NEC IS004-13E User Manual

NEC Storage Manager
User’s Manual
IS004-13E
No part of the contents of this book may be reproduced or
transmitted in any form without permission of NEC Corporation.
The contents of this book may be modified without notice in the future.

Preface

This manual describes the usage of NEC Storage Manager. NEC Storage Manager centrally operates/manages NEC
Storage disk array subsystems connected to server machines. To do so, it manages the configurations and statuses
of the NEC Storage disk array subsystems and issues alert messages according to performance and fault information.
Refer to the “NEC Storage Manager Manual Guide” (IS901) for the overview of NEC Storage and the related
manuals.
Remarks 1. This manual explains functions implemented by the following program products:
NEC Storage Manager and NEC Storage BaseProduct
2. This manual is applicable to the program products of the following versions:
NEC Storage Manager Ver3.3
NEC Storage BaseProduct Ver3.3
3. The NEC Storage Manager is referred to as iSM or Storage Manager in the text of this manual. Also,
the NEC Storage series disk array subsystem is referred to as a disk array.
4. The following descriptions in the text of this manual refer to the corresponding products.
Description Corresponding Product
Storage Manager NEC Storage Manager
BaseProduct NEC Storage BaseProduct
AccessControl NEC Storage AccessControl
CachePartitioning NEC Storage CachePartitioning
DynamicDataReplication NEC Storage DynamicDataReplication
PerformanceMonitor NEC Storage PerformanceMonitor
PerformanceOptimizer NEC Storage PerformanceOptimizer
ReallocationControl NEC Storage ReallocationControl
RemoteDataReplication NEC Storage RemoteDataReplication
RemoteDataReplication/DisasterRecovery NEC Storage RemoteDataReplication/DisasterRecovery
ReplicationControl NEC Storage ReplicationControl
5. The following descriptions in the text of this manual refer to the corresponding manuals.
Description Corresponding Manual
Configuration Setting Tool User’s Manual (GUI)
Messages Handbook NEC Storage Manager Messages Handbook (IS010)
Data Replication User's Manual (Function Guide)
Data Replication User's Manual (Installation and Operation Guide for Windows)
PerformanceMonitor User's Manual
Snapshot User’s Manual (Function Guide)
Manual Guide NEC Storage Manager Manual Guide (IS901)
NEC Storage Manager Configuration Setting Tool User’s Manual (GUI) (IS007)
NEC Storage Manager Data Replication User's Manual (Function Guide) (IS015)
NEC Storage Manager Data Replication User's Manual (Installation and Operation Guide for Windows) (IS016)
NEC Storage PerformanceMonitor User's Manual (IS025)
NEC Storage Manager Snapshot User’s Manual (Function Guide) (IS030)
6. Trademarks and registered trademarks
Microsoft® and Windows® are trademarks or registered trademarks of Microsoft Corporation in the
United States and other countries.
HP-UX is a registered trademark of Hewlett-Packard Co. in the United States.
Solaris is a trademark or a registered trademark of Sun Microsystems, Inc. in the United States and
other countries.
Linux is a trademark or a registered trademark of Mr. Linus Torvalds in the United States and other
countries.
Other product names and company names, etc. are trademarks or registered trademarks of the
associated companies.
7. In this document, matters to which careful attention needs to be paid will be described as follows:
Be sure to observe the contents.
If the indications are ignored and the system is improperly operated, settings which have been already
made might be affected.
Type of Indication
Type Description
Describes contents which require special attention during operation.
The First Edition in March 2001
The Thirteenth Edition in November 2004

Contents

Part I Installation and Setting ..........................................................................................................................I-1
Chapter 1 Server Installation ..........................................................................................................................................I-2
1.1 Operating Environment ............................................................................................................................................I-2
1.2 Installation ................................................................................................................................................................ I-3
1.3 Environment Setting................................................................................................................................................. I-5
Chapter 2 Client Installation .........................................................................................................................................I-24
2.1 Operating Environment ..........................................................................................................................................I-24
2.2 Installation and Setting ........................................................................................................................................... I-25
2.3 Relationship between Server and Client Versions ................................................................................................. I-27
Part II Functions ..............................................................................................................................................II-1
Chapter 3 Basic Functions ............................................................................................................................................. II-2
3.1 Configuration Display .............................................................................................................................................II-2
3.2 State Monitoring....................................................................................................................................................II-44
3.3 Nickname Setting ..................................................................................................................................................II-49
3.4 Fault Monitoring....................................................................................................................................................II-55
3.5 Log Output ............................................................................................................................................................II-56
3.6 Event Link .............................................................................................................................................................II-62
3.7 ESMPRO Link.......................................................................................................................................................II-65
Chapter 4 Server Menu................................................................................................................................................ II-69
4.1 Operation Method.................................................................................................................................................. II-69
4.2 Functions ...............................................................................................................................................................II-70
Part III Operations...........................................................................................................................................III-1
Chapter 5 Normal Operation........................................................................................................................................III-2
5.1 Server Start/Stop.................................................................................................................................................... III-2
5.2 Client Start/Stop .................................................................................................................................................... III-3
5.3 Volume List Command (iSMvollist)................................................................................................................... III-10
5.4 Volume List Display............................................................................................................................................ III-26
5.5 Configuration Display Command (iSMview) ..................................................................................................... III-37
5.6 Configuration Information File Output Command (iSMcsv) .............................................................................. III-92
Chapter 6 Measures in Abnormalities .....................................................................................................................III-108
6.1 Measures for Server Fault ................................................................................................................................. III-108
6.2 Measures for Client Fault .................................................................................................................................. III-114
Appendix A Specifications..................................................................................................................................................1
A.1 Number of Monitored Disk Arrays .............................................................................................................................1
A.2 Number of Connected Clients .....................................................................................................................................1
A.3 Maximum Number of iSM Clients That Can Be Started Simultaneously ..................................................................1
Appendix B Environment Definition Language ..................................................................................................................2
B.1 Mail Header File..........................................................................................................................................................2
Appendix C Notes...................................................................................................................................................................3
C.1 Items about Server ....................................................................................................................................................... 3
C.2 Items about Client ....................................................................................................................................................... 4
Index .....................................................................................................................................................................................5
i
This page is intentionally left blank.
ii
P
a
r
t
I
I
n
s
t
a
l
l
a
t
i
o
n
a
n
d
S
e
t
t
i
n
g
P
a
r
t
I
I
n
s
t
a
l
l
a
t
i
o
n
a
n
d
S
e
t
t
P
a
r
t
I
I
n
s
t
a
l
l
a
t
i
o
n
a
n
d
S
e
i
t
t
i
n
n
g
g

