area for Connectivity 4 Click the [Done] button to return to the [FCoE Port QoS] screen. End of procedure 9.2.7.13 Add LU QoS Group This function adds LU QoS groups with bandwidth limit (the maximum performance limit) settings to each host LUN. • Use one LU QoS group number per 512 Host LUNs as an internal resource.
Chapter 9 Connectivity Management 9.2 Functions in the Action Area for Connectivity 2 Select a host LUN bandwidth limit, and click the [Add] button. • Bandwidth Limit Select the maximum performance in IOPS (throughput value). If the bandwidth limit is not applied, select "Unlimited". → A confirmation screen appears. 3 Click the [OK] button. → Addition of LU QoS group starts. 4 Click the [Done] button to return to the [LU QoS Group] screen.
Chapter 9 Connectivity Management 9.2 Functions in the Action Area for Connectivity 9.2.7.14 Delete LU QoS Group This function deletes LU QoS groups. An LU QoS group in the "Active" status cannot be deleted. The procedure to delete LU QoS groups is as follows: Procedure 1 Select the LU QoS group that is to be deleted (multiple selections can be made) and click [Delete LU QoS Group] in [Action]. → A confirmation screen appears. 2 Click the [OK] button. → Deletion of LU QoS group starts.
Chapter 9 Connectivity Management 9.2 Functions in the Action Area for Connectivity • This function can be used, irrespective of whether the Host-LU QoS is enabled or disabled. • By assigning an LU QoS group to a LUN group with the host affinity settings, the bandwidth limit can be configured for each LUN. Refer to "9.2.7.2 Set Host-LU QoS" (page 599) for details.
Chapter 10 Component Management This chapter describes component management. 10.1 Component Status Component status displays the status information of volumes.
Chapter 10 Component Management 10.
Chapter 10 Component Management 10.1 Component Status 10.1.1 Storage (Basic Information) The general information for the ETERNUS DX Disk storage system is displayed. ■ Summary The following items are displayed in the Main area: • Name The name of the ETERNUS DX Disk storage system is displayed. • Model Name The model name of the ETERNUS DX Disk storage system is displayed. • Serial Number The serial number of the ETERNUS DX Disk storage system is displayed.
Chapter 10 Component Management 10.1 Component Status • Battery The battery charge level is displayed. When the battery charge level is 90% or more, "Full Charge" is displayed. When the battery charge level is less than 90%, "xx%" is displayed. This item is displayed only when using the ETERNUS DX410 S2/DX440 S2 or the ETERNUS DX8100 S2/DX8700 S2. • Remote Support The Remote Support (REMCS) status is displayed. - Operating The Remote Support is operating.
Chapter 10 Component Management 10.1 Component Status ■ View This screen is displayed only when using the ETERNUS DX80 S2/DX90 S2, the ETERNUS DX410 S2/DX440 S2, or the ETERNUS DX8100 S2. The following items are displayed in the Main area: • Device image The front view of the enclosures that are installed in the ETERNUS DX Disk storage system is displayed. The enclosure statuses are displayed with icons. Refer to "B.5 Component Status" (page 977) for details.
Chapter 10 Component Management 10.1 Component Status 10.1.2 Controller Enclosure Information of the CE is displayed. ■ Summary The following items are displayed in the Main area: • Serial Number The serial number of the CE is displayed. • Other Information Additional information for the CE is displayed. • Location The installation location of the thermal sensor is displayed. - Intake Temp - Exhaust Temp • Status The status of thermal sensor is displayed.
Chapter 10 Component Management 10.1 Component Status • Sensor The temperature obtained from the SVC for which thermal monitoring is being performed is displayed in Celsius (C) and in Fahrenheit (F). If the thermal information is not available due to problem such as a sensor failure, a "-" (hyphen) is displayed. This item is displayed only when using the ETERNUS DX8700 S2. ■ Front View The image that is displayed in this screen varies depending on the storage system model.
Chapter 10 Component Management 10.1 Component Status - Type The drive type is displayed. • For SAS disks: Online • For Nearline SAS disks: Nearline • For SSDs: SSD • For SEDs: SED - Usage The usage of the drive is displayed.
Chapter 10 Component Management 10.1 Component Status ● For ETERNUS DX8700 S2 The following items are displayed in the Main area: - Device image The front view of the CE that is installed in the ETERNUS DX Disk storage system is displayed. The statuses of the BBU, Controller Module (CM), Channel Adapter (CA), and Boot and Utility Device (BUD) are indicated by icons. Refer to "B.5 Component Status" (page 977) for details. By clicking the BBU number, the [Battery Backup Unit] screen is displayed.
Chapter 10 Component Management 10.1 Component Status ■ Rear View The image that is displayed in this screen varies depending on the storage system model. ● For ETERNUS DX80 S2/DX90 S2 The following items are displayed in the Main area: - Device image The rear view of the CE that is installed in the ETERNUS DX Disk storage system is displayed. The CM status and the Power Supply Unit (PSU) status are displayed with icons. By clicking the CM number, the [Controller Module] screen is displayed.
Chapter 10 Component Management 10.1 Component Status ● For ETERNUS DX410 S2/DX440 S2 The following items are displayed in the Main area: - Device image The rear view of the CE that is installed in the ETERNUS DX Disk storage system is displayed. The CM status, the CA status, and the Controller enclosure Power Supply Unit (CPSU) status are displayed with icons. By clicking the CM number, the [Controller Module] screen is displayed. Refer to "10.1.5 Controller Module Detail" (page 652) for display items.
Chapter 10 Component Management 10.1 Component Status ● For ETERNUS DX8100 S2 The following items are displayed in the Main area: - Device image The rear view of the CE that is installed in the ETERNUS DX Disk storage system is displayed. The CM status, the CA status, the BUD status, and the CPSU status are displayed with icons. By clicking the CM number, the [Controller Module] screen is displayed. Refer to "10.1.5 Controller Module Detail" (page 652) for display items.
Chapter 10 Component Management 10.1 Component Status ● For ETERNUS DX8700 S2 The following items are displayed in the Main area: - Device image The rear view of the CE that is installed in the ETERNUS DX Disk storage system is displayed. The CPSU status, the FANU status, the SVC status, FRT status, and the BRT status are displayed with icons. By clicking the CPSU number, the [Controller Enclosure Power Supply Unit] screen is displayed. Refer to "10.1.11 PSU/CPSU (CE) Detail" (page 664) for display items.
Chapter 10 Component Management 10.1 Component Status 10.1.2.1 Controller Module The CM information is displayed. The following items are displayed in the Main area: • CM The CM number is displayed. By clicking this item, the [Controller Module] screen is displayed. Refer to "10.1.5 Controller Module Detail" (page 652) for display items. • Status The CM status is displayed. Refer to "B.5 Component Status" (page 977) for details. 10.1.2.
Chapter 10 Component Management 10.1 Component Status ■ For ETERNUS DX8700 S2 when the I/O offloading is disabled, ETERNUS DX80 S2/DX90 S2, ETERNUS DX410 S2/DX440 S2, or ETERNUS DX8100 S2 The following items are displayed in the Main area: • CM The CM number and the CPU number are displayed. • Busy Ratio The CPU utilization rate is displayed. For the ETERNUS DX80 S2/DX 90 S2, the ROE busy ratio is included in this value. • ROE Busy Ratio The ROE utilization rate of the CPU (*1) is displayed.
Chapter 10 Component Management 10.1 Component Status ■ For ETERNUS DX8700 S2 when the I/O offloading is enabled The following items are displayed in the Main area: • CM The CM number and the CPU number are displayed. • Busy Ratio The CPU utilization rate is displayed. For the ETERNUS DX80 S2/DX 90 S2, the ROE busy ratio is included in this value. • ROE Busy Ratio The ROE utilization rate of the CPU (*1) is displayed.
Chapter 10 Component Management 10.1 Component Status 10.1.2.3 All Channel Adapters The information of all the CAs registered in the ETERNUS DX Disk storage system is displayed. The following items are displayed in the Main area: • CM The CM number is displayed. By clicking this item, the [Controller Module] screen is displayed. Refer to "10.1.5 Controller Module Detail" (page 652) for display items. • CA The CA number is displayed. By clicking this item, the [Channel Adapter] screen is displayed.
Chapter 10 Component Management 10.1 Component Status - For ETERNUS DX8100 S2/DX8700 S2 • 8G-FC 2port • 8G-FC 4port • 16G-FC 2port • 16G-FC 4port • 10G-iSCSI 2port • 1G-iSCSI 2port • 10G-FCoE 2port • 1G-iSCSI-RA 2port The 1-port type CA provided by ETERNUS DX80 S2 is also displayed as a 2-port type. To determine whether the CA is 1-port type or 2-port-type, refer to the port number displayed in the [Internal Parts] tab in the "10.1.6 Channel Adapter Detail" (page 655).
Chapter 10 Component Management 10.1 Component Status The following items are displayed in the Main area: • CM The CM number is displayed. • CA The CA number is displayed. • Port The port number is displayed. • Port Mode The port mode is displayed. - CA - RA - CA/RA • Read IOPS The number of reads per second is displayed. • Write IOPS The number of writes per second is displayed. • Read Throughput The amount of data that is read per second is displayed.
Chapter 10 Component Management 10.1 Component Status 10.1.2.5 Frontend Router The FRT information is displayed. This item is displayed only when using the ETERNUS DX8700 S2. The following items are displayed in the Main area: • FRT The FRT number is displayed. By clicking this item, the [Frontend Router] screen is displayed. Refer to "10.1.7 Frontend Router Detail" (page 658) for display items. • Status The FRT status is displayed. Refer to "B.5 Component Status" (page 977) for details. 10.1.2.
Chapter 10 Component Management 10.1 Component Status The following items are displayed in the Main area: • BRT The BRT number is displayed. By clicking this item, the [Backend Router] screen is displayed. Refer to "10.1.8 Backend Router Detail" (page 659) for display items. • Status The FRT status is displayed. Refer to "B.5 Component Status" (page 977) for details. 10.1.2.7 Service Controller The Service Controller (SVC) information is displayed.
Chapter 10 Component Management 10.1 Component Status 10.1.2.8 Power Supply Unit (CE) The PSU information for a CE is displayed. The following items are displayed in the Main area: • Enclosure The enclosure where the PSU or the CPUS is installed is displayed. • PSU The PSU number is displayed. By clicking this item, the [Controller Enclosure Power Supply Unit] screen is displayed. Refer to "10.1.11 PSU/CPSU (CE) Detail" (page 664) for display items.
Chapter 10 Component Management 10.1 Component Status 10.1.2.9 Battery The information of the BTU and the BCU is displayed when the ETERNUS DX410 S2/DX440 S2 or the ETERNUS DX8100 S2 is used. The information of the BBU is displayed when the ETERNUS DX8700 S2 is used. ■ For the ETERNUS DX410 S2/DX440 S2 or the ETERNUS DX8100 S2 ● BTU The following items are displayed in the Main area: - Component The BTU number is displayed. - Status The BTU status is displayed. Refer to "B.
Chapter 10 Component Management 10.1 Component Status ● BCU The following items are displayed in the Main area: - Component The BCU number is displayed. - Status The BCU status is displayed. Refer to "B.5 Component Status" (page 977) for details. - Status Code The BCU status code is displayed. - Error Code The BCU error code is displayed.
Chapter 10 Component Management 10.1 Component Status The following items are displayed in the Main area: - BBU The BBU number is displayed. By clicking this item, the [Battery Backup Unit] screen is displayed. Refer to "10.1.12 Battery Backup Unit Detail" (page 666) for display items. - Status The BBU status is displayed. Refer to "B.5 Component Status" (page 977) for details. 10.1.2.10 FAN Unit The FAN Unit information is displayed. This item is displayed only when using the ETERNUS DX8700 S2.
Chapter 10 Component Management 10.1 Component Status 10.1.2.11 Operation Panel The Operation Panel (OPNL) information is displayed. This item is displayed only when using the ETERNUS DX8700 S2. ■ Summary The following items are displayed in the Main area: • Location The OPNL is displayed. • Status The OPNL status is displayed. Refer to "B.5 Component Status" (page 977) for details. • Status Code The OPNL status code is displayed. • Error Code The OPNL error code is displayed.
Chapter 10 Component Management 10.1 Component Status 10.1.3 Drive Enclosure The DE information is displayed. The following items are displayed in the Main area: • Enclosure The DE number is displayed. By clicking this item, the [Drive Enclosure] screen is displayed. Refer to "10.1.14 Drive Enclosure Detail" (page 669) for display items. • Status The DE status is displayed. Refer to "B.5 Component Status" (page 977) for details.
Chapter 10 Component Management 10.1 Component Status The following items are displayed in the Main area: • Enclosure The enclosure where the IOM is installed is displayed. • IOM The IOM number is displayed. By clicking this item, the [I/O Module] screen is displayed. Refer to "10.1.15 I/O Module Detail" (page 672) for display items. • Status The IOM status is displayed. Refer to "B.5 Component Status" (page 977) for details.
Chapter 10 Component Management 10.1 Component Status • Status The Phy status is displayed. - Link Up - Link Down - N/A • Invalid Dword The number of Invalid Dword occurrences is displayed. • Disparity Error The number of Disparity Error occurrences is displayed. • Loss of Dword Synchronization The number of Loss of Dword Synchronization occurrences is displayed. • Phy Reset Problem The number of Phy Reset Problem occurrences is displayed. 10.1.3.
Chapter 10 Component Management 10.1 Component Status 10.1.4 Disks The drive information is displayed. The following items are displayed in the Main area: • Enclosure The enclosure where the drive is installed is displayed. • Slot No. The slot number of the enclosure where the drive is installed is displayed. By clicking the drive image, the [Disks] screen is displayed. Refer to "10.1.17 Disks Detail" (page 675) for display items. • Status The drive status is displayed. Refer to "B.5.
Chapter 10 Component Management 10.1 Component Status • Usage The usage of the drive is displayed. - For a drive that is used for user data or an unused drive: Data - For a drive that is registered as a Global Hot Spare: Global Hot Spare - For a drive that is registered as a Dedicated Hot Spare: Dedicated Hot Spare • RAID Group If the drive is registered in a RAID group, the RAID group name to which the drive belongs is displayed. By clicking this item, the [RAID Group Detail] screen is displayed.
Chapter 10 Component Management 10.1 Component Status The following items are displayed in the Main area: • Enclosure The enclosure where the drive is installed is displayed. • Slot No. The slot number of the enclosure where the drive is installed is displayed. • Busy Ratio The busy ratio of the drive is displayed. A "-" (hyphen) is displayed when the status is "Broken" or "Not Supported". Filter Setting Filter 10.1.4.2 Description Enclosure Select the enclosure in which the target drive is installed.
Chapter 10 Component Management 10.1 Component Status • Media Error The number of Media Error occurrences is displayed. • Drive Error The number of Drive Error occurrences is displayed. • Drive Recovered Error The number of Drive Recovered Error occurrences is displayed. • S.M.A.R.T. Event The number of S.M.A.R.T. Event occurrences is displayed. • I/O Timeout The number of I/O Timeout occurrences is displayed. • Link Error The number of Link Error occurrences is displayed.
Chapter 10 Component Management 10.1 Component Status • Serial Number The serial number of the CM is displayed. • Hardware Revision The hardware version of the CM is displayed. • MAC Address (MNT) The MAC address of the MNT Port is displayed. This item is displayed only when using the ETERNUS DX80 S2/DX90 S2, the ETERNUS DX410 S2/DX440 S2, or the ETERNUS DX8100 S2. • MAC Address (RMT) The MAC address of the RMT Port is displayed.
Chapter 10 Component Management 10.1 Component Status The following items are displayed in the Main area: • Parts The component name and the component number are displayed. A link is displayed for the ETERNUS DX80 S2/DX90 S2, the ETERNUS DX410 S2/DX440 S2, or the ETERNUS DX8100 S2 when the "Parts" is "QSFP Cable". Click this link to display the [QSFP Cable] screen. Refer to "10.1.18 QSFP Cable Detail" (page 678) for display items.
Chapter 10 Component Management 10.1 Component Status The following items are displayed in the Main area: • Device image The rear view or front view of the CE that is installed in the ETERNUS DX Disk storage system is displayed. For the ETERNUS DX80 S2/DX90 S2, the ETERNUS DX410 S2/DX440 S2, or the ETERNUS DX8100 S2, the rear view is displayed. For the ETERNUS DX8700 S2, the front view is displayed. Components that are not CMs are grayed out. The CM status is displayed with an icon. Refer to "B.
Chapter 10 Component Management 10.1 Component Status - For ETERNUS DX410 S2/DX440 S2 • 8G-FC 2port • 8G-FC 4port • 16G-FC 2port • 16G-FC 4port • 10G-iSCSI 2port • 1G-iSCSI 2port • 10G-FCoE 2port • 1G-iSCSI-RA 2port - For ETERNUS DX8100 S2/DX8700 S2 • 8G-FC 2port • 8G-FC 4port • 16G-FC 2port • 16G-FC 4port • 10G-iSCSI 2port • 1G-iSCSI 2port • 10G-FCoE 2port • 1G-iSCSI-RA 2port The 1-port type CA provided by ETERNUS DX80 S2 is also displayed as a 2-port type.
Chapter 10 Component Management 10.1 Component Status ● CM#x CA#y Port Information The detailed information of all the ports is displayed. Refer to "FC port" (page 681), "iSCSI port" (page 687), "SAS port" (page 690), or "FCoE port" (page 691) for display contents. ■ Internal Parts The following items are displayed in the Main area: • Port The CA port number is displayed. By clicking this item, the [Port] screen is displayed. Refer to "10.1.21 Port Detail" (page 681) for display items.
Chapter 10 Component Management 10.1 Component Status The following items are displayed in the Main area: • Device image The rear view or front view of the CE that is installed in the ETERNUS DX Disk storage system is displayed. For the ETERNUS DX80 S2/DX90 S2, the ETERNUS DX410 S2/DX440 S2, or the ETERNUS DX8100 S2, the rear view is displayed. For the ETERNUS DX8700 S2, the front view is displayed. Components that are not CAs are grayed out. The CA status is displayed with an icon. Refer to "B.
Chapter 10 Component Management 10.1 Component Status ■ View The following items are displayed in the Main area: • Device image The rear view of the CE that is installed in the ETERNUS DX Disk storage system is displayed. Components that are not the target FRT is grayed out. The FRT status is displayed with an icon. Refer to "B.5 Component Status" (page 977) for details. 10.1.8 Backend Router Detail The detailed information for the BRT is displayed.
Chapter 10 Component Management 10.1 Component Status • Status The BRT status is displayed. Refer to "B.5 Component Status" (page 977) for details. • Status Code The BRT status code is displayed. • Error Code The BRT error code is displayed. • Part Number The part number of the BRT is displayed. • Serial Number The serial number of the BRT is displayed. • Hardware Revision The hardware version of the BRT is displayed. • BRT Expander#n The status of BRT Expander#0 or BRT Expander#1 is displayed.
Chapter 10 Component Management 10.1 Component Status ■ View The following items are displayed in the Main area: • Device image The rear view of the CE that is installed in the ETERNUS DX Disk storage system is displayed. Components that are not the target BRT are grayed out. The BRT status is displayed with an icon. Refer to "B.5 Component Status" (page 977) for details. 10.1.9 BRT Expander Detail The detailed information of the BRT Expander is displayed.
Chapter 10 Component Management 10.1 Component Status • Status Code The status code of BRT EXP is displayed. • Error Code The error code of BRT EXP is displayed. • Active EC The Edition Control (EC) number of the currently running firmware is displayed. • Next EC The EC number of the firmware that is to be run at the next power-on is displayed. • Firmware Version The current controller firmware version is displayed. 10.1.10 Service Controller Detail The detailed information of the SVC is displayed.
Chapter 10 Component Management 10.1 Component Status • Hardware Revision The hardware version of the SVC is displayed. • MAC Address (MNT) The MAC address of the MNT Port is displayed. • MAC Address (RMT) The MAC address of the RMT Port is displayed. • MAC Address (FST) The MAC address of the FST Port is displayed. • LAN Control The role of the LAN in the SVC is displayed. - Master When the SVC is connected to the Master CM, "Master" is displayed.
Chapter 10 Component Management 10.1 Component Status ■ View The following items are displayed in the Main area: • Device image The rear view of the CE that is installed in the ETERNUS DX Disk storage system is displayed. Components that are not the target SVC are grayed out. The SVC status is displayed with an icon. Refer to "B.5 Component Status" (page 977) for details. 10.1.11 PSU/CPSU (CE) Detail The detailed information for the PSU or the CPSU is displayed.
Chapter 10 Component Management 10.1 Component Status The following items are displayed in the Main area: • Location The installation location of PSU or the CPSU is displayed. • Status The PSU status or the CPSU status is displayed. Refer to "B.5 Component Status" (page 977) for details. • Status Code The status code of PSU or CPSU is displayed. • Error Code The error code of PSU or CPSU is displayed. • Part Number The part number of PSU or CPSU is displayed.
Chapter 10 Component Management 10.1 Component Status 10.1.12 Battery Backup Unit Detail The detailed information of the Battery Backup unit is displayed. ■ Summary The following items are displayed in the Main area: • Location The BBU number is displayed. • Status The BBU status is displayed. Refer to "B.5 Component Status" (page 977) for details. • Status Code The BBU unit status code is displayed. • Error Code The BBU error code is displayed. • Charge Rate The BBU charge rate is displayed.
Chapter 10 Component Management 10.1 Component Status ■ View The following items are displayed in the Main area: • Device image The front view of the CE that is installed in the ETERNUS DX Disk storage system is displayed. Components that are not the target BBU are grayed out. The BBU status is displayed with an icon. Refer to "B.5 Component Status" (page 977) for details. 10.1.13 FAN Unit Detail The detailed information of the FAN unit is displayed.
Chapter 10 Component Management 10.1 Component Status The following items are displayed in the Main area: • Parts The FAN unit number is displayed. • Status The FAN unit status is displayed. Refer to "B.5 Component Status" (page 977) for details. • Status Code The FAN unit status code is displayed. • Error Code The FAN unit error code is displayed. • Part Number The part number of the FAN unit is displayed. • Serial Number The serial number of the FAN unit is displayed.
Chapter 10 Component Management 10.1 Component Status 10.1.14 Drive Enclosure Detail The detailed information of the DE is displayed. ■ Summary The following items are displayed in the Main area: • Serial Number The serial number of the DE is displayed. • Other Information Additional information for the DE is displayed. • Location The installation location of the thermal sensor is displayed. - Intake Temp - Exhaust Temp • Status The thermal sensor status is displayed.
Chapter 10 Component Management 10.1 Component Status ■ Front View The following items are displayed in the Main area: • Device image The front view of the DEs that are installed in the ETERNUS DX Disk storage system is displayed. - For 2.5-inch models: 24 (24 drives are lined up horizontally) - For 3.5-inch models: 12 (3 drives are lined up vertically and 4 drives are lined up horizontally) - When no drives are installed: Blank The drive status is displayed with an icon. Refer to "B.
Chapter 10 Component Management 10.1 Component Status • Usage The usage of the drive is displayed. - For a drive that is used for user data or an unused drive: Data - For a drive that is registered as a Global Hot Spare: Global Hot Spare - For a drive that is registered as a Dedicated Hot Spare: Dedicated Hot Spare • RAID Group If the drive is registered in a RAID group, the RAID group name to which the drive belongs is displayed. By clicking this item, the [RAID Group Detail] screen is displayed.
Chapter 10 Component Management 10.1 Component Status 10.1.15 I/O Module Detail The detailed information of IOM is displayed. ■ Summary The following items are displayed in the Main area: • Status The IOM status is displayed. Refer to "B.5 Component Status" (page 977) for details. • Status Code The IOM status code is displayed. • Error Code The IOM error code is displayed. • WWN The IOM WWN is displayed. • Part Number The IOM part number is displayed.
Chapter 10 Component Management 10.1 Component Status ■ Internal Parts The following items are displayed in the Main area: • Parts The QSFP Cable (IN) or the QSFP Cable (OUT) is displayed. By clicking this item, the [QSFP Cable] screen is displayed. Refer to "10.1.18 QSFP Cable Detail" (page 678) for display items. • Status The status for QSFP Cable (IN) or QSFP Cable (OUT) is displayed. Refer to "B.5 Component Status" (page 977) for details.
Chapter 10 Component Management 10.1 Component Status 10.1.16 Power Supply Unit (DE) Detail The detailed information of PSU is displayed. ■ Summary The following items are displayed in the Main area: • Location The installation location of PSU is displayed. • Status The PSU status is displayed. Refer to "B.5 Component Status" (page 977) for details. • Status Code The PSU status code is displayed. • Error Code The PSU error code is displayed. • Part Number The PSU part number is displayed.
Chapter 10 Component Management 10.1 Component Status ■ View The following items are displayed in the Main area: • Device image The rear view of the DE that is installed in the ETERNUS DX Disk storage system is displayed. Components that are not PSUs are grayed out. The PSU status is displayed with an icon. Refer to "B.5 Component Status" (page 977) for details. 10.1.17 Disks Detail The detailed information of the drive is displayed.
Chapter 10 Component Management 10.1 Component Status The following items are displayed in the Main area: • Location The detailed information of the drive is displayed. • Status The drive status is displayed. Refer to "B.5 Component Status" (page 977) for details. • Status Code The drive status code is displayed. • Error Code The drive error code is displayed. • Capacity The capacity of the drive is displayed. • Type The drive type is displayed.
Chapter 10 Component Management 10.1 Component Status • Product ID The drive manufacturer name is displayed. • Serial Number The serial number of the drive is displayed. • WWN The drive WWN is displayed. • Firmware Version The drive firmware version is displayed. ■ View The following items are displayed in the Main area: • Device image The front view of the DE that are installed in the ETERNUS DX Disk storage system is displayed. - For 2.5-inch drives: 24 (24 drives are lined up horizontally) - For 3.
Chapter 10 Component Management 10.1 Component Status 10.1.18 QSFP Cable Detail The detailed information of the QSFP cable is displayed. ■ Summary The following items are displayed in the Main area: • Status The QSFP cable status is displayed. Refer to "B.5 Component Status" (page 977) for details. • Status Code The QSFP cable status code is displayed. • Error Code The QSFP cable error code is displayed. • Part Number The QSFP cable number is displayed.
Chapter 10 Component Management 10.1 Component Status 10.1.19 Boot and Utility Device Detail The detailed information of the Boot and Utility Device (BUD) is displayed. ■ Summary The following items are displayed in the Main area: • Location The BUD number is displayed. • Status The BUD status is displayed. Refer to "B.5 Component Status" (page 977) for details. • Status Code The BUD status code is displayed. • Error Code The BUD error code is displayed. • Part Number The BUD part number is displayed.
Chapter 10 Component Management 10.1 Component Status ■ View The following items are displayed in the Main area: • Device image The rear view or the front view of the CE that is installed in the ETERNUS DX Disk storage system is displayed. For the ETERNUS DX8100 S2, the rear view is displayed. For the ETERNUS DX8700 S2, the front view is displayed. Components that are not BUDs are grayed out. The BUD status is displayed with an icon. Refer to "B.5 Component Status" (page 977) for details. 10.1.
Chapter 10 Component Management 10.1 Component Status • Status Code The CM MMC status code is displayed. • Error Code The CM MMC error code is displayed. • Active EC The Edition Control (EC) number of the currently running firmware is displayed. • Next EC The EC number of the firmware that is to be run at the next power-on is displayed. • Hardware Revision The hardware version of the CM MMC is displayed. 10.1.21 Port Detail The detailed information of the port is displayed.
Chapter 10 Component Management 10.1 Component Status The following items are displayed in the Main area: ■ CM#x CA#y Port#z Information - Location The location information of the port is displayed. • CM#x CA#y Port#z (x: CM number, y: CA number, z: Port number) - Port Mode The port mode is displayed. • CA • RA • CA/RA • Initiator - Status The port status is displayed. Refer to "B.5 Component Status" (page 977) for details. - Status Code The port status code is displayed.
Chapter 10 Component Management 10.1 Component Status - Link Status The link status of the port is displayed. If the status is " Unknown", a "-" (hyphen) is displayed. • • • • • • Link Down 1 Gbit/s Link Up 2Gbit/s Link Up 4Gbit/s Link Up 8Gbit/s Link Up 16Gbit/s Link Up - WWN The WWN of the port is displayed. "WWN" is displayed when the port mode is "CA", "RA", or "CA/RA". If the port mode is "Initiator", the display status varies according to the screen.
Chapter 10 Component Management 10.1 Component Status - SFP Type The SFP type of the port is displayed. If the SFP is not installed, "Unmount" is displayed. • Shortwave: 4G ShortWave • SFP+(SMF): 8G LongWave • SFP+(MMF): 8G SFP+ • 16G SFP+(SMF): 16G LongWave • 16G SFP+(MMF): 16G SFP+ • Unknown: SFP type other than above - Temperature The real time temperature of the SFP in the port is displayed in Celsius (C) and in Fahrenheit (F). When the information cannot be obtained, a "-" (hyphen) is displayed.
Chapter 10 Component Management 10.1 Component Status ■ Sensor Information The real time and threshold values (Low/High) for the temperature, voltage, current, transmission power, and received power are displayed in the Sensor Information. When the information cannot be obtained, a "-" (hyphen) is displayed. The target components for this information are FC that have SFPs from which information can be obtained.
Chapter 10 Component Management 10.1 Component Status - Current • Present The real time current of the SFP in the port is displayed. - x mA (x: 0.00 to 131.00) • Warning - Low or High The Warning threshold (Low/High) for the current of the SFP in the port is displayed. • x mA (x: 0.00 to 131.00) • Alarm - Low or High The Alarm threshold (Low/High) for the current of the SFP in the port is displayed. • x mA (x: 0.00 to 131.
Chapter 10 Component Management 10.1 Component Status ● iSCSI port The detailed iSCSI port information is displayed. The following items are displayed in the Main area: ■ CM#x CA#y Port#z Information - Location The location information of the port is displayed. • CM#x CA#y Port#z (x: CM number, y: CA number, z: Port number) - Port Mode The port mode is displayed. • CA • RA • CA/RA - Status The port status is displayed. Refer to "B.5 Component Status" (page 977) for details.
Chapter 10 Component Management 10.1 Component Status - Link Status The link status of the port is displayed. If the status is " Unknown", a "-" (hyphen) is displayed. • • • • Link Down 100Mbit/s Link Up 1Gbit/s Link Up 10Gbit/s Link Up - iSCSI Name The iSCSI name is displayed. - iSCSI Alias Name The iSCSI Alias name is displayed. - iSCSI IP Address The IPv4 address of the iSCSI is displayed. If not specified, a "-" (hyphen) is displayed. - iSCSI Subnet Mask The subnet mask of the iSCSI is displayed.
Chapter 10 Component Management 10.1 Component Status - Bandwidth Limit The bandwidth limit of the iSCSI is displayed between 10Mbit/s - 400Mbit/s. A "-" (hyphen) is displayed in the following conditions: • When the Bandwidth Limit is "0" • When the "Type" is "1G iSCSI " or "10G iSCSI" - MTU Size The MTU size of the iSCSI is displayed.
Chapter 10 Component Management 10.1 Component Status ■ Sensor Information The real time and threshold values (Low/High) for the temperature, voltage, current, transmission power, and received power are displayed in the Sensor Information. When the information cannot be obtained, a "-" (hyphen) is displayed. The target components for this information are 10 iSCSI that have SFPs from which information can be obtained. Refer to "Sensor Information" (page 685) for display items.
Chapter 10 Component Management 10.1 Component Status - Link Status The link status for each Phy is displayed. If the status is " Unknown", a "-" (hyphen) is displayed. • Phy#0 - 3:x "x" indicates one of the following statuses: - Link Down - 1.5Gbit/s Link Up - 3Gbit/s Link Up - 6Gbit/s Link Up - SAS Address The SAS address is displayed. If not specified, a "-" (hyphen) is displayed. - Affinity Mode The affinity mode of the port is displayed. • ON • OFF - Part Number The part number is not displayed.
Chapter 10 Component Management 10.1 Component Status The following items are displayed in the Main area: ■ CM#x CA#y Port#z Information - Location The location information of the port is displayed. • CM#x CA#y Port#z (x: CM number, y: CA number, z: Port number) - Port Mode The port mode (fixed to "CA") is displayed. - Status The port status is displayed. Refer to "B.5 Component Status" (page 977) for details. - Status Code The port status code is displayed. - Error Code The port error code is displayed.
Chapter 10 Component Management 10.1 Component Status - Fabric Name The fabric name (WWN for FCoE) is displayed. When the fabric name is manually specified, the specified fabric name is displayed. When the fabric name is automatically specified, "Auto" is displayed. - MAC Address The MAC address of the port is displayed. - Part Number The part number of the port is displayed. If the part number cannot be acquired, a "-" (hyphen) is displayed. - Serial Number The serial number of the port is displayed.
Chapter 10 Component Management 10.2 Functions in the Action Area for Component 10.2 Functions in the Action Area for Component When using functions in the Action area, select the desired function from the Action area that is displayed in the status display screen.
Chapter 10 Component Management 10.2 Functions in the Action Area for Component 10.2.1 Add Drive Enclosure This function enables DEs to be added without stopping the ETERNUS DX Disk storage system. Use GUI to install any DEs that are added. Specify between DE#01 - DE#09 for the drive enclosures that are to be added. • When logged in using a user account with the "Admin" default role, this function is available only with the ETERNUS DX80 S2/DX90 S2.
Chapter 10 Component Management 10.2 Functions in the Action Area for Component 2 Click the [Next >>] button. The displayed screen may vary depending on whether the recovery process is required or not. ■ When the recovery process is required → The [Recovery Procedure] screen appears. Proceed to Step 3. ■ When the recovery process is not required → The [Place DE on the rack] screen appears. Proceed to Step 4. 3 Perform the recovery operation according to the displayed procedure.
Chapter 10 Component Management 10.2 Functions in the Action Area for Component 4 Perform the DE expansion according to the displayed procedure, and click the [Next >>] button. → The DE installation starts and the [Status Check] screen appears. After the installation is complete, the [Finish] screen appears. 5 Click the [Done] button to return to the [Drive Enclosure] screen.
Chapter 10 Component Management 10.2 Functions in the Action Area for Component 10.2.2 Turn on Locator Beacon/Turn off Locator Beacon This function blinks or turns off the locator beacon of the CE, the CM, or the SVC to identify the component that requires maintenance.
Chapter 10 Component Management 10.2 Functions in the Action Area for Component ■ Turning off the LED The procedure to turn off an LED is as follows: Procedure 1 Click [Turn off locator beacon] in [Action]. → A confirmation screen appears. If the LED is already turned off, [Turn off locator beacon] cannot be selected. 2 Click the [OK] button. → The locator beacon is turned off. 3 Click the [Done] button to return to the [Controller Enclosure] screen. End of procedure 10.2.
Chapter 10 Component Management 10.2 Functions in the Action Area for Component The procedure to add a CA port is as follows: Procedure 1 Click [Add Channel Adapter Port] in [Action]. → The [Start] screen appears. 2 Click the [Next >>] button. The displayed screen may vary depending on whether the installation of license key is required or not. ■ When the license key is not registered → The [Register license of additional Channel Adapter Port] screen appears. Proceed to Step 3.
Chapter 10 Component Management 10.2 Functions in the Action Area for Component 3 Input the license key, and click the [Next >>] button. • License Key Input the license key. The following input conditions apply: - 16 characters - Capital letters and numeric characters → The [Register license of additional Channel Adapter Port] screen appears. The [Define additional Channel Adapter port] screen appears after the registration of the license key is complete.
Chapter 10 Component Management 10.2 Functions in the Action Area for Component ■ For FC, FCoE, or 10G iSCSI host interfaces → The installation of SFP starts and the [Check SFP Installation] screen appears. After the installation of the SFP is complete (when the CA includes an SFP), the installation of the CA port starts and the [Status Check] screen appears. After the installation of the CA port is complete, the [Finish] screen appears.
Chapter 10 Component Management 10.2 Functions in the Action Area for Component The procedure to register a Global Hot Spare is as follows: Procedure 1 Select a drive that is to be used as a Global Hot Spare (multiple selections can be made) and click [Assign Global HS] in [Action]. → A confirmation screen appears. 2 Click the [OK] button. → Registration of the Global Hot Spare starts. 3 Click the [Done] button to return to the [Disks] screen. End of procedure 10.2.
Chapter 10 Component Management 10.2 Functions in the Action Area for Component 2 Click the [OK] button. → Releasing of the Global Hot Spare starts. 3 Click the [Done] button to return to the [Disks] screen. End of procedure 10.2.6 Assign Dedicated Hot Spare This function registers a drive as a Dedicated Hot Spare for a RAID group. A Dedicated Hot Spare is a spare drive (hot spare) that is registered in the RAID group instead of the failed drive when a drive failure is occur.
Chapter 10 Component Management 10.2 Functions in the Action Area for Component The procedure to register a Dedicated Hot Spare is as follows: Procedure 1 Select a drive (multiple selections can be made) that is to be used as a Dedicated Hot Spare and click [Assign Dedicated HS] in [Action]. Select the same type of drives that configure the target RAID group. If multiple types of drives are selected, the [Assign Dedicated HS] is not available.
Chapter 10 Component Management 10.2 Functions in the Action Area for Component 10.2.7 Release Dedicated Hot Spare This function releases a drive from being a Dedicated Hot Spare. A drive that is released from being a Dedicated Hot Spare can be used as a data drive, Global Hot Spare, or Dedicated Hot Spare for a different RAID group. This function cannot be used when the drive is already used as a hot spare.
Chapter 10 Component Management 10.2 Functions in the Action Area for Component 10.2.9 Clear Disk Error Statistics (All Disks) This function deletes the error information from all of the drives. This function can be performed without selecting the drive to delete error information or without the error information that is to be deleted. The procedure to delete error information from all the drives is as follows: Procedure 1 Click [Clear All Error] in [Action]. → A confirmation screen appears.
Chapter 10 Component Management 10.2 Functions in the Action Area for Component The procedure to delete error information from the selected drive is as follows: Procedure 1 Select the drive to delete error information from (multiple selections can be made) and click [Clear Error] in [Action]. → A confirmation screen appears. 2 Click the [OK] button. → Deletion of the error information from the selected drive starts. 3 Click the [Done] button to return to the [Disk Error Statistics] screen.
Chapter 11 System Management This chapter describes system management. 11.1 System Status System status displays the status information of volumes.
Chapter 11 System Management 11.1 System Status 11.1.1 System (Basic Information) This function displays the system information and a list of users who are currently logged in. • The user list is displayed only when a user account with the "User Management" policy is used to log in.
Chapter 11 System Management 11.1 System Status • Firmware Version The current controller firmware version is displayed. - VxxLyy-zzzz (Vxx: Version, Lyy: Level, zzzz: Release number) • Cache Mode The current status and the factor of the cache are displayed. The normal status is "Write Back Mode". - Write Back Mode When a Write request is issued from the host, "Write Complete" is displayed after writing to the cache area is complete.
Chapter 11 System Management 11.1 System Status • Session ID An identification number between 0 - 65535 for users who are logged in is displayed. A session ID is obtained for each login and released with each logout. Because the session ID is obtained discretely, the same session ID is not used even if the same user logs in again. GUI uses session IDs between 1 - 999 and CLI (including SOFT) uses session IDs from 1001 onwards. An "*" (asterisk) is added on top of the current user's (your) session ID.
Chapter 11 System Management 11.1 System Status 11.1.2 Network This function displays the network environment of each port in the ETERNUS DX Disk storage system. Click the [ ] icon to display the latest screen. Note that after changing the firewall setting and returning to this screen, it takes approximately 10 seconds to update the display contents. Wait at least 10 seconds and click the [ ] icon or click [Network] in the category to display the [Network] screen again.
Chapter 11 System Management 11.1 System Status • Master IP Address The IP address of the Master CM, which has been specified to the port, is displayed. If not specified, the field is blank. This item is used for IPv4. • Slave IP Address The IP address of the Slave CM, which has been specified to the port, is displayed. If there is only one CM, the "Slave CM IP Address" is not displayed. If not specified, the field is blank. This item is used for IPv4.
Chapter 11 System Management 11.1 System Status ■ Firewall The Firewall setting status for each service and the SNMP information and the E-Mail information of the ETERNUS DX Disk storage system are displayed. The following items are displayed in the Main area: • Port The port type is displayed.
Chapter 11 System Management 11.1 System Status ● SNMP Information • SNMP Function Whether the SNMP function is enabled or disabled is displayed. ● E-Mail Information • Notification E-Mail Whether the E-mail notification is enabled or disabled is displayed. 11.1.3 Remote Support (REMCS) for Regions other than EMEA This function displays the Remote Support function settings and the operation status in the ETERNUS DX Disk storage system. This caution is applied for regions other than Japan.
Chapter 11 System Management 11.1 System Status The following items are displayed in the Main area: • Customer Information Setup Whether or not the customer information has been specified at the REMCS center is displayed. • Communication Environment Setup Whether or not the communication environment information has been specified at the REMCS center is displayed. • Support Status The Remote Support status is displayed. - "-" (hyphen) The Remote Support is not operating.
Chapter 11 System Management 11.1 System Status • Automatic Log Transmission Whether the automatic log transmission is enabled or disabled is displayed. - "-" (hyphen) The Remote Support is not operating. - ON The automatic log transmission is enabled. The internal log of the ETERNUS DX Disk storage system is automatically sent to the REMCS center when an error occurs. - OFF The automatic log transmission is disabled.
Chapter 11 System Management 11.1 System Status 11.1.4 Remote Support (AIS Connect) for Regions other than Japan This function displays the setting information for AIS Connect. The AIS Connect function monitors or controls remotely the ETERNUS DX80 S2/DX90 S2, the ETERNUS DX410 S2/DX440 S2, or the ETERNUS DX8100 S2/DX8700 S2 from a remote server (AIS Connect server). This caution is applied for regions other than EMEA. REMCS and AIS Connect cannot be used at the same time.
Chapter 11 System Management 11.1 System Status • Service Contract Responsibility (Country Code : Country Name) The country in which the support office for the ETERNUS DX Disk storage system is located is displayed in "Country Code : Country Name" format. This item is not displayed when "Service Contract Responsibility (Country Code : Country Name)" is not specified from CLI. • Use LAN Port The LAN port that is used for communication with the AIS Connect server is displayed.
Chapter 11 System Management 11.1 System Status 11.1.4.1 Root Certificate This function displays the root certificate that is used for SSL communication with the AIS Connect server. If multiple certificates are included in the root certificate file, up to 6 issuer names and their validity periods are displayed. • The root certificate that is registered in the ETERNUS DX Disk storage system is displayed by default. When the root certificate is updated, only the latest certificate is displayed.
Chapter 11 System Management 11.1 System Status 11.1.5 Key Management This function displays the setting parameters for the key server. In this section, the SED authentication key is referred to as "key". The following items are displayed in the Main area: ● Key Management Machine Name • Key Management Machine Name The name of the device that is connected to the key server is displayed. If the key management device name is not specified, the field is blank.
Chapter 11 System Management 11.1 System Status 11.1.5.1 Key Group This function displays the key information that is used for a key group and the SSL/KMIP certificate information. The key group combines all of the RAID groups that use the same key. The RAID groups that are registered in the key group can be checked by using the [SED Key Group] screen. Refer to "6.1.4 SED Key Group" (page 167) for details.
Chapter 11 System Management 11.1 System Status - High Rebuilding to hot spares for which the key cannot be changed after SED failure is not performed. The RAID group loses its redundancy (" Exposed" or " Partially Exposed" (for High Reliability (RAID6))). When SED maintenance is being performed, replacing a SED with a new SED for which the key cannot be changed does not complete successfully. If this action is performed, the status of the new SED changes to " Not Exist".
Chapter 11 System Management 11.1 System Status - Status The master server status is displayed. If no key group is created or if no master server is specified, the field is blank. Refer to "B.7 Key Server Status" (page 980) for details. • Slave Server - Server ID The key server ID of the slave server is displayed. If no key group is created or if no slave server is specified, the field is blank. - Domain Name / IP Address The domain name (FQDN) or the IP address of the slave server is displayed.
Chapter 11 System Management 11.1 System Status 11.1.6 Define Role The registered custom roles in the ETERNUS DX Disk storage system are displayed. A custom role is a role created by the user in combination of policies, in addition to the default roles. The following items are displayed in the Main area: • Role The custom role name is displayed. 11.1.7 ECO Mode A list of the ECO mode setting status and the ECO mode schedule that is registered in the ETERNUS DX Disk storage system are displayed.
Chapter 11 System Management 11.1 System Status The following items are displayed in the Main area: ● ECO Mode General Setting • ECO Mode The ECO mode setting (enabled or disabled) for all of the ETERNUS DX Disk storage systems is displayed. ● ECO Mode Schedule • No. The schedule number is displayed. By clicking this link, the [ECO Mode Schedule] screen is displayed. Refer to "11.1.13 ECO Mode Schedule Detail" (page 733) for display items.
Chapter 11 System Management 11.1 System Status 11.1.9 Audit Log This function displays the audit log information. An audit log records not only operations that are performed by a user, but also how the ETERNUS DX Disk storage system operates for these operations.
Chapter 11 System Management 11.1 System Status 11.1.10 Storage Migration This function displays the setting and progress of Storage Migration. Storage Migration is the function for migrating data by connecting other storage systems (migration source) and the ETERNUS DX disk storage system (migration destination). Data migration is possible regardless of the server and the OS, and without using server resources.
Chapter 11 System Management 11.1 System Status The following items are displayed in the Main area: • Path Group The path group number is displayed. Click this item to display the [Path Group Detail Information] screen. Refer to "11.1.14 Path Group Detail Information" (page 734) for details. A path group combines the paths for data migration into a group for each source storage system. The paths from a single source storage system to the ETERNUS DX disk storage system (destination) constitute a path group.
Chapter 11 System Management 11.1 System Status 11.1.11 Utility Descriptions on the actions that can be started from the [Utility] screen are displayed. 11.1.12 System Settings This function displays the system setting information. The following items are displayed in the Main area: For ETERNUS DX8700 S2, "I/O Offloading (Current / After Power OFF ON)" is displayed. • Storage System Name The name for the ETERNUS DX Disk storage system is displayed.
Chapter 11 System Management 11.1 System Status • Date The date and time when the event occurs are displayed. - YYYY-MM-DD hh:mm:ss (YYYY: Year (AD), MM: Month (01 - 12), DD: Day (01 - 31), hh: Hour (00 - 23), mm: Minute (00 - 59), ss: Second (00 - 59)) • Box ID The Box ID is displayed. Box ID is the information to be used for application software to define the remote device. The initial Box ID is a device ID that is created by combining device information (series name, model, serial number, etc.).
Chapter 11 System Management 11.1 System Status When different settings are specified for "Current" and "After Power OFF ON", reboot the ETERNUS DX Disk storage system. • SED Authentication Key Whether the SED authentication key has been "Registered" or "Not Registered" is displayed. 11.1.13 ECO Mode Schedule Detail In this screen, the detailed information of an ECO mode schedule is displayed. The following items are displayed in the Main area: ● Schedule • No. The schedule number is displayed.
Chapter 11 System Management 11.1 System Status 11.1.14 Path Group Detail Information In this screen, the detailed information of a path group is displayed. The following items are displayed in the Main area: Items displayed in this screen vary depending on whether the previous screen is the [Storage Migration] screen or the [Start Storage Migration] screen. When the previous screen is the [Storage Migration] screen, the progress of Storage Migration is checked.
Chapter 11 System Management 11.1 System Status • Operation Mode The operation mode for the path group is displayed. When a Storage Migration setting file is in the old format or when a Storage Migration setting file is in the new format and the operation mode setting is omitted, "Migration" is displayed. - Migration Data migration from the source storage system to the destination storage system is performed.
Chapter 11 System Management 11.1 System Status ● Migration Connection Path • Source WWN The WWN for the source FC-CA port is displayed. • CA Port The location information of the destination FC-Initiator is displayed. - CM#x CA#y Port#z (x: CM number, y: CA number, z: Port number) ● Storage Migration Volume List • Source LUN The source LUN is displayed in decimal number.
Chapter 11 System Management 11.1 System Status • Migration Status The data migration status is displayed. - Initial Initial state - Waiting Awaiting migration - Running Migrating - Normal End Normally completed - Suspend In suspension - Stop Stopped - Error (xxx) (xxx) indicates the error factor. - "-" (hyphen) Does not exist in the source LUN (the LUN status is "Not Exist"). • Progress The data transfer progress is displayed.
Chapter 11 System Management 11.1 System Status • Error Location The storage system in which a data migration error occurs is displayed. If no error is occurred, a "-" (hyphen) is displayed. This item is displayed only when the previous screen is the [Storage Migration] screen. - Source Migration source storage system - Destination ETERNUS DX Disk storage system (destination storage system) • Result When the source LUN and destination volume are in normal status, the "Result" field is blank.
Chapter 11 System Management 11.2 Functions in the Action Area for System 11.2 Functions in the Action Area for System When using functions in the Action area, select the desired function from the Action area that is displayed in the status display screen.
Chapter 11 System Management 11.
Chapter 11 System Management 11.
Chapter 11 System Management 11.2 Functions in the Action Area for System 11.2.1 Change User Password This function changes the current user's (your) password. When RADIUS Authentication is used for login, the password cannot be changed. The procedure to change the password is as follows: Procedure 1 Click [Change User Password] in [Action]. 2 Specify the parameters, and click the [Change] button. • Old Password Input the current password.
Chapter 11 System Management 11.2 Functions in the Action Area for System An error screen appears in the following conditions: • When "Old Password", "New Password", and/or "Confirm New Password" is not input • When a parameter does not satisfy the input conditions • When the current password does not match "Old Password" • When "New Password" does not match "Confirm New Password" 3 Click the [OK] button. → Changing of the user password starts.
Chapter 11 System Management 11.2 Functions in the Action Area for System 2 Specify the SSH Public Key, and click the [Set] button. • Delete checkbox To delete the current user's (your) SSH client public key, select the checkbox. The checkbox is displayed only when the SSH client public key has been registered. • SSH Public Key Register or change the SSH client public key used for login authentication from CLI in the ETERNUS DX Disk storage system. Click the [Browse...
Chapter 11 System Management 11.2 Functions in the Action Area for System 11.2.3 Network Management This section describes the network environment settings. The following functions are available for the network environment settings: • • • • • • • • • • • • • • • • • 11.2.3.
Chapter 11 System Management 11.2 Functions in the Action Area for System • When SNMP Manager exists in a different subnetwork from where the ETERNUS DX Disk storage system belongs, specify the IP address or the network address of SNMP Manager in the "Allowed IP List" using the procedure in "11.2.3.1 Setup Network Environment" (page 745). • Logging in again may be required after the settings are complete.
Chapter 11 System Management 11.2 Functions in the Action Area for System 2 Select the network port and specify each item. ● Select Network Port • Network Port Select the port to configure from "MNT", "RMT", and "FST". - For ETERNUS DX80 S2/DX90 S2: MNT or RMT - For ETERNUS DX410 S2/DX440 S2: MNT, RMT, or FST - For ETERNUS DX8100 S2/DX8700 S2: MNT, RMT, or FST ● Interface • Master IP Address Input the IP address for the Master CM of the ETERNUS DX Disk storage system.
Chapter 11 System Management 11.2 Functions in the Action Area for System When two CMs are installed, a CM, to which authority to manage the ETERNUS DX Disk storage system has been given, is called a "Master CM". The other CM is called a "Slave CM". When an error occurs in a CM or a LAN, the Master CM is automatically switched, and the IP address of the old Master CM is passed to the new Master CM.
Chapter 11 System Management 11.2 Functions in the Action Area for System 4 Input the IP address and the subnet mask, and then click the [OK] button. If the gateway is specified, the information of the remote devices for which network access will be allowed can be input. ● Allow IP Setting • IP Address Input the IP address (or the network address) for the remote device. (*1) Up to 16 addresses can be registered. Make sure to input the IP address (or the network address) and subnet mask together.
Chapter 11 System Management 11.2 Functions in the Action Area for System 6 After registering the IP address is complete, click the [Set] button. → A confirmation screen appears. • When specifying the IP address or the subnet mask, note the following: - IP addresses must be specified with the IPv4 format - The IP address of the RMT port must be in a different subnetwork from the MNT port - Specify the IP address of the Slave CM when connecting to the Slave CM.
Chapter 11 System Management 11.2 Functions in the Action Area for System 8 Click the [Done] button to return to the [Network] screen. Device management operation cannot be continued if the IP address of the ETERNUS DX Disk storage system has been changed. Logging in again with the new IP address is required. End of procedure ■ When using IPv6 The procedure to set network environment using IPv6 address is as follows: Procedure 1 Click [Setup Network] in [Action].
Chapter 11 System Management 11.2 Functions in the Action Area for System • Slave IP Link Local Address Input the link local address (interface ID) for the Slave CM of the ETERNUS DX Disk storage system. The link local address of the Slave CM is used when an error occurs in the Master CM. Refer to "Available IPv6 Address" (page 757) for details. This item is not displayed for the 1CM model. Note that the current setting is displayed by an abbreviation.
Chapter 11 System Management 11.2 Functions in the Action Area for System • Secondary DNS Input the IP address of the Secondary DNS server. The Secondary DNS server must be specified after the Primary DNS server. The following IPv6 addresses can be used; "global address", "unique local address", and "6to4 address". Refer to "Available IPv6 Address" (page 757) for details. Note that the current setting is displayed by an abbreviation.
Chapter 11 System Management 11.2 Functions in the Action Area for System 3 To allow access from a different subnetwork to the ETERNUS DX Disk storage system, click the [Add] button. → The [Add Allow IP] screen appears. 4 Input "Connect IP Address" and "Length of Subnet Prefix", and click the [OK] button. ● Allow IP Setting • Connect IP Address Input the connect IP address that is to be displayed. The following IPv6 addresses can be used; "global address", "unique local address", and "6to4 address".
Chapter 11 System Management 11.2 Functions in the Action Area for System → Returns to the [Setup Network Environment] screen. 5 Repeat Step 3 and Step 4 when registering several connect IP addresses. 6 After registering the connect IP address is complete, click the [Set] button. → A confirmation screen appears.
Chapter 11 System Management 11.2 Functions in the Action Area for System • Note the following points when specifying an IP address: - IP addresses must be specified with the IPv6 format.
Chapter 11 System Management 11.2 Functions in the Action Area for System ● Available IPv6 Address No.
Chapter 11 System Management 11.2 Functions in the Action Area for System ■ Supplementary Information • When accessing of the ETERNUS DX Disk storage system from a different subnetwork is not allowed Specify "IP Address" and "Subnet Mask" of the ETERNUS DX Disk storage system. Only accessing from the same subnetwork is allowed.
Chapter 11 System Management 11.2 Functions in the Action Area for System • To configure the network environment of the ETERNUS DX Disk storage system, use the procedure in "11.2.3.1 Setup Network Environment" (page 745). • The following table shows the protocols, the port numbers, and the direction for each service.
Chapter 11 System Management 11.2 Functions in the Action Area for System • ICMP Specify whether to enable or disable the ICMP connection. Select the checkbox to enable the connection. The Internet Control Message Protocol (ICMP) is used when sending the ping command from a PC. • Maintenance-Secure Specify whether to enable or disable the Maintenance-Secure connection. Select the checkbox to enable the connection.
Chapter 11 System Management 11.2 Functions in the Action Area for System 11.2.3.3 Setup SNMP Agent Basic Interface This function sets up the SNMP Agent basic interface in the ETERNUS DX Disk storage system. SNMP is a standard protocol used for network management. • When SNMP Manager exists in a different subnetwork from where the ETERNUS DX Disk storage system belongs, specify the IP address or the network address of SNMP Manager in "Allowed IP List" using the procedure in "11.2.3.
Chapter 11 System Management 11.2 Functions in the Action Area for System • LAN Port used for SNMP When enabling the SNMP function, select the port used for SNMP from "MNT" or "RMT". When sending a SNMPv1 trap, the agent-address of the trap sender is the Master CM IP address of the selected port. • Authentication Failure When enabling the SNMP function, select "Send SNMP Trap" or "Do not send SNMP Trap" when authentication fails. • Engine ID When enabling the SNMP function, enter the engine ID of the SNMP.
Chapter 11 System Management 11.2 Functions in the Action Area for System If the entered engine ID does not satisfy the input conditions, an error screen appears. 3 Click the [OK] button. → Setting of the SNMP Agent basic interface starts. 4 Click the [Done] button to return to the [Network] screen. End of procedure 11.2.3.4 Setup SNMP Manager This function specifies the IP address of the SNMP Manager.
Chapter 11 System Management 11.2 Functions in the Action Area for System 2 Click the [Add] button. → The [Manager] screen appears. • Click the [Manager] link to edit the existing IP address for the target SNMP manager area. • Click the [Delete] button to delete the existing IP address for the target SNMP Manager area. 3 Input or edit the IP address, and click the [OK] button. • IP Version Select "IPv4" or "IPv6" for the IP version of the SNMP Manager IP address.
Chapter 11 System Management 11.2 Functions in the Action Area for System → Returns to the original screen. 4 Repeat Step 2 and Step 3 to configure multiple IP addresses. 5 After adding or editing the IP address, click the [Set] button. → A confirmation screen appears. 6 Click the [OK] button. → Setting of the SNMP Manager starts.
Chapter 11 System Management 11.2 Functions in the Action Area for System 7 Click the [Done] button to return to the [Network] screen. End of procedure 11.2.3.5 Setup SNMP Agent MIB Access View This function sets up the SNMP Agent MIB View. MIB View is used for defining the accessible area in the Management Information Base (MIB) database, with a tree type structure. Use this item when defining the accessible area in the MIB database.
Chapter 11 System Management 11.2 Functions in the Action Area for System 3 Input or edit the MIB View, and click the [OK] button. • View Name Input the MIB View name. The view name which has already been used cannot be entered.
Chapter 11 System Management 11.2 Functions in the Action Area for System 5 After adding or editing the MIB View, click the [Set] button. → A confirmation screen appears. 6 Click the [OK] button. → Setting of the SNMP Agent MIB View starts. 7 Click the [Done] button to return to the [Network] screen. End of procedure 11.2.3.6 Setup SNMP Agent User This function sets up the user which accesses the SNMP Agent. The security level and the MIB access range are configured for each user.
Chapter 11 System Management 11.2 Functions in the Action Area for System The authentication and encryption can be enabled/disabled, and also the MIB access range can be specified, for each user. The procedure to set the user to access the SNMP Agent is as follows: Procedure 1 Click [Setup SNMP User] in [Action]. 2 Click the [Add] button. Click the [User Name] link to edit the existing user. 3 Input or edit the user information, and click the [OK] button.
Chapter 11 System Management 11.2 Functions in the Action Area for System • Authentication Password When enabling authentication, enter the authentication password. The following input conditions apply: - 8 - 64 alphanumeric characters and symbols - "! (exclamation mark)", "# (hash mark)", "& (ampersand)", "_ (underscore)", "+ (plus)", "(hyphen)", "* (asterisk)" and "/ (slash)" can be used - Spaces • Retype Authentication Password When enabling authentication, enter the authentication password again.
Chapter 11 System Management 11.2 Functions in the Action Area for System 5 After adding or editing the user information, click the [Set] button. → A confirmation screen appears. 6 Click the [OK] button. → Setting of the SNMP Agent user starts. 7 Click the [Done] button to return to the [Network] screen. End of procedure 11.2.3.7 Setup SNMP Agent Community This function sets up the SNMP Agent Community. The Community is a range of available networks for SNMP.
Chapter 11 System Management 11.2 Functions in the Action Area for System The SNMP Managers which are allowed to access, and the MIB access range, can be specified for each community. The procedure to set the SNMP Agent community is as follows: Procedure 1 Click [Setup SNMP Community] in [Action]. 2 Click the [Add] button. Click the [Community Name] link to edit the existing community information. 3 Input or edit the community, and click the [OK] button.
Chapter 11 System Management 11.2 Functions in the Action Area for System • Allowed SNMP Manager List Select the IP address of the SNMP Manager which is allowed to access in the community. Only the selected SNMP Manager is allowed to access. However, if the Allowed SNMP Manager List has been left blank, all of the SNMP Managers (*1) are allowed to access. *1: Not only the SNMP Manager which has been registered using the procedure in "11.2.3.
Chapter 11 System Management 11.2 Functions in the Action Area for System 6 Click the [OK] button. → Setting of the SNMP Agent Community starts. 7 Click the [Done] button to return to the [Network] screen. End of procedure 11.2.3.8 Setup SNMP Agent Trap This function notifies events that occur in the ETERNUS DX Disk storage system to the SNMP Manager by an SNMP Trap. This function configures the trap destination, the trap version, etc.
Chapter 11 System Management 11.2 Functions in the Action Area for System 2 Click the [Add] button. Click the [Trap No.] link to edit the existing trap. 3 Add or edit the trap information, and click the [OK] button. • Manager No. Select a manager number from "Manager01" to "Manager10". The management number of the SNMP Manager, which has been registered using the procedure in "11.2.3.4 Setup SNMP Manager" (page 763), is displayed as an option.
Chapter 11 System Management 11.2 Functions in the Action Area for System → Returns to the original screen. 4 Repeat Step 2 and Step 3 to configure multiple traps. 5 After adding or editing the trap information, click the [Set] button. → A confirmation screen appears. An error screen appears in the following conditions: • When "Manager No. " or "Community Name/User Name" is not input • When a trap with the same parameters (except the "Trap No.
Chapter 11 System Management 11.2 Functions in the Action Area for System 6 Click the [OK] button. → Setting of the SNMP Agent Trap starts. 7 Click the [Done] button to return to the [Network] screen. End of procedure 11.2.3.9 Download MIB File This function downloads the MIB definition file in the ETERNUS DX Disk storage system. MIB is the information for managing SNMP Agent that is transferred by using SNMP Manager with the SNMP.
Chapter 11 System Management 11.2 Functions in the Action Area for System 3 Click the [OK] button. → A dialog box to download the file appears. 4 Save the downloaded file. The file name is as follows: • ETERNUS DX80 S2/DX90 S2: "FJDARY-E100.MIB" • ETERNUS DX410 S2/DX440 S2: "FJDARY-E100.MIB" • ETERNUS DX8100 S2: "FJDARY-E100.MIB" • ETERNUS DX8700 S2: "FJDARY-E102.MIB" → The downloaded file is saved. 5 Click the [Done] button to return to the [Network] screen. End of procedure 11.2.3.
Chapter 11 System Management 11.2 Functions in the Action Area for System The procedure to perform the SNMP Trap test is as follows: Procedure 1 Click [Send SNMP Trap] in [Action]. 2 Click the [Send] button. → A confirmation screen appears. 3 Click the [OK] button. → The SNMP Trap test is performed. 4 Click the [Done] button to return to the [Network] screen. Confirm that the trap has been successfully received by SNMP Manager after the SNMP Trap test has been performed.
Chapter 11 System Management 11.2 Functions in the Action Area for System 11.2.3.11 Display SMTP Log This function displays the E-Mail communication log between the ETERNUS DX Disk storage system and the EMail server. If the E-Mail communication is not operated properly, this function may identify the cause of problem. The E-Mail communication log contains requests from the ETERNUS DX Disk storage system to the server and responses from the server to the ETERNUS DX Disk storage system.
Chapter 11 System Management 11.2 Functions in the Action Area for System 11.2.3.12 Setup E-Mail Notification This function is used to configure the E-mail Notification settings for the various events detected by the ETERNUS DX Disk storage system. To specify event notification, refer to "11.2.9.1 Setup Event Notification" (page 880). When stopping the event notification via E-Mail, perform one of the following procedures.
Chapter 11 System Management 11.2 Functions in the Action Area for System • SMTP Server Specify the IP address or domain name of the SMTP server to be used. There are two methods to specify an IP address; "IPv4" and "IPv6". The following IPv6 addresses can be used; "link local address", "global address", "unique local address", and "6to4 address". Refer to "Available IPv6 Address" (page 757) for details. When the current setting is displayed, the IPv6 address is displayed as an abbreviation.
Chapter 11 System Management 11.2 Functions in the Action Area for System → A confirmation screen appears. 3 Click the [OK] button. → The specified E-mail notification setting is performed. 4 Click the [Done] button to return to the [Network] screen. Click the [Send Test E-Mail] button to confirm that an E-Mail can be sent to the specified address. When sending a test E-Mail, select "Enable" for the "Notification E-Mail" setting.
Chapter 11 System Management 11.2 Functions in the Action Area for System • Select whether to send ("on") or not send ("off") Syslogs for each ETERNUS DX Disk storage system. • Confirm that the Syslog has been successfully sent to the Syslog server by logging in and out from GUI or CLI and performing a transmission test to the Syslog server. • Even if a communication error occurs between the ETERNUS DX Disk storage system and the Syslog server, the Syslog is not sent again. • Use the procedure in "11.2.9.
Chapter 11 System Management 11.2 Functions in the Action Area for System • LAN Port Select the LAN port from "MNT" or "RMT" that is to be used to send a Syslog. → A confirmation screen appears. Up to two Syslog servers can be configured. When configuring a second Syslog server, specify the required parameters in "Syslog Server2". 3 Click the [OK] button. → Setting of the Syslog starts.
Chapter 11 System Management 11.2 Functions in the Action Area for System 11.2.3.14 Setup SSH Server Key This function sets up the SSH server key that is used when encrypting communication using Secure SHell (SSH). SSH is used when accessing from CLI. After the SSH server key setting has been changed, the information must be updated in the storage system before accessing from CLI via the SSH connection. Log out from CLI and wait a few minutes before logging in again.
Chapter 11 System Management 11.2 Functions in the Action Area for System 3 Click the [OK] button. → Setting of the SSH server key starts. 4 Click the [Done] button to return to the [Network] screen. After setting the SSH server key, the information must be updated in the ETERNUS DX Disk storage system before being accessed from CLI via the SSH connection. Log out from CLI and wait a few minutes before logging in again. End of procedure 11.2.3.
Chapter 11 System Management 11.2 Functions in the Action Area for System The procedures to create SSL server key and the self-signed SSL certificate are as follows: Procedure 1 Click [Create SSL Certificate] in [Action]. 2 Specify the parameters, and click the [Create] button. • Key Length Select the SSL server key length from "1024 bit", "2048 bit", and "4096 bit". The SSL server key length is equivalent to the encryption level.
Chapter 11 System Management 11.2 Functions in the Action Area for System • For IPv6 address - xxxx:xxxx:xxxx:xxxx:xxxx:xxxx:xxxx:xxxx xxxx: 0 - ffff (FFFF) (hexadecimal, alphanumeric characters) Refer to "IPv6 Address Notation" (page 378) for details.
Chapter 11 System Management 11.2 Functions in the Action Area for System 4 Click the [Done] button to return to the [Network] screen. After registering the SSL server key or SSL server certificate, the information must be updated in the ETERNUS DX Disk storage system before being accessed from GUI via the HTTPS connection. Log out from GUI and wait a few minutes before logging in again. End of procedure 11.2.3.
Chapter 11 System Management 11.2 Functions in the Action Area for System • Country Name Input the country code which conforms to ISO-3166 A2 (required). [Example] Japan: JP The following input conditions apply: - Alphabetic characters (upper case) (A - Z) - Two fixed letters • State or Province Name Input the prefecture where the organization is located (required).
Chapter 11 System Management 11.2 Functions in the Action Area for System The following input conditions apply: - Main IP Address • For IPv4 address - xxx.xxx.xxx.xxx xxx: 1 - 255 for the top field (decimal) xxx: 0 - 255 for other fields (decimal) - Class must be A, B, or C. • For IPv6 address - xxxx:xxxx:xxxx:xxxx:xxxx:xxxx:xxxx:xxxx xxxx: 0 - ffff (FFFF) (hexadecimal, alphanumeric characters) Refer to "IPv6 Address Notation" (page 378) for details.
Chapter 11 System Management 11.2 Functions in the Action Area for System → A confirmation screen appears. An error screen appears in the following conditions: • When items do not satisfy the input conditions • When all of the required items are not input 3 Click the [OK] button. → The creation of the CSR starts. When the creation of the CSR is complete, the screen for downloading the file is displayed.
Chapter 11 System Management 11.2 Functions in the Action Area for System 4 Select the file that is to be downloaded, and click the [Export] button. • File Name Select the target file to download from "Key File" or "CSR File". → A dialog box to download the file appears. 5 Save both the key file and the CSR file. The default key file name is "ServerKey_serial number for the ETERNUS DX Disk storage system_YYYYMM-DD_hh-mm-ss.txt".
Chapter 11 System Management 11.2 Functions in the Action Area for System 11.2.3.17 Register SSL Certificate This function registers the SSL server key, which was downloaded by using the [Create Key/CSR] function, and the SSL server certificate which was acquired from the certification authority. • The HTTPS connection from GUI is disabled in the factory settings. • There are two types of SSL certificate formats: the "SSL server certificate" and the "self-signed SSL certificate".
Chapter 11 System Management 11.2 Functions in the Action Area for System 2 Click the [Browse...] button to specify the path to the "SSL Server Key File". • SSL Server Key File Click the [Browse...] button to specify the SSL server key file, or directly input the path to the SSL server key file. Click the [Import] button to import the SSL server key file to GUI. When importing has been completed, "Imported" is displayed. 3 Click the [Import] button. → "Imported" is displayed.
Chapter 11 System Management 11.2 Functions in the Action Area for System 4 Click the [Browse...] button to specify the path to the "SSL Server Certificate File". • SSL Server Certificate File Click the [Browse...] button to specify the SSL server certificate file, or directly input the path to the SSL server certificate file. Click the [Import] button to import the SSL server certificate file to GUI. When importing has been completed, "Imported" is displayed. 5 Click the [Import] button.
Chapter 11 System Management 11.2 Functions in the Action Area for System 6 Confirm that the "SSL server key file" and the "SSL server certificate file" have been imported, and click the [Register] button. → A confirmation screen appears.
Chapter 11 System Management 11.2 Functions in the Action Area for System 11.2.4 Remote Support (REMCS) for Regions other than EMEA This section describes remote support management (by REMCS) for regions other than EMEA. Remote support management (by REMCS) provides the following functions: • • • • • • 11.2.4.
Chapter 11 System Management 11.2 Functions in the Action Area for System 2 Check the displayed "Event Type" and the "Communication Log". 3 Click the [Cancel] button to return to the screen when starting this function in Step 1. End of procedure 11.2.4.2 Setup Remote Support This function registers the customer information and communication environment information required to receive Remote Support from the REMote Customer Support system (REMCS) center.
Chapter 11 System Management 11.2 Functions in the Action Area for System • When changing the registered information, use the procedure in "11.2.4.3 Update Customer Information" (page 805) and the "11.2.4.4 Update Communication Environment Information" (page 808).
Chapter 11 System Management 11.2 Functions in the Action Area for System ● Communication Environment Information Refer to Step 2 in the "11.2.4.4 Update Communication Environment Information" (page 808) for setting items. ● Detailed Configuration Information • Data Transmission Method Select whether to "Split" or "Do not Split" into the specified size.
Chapter 11 System Management 11.2 Functions in the Action Area for System • Connection check operator Select "Notification (Standard E-Mail format)", "Notification (Simple E-Mail format for cell phone)" or "Not Notification" for the connection check operator of the setting confirmation result at the REMCS center. If notifying, input the "Connection check operator E-Mail Address".
Chapter 11 System Management 11.2 Functions in the Action Area for System → A confirmation screen appears.
Chapter 11 System Management 11.2 Functions in the Action Area for System 4 Click the [Done] button to return to the screen when starting this function in Step 1. After completing the setting, the REMCS center sends the setting confirmation result to the "Administrator E-Mail Address" or the "Connection check operator E-Mail Address". Make sure to confirm the setting results. End of procedure 11.2.4.
Chapter 11 System Management 11.2 Functions in the Action Area for System When importing customer information to the ETERNUS DX Disk storage system all at once, click the [Browse...] button to specify the location where the customer information file has been stored, and click the [Import] button. If the [Import] button is clicked in the following conditions, an error screen appears.
Chapter 11 System Management 11.2 Functions in the Action Area for System • Postal Code (Zip Code) Input the postal code for the company that owns ETERNUS DX Disk storage system. The following input condition applies: - Up to 10 alphanumeric characters and symbols • Phone Number* Input the phone number for the company that owns the ETERNUS DX Disk storage system.
Chapter 11 System Management 11.2 Functions in the Action Area for System → A confirmation screen appears. If the [Set] button is clicked in the following conditions, an error screen appears. • When required items (items with "*") are not specified • When wrong values are entered 3 Click the [OK] button. → The customer information is updated. 4 Click the [Done] button to return to the screen when starting this function in Step 1. End of procedure 11.2.4.
Chapter 11 System Management 11.2 Functions in the Action Area for System The Remote Support setting information file (customer information file) created by using REMCS Environment Setup Assist Tool (REMCS ESAT) can be imported to the ETERNUS DX Disk storage system, to simplify the input operation required to be set for each storage system. The procedure to update communication environment information is as follows: Procedure 1 Click [Update Connection Info] in [Action].
Chapter 11 System Management 11.2 Functions in the Action Area for System • Service - Scheduled Connection Time * Input the time for scheduled REMCS connection. (*1) The following input conditions apply: • Numeric characters • Hour ("00" - "23") • Minute ("00" - "59") *1: Different times are specified in the factory settings in order to disperse the load on the REMCS center. - Scheduled Connection Period * Select the term for scheduled REMCS connection.
Chapter 11 System Management 11.2 Functions in the Action Area for System • SMTP Server - SMTP Server * Input the IP address or the domain name of the SMTP server that is used for REMCS operation. The following input condition applies: • Up to 63 alphanumeric characters and symbols (except space) - Port No. * Input the port number of the SMTP server.
Chapter 11 System Management 11.2 Functions in the Action Area for System • REMCS Center - REMCS Center * Select the REMCS center (in each country) where the ETERNUS DX Disk storage system is connected (required).
Chapter 11 System Management 11.2 Functions in the Action Area for System → A confirmation screen appears.
Chapter 11 System Management 11.2 Functions in the Action Area for System 4 Click the [Done] button to return to the screen when starting this function in Step 1. After completing the setting, the REMCS center sends the setting confirmation result to the "Administrator E-Mail Address" or the "Connection check operator E-Mail Address". Make sure to confirm the setting results. End of procedure 11.2.4.
Chapter 11 System Management 11.2 Functions in the Action Area for System ● Send Log Periodically • Periodical Transmission of Log To send log periodically, select the "Enable" checkbox. The default state of "Periodical Transmission of Log" is, if the Remote Support setting using the [Setup Remote Support] function has been completed, "Enable" will be selected. • Time Specify between "0:00" and "23:59" for the time to send logs periodically.
Chapter 11 System Management 11.2 Functions in the Action Area for System 3 Click the [OK] button. → The parameter settings of log transmission (Automatic Log Transmission) are updated in the storage system. 4 Click the [Done] button to return to the screen when starting this function in Step 1. End of procedure ■ Immediately Send Log Manually In this screen, send log manually and immediately. Procedure 1 Click [Setup Log Sending Parameters] in [Action].
Chapter 11 System Management 11.2 Functions in the Action Area for System 3 Specify the parameters, and click the [Run] button. • Incident Number Input the incident number to be added to the log to be sent. The following input condition applies: - Up to 15 alphanumeric characters and symbols (except spaces) • Include I/O Module log Specify whether to collect the I/O module log. To obtain the I/O module log, select the "Yes" checkbox.
Chapter 11 System Management 11.2 Functions in the Action Area for System 4 Click the [OK] button. → Log transmission (Immediately Send Log Manually) is executed. 5 Click the [Done] button to return to the screen when starting this function in Step 1. End of procedure 11.2.4.6 Stop/Restart Remote Support This function temporarily stops the Remote Support function and starts again. This function is used when the ETERNUS DX Disk storage system is stopped for a prolonged period such as for relocation.
Chapter 11 System Management 11.2 Functions in the Action Area for System 2 Click the [Stop] button. → A confirmation screen appears. 3 Click the [OK] button. → The Remote Support is stopped. 4 Click the [Done] button to return to the screen when starting this function in Step 1. End of procedure ■ Restarting Remote Support This function restarts the Remote Support. The Remote Support can be restarted only when it is "Stopped".
Chapter 11 System Management 11.2 Functions in the Action Area for System 2 Click the [Restart] button. → A confirmation screen appears. 3 Click the [OK] button. → The Remote Support is restarted. 4 Click the [Done] button to return to the screen when starting this function in Step 1.
Chapter 11 System Management 11.2 Functions in the Action Area for System 11.2.5 Remote Support (AIS Connect) for Regions other than Japan This section describes remote support management (by AIS Connect) for regions other than Japan. Remote support management (by AIS Connect) provides the following functions: • • • • • • 11.2.5.
Chapter 11 System Management 11.2 Functions in the Action Area for System 2 Check the terms and conditions regarding the handling of personal information. ■ When the [I agree] button is clicked → The [Setup AIS Connect Environment] screen appears. Proceed to Step 3. ■ When the [I decline] button is clicked → Returns to the screen when starting this function in Step 1.
Chapter 11 System Management 11.2 Functions in the Action Area for System • SSL Server Certification To use SSL server certification for communication with the AIS Connect server, select "Enable". To not use SSL server certification, select "Disable". When "Enable" is selected, server certification is performed with the root certificate that is registered in the ETERNUS DX Disk storage system for AIS Connect server communication.
Chapter 11 System Management 11.2 Functions in the Action Area for System • Confirm Password Select the "Change Password" checkbox and then input the password for proxy server authentication again. When inputting the password, "*" is displayed to hide the specified value. If a proxy server is not used, this item does not need to be set. The following input condition applies: - Up to 64 alphanumeric characters and symbols → A confirmation screen appears.
Chapter 11 System Management 11.2 Functions in the Action Area for System 4 Click the [OK] button. → AIS Connect setting starts. 5 Click the [Done] button to return to the screen when starting this function in Step 1. End of procedure 11.2.5.2 Setup Remote Session Permission This function performs permission settings for remote sessions with the AIS Connect function.
Chapter 11 System Management 11.2 Functions in the Action Area for System 2 Specify the parameters, and click the [Set] button. • Remote Session Select whether to permit or forbid a remote session from the AIS Connect server. • Remote Session Timeout Select the timeout limit for remote session connection. When not setting the timeout limit, select "Unlimited". When "Permit" is selected for "Remote Session", monitoring of the remote sessions starts.
Chapter 11 System Management 11.2 Functions in the Action Area for System 11.2.5.3 Send Log This function manually sends a storage system log to the remote server (AIS Connect server) when the AIS Connect function is in operation. • Sending logs is only available when "AIS Connect" is enabled. Refer to "11.2.5.1 Setup AIS Connect Environment" (page 821) for details. • Check the connection to the AIS Connect server in advance. Refer to "11.2.5.4 Test Server Connectivity" (page 828) for details.
Chapter 11 System Management 11.2 Functions in the Action Area for System 11.2.5.4 Test Server Connectivity This function checks the connection status between the ETERNUS DX80 S2/DX90 S2, the ETERNUS DX410 S2/ DX440 S2, or the ETERNUS DX8100 S2/DX8700 S2, and a remote server (AIS Connect server). Checking the connection status is only available when "AIS Connect" is enabled. Refer to "11.2.5.1 Setup AIS Connect Environment" (page 821) for details.
Chapter 11 System Management 11.2 Functions in the Action Area for System 11.2.5.5 Send AIS Connect Test Event This function sends a test event to the remote server (AIS Connect server). • Sending a test event is only available when "AIS Connect" is enabled. Refer to "11.2.5.1 Setup AIS Connect Environment" (page 821) for details. • The [Send AIS Connect Test Event] function only sends an event.
Chapter 11 System Management 11.2 Functions in the Action Area for System 11.2.5.6 Import Root Certificate This function updates the root certificate that is used for SSL communication with the AIS Connect server. A root certificate file includes multiple certificates. The maximum file size of a root certificate is 12288 byte. • A default root certificate is already registered in the ETERNUS DX Disk storage system.
Chapter 11 System Management 11.2 Functions in the Action Area for System An error screen appears in the following conditions: • When the imported file is not "root certificate file" • When the imported file size exceeds 12288 bytes • When both the "AIS Connect" setting and "SSL Server Certification" setting are enabled 3 Click the [OK] button. → Updating of the root certificate starts. 4 Click the [Done] button to return to the [Root Certificate] screen. End of procedure 11.2.
Chapter 11 System Management 11.2 Functions in the Action Area for System 11.2.6.1 Required Settings for the Key Management Function Security on preventing the leakage of information can be improved by storing the key for Self Encrypting Drive (SED) authentication in an external secure place (key server), and updating the key regularly.
Chapter 11 System Management 11.2 Functions in the Action Area for System (3) Setup key management device name Set the name (Key Management Machine Name) for the device that communicates with the key server. Refer to "11.2.6.2 Setup Key Management Machine Name" (page 835). (4) Add key server Register the IP address or the domain name of the key server that manages the key. Up to two key servers can be registered in the ETERNUS DX Disk storage system. Refer to "11.2.6.3 Add Key Server" (page 836).
Chapter 11 System Management 11.2 Functions in the Action Area for System For details on how to register the SSL certificate and accept the ETERNUS DX Disk storage system, refer to the manuals of the key management software "ETERNUS SF KM". ● Check key status (1) Key group Check the communication status between the ETERNUS DX Disk storage system and the key server.
Chapter 11 System Management 11.2 Functions in the Action Area for System 11.2.6.2 Setup Key Management Machine Name This function specifies the name of the key management device (Key Management Machine). The key management device name is used for the device that is to be used to connect to the key server. The key management device name cannot be specified when a common key (*1) is not registered. Refer to "11.2.13.7 Register SED Authentication Key" (page 944) for details.
Chapter 11 System Management 11.2 Functions in the Action Area for System If the entered "Key Management Machine Name" does not satisfy the input conditions, an error screen appears. 3 Click the [OK] button. → Setting of the key management device name starts. 4 Click the [Done] button to return to the [Key Management] screen. End of procedure 11.2.6.3 Add Key Server This function adds a key server. A key server is an external server that manages the key.
Chapter 11 System Management 11.2 Functions in the Action Area for System 2 Specify the parameters, and click the [Add] button. • Server ID "1" or "2" is displayed as the ID for unregistered servers. When a key server is registered for "1", "2" is displayed. The server ID for the master or the slave server is specified when creating the key group. Refer to "11.2.6.6 Create Key Group" (page 841) for details. • Domain Name / IP Address Input the domain name (FQDN) or the IP address of the key server.
Chapter 11 System Management 11.2 Functions in the Action Area for System An error screen appears in the following conditions: • When each parameter fails to satisfy the input conditions • When inputting a domain name or an IP address that is already used for another key server • When the IP address that was input and the IP address of the LAN port (MNT or RMT) are the same • When the IP address that was input and the network address of the LAN port (MNT or RMT)are the same 3 Click the [OK] button.
Chapter 11 System Management 11.2 Functions in the Action Area for System 2 Click the [OK] button. → Deleting of the key server starts. 3 Click the [Done] button to return to the [Key Management] screen. End of procedure 11.2.6.5 Modify Key Server This function changes the key server settings. • Key server settings that are allocated to a key group can be changed. • This function can be used to change "Domain Name / IP Address", "Port No.", and "LAN Port".
Chapter 11 System Management 11.2 Functions in the Action Area for System - For IPv6 address xxxx:xxxx:xxxx:xxxx:xxxx:xxxx:xxxx:xxxx xxxx: 0 - ffff (FFFF) (hexadecimal, alphanumeric characters) Refer to "IPv6 Address Notation (Setup Network Environment)" (page 757) for details. • Port No. Input the port number used to communicate with the key server.
Chapter 11 System Management 11.2 Functions in the Action Area for System 4 Click the [Done] button to return to the [Key Management] screen. End of procedure 11.2.6.6 Create Key Group This function creates a key group. The key group combines all of the RAID groups that use the same key. One key group can be created in the ETERNUS DX Disk storage system. The key group cannot be created when a common key (*1) is not registered. Refer to "11.2.13.7 Register SED Authentication Key" (page 944) for details.
Chapter 11 System Management 11.2 Functions in the Action Area for System • Storage System Group Name Input the storage system group name. The storage system group combines the key management device (Key Management Machine) name that is managed by the user with the key groups. The storage system group name corresponds to "Device Group Name", which is managed in the key server. If the default setting is used, input "ETERNUS_DX".
Chapter 11 System Management 11.2 Functions in the Action Area for System • Recovery Mode Select the recovery mode of the key group from "Auto" or "Manual". The recovery mode is a method to recover locked (*1) RAID groups or SEDs after communication with the key server is resolved. For RAID groups in locked status, " SEDs in locked status, " *1: SED Locked" is displayed. For Not Exist" is displayed. A blocked status that occurs when the key of the RAID groups cannot be obtained.
Chapter 11 System Management 11.2 Functions in the Action Area for System → A confirmation screen appears. An error screen appears in the following conditions: • When the "Name" is not entered • When the "Storage System Group Name" is not entered • When each parameter fails to satisfy the input conditions • When the same server ID is specified for both the master and slave servers 3 Click the [OK] button. → Key group creation starts. 4 Click the [Done] button to return to the [Key Group] screen.
Chapter 11 System Management 11.2 Functions in the Action Area for System The procedure to delete a key group is as follows: Procedure 1 Click [Delete Key Group] in [Action]. → A confirmation screen appears. 2 Click the [OK] button. → Deleting of the key group starts. 3 Click the [Done] button to return to the [Key Group] screen. End of procedure 11.2.6.8 Modify Key Group This function changes the key group settings. The key group combines all of the RAID groups that use the same key.
Chapter 11 System Management 11.2 Functions in the Action Area for System • Storage System Group Name Input the storage system group name. The storage system group combines the key management device (Key Management Machine) name that is managed by the user with the key groups. The storage system group name corresponds to "Device Group Name", which is managed in the key server.
Chapter 11 System Management 11.2 Functions in the Action Area for System - Auto This mode recovers locked RAID groups or SEDs when the communication error with the key server is resolved. - Manual Use the [Recovery SED] function of GUI to recover the locked RAID groups or SEDs when the communication error with the key server is resolved. • Key Valid Period Select a key expiration period that is based on the date when the key from the server is obtained for the first time (beginning of use).
Chapter 11 System Management 11.2 Functions in the Action Area for System → A confirmation screen appears.
Chapter 11 System Management 11.2 Functions in the Action Area for System 11.2.6.9 Update SED Authentication Key This function updates the key in the key group. Updating of the key is performed in the following ways: • When no key is registered in the key group, a key that has not expired is obtained from the key server. • When the key is valid and has not expired, this key is replaced with a new key from the key server.
Chapter 11 System Management 11.2 Functions in the Action Area for System 2 Select whether to use the current key again, and then click the [Update] button. • Current Key Select whether to enable ("Enabled Key") or disable ("Disabled Key") the current key. - Enabled Key - Disabled Key → A confirmation screen appears. 3 Click the [OK] button. → Updating of the SED Authentication Key starts.
Chapter 11 System Management 11.2 Functions in the Action Area for System 11.2.6.10 Import SSL/KMIP Certificate This function registers the SSL/KMIP certificate in the ETERNUS DX Disk storage system. The SSL/KMIP certificate is used for communication with the key server. When performing management of the key in the key server, communication between the key server and the ETERNUS DX80 S2/DX90 S2, the ETERNUS DX410 S2/DX440 S2, or the ETERNUS DX8100 S2/DX8700 S2 is required.
Chapter 11 System Management 11.2 Functions in the Action Area for System 3 Click the [Import] button. → A confirmation screen appears. An error screen appears in the following conditions: • When reading of the "SSL / KMIP Certificate" failed • When the "SSL / KMIP Certificate" file is larger than 4096 bytes 4 Click the [OK] button. → Importing of the SSL/KMIP certificate starts. When the imported file was not the "SSL/KMIP Certificate File", an error screen appears.
Chapter 11 System Management 11.2 Functions in the Action Area for System 11.2.7 Define Role This section describes user management. User management provides the following functions: • • • • • • 11.2.7.1 Setup User Account Initialize User Account Modify RADIUS Add Role Delete Role Modify Role Setup User Account This function adds, edits, and deletes the user account. • Up to 60 user accounts can be set.
Chapter 11 System Management 11.2 Functions in the Action Area for System ■ Add User Account The procedure to add a user accounts is as follows: Procedure 1 Click [Setup User Account] in [Action]. 2 Click the [Add] button. 3 Specify the parameters, and click the [Apply] button. • User Name Input a user name. An existing user name cannot be used. Entered letters are case-sensitive. The following input condition applies: - Up to 32 alphanumeric characters and symbols ('!', '-', '_', '.
Chapter 11 System Management 11.2 Functions in the Action Area for System • User Role Select the user role to be added to the user name. The default and custom roles registered in the ETERNUS DX Disk storage system are displayed as the options. - Monitor - Admin - StorageAdmin - AccountAdmin - SecurityAdmin - Maintainer - Software - Custom role • Account Select whether to "Enable" or "Disable" the user account. If the user account is disabled, that user account is registered but cannot be used.
Chapter 11 System Management 11.2 Functions in the Action Area for System 4 Click the [OK] button. → The user account setup starts. 5 Click the [Done] button to return to the [Define Role] screen. End of procedure ■ Edit User Account The procedure to edit a user accounts is as follows: Procedure 1 Click [Setup User Account] in [Action]. 2 Select the user account to be modified and click the [Edit] button. • Checkbox Select the checkbox for the user account to be modified.
Chapter 11 System Management 11.2 Functions in the Action Area for System 3 Change the parameters, and click the [Apply] button. ● Edit User Account • Change Password Only when changing the password, select the "Change Password" checkbox. When the "Change Password" checkbox is selected, enter a new password in "New Password" and "Confirm New Password". • New Password Input a new password. Entered letters are case-sensitive.
Chapter 11 System Management 11.2 Functions in the Action Area for System → A confirmation screen appears. • "Software" is the dedicated role that is used for external software. A user account with the "Software" role cannot log in to GUI. • To change the password, select the "Change Password" checkbox.
Chapter 11 System Management 11.2 Functions in the Action Area for System ■ Delete User Account The procedure to delete a user accounts is as follows: Procedure 1 Click [Setup User Account] in [Action]. 2 Select the deletion target user accounts (multiple selections can be made), and click the [Delete] button. • Checkbox Select the checkbox for the user account to be deleted. → A confirmation screen appears.
Chapter 11 System Management 11.2 Functions in the Action Area for System 11.2.7.2 Initialize User Account This function initializes the user accounts to the default status. • By using this function, all the registered user accounts are deleted and only the default account remains. • The password for the default account is restored to the default password. • The user accounts deleted by this function will be unavailable for the next login.
Chapter 11 System Management 11.2 Functions in the Action Area for System 4 Click the [Done] button to return to the [Define Role] screen. End of procedure 11.2.7.3 Modify RADIUS This function specifies the external server (RADIUS server) that is used for authentication when logging in. Up to two RADIUS Authentication servers can be registered. • Enable or disable RADIUS Authentication for each storage system.
Chapter 11 System Management 11.2 Functions in the Action Area for System • Recovery Mode When "Enable" has been specified in the "RADIUS Authentication" field, select the desired operation if RADIUS Authentication fails. If RADIUS Authentication fails when "No" has been selected for "Recovery Mode", logging in to GUI will not be available. Selecting "Yes" is recommended.
Chapter 11 System Management 11.2 Functions in the Action Area for System • Retry Out Time Select the total time (seconds) for waiting for a response from the RADIUS server. ETERNUS DX Disk storage system retries authentication during the specified time (seconds), and if there is no response in the specific time, regards the situation as a network error. - 10 - 20 - 30 - 40 - 50 - 60 → A confirmation screen appears.
Chapter 11 System Management 11.2 Functions in the Action Area for System An error screen appears if the specified IP address of the RADIUS server conflicts with the internal IP address of the ETERNUS DX Disk storage system. 4 Click the [Done] button to return to the [Define Role] screen. End of procedure 11.2.7.4 Add Role This function combines several user policies and creates a user-specific role (custom role). Up to 20 roles can be created per storage system.
Chapter 11 System Management 11.2 Functions in the Action Area for System • The ETERNUS DX Disk storage system has default roles. Refer to "Default Role" (page 948) for details. • Multiple policies can be allocated to one role. • A role that is created can be allocated to a user account by using the procedure in "11.2.7.1 Setup User Account" (page 853). The procedure to add a user role is as follows: Procedure 1 Click [Add Role] in [Action].
Chapter 11 System Management 11.2 Functions in the Action Area for System → A confirmation screen appears. An error screen appears in the following conditions: • When the "Name" does not satisfy the input conditions • When the "Name" has already been used 3 Click the [OK] button. → Application of the role settings starts. 4 Click the [Done] button to return to the [Define Role] screen. End of procedure 11.2.7.
Chapter 11 System Management 11.2 Functions in the Action Area for System The procedure to delete a role is as follows: Procedure 1 Select the user role to be deleted (multiple selections can be made) and click [Delete Role] in [Action]. → A confirmation screen appears. 2 Click the [OK] button. → The user role is deleted. 3 Click the [Done] button to return to the [Define Role] screen. End of procedure 11.2.7.
Chapter 11 System Management 11.2 Functions in the Action Area for System The procedure to modify a user role is as follows: Procedure 1 Select the role to be modified, and click [Modify Role] in [Action]. 2 Change the role settings, and click the [Modify] button. ● Target Role • Policies Checkbox of the current user policies are selected. Set the new policies for the role.
Chapter 11 System Management 11.2 Functions in the Action Area for System 3 Click the [OK] button. → Modification of the role settings starts. 4 Click the [Done] button to return to the [Define Role] screen. End of procedure 11.2.8 ECO Mode Management This section describes ECO mode management. ECO mode management provides the following functions: • • • • 11.2.8.
Chapter 11 System Management 11.2 Functions in the Action Area for System The procedure to set the ECO mode schedule for a RAID group is as follows: Procedure 1 Click [Modify ECO Mode Setting] in [Action]. 2 Specify the parameters, and click the [Set] button. • ECO Mode Select whether to "Enable" or "Disable" the ECO mode for the ETERNUS DX Disk storage system. → A confirmation screen appears. 3 Click the [OK] button. → The application of the ECO mode general settings starts.
Chapter 11 System Management 11.2 Functions in the Action Area for System 11.2.8.2 Create ECO Mode Schedule This function specifies the disk operating time (term for activating disk motor constantly) as an ECO mode schedule. • Up to 64 ECO mode schedules can be created for each storage system. • Up to eight events can be specified for a single ECO mode schedule. • To perform schedule operations using this function, the ECO mode setting for the ETERNUS DX Disk storage system must be enabled.
Chapter 11 System Management 11.2 Functions in the Action Area for System 3 Select an event type, set the event details, and then click the [Apply] button. • Event Type Select the event type. The settings vary depending on the event type. - everyday - Every week - Specific days - Specific week • Event Type - everyday Select this to add or edit the daily schedule. When "everyday" is selected, enter the start time ("From Time") and the end time ("To Time").
Chapter 11 System Management 11.2 Functions in the Action Area for System → The event is added to the "Event List".
Chapter 11 System Management 11.2 Functions in the Action Area for System 5 After adding all the events, click the [Set] button. → A confirmation screen appears. An error screen appears in the following conditions: • "Schedule Name" has not been entered • "Schedule Name" matches with an existing schedule name 6 Click the [OK] button. → Creation of the ECO mode schedule starts. 7 Click the [Done] button to return to the [ECO Mode] screen.
Chapter 11 System Management 11.2 Functions in the Action Area for System 11.2.8.3 Delete ECO Mode Schedule This function deletes the ECO mode schedule. • An ECO mode schedule that is allocated to a RAID group cannot be deleted. • An ECO mode schedule that is allocated to a Thin Provisioning Pool cannot be deleted. The procedure to delete an ECO Mode schedule is as follows: Procedure 1 Select the schedule that is to be deleted (multiple selections can be made) and click [Delete Schedule] in [Action].
Chapter 11 System Management 11.2 Functions in the Action Area for System 11.2.8.4 Modify ECO Mode Schedule This function modifies the ECO mode schedule. Up to eight events can be specified for a single ECO mode schedule. Disk operation time varies depending on the ECO mode schedule settings and disk access.
Chapter 11 System Management 11.2 Functions in the Action Area for System 3 After the event content is modified, click the [Apply] button. • Event Type Select the event type. The settings vary depending on the event type. - everyday - Every week - Specific days - Specific week • Event Type - everyday Select this to add or edit the daily schedule. When "everyday" is selected, enter the start time ("From Time") and the end time ("To Time").
Chapter 11 System Management 11.2 Functions in the Action Area for System → The "Event List" is updated.
Chapter 11 System Management 11.2 Functions in the Action Area for System 5 After editing all the events, click the [Set] button. → A confirmation screen appears. An error screen appears in the following conditions: • "Schedule Name" has not been entered • "Schedule Name" matches with an existing schedule name 6 Click the [OK] button. → Modification of the ECO mode schedule starts. 7 Click the [Done] button to return to the [ECO Mode] screen.
Chapter 11 System Management 11.2 Functions in the Action Area for System 11.2.9 Event/Dump Management This section describes event/dump management. Event/dump management provides the following functions: • • • • 11.2.9.1 Setup Event Notification Display Event Log Export/Delete Log Export Panic Dump Setup Event Notification This function specifies whether to report events that are detected in the ETERNUS DX Disk storage system.
Chapter 11 System Management 11.2 Functions in the Action Area for System The procedure to set the event notification is as follows: Procedure 1 Click [Setup Event Notification] in [Action]. 2 Specify whether to notify each event, and click the [Set] button. The events are classified into three levels: "Error Severity Level", "Warning Level", and "Informational Level".
Chapter 11 System Management 11.2 Functions in the Action Area for System • Display parts (except disk) with error status on LCD Select "Enable" when displaying the part (other than disk) error message in the LCD, and select "Disable" to not display the message in the LCD. This setting is available only when using the ETERNUS DX8700 S2.
Chapter 11 System Management 11.2 Functions in the Action Area for System • Temperature Error Select whether to notify when a temperature error status is detected by the sensor. When notifying, select the notification method. • End of battery life Select whether to notify when a battery expires. When notifying, select the notification method. "End of battery life" notification is available only for the ETERNUS DX410 S2/DX440 S2 or the ETERNUS DX8100 S2/DX8700 S2.
Chapter 11 System Management 11.2 Functions in the Action Area for System • Pinned data Select whether to notify when pinned data (*1) is detected or disappears. When notifying, select the notification method. *1: • "Pinned data" is the data left in the cache due to unsuccessful write-back to the drive from the cache area. Not ready Select whether to notify when the ETERNUS DX Disk storage system is in "Not ready" status (*1). When notifying, select the notification method.
Chapter 11 System Management 11.2 Functions in the Action Area for System ● Warning Severity Level Select whether to notify of a warning event for each event type. • Parts Warning Select whether to notify when a warning level event occurs in a part other than the drive. When notifying, select the notification method. • Disk Warning Select whether to notify when a warning level event occurs in the drive for each condition shown below. When notifying, select the notification method.
Chapter 11 System Management 11.2 Functions in the Action Area for System • Operated Volume Select whether to notify when the volume has been created or deleted. When notifying, select the notification method. • Power off/on Apply Firmware Select whether to notify when the ETERNUS DX Disk storage system is turned off/on or when the controller firmware is changed in hot mode. When notifying, select the notification method.
Chapter 11 System Management 11.2 Functions in the Action Area for System • Only the FC link status is notified. Note that a change in link status for iSCSI, SAS, and FCoE is not notified. • Link up and Link down that occur due to the following user operations are not notified.
Chapter 11 System Management 11.2 Functions in the Action Area for System 3 Click the [OK] button. → Setting of the event notification starts. 4 Click the [Done] button to return to the [Event/Dump] screen.
Chapter 11 System Management 11.
Chapter 11 System Management 11.
Chapter 11 System Management 11.2 Functions in the Action Area for System REMCS Defaults The REMCS recommended pattern of event notification is as follows. For the notification methods indicated with "*", notification setting has been changed from the system default.
Chapter 11 System Management 11.
Chapter 11 System Management 11.
Chapter 11 System Management 11.2 Functions in the Action Area for System 2 Check the displayed event logs. • Level The event level is displayed with an icon. - (Information) This icon indicates that the level of importance of the log is "Information". - (Warning) This icon indicates that the level of importance of the log is "Warning". - (Error) This icon indicates that the level of importance of the log is "Error". • Date The date and time when the event occurs are displayed.
Chapter 11 System Management 11.2 Functions in the Action Area for System 3 Click the [Cancel] button to return to the [Display Event Log] screen. End of procedure ■ Delete event logs The procedure to delete event logs is as follows: Procedure 1 Click [Display/Delete Event Log] in [Action]. 2 Click the [Delete] button. → A confirmation screen appears. 3 Click the [OK] button. → Deletion of event logs starts. 4 Click the [Done] button to return to the [Event/Dump] screen.
Chapter 11 System Management 11.2 Functions in the Action Area for System 11.2.9.3 Export/Delete Log This function exports and saves the ETERNUS DX Disk storage system maintenance information (log) in accordance with user-specified time settings. An exported log can be stored on a floppy disk or hard disk, or sent by E-mail. Also, users can select a log segment size to suit the destination it is to be saved.
Chapter 11 System Management 11.2 Functions in the Action Area for System • Delete of Customer Information When deleting the customer information (information to identify the customer such as; user name, box ID and IP address) from the exported log, select "Yes". When not deleting, select "No". → A confirmation screen appears. When clicking the [Export] button in the following conditions, an error screen appears.
Chapter 11 System Management 11.2 Functions in the Action Area for System 4 Click the [Download] button to save the exported log. → A dialog box to download the file appears. When exporting of the log has been completed, save the log file immediately. If "Non-segmentation" is selected in the "Log File Size" field, the [Download] button becomes inactive after the log file has been saved. Proceed to Step 5. 5 Save the log file.
Chapter 11 System Management 11.2 Functions in the Action Area for System 11.2.9.4 Export Panic Dump "Panic Dump" is the action of outputting (dump) memory information when an error (panic) occurs, and also the name of the output information itself. This function exports and saves the memory information of the Controller Module that is stored in the panic dump data, in a segment size specified by the user. An exported panic dump can be stored on a floppy disk or hard disk, or sent by E-mail.
Chapter 11 System Management 11.2 Functions in the Action Area for System 3 Click the [OK] button. → Exporting of the panic dump starts. The progress screen is displayed. After the panic dump export is finished, a screen to execute downloading the file is displayed. 4 Click the [Download] button to save the exported panic dump. → A dialog box to download the file appears. When exporting of the panic dump has been completed, save the panic dump immediately.
Chapter 11 System Management 11.2 Functions in the Action Area for System 5 Save the panic dump. The default file name is "Panic_serial number for the ETERNUS DX Disk storage system_YYYY-MMDD_hh-mm-ss_CMx_serial number for panic dump file.zlg". (YYYY-MM-DD_hh-mm-ss: the date and time when the panic has occurred. x: CM number in which the panic has occurred. When a panic dump file is segmented, the segmented panic dump files are given the same name and numbered serially (01 -).
Chapter 11 System Management 11.2 Functions in the Action Area for System 11.2.10.1 Enable Audit Log This function enables the audit log function. • Enable the "Audit Log" setting, and then specify the destination external server. Refer to "11.2.10.3 Setup Audit Log" (page 903) for details. Audit logs are sent after the external server is specified. • Note that the ETERNUS DX Disk storage system does not save the audit log. The audit log is only sent to the specified external server.
Chapter 11 System Management 11.2 Functions in the Action Area for System 11.2.10.2 Disable Audit Log This function disables the audit log function. The procedure to disable the audit log function is as follows: Procedure 1 Click [Disable Audit Log] in [Action]. → A confirmation screen appears. If the audit log function has already been disabled, [Disable Audit Log] cannot be clicked. 2 Click the [OK] button. → Disabling of the audit log starts.
Chapter 11 System Management 11.2 Functions in the Action Area for System • The audit log function uses the destination server that has the same interface as the Syslog server. The same server as the Syslog server is also available. • The audit logs are sent to both Syslog servers at the same time. • Even if the "Audit Log" setting changed to "Disable", the audit log setting information in the ETERNUS DX Disk storage system is maintained.
Chapter 11 System Management 11.2 Functions in the Action Area for System → A confirmation screen appears. Up to two Syslog servers can be configured. When configuring a second Syslog server, specify the required parameters in "Syslog Server2". 3 Click the [OK] button. → Setting of the audit log starts.
Chapter 11 System Management 11.2 Functions in the Action Area for System 11.2.11 Storage Migration Management This section describes Storage Migration management. Storage Migration management provides the following functions: • Start Storage Migration • Download Template File for Storage Migration Settings • Delete Storage Migration Path • Download Storage Migration Result • Restart Storage Migration • Suspend Storage Migration • Stop Storage Migration 11.2.11.
Chapter 11 System Management 11.
Chapter 11 System Management 11.2 Functions in the Action Area for System Data migration flow using the Storage Migration function The workflow sequence for Storage Migration is described below. The host environment must be confirmed and saved before performing the Storage Migration. Ask the system administrator to do it. (1) Preparation a Check and save the host environment so that the ETERNUS DX disk storage system can be used in the same environment after migration.
Chapter 11 System Management 11.2 Functions in the Action Area for System The procedure to start Storage Migration is as follows: Procedure 1 Click [Start] in [Action]. 2 Click the [Browse...] button to select a Storage Migration setting file, and click the [Next >>] button. • Storage migration setting file Input the location where the Storage Migration setting file is stored. Click the [Browse...] button to specify the location, or input the location directly.
Chapter 11 System Management 11.2 Functions in the Action Area for System • An error screen is displayed when a timeout occurs during the retrieval of destination device information.
Chapter 11 System Management 11.
Chapter 11 System Management 11.2 Functions in the Action Area for System 4 Click the [OK] button. → Storage Migration starts. 5 Click the [Done] button to return to the [Storage Migration] screen. • Refer to the [Storage Migration] screen for progress status of Storage Migration. • Click the [Path Group] link to display the "11.1.14 Path Group Detail Information" (page 734). End of procedure 11.2.11.
Chapter 11 System Management 11.2 Functions in the Action Area for System The procedure to download the template is as follows: Procedure 1 Click [Download Template] in [Action]. 2 Click the [Download] button. → A confirmation screen appears. 3 Click the [OK] button. → A dialog box to download file appears. 4 Save the template file. The default file name is "StMigTemplate.txt". → Downloading of the template file starts. 5 Click the [Close] button to return to the [Storage Migration] screen.
Chapter 11 System Management 11.2 Functions in the Action Area for System 11.2.11.3 Delete Storage Migration Path This function deletes path groups for Storage Migration. The path groups must be deleted after the data migration is complete.
Chapter 11 System Management 11.2 Functions in the Action Area for System 11.2.11.4 Download Storage Migration Result This function downloads the execution result of the Storage Migration. • Download of Storage Migration results is made in path group units. • Storage Migration results can be downloaded not only after completion of data migration but also during data migration. • The Storage Migration results are text files. The template is the same as the [Path Group Detail Information] screen.
Chapter 11 System Management 11.2 Functions in the Action Area for System 4 Save the Storage Migration result file. The default file name is "StMigResult_serial number for the ETERNUS DX Disk storage system_YYYY-MMDD_hh-mm-ss.txt". (YYYY-MM-DD_hh-mm-ss: the date and time when the download screen (Step 2) is displayed.) → Downloading of the Storage Migration result file starts. 5 Click the [Close] button to return to the [Path Group Detail Information] screen. End of procedure 11.2.11.
Chapter 11 System Management 11.2 Functions in the Action Area for System [Restart] cannot be clicked if one or more source LUNs are selected for which the migration status is unavailable for restarting. Note that if the migration status of some LUNs changes to unavailable status after clicking [Restart], only the available LUNs among the selected LUNs are restarted.
Chapter 11 System Management 11.2 Functions in the Action Area for System [Suspend] cannot be clicked if one or more source LUNs are selected for which the migration status is unavailable for suspending. Note that if the migration status of some LUNs changes to unavailable status after clicking [Suspend], only the available LUNs among the selected LUNs are suspended.
Chapter 11 System Management 11.2 Functions in the Action Area for System [Stop] cannot be clicked if one or more source LUNs are selected for which the migration status is unavailable for stopping. Note that if the migration status of some LUNs changes to unavailable status after clicking [Stop], only the available LUNs among the selected LUNs are stopped.
Chapter 11 System Management 11.2 Functions in the Action Area for System 2 Click the [Shutdown] button. → A confirmation screen appears. 3 Click the [OK] button. → The ETERNUS DX disk storage system shuts down after 30 seconds. Note that the ETERNUS DX Disk storage system may reboot automatically when "Setup Power Management" is enabled.
Chapter 11 System Management 11.2 Functions in the Action Area for System 2 Click the [Restart] button. → A confirmation screen appears. 3 Click the [OK] button. → The ETERNUS DX disk storage system shuts down after 30 seconds. After shutdown, the ETERNUS DX disk storage system restarts. End of procedure 11.2.12.2 Backup Configuration This function backs up the configuration definition data to the Bootup and Utility Device (BUD) in the CM.
Chapter 11 System Management 11.2 Functions in the Action Area for System The procedure to backup configuration definition file is as follows: Procedure 1 Click [Backup Configuration] in [Action]. 2 Specify the parameters, and click the [Backup] button. ● Select Configuration Definition • Configuration Definition Data Select configuration definition data to be backed up from "Configuration (Latest)", "Configuration (1 time before)", or "Configuration (2 times before)".
Chapter 11 System Management 11.2 Functions in the Action Area for System 3 Click the [OK] button. → The configuration definition data is backed up. 4 Click the [Done] button to return to the [Utility] screen. End of procedure 11.2.12.3 Export Configuration This function exports the configuration file from the ETERNUS DX Disk storage system as a configuration information file and stores it in the local PC, or other medium.
Chapter 11 System Management 11.2 Functions in the Action Area for System 2 Click the [Download] button to save the setup information. → A confirmation screen appears. 3 Click the [OK] button. The extension of the file to be saved must be ".cfg". The default file name is "Conf_serial number for the ETERNUS DX Disk storage system_YYYY-MM-DD_hhmm-ss.cfg". (YYYY-MM-DD_hh-mm-ss: the date and time when the download screen (Step 2) is displayed.) → The configuration information is exported.
Chapter 11 System Management 11.2 Functions in the Action Area for System 11.2.12.4 Start/Stop Performance Monitoring This function acquires performance information and displays the result. The Start/Stop Performance Monitoring function is used to start or stop acquiring the ETERNUS DX Disk storage system performance information. Acquired information can be checked using the [Performance] function. • When the ETERNUS DX Disk storage system is rebooted, the performance monitoring process is stopped.
Chapter 11 System Management 11.2 Functions in the Action Area for System 3 Click the [OK] button. → Acquisition of performance information starts. 4 Click the [Done] button to return to the [Utility] screen. End of procedure ■ Stopping performance monitoring The [Stop] button is displayed when "Monitoring State" is "Active". Procedure 1 Click [Start/Stop Perfmon] in [Action]. 2 Click the [Stop] button. → A confirmation screen appears.
Chapter 11 System Management 11.2 Functions in the Action Area for System 3 Click the [OK] button. → Acquisition of performance information stops. 4 Click the [Done] button to return to the [Utility] screen. End of procedure 11.2.13 System Management This section describes system management.
Chapter 11 System Management 11.2 Functions in the Action Area for System 2 Specify the parameters, and click the [Set] button. • Name Specify the storage system name (required). The following input conditions apply: - Up to 16 alphanumeric characters and symbols (except ", (comma)" and "?") - Spaces • Installation Location Specify the installation location of the ETERNUS DX Disk storage system (required).
Chapter 11 System Management 11.2 Functions in the Action Area for System 3 Click the [OK] button. → Setting of the storage system name starts. 4 Click the [Done] button to return to the [System Settings] screen. End of procedure 11.2.13.2 Modify Date and Time This function sets the date/time and time zone (storage system location) of the internal clock in the ETERNUS DX Disk storage system. The clock is used for checking the internal log of the ETERNUS DX Disk storage system and in the ECO mode, etc.
Chapter 11 System Management 11.2 Functions in the Action Area for System 2 Specify the parameters, and click the [Set] button. ● Date/Time Information • Date To change the current date and time settings, input the new values. - YYYY-MM-DD hh:mm:ss (YYYY: Year (2001 - 2037), MM: Month (01 - 12), DD: Day (01 - 31), hh: Hour (00 - 23), mm: Minute (00 - 59), ss: Second (00 - 59)) ● Time Zone • Time Zone Select the Time Zone from the list box. If the appropriate Time Zone does not exist, select "Manually".
Chapter 11 System Management 11.2 Functions in the Action Area for System The following input conditions apply: - For IPv4 address • xxx.xxx.xxx.xxx xxx: 1 - 255 for the top field (decimal) xxx: 0 - 255 for other fields (decimal) - For IPv6 address • xxxx:xxxx:xxxx:xxxx:xxxx:xxxx:xxxx:xxxx xxxx: 0 - ffff (FFFF) (hexadecimal, alphanumeric characters) Refer to "IPv6 Address Notation" (page 378) for details.
Chapter 11 System Management 11.
Chapter 11 System Management 11.2 Functions in the Action Area for System 11.2.13.3 Change Box ID This function changes the Box ID that identifies an ETERNUS DX Disk storage system in the user system. Box ID is used as information to identify the ETERNUS DX Disk storage system from applications connected to the ETERNUS DX Disk storage system. The initial Box ID is a device ID that is created by combining device information (series name, model, serial number, etc.).
Chapter 11 System Management 11.2 Functions in the Action Area for System 2 The current Box ID setting appears. To change the value, enter a new Box ID and click the [Set] button. • Box ID The Box ID setting of the ETERNUS DX Disk storage system is displayed. If the ETERNUS DX Disk storage system is changed, correct the Box ID. The initial Box ID displayed is a 40-digit code (device ID) that is created by combining device information (series name, model, serial number, etc.).
Chapter 11 System Management 11.2 Functions in the Action Area for System 3 Click the [OK] button. → The specified Box ID is registered. 4 Click the [Done] button to return to the [System Settings] screen. If the Box ID entered is less than 40 characters, a "#" hash key character is appended to the Box ID for each character short. Then, the 40-digit Box ID is registered in the ETERNUS DX Disk storage system. End of procedure 11.2.13.
Chapter 11 System Management 11.2 Functions in the Action Area for System 2 Specify the parameters, and click the [Set] button. ● Setup Subsystem Parameters • Load Balance Set whether to enable or disable the load balance for the ETERNUS DX Disk storage system. When load balance is enabled and the ETERNUS DX Disk storage system is overloaded, the ETERNUS DX Disk storage system responds with the sense that is specified in the "Load Balance Response" field described in "9.2.5.
Chapter 11 System Management 11.2 Functions in the Action Area for System [Example] Three TPVs (TPV#0, TPV#1, and TPV#2) are registered in a single TPP. A single TPP is configured with four RAID groups (RAID group #0, RAID group #1, RAID group #2, and RAID group #3). - TPP balancing Physical area is allocated in the following order regardless of the TPV in which the data is written. RAID group#0 → RAID group#1 → RAID group#2 → RAID group#3 → RAID group#0 → ...
Chapter 11 System Management 11.2 Functions in the Action Area for System • The following conditions apply when "Disable" is selected: - User data in the cache memory is not duplicated. - The parity information for RAID groups for which the type is High Capacity (RAID5), High Reliability (RAID6), or Reliability (RAID5+0) is not duplicated. - If a CM is disconnected when the ETERNUS DX Disk storage system fails, the user data in this CM is lost.
Chapter 11 System Management 11.2 Functions in the Action Area for System • Checkcode Enforcement Select whether to enable or disable the Checkcode Enforcement mode. - Enable Error detection function in the ETERNUS DX Disk storage system is enhanced. When data is duplicated, the check codes of all the data blocks are checked. - Disable Error detection in the ETERNUS DX Disk storage system is performed with the normal procedure. If "Enable" is selected, write access performance is reduced.
Chapter 11 System Management 11.2 Functions in the Action Area for System Select "Use "Add Host"" only when using the previous procedure for registering hosts in older storage systems (such as ETERNUS DX410/DX440 and ETERNUS DX8100/DX8400/DX8700). Both checkboxes can be selected at the same time. The "Use "Add Host"" checkbox is cleared by default. → A confirmation screen appears. • "Cache Mirroring " is not displayed for ETERNUS DX8100 S2/DX8700 S2.
Chapter 11 System Management 11.2 Functions in the Action Area for System 11.2.13.5 Setup Encryption Mode This function sets the encryption mode to encrypt volumes by using the CM. • Encryption related functions are only available after enabling the encryption mode. • When disabling the encryption mode, reboot the ETERNUS DX Disk storage system. • When changing the encryption mode, delete all the encrypted volumes and volumes being encrypted in advance.
Chapter 11 System Management 11.2 Functions in the Action Area for System → A confirmation screen appears. If the [Set] button is clicked when encrypted volumes or volumes being encrypted exist, an error screen is displayed. 3 Click the [OK] button. → The encryption mode setting is performed. 4 Click the [Done] button to return to the [System Settings] screen. When disabling the encryption mode, reboot the ETERNUS DX Disk storage system. End of procedure 11.2.13.
Chapter 11 System Management 11.2 Functions in the Action Area for System Reboot the ETERNUS DX Disk storage system to apply the new setting. This function can be used to check the current SMI-S setting and the SMI-S setting after rebooting. Refer to "11.1.12 System Settings" (page 731) for details. The procedure to enable or disable the SMI-S function is as follows: Procedure 1 Click [Setup SMI-S Environment] in [Action]. 2 Select the parameters, and click the [Set] button.
Chapter 11 System Management 11.2 Functions in the Action Area for System 4 Click the [Done] button to return to the [System Settings] screen. After switching the SMI-S setting between enabled or disabled, reboot the ETERNUS DX Disk storage system. End of procedure 11.2.13.7 Register SED Authentication Key This function registers the SED authentication key (common key) that is managed in the ETERNUS DX Disk storage system.
Chapter 11 System Management 11.2 Functions in the Action Area for System 2 Click the [Register] button. → A confirmation screen appears. 3 Click the [OK] button. → The SED authentication key registration starts. 4 Click the [Done] button to return to the [System Settings] screen. End of procedure 11.2.13.8 Setup Power Management This function connects the external input device and controls (shuts down) the ETERNUS DX Disk storage system power.
Chapter 11 System Management 11.2 Functions in the Action Area for System 2 Specify the parameters, and click the [Set] button. • Enable Select the checkbox for the Controller Module to enable power management by an external input device (multiple selections can be made). • Auto Power Select whether to "Enable" or "Disable" the AC power interlock mode (the function to automatically power on when AC power is supplied). When PMAN is connected, enable the "Auto Power".
Chapter 11 System Management 11.2 Functions in the Action Area for System → A confirmation screen appears. 3 Click the [OK] button. → Setting of the power management starts. 4 Click the [Done] button to return to the [System Settings] screen.
Appendix A User Roles and Policies This chapter describes user roles and policies. A.1 Roles When creating a user account, at least one role must be applied. There are two types of roles: a default role and a custom role. The default role is already prepared in the ETERNUS DX Disk storage system and the custom role can be managed by the user. ■ Default Role Use the default roles for normal operation. Default roles cannot be deleted. The default role settings cannot be changed.
Appendix A User Roles and Policies A.1 Roles ■ Custom Roles Create custom roles when the operating environment cannot be configured by default roles. Custom roles have unique names that do not match the existing roles. Policies are applied for custom roles. Multiple policies can be applied to one custom role. Refer to the following sections for the procedure on how to set custom roles. • Add Role This function creates custom roles. • Delete Role This function deletes custom roles.
Appendix A User Roles and Policies A.2 Availability of Functions for each Policy A.2 Availability of Functions for each Policy Functions that can be used vary depending on the policy. The following tables show the availability of functions for each policy. "Software" is the default role that is used for external software. A user account with the "Software" role cannot log in to GUI. "Software" is omitted in the following tables.
Appendix A User Roles and Policies A.
Appendix A User Roles and Policies A.
Appendix A User Roles and Policies A.
Appendix A User Roles and Policies A.
Appendix A User Roles and Policies A.
Appendix A User Roles and Policies A.
Appendix A User Roles and Policies A.
Appendix A User Roles and Policies A.
Appendix A User Roles and Policies A.
Appendix A User Roles and Policies A.
Appendix A User Roles and Policies A.
Appendix A User Roles and Policies A.
Appendix A User Roles and Policies A.
Appendix A User Roles and Policies A.
Appendix A User Roles and Policies A.
Appendix A User Roles and Policies A.
Appendix A User Roles and Policies A.
Appendix A User Roles and Policies A.
Appendix A User Roles and Policies A.
Appendix A User Roles and Policies A.
Appendix A User Roles and Policies A.
Appendix B Status List This chapter describes the meaning of status icon. B.1 Device General Status The general status of the ETERNUS DX Disk storage system is displayed as an icon with character strings. A "Normal (green)" general status icon indicates normal status, while other color images indicate a failure. The meaning of each general status icon is described below. Device general status (Green) (Orange) (Yellow) (Red) (Red) Description The ETERNUS DX Disk storage system is in normal state.
Appendix B Status List B.1 Device General Status B.1.1 Device General Status (Detail) The detailed information of the ETERNUS DX Disk storage system general status is displayed with an icon and character strings in the [Storage] screen under the [Component] navigation. The meaning of ETERNUS DX Disk storage system general status (detail) is described below.
Appendix B Status List B.2 Volume Status B.2 Volume Status Volume status is displayed with an icon and the status name. The volume status is described below. Status Description Available The volume is operating normally. Spare in Use The RAID group to which the volume belongs manages redundancy by using the hot spare disk. Readying The volume is not formatted.
Appendix B Status List B.3 RAID Group Status B.3 RAID Group Status RAID group status is displayed with an icon and the status name. The RAID group status is described below. Status Description Available The RAID group is operating normally. Spare in Use Rebuilding to the hot spare disk is complete. The RAID group manages redundancy by using the hot spare disk. Readying The RAID group that is registered as an REC Disk Buffer is not formatted.
Appendix B Status List B.4 Thin Provisioning Pool Status B.4 Thin Provisioning Pool Status Thin Provisioning Pool (TPP) status is displayed with an icon and the status name. The TPP status is described below. Status Description Available The TPP is operating normally. Maintenance Forcible recovery of the TPP is being performed. Readying All the physical area in the TPP is not formatted. Partially Readying Some parts of the physical area in the TPP is not formatted. Exposed The TPP is available.
Appendix B Status List B.5 Component Status B.5 Component Status This section explains the component status. The status of the components is displayed with an icon for each device image in the view screen. Status Description The component is operating normally. The component is installed, but not used. The component is under maintenance. The component requires preventive maintenance. An error has occurred in the component. A status other than the ones listed above.
Appendix B Status List B.5 Component Status B.5.1 Drive Status Drive status is displayed with an icon and the status name. The drive status is described below. Status Description Available The drive is in normal status. The drive is used in the RAID group. Spare The drive is an unused hot spare. Present The drive is not used (not registered as a RAID group or hot spare), or is waiting for rebuild/copy back. Readying The drive is starting up.
Appendix B Status List B.6 Key Status B.6 Key Status Key status is displayed with the status name. The key status is described below. Status Description Normal A valid key is registered for the SEDs. The key is in normal state. Unregistered Server Certificate The "SSL / KMIP Certificate" (key server certification) is not registered in the ETERNUS DX Disk storage system. Communication between the ETERNUS DX Disk storage system and the key server cannot be performed.
Appendix B Status List B.7 Key Server Status B.7 Key Server Status Key server status is displayed with the status name. The key server status is described below. Status Normal Description The communication between the ETERNUS DX Disk storage system and the key server is normal. The key can be obtained successfully. The key server is in normal state. "Setting" indicates the following conditions: Setting • The "SSL / KMIP Certificate" (key server certification) or SSL certificate (*1) is not registered.
Appendix C Installing the Security Certificate This chapter describes how to install the web-site certificate. This chapter provides an example of when using Internet Explorer and Firefox. C.1 For Internet Explorer This section describes the procedure to install security certificate. The procedure to install security certificate for Internet Explorer 8 is as follows: Register the URL of the ETERNUS DX Disk storage system in "Trusted Sites" before installing the security certificate.
Appendix C Installing the Security Certificate C.1 For Internet Explorer 2 Click the [Continue to this website (not recommended)] link. → The login screen for GUI is displayed. 3 Click the "Certificate Error". → A warning message appears.
Appendix C Installing the Security Certificate C.1 For Internet Explorer 4 Click the [View certificates] link. → The site certificate information appears. 5 Click the [Copy to File...] button on the [Details] tab. → The [Certificate Export Wizard] screen appears. 6 Click the [Next >] button.
Appendix C Installing the Security Certificate C.1 For Internet Explorer 7 Select "DER encoded binary X.509 (.CER)" and click the [Next >] button. 8 Select the file name that is to be exported, and then click the [Next >] button. 9 Click the [Finish] button. → The information of the exported certificate is displayed.
Appendix C Installing the Security Certificate C.1 For Internet Explorer 10 Click the [Install Certificate] button on the [General] tab. → The [Certificate Import Wizard] screen appears. 11 Click the [Next >] button. The following screen is displayed when using Internet Explorer 10.0. Select "Current User" or "Local Machine" on the start screen. To accept only the currently logged in user with the current PC, select "Current User".
Appendix C Installing the Security Certificate C.1 For Internet Explorer 12 Select "Place all certificates in the following store". → The [Select Certificate Store] screen appears. If "Automatically select the certificate store based on the type of certificate" is selected in the "Certificate Import Wizard", an error may occur in the security certificate according to the customer environment. 13 Select the "Trusted Root Certification Authorities", and click the [OK] button.
Appendix C Installing the Security Certificate C.1 For Internet Explorer 15 Click the [Yes] button. After clicking the [No] button, the operation may not be continuable. If this occurs, restart the web browser. → The completion screen appears. 16 Click the [OK] button. → The security certificate is installed. Restart the web browser.
Appendix C Installing the Security Certificate C.2 For Firefox C.2 For Firefox This section provides the procedure to install the security certificate. The example when installing security certificate for Firefox 3.6. X is as follows: ■ When installing a new security certificate Procedure 1 Enter the URL to the address bar in the web browser. Specify "https://IP address of the ETERNUS DX Disk storage system" (Default IP address is "192.168.1.1").
Appendix C Installing the Security Certificate C.2 For Firefox 3 Click the [Add Exception...] button. → The [Add Exception] screen appears. 4 Click the [Get Certificate] button. → The status of certificate is displayed.
Appendix C Installing the Security Certificate C.2 For Firefox 5 Click the [View...] button. → The [Certificate Viewer] screen appears. 6 Click the [Export...] button on the [Details] tab. 7 Specify the file name and save the certificate. → Returns to the [Add Security Exception] screen.
Appendix C Installing the Security Certificate C.2 For Firefox 8 Click the [Confirm Security Exception] button. → The security certificate is installed. Restart the web browser. End of procedure ■ When a security certificate is already registered Procedure 1 Enter the URL to the address bar in the web browser. Specify "https://IP address of the ETERNUS DX Disk storage system" (Default IP address is "192.168.1.1").
Appendix C Installing the Security Certificate C.2 For Firefox 3 Select the certificate for the IP address of "ETERNUS server" on the [Servers] tab, and then click the [Export] button. 4 Specify the file name and save the certificate. → The [Add Security Exception] screen appears. 5 Click the [Confirm Security Exception] button. → The security certificate is installed. Restart the web browser.
Appendix D Naming Conventions of Volumes and Hosts This chapter describes the naming conventions for volumes and hosts. D.1 Naming Convention of Volumes ■ Naming conventions for creating volumes The following naming conventions apply when creating volumes: • When creating multiple volumes, the specified "Name" and the suffix numbers "x" (serial numbers starting with "0") are automatically added to volumes.
Appendix D Naming Conventions of Volumes and Hosts D.2 Naming Convention of Hosts D.2 Naming Convention of Hosts ■ Naming conventions for adding hosts The following naming conventions apply when adding hosts: • A name is automatically added to a host with the "host group name" and a suffix number "_x" (serial numbers starting with "0"). [Example] When specifying "HOST_Group_001" (14 characters) as the host group name Names such as "HOST_Group_001_0" and "HOST_Group_001_1" are used for host groups.
Appendix E Basic Size and MWC Input Condition for RAID Groups This chapter describes the basic size for each RAID type and the input conditions for the Multi Writeback Count (MWC) of each RAID group. E.1 Basic Size for each RAID Group This section describes the basic size for each RAID type. The allowed input for the basic size varies depending on the RAID type, the drive configuration, and the Stripe Depth value. E.1.
Appendix E Basic Size and MWC Input Condition for RAID Groups E.
Appendix E Basic Size and MWC Input Condition for RAID Groups E.1 Basic Size for each RAID Group *1: *2: D: Data, M: Mirror, P: Parity Basic size when creating volumes. ETERNUS DX80 S2/DX90 S2, ETERNUS DX410 S2/DX440 S2, and ETERNUS DX8100 S2/DX8700 S2 manages volumes in units of stripe size. If the volume size is not an exact multiple of the basic size (stripe size), then when a RAID group is created the remainder at the end of the last stripe used will be lost.
Appendix E Basic Size and MWC Input Condition for RAID Groups E.1 Basic Size for each RAID Group E.1.2 Basic Size when Using the Default Stripe Depth Value (For WSV Type Volumes) When using the default Stripe Depth value, refer to the following table for basic size: ■ Basic size of each RAID group when using the default Stripe Depth value For WSVs, the basic size is a multiple of the number of concatenations (the number of RAID groups that are to be concatenated).
Appendix E Basic Size and MWC Input Condition for RAID Groups E.
Appendix E Basic Size and MWC Input Condition for RAID Groups E.
Appendix E Basic Size and MWC Input Condition for RAID Groups E.
Appendix E Basic Size and MWC Input Condition for RAID Groups E.1 Basic Size for each RAID Group E.1.3 Basic Size When Stripe Depth is Tuned (For Standard, TPV, or SDPV Type Volumes) Refer to the following table for the basic size of RAID groups when the Stripe Depth value is changed: ■ Basic size of each RAID group when the Stripe Depth value is tuned RAID type Drive configuration (*1) Basic size (MB) (Lowest exact MB multiple) (*2) When the Stripe Size is ...
Appendix E Basic Size and MWC Input Condition for RAID Groups E.1 Basic Size for each RAID Group *1: *2: E.1.4 D: Data, M: Mirror, P: Parity Basic size when creating volumes. ETERNUS DX80 S2/DX90 S2, ETERNUS DX410 S2/DX440 S2, and ETERNUS DX8100 S2/DX8700 S2 manages volumes in units of stripe size. If the volume size is not an exact multiple of the basic size (stripe size), then when a RAID group is created the remainder at the end of the last stripe used will be lost.
Appendix E Basic Size and MWC Input Condition for RAID Groups E.1 Basic Size for each RAID Group RAID type High Performance (RAID1+0) High Capacity (RAID5) *1: *2: Drive configuration (*1) Basic size (MB) (Lowest exact MB multiple) (*2) When the Stripe Size is ...
Appendix E Basic Size and MWC Input Condition for RAID Groups E.1 Basic Size for each RAID Group When the Wide Stripe Size is "Small" RAID type High Performance (RAID1+0) High Capacity (RAID5) Drive configuration (*1) Basic size (MB) (Lowest exact MB multiple) (*2) When the Stripe Size is ...
Appendix E Basic Size and MWC Input Condition for RAID Groups E.1 Basic Size for each RAID Group RAID type High Capacity (RAID5) *1: *2: Drive configuration (*1) Basic size (MB) (Lowest exact MB multiple) (*2) When the Stripe Size is ...
Appendix E Basic Size and MWC Input Condition for RAID Groups E.2 Input Conditions for MWC E.2 Input Conditions for MWC This section describes the allowed input values for the Multi Writeback Count (MWC). The allowed input for the MWC varies depending on the RAID type, the drive configuration, and the Stripe Depth value. E.2.
Appendix E Basic Size and MWC Input Condition for RAID Groups E.
Appendix E Basic Size and MWC Input Condition for RAID Groups E.2 Input Conditions for MWC RAID type Drive configuration (*1) Allowed input for MWC (initial state) Stripe Depth = 64KB (default) High Reliability (RAID6) *1: E.2.
Appendix E Basic Size and MWC Input Condition for RAID Groups E.2 Input Conditions for MWC ■ Allowed Input for MWC when the Stripe Depth value is tuned (TPP) RAID type Striping (RAID0) High Performance (RAID1+0) High Capacity (RAID5) *1: Drive configuration (*1) Allowed input for MWC (initial state) When the Stripe Size is ...
Appendix F Automatic Controlling CM-CPU Setting This chapter describes controlling CM-CPU allocation if "Automatic" is specified when setting the controlling CM-CPU.
Appendix F Automatic Controlling CM-CPU Setting ■ For ETERNUS DX8700 S2 (6CM) *1: Remainder when dividing the RAID group number by "12" (*1) Controlling CM-CPU assignment 0 CM#0 CPU#0 1 CM#5 CPU#1 2 CM#1 CPU#0 3 CM#4 CPU#1 4 CM#2 CPU#0 5 CM#3 CPU#1 6 CM#3 CPU#0 7 CM#2 CPU#1 8 CM#4 CPU#0 9 CM#1 CPU#1 10 CM#5 CPU#0 11 CM#0 CPU#1 Divide the RAID group number by the number of CM-CPUs ("12").
Appendix G Using RADIUS Authentication This chapter describes supplementary notes when using RADIUS Authentication. G.1 Using RADIUS Authentication to Access the ETERNUS DX Disk Storage System • RADIUS Authentication is used to authenticate logging in to the ETERNUS DX Disk storage system with GUI or CLI. • Up to two RADIUS servers can be connected to an ETERNUS DX Disk storage system.
Appendix G Using RADIUS Authentication G.2 Notes when Using RADIUS Authentication for GUI G.2 Notes when Using RADIUS Authentication for GUI • A primary server and secondary server can be set for GUI authentication. If the primary RADIUS server times out, the secondary server is tried. • If RADIUS Authentication fails and "Do not use Internal Authentication" has been selected for "Authentication Error Recovery", it will not be possible to login to GUI or CLI.
Appendix G Using RADIUS Authentication G.3 Setting Up the RADIUS Server ● Create Users and User Groups (1) Select [Start] → [Administrative Tools] → [Computer Management]. (2) Select [System Tools] → [Local Users and Groups] → [Users]. Right-click [Users] and select [New User]. Create an ETERNUS DX Disk storage system login user as the [New User]. (3) Select [System Tools] → [Local Users and Groups] → [Groups]. Right-click [Groups] and select [New Group].
Appendix G Using RADIUS Authentication G.3 Setting Up the RADIUS Server ● Set the role with Vendor Specific Attribute (VSA) (1) Select [Start] → [Administrative Tools] → [Server Manager]. (2) Select [Roles] → [Network Policy and Access Services] → [NPS] → [Policies] → [Network Policies]. Select and double-click the newly added policy. (3) Set the following items using the [Add] button under [Vendor Specific] on the [Settings] tab. • • • • • • For the "Attributes", add "Vendor-Specific/RADIUS Standard".
Appendix H Estimated Advanced Copy Source Capacity This chapter describes the maximum copy source capacity for each copy type. The estimated values in the following tables are examples of typical Advanced Copy sessions (the maximum memory area required for Advanced Copy management is secured and the number of copy sessions is 400). Actual values can be calculated by using the procedure in "How to calculate the copy table size" (page 308) of "8.2.7 Modify Copy Table Size" (page 301).
Appendix H Estimated Advanced Copy Source Capacity ETERNUS DX Disk storage system ETERNUS DX8700 S2 (Table size = 12288MB [12GB]) Copy type Resolution ×1 ×2 ×4 ×8 × 16 EC/REC/ OPC, QuickOPC, SnapOPC, and SnapOPC+ without using Restore OPC 786232GB (767.8TB) 1572464GB (1535.6TB) 3144928GB (3071.2TB) 6289856GB (6142.4TB) 12579712GB (12284.9TB) OPC, QuickOPC, SnapOPC, and SnapOPC+ using Restore OPC 393016GB (383.8TB) 786032GB (767.6TB) 1572064GB (1535.2TB) 3144128GB (3070.
Appendix I Storage Migration Setting Files This chapter describes Storage Migration setting files. I.1 Template File for Storage Migration Settings The following table shows the details of a template file for storage migration settings. Keyword Number of settings Type Specify the type of Storage Migration. (Example) Type = Open 1 GROUP Specify a path group for each source storage system. Up to 16 path groups can be specified.
Appendix I Storage Migration Setting Files I.1 Template File for Storage Migration Settings Keyword GROUP PATH Specify the path information of the destination and source storage systems. Up to 8 paths per path group can be specified.
Appendix I Storage Migration Setting Files I.1 Template File for Storage Migration Settings Operation Mode The following table explains the details of the operation mode. OPEMODE Specification code M Description Meaning Migration Data migration from the source storage system to the destination storage system is performed. Migration + Quick Compare Data migration from the source storage system to the destination storage system and a data comparison of source LUNs and destination volumes are performed.
Appendix I Storage Migration Setting Files I.2 Coding Conventions for the Storage Migration Setting File I.2 Coding Conventions for the Storage Migration Setting File The following table shows the coding conventions for a Storage Migration setting file. Keyword Common Coding conventions • The Storage Migration setting file must be saved in the text format. • Contents of the file must be described in alphanumeric characters.
Appendix I Storage Migration Setting Files I.2 Coding Conventions for the Storage Migration Setting File Keyword VOL Coding conventions • Keep the number of VOLs to 512 or less, so they can be accessed from the source FC-CA port. • Separate the VOL setting values with "," (comma). • For the setting range of VOL, refer to "I.1 Template File for Storage Migration Settings" (page 1019). • Describe the VOL in the following order.
Appendix I Storage Migration Setting Files I.3 Setting Example of the Storage Migration Setting File I.
Appendix I Storage Migration Setting Files I.
Appendix I Storage Migration Setting Files I.3 Setting Example of the Storage Migration Setting File The above example describes the case where the following paths and migration volumes are configured for two sets of source storage systems (GROUP#0, 1).
Appendix J Factory Default List This chapter describes the default settings for the following management functions. • Advanced Copy • Connectivity • System The following table shows the factory default values. Note that functions and setting items that do not have default settings are not listed in the following tables. J.
Appendix J Factory Default List J.1 Advanced Copy Function Modify Copy Table Size Setting item Default value Table Size (MB) 0 Allowed input For ETERNUS DX80 S2/DX90 S2 • 0 – 256 For ETERNUS DX410 S2 • 0 – 512 For ETERNUS DX440 S2 • 0 – 4096 For ETERNUS DX8100 S2 • 0 – 1024 For ETERNUS DX8700 S2 • 0 – 12288 ODX Table Size Threshold (%) 80 • 1 – 100 Operation mode Disable • Enable • Disable The ODX function is disabled by default and only the [Enable ODX] function is available.
Appendix J Factory Default List J.
Appendix J Factory Default List J.
Appendix J Factory Default List J.1 Advanced Copy Function Modify REC Buffer Setting item Size Default value When "Usage" is "Send" or "Receive" • 128 MB When "Usage" is "Unused" • "-" (hyphen) Allowed input When "Usage" is "Send" or "Receive" • For ETERNUS DX90 S2 - 128 MB - 256 MB - 512 MB • For ETERNUS DX410 S2/DX440 S2 - 128 MB - 256 MB - 512 MB - 1024 MB - 2048 MB • For ETERNUS DX8100 S2/DX8700 S2 Forwarding Interval When "Usage" is "Send" or "Receive" • 1 sec.
Appendix J Factory Default List J.1 Advanced Copy Function Modify REC Buffer Setting item Monitoring Time Default value When "Usage" is "Send" or "Receive" • 5 min. When "Usage" is "Unused" • "-" (hyphen) HALT Wait Timer When "Usage" is "Send" or "Receive" • 15 sec. When "Usage" is "Unused" • "-" (hyphen) I/O Priority Mode When "Usage" is "Send" or "Receive" • Disable When "Usage" is "Unused" Allowed input When "Usage" is "Send" or "Receive" • • • • • • • • • • • • • • • • 0 min. 1 min.
Appendix J Factory Default List J.2 Connectivity J.
Appendix J Factory Default List J.2 Connectivity Function Modify FC Port Parameters (When the port mode is "CA" or "CA/RA") Setting item Default value REC Transfer Mode Enable • Sync • Async Stack • Async Allowed input • Enable • Disable This item is displayed only when "Port Mode" is "CA/RA".
Appendix J Factory Default List J.
Appendix J Factory Default List J.2 Connectivity Function Modify iSCSI Port Parameters (When the port mode is "CA") Setting item Default value Allowed input iSNS Server Disable • IPv4 • IPv6 • Disable iSNS Server Port No. 3205 • 0 – 65535 iSCSI Name iqn.2000-09.com.fujitsu:storagesystem.eternus-xxxx:000yyyyy • Alphabetic characters (lower The default value varies depending on the factory setting. Refer to "The default value for "iSCSI Name"" (page 1043) for details.
Appendix J Factory Default List J.2 Connectivity Function Modify iSCSI Port Parameters (When the port mode is "RA") Setting item Default value Allowed input IP Version IPv4 • IPv4 • IPv6 • IPv4 / IPv6 IP Address 192.168.xxx.xxx • Up to 3 numeric characters • First text box 1 – 255 • Other text boxes 0 – 255 Subnet Mask 255.255.255.
Appendix J Factory Default List J.2 Connectivity Function Modify iSCSI Port Parameters (When the port mode is "CA/RA") Setting item Default value Allowed input IP Version IPv4 • IPv4 • IPv6 • IPv4 / IPv6 IP Address 192.168.xxx.xxx • Up to 3 numeric characters • First text box 1 – 255 • Other text boxes 0 – 255 Subnet Mask 255.255.255.
Appendix J Factory Default List J.
Appendix J Factory Default List J.2 Connectivity Function Modify iSCSI Port Parameters (When the port mode is "iSCSI-RA (for older storage system connection)") Setting item Default value Allowed input CHAP OFF • ON • OFF REC Line No.
Appendix J Factory Default List J.2 Connectivity Function Setting item Add Host Response Inquiry VPD ID Type Type3 (Default) Default value Allowed input • Type3 (Default) • Type1 • Type1 + Type3 Inquiry Standard Data Version Version 5 (Default) • Version 5 (Default) • Version 4 • Version 3 Command Timeout Interval Default (25sec.) • Default (25sec.
Appendix J Factory Default List J.2 Connectivity Function Setting item Default value Allowed input Add Host Response Sense Data Conversion No Conversion (Default) • No Conversion (Default) • Customize Modify CA Reset Group Checkbox to select a port All checkboxes are selected • Selected Select the port • Cleared Do not select the port Host-LU QoS Operation mode Disable • Enable • Disable The Host-LU QoS function is disabled by default and only the [Enable Host-LU QoS] function is available.
Appendix J Factory Default List J.
Appendix J Factory Default List J.3 System J.3 System ■ Network Management Function Setup Network Environment (When using IPv4) Setting item Default value Network Port MNT Allowed input For ETERNUS DX80 S2/DX90 S2 • MNT • RMT For ETERNUS DX410 S2/DX440 S2, ETERNUS DX8100 S2/DX8700 S2 • MNT • RMT • FST Master IP Address For ETERNUS DX80 S2/DX90 S2 • MNT port 192.168.1.
Appendix J Factory Default List J.
Appendix J Factory Default List J.
Appendix J Factory Default List J.3 System Function Setup SNMP Agent Community Setting item Default value View Name ViewALL Allowed input • • • • ViewALL View-mib2 View-exmib View name that is registered in "11.2.3.5 Setup SNMP Agent MIB Access View" (page 766). When accessing the MIB is not allowed • Blank If "ViewALL", "View-mib2", or "Viewexmib" is deleted in "11.2.3.5 Setup SNMP Agent MIB Access View" (page 766), the deleted options are not displayed in the "View Name" field.
Appendix J Factory Default List J.3 System Function Setting item Default value Allowed input Setup E-Mail Notification (Notification EMail) Notification E-Mail No • Yes • No Setup E-Mail Notification (Mail Server Settings) LAN Port used for SMTP Connection MNT • MNT • RMT SMTP Port No.
Appendix J Factory Default List J.3 System ■ Remote Support (REMCS) for Regions other than EMEA Function Setup Remote Support Setting item Customer Information Default value Checkbox (Delete any Customer Identity information from the storage system after the information is sent to the 'REMCS Center'.
Appendix J Factory Default List J.3 System Function Setup Remote Support Setting item Communication Environment Information Scheduled Connection Time Default value Undefined Allowed input Hour : Minute • Numeric characters • 00 - 23 Hour • 00 - 59 Minute • Undefined (10:00 - 15:00) Different times are specified in the factory settings.
Appendix J Factory Default List J.
Appendix J Factory Default List J.3 System Function Setup Remote Support Setting item Time Information Default value SMTP Response Timeout (sec.) 60 SMTP Retry Count 5 SMTP Retry Interval (sec.) 30 HTTP Timeout (sec.) 30 HTTP Retry Count 5 HTTP Retry Interval (sec.) 5 Queue Time before Sending Mails (msec.
Appendix J Factory Default List J.
Appendix J Factory Default List J.
Appendix J Factory Default List J.
Appendix J Factory Default List J.
Appendix J Factory Default List J.3 System ■ Event/Dump Management Function Setup Event Notification Setting item Setting based on Severity Default value Allowed input Refer to "System Defaults" (page 888) in "11.2.9.1 Setup Event Notification" (page 880) for details.
Appendix J Factory Default List J.3 System ■ Audit Log Management Function Audit Log Setting item Default value Operation mode Disable Allowed input • Enable • Disable The Audit Log function is disabled by default and only the [Enable Audit Log] function can be performed. Setup Audit Log Send Audit Log off • on (RFC3164) • on (RFC5424) • off Port No.
Appendix J Factory Default List J.
Appendix J Factory Default List J.
Appendix J Factory Default List J.
Appendix J Factory Default List J.
Appendix J Factory Default List J.
Appendix K Error Code The error codes for copy sessions are described below. Error code Description 0x10 – 0x1F An error that is caused by a copy source volume occurs. Some copy source volumes cannot be accessed because a failure has occurred in a component (e.g. drives and drive enclosures). 0x20 – 0x2F An error that is caused by a copy destination volume occurs. Some copy destination volumes cannot be accessed because a failure has occurred in a component (e.g. drives and drive enclosures).
ETERNUS Web GUI User's Guide ETERNUS DX80 S2/DX90 S2, ETERNUS DX410 S2/DX440 S2, ETERNUS DX8100 S2/DX8700 S2 P2X0-1090-10ENZ0 Date of issuance: June 2013 Issuance responsibility: FUJITSU LIMITED • The content of this manual is subject to change without notice. • This manual was prepared with the utmost attention to detail. However, Fujitsu shall assume no responsibility for any operational problems as the result of errors, omissions, or the use of information in this manual.