Chapter 1 Server Installation

Chapter 1 Server Installation
1
.
1
O
p
e
r
a
t
i
n
g
E
n
v
i
r
o
n
1
.
1
O
p
e
r
a
t
i
n
g
E
n
v
i
1
.
1
O
p
e
r
a
t
i
n
g
E
Table 1-1 Operating Environment
Operating systems Microsoft Windows 2000 Server (SP2 or later)
Microsoft Windows 2000 Advanced Server (SP2 or later)
Microsoft Windows Server 2003, Standard Edition
Microsoft Windows Server 2003, Enterprise Edition (64-bit)
Microsoft Windows Server 2003, Enterprise Edition
Memory OS required memory capacity + 50MB (+ 200MB for 64-bit) or more
Disk capacity Program capacity: 20MB
Required capacity for operation: 100MB or more
Recommended software
Indispensable hardware
IIS FTP Publishing Service
Storage series
n
v
r
i
r
o
o
n
n
m
m
m
e
e
e
n
n
n
t
t
t
Disk array
Client
When managing a disk array via FC, a fibre channel controller, a fibre channel cable and a driver of fibre channel
controller are necessary as peripheral equipments. And a fibre channel hub and a fibre channel switch should be
installed if necessary.
Event log
Storage Manager
Operation log
Executable file, batch file starting
Mail server
Mail transmission
Figure 1-1 System Configuration Image
I-2
Chapter 1 Server Installation
1
.
2
I
n
s
t
a
l
l
a
t
i
o
n
1
.
2
I
n
s
t
a
l
l
a
1
.
2
I
n
s
t
a
1
.
2
.
1
S
t
1
.
2
.
1
1
To install the iSM server, follow the procedure below.
1. To use the ESMPRO link function, install ESMPRO Agent ahead of the iSM server. If Alert Manager
2. When you install the iSM server to a server machine in which ESMPRO Manager is installed, a screen for
3. iSM server creates many files, while it is operating, in the folder where iSM itself is installed. If the
4. The target folder where Win.ini file is stored cannot be selected for a folder where the program is to be
.
2
.
1
Main Service has been started before the iSM server is installed, terminate this service once to register the
link function securely and then execute the following operations for installation.
confirming link with ESMPRO Alert Manager appears. Make setting as needed on the screen. For
details, refer to 3.7.4 “Link between ESMPRO Manager and ESMPRO Alert Manager”.
program is uninstalled, all files and subfolders, not including the iSM server setting file, in the folder where
the program is installed are deleted. Therefore, default folder setting is recommended to use for installing
the program. If you want to install the program into a folder other than the default folder, you have to
create a new folder or be sure to install into an existing folder where other files are not installed. In
addition, never save important files in the folder.
installed.
S
S
o
t
o
t
o
t
l
l
a
t
r
a
g
e
r
a
g
e
r
a
g
e
i
o
n
i
o
n
M
a
n
a
g
e
r
S
e
r
v
e
r
I
n
s
t
a
l
l
a
t
i
o
n
M
M
a
a
n
n
a
a
g
g
e
e
r
S
e
r
v
e
r
I
n
s
t
a
l
l
a
r
S
e
r
v
e
r
I
n
s
t
a
t
l
l
a
t
i
o
n
i
o
n
(1) Log on as the Administrator.
(2) Select the following installation program from [Add/Remove Programs] ([Add or Remove Programs] for
Windows Server 2003) in [Control Panel].
CD-ROM drive:\SERVER\WINDOWS\SETUP.EXE
(3) Follow the directions of the installer.
Perform environment setting in the install process. For the information of the environment setting, refer to 1.3
“Environment Setting”.
(4) Reboot the operating system.
To prevent iSM server from being automatically started during restart of the operating system, refer to 5.1
“Server Start/Stop”.
I-3
Chapter 1 Server Installation
1
.
2
.
2
S
t
o
r
a
1
.
2
.
2
S
2
3
3
3
4
4
4
t
S
t
S
S
S
V
V
V
1
.
2
.
To uninstall the iSM server, follow the procedure below.
(1) Log on as the Administrator.
(2) Close [Services] and [Event Viewer].
(3) Remove “Storage Manager Server” by using [Add/Remove Programs] ([Add or Remove Programs] for Windows
Server 2003) in [Control Panel]. When the Storage Manager service is running, it will be automatically stopped.
Even after iSM has been uninstalled, the environment definition files, operation log files, performance statistical
information history files, performance statistical information summary files, performance optimization log files,
and license-related files are not deleted. All the other files and subfolders under the folder where the program is
installed are deleted when iSM is uninstalled.
1
.
2
.
1
.
2
.
1
.
2
.
To update iSM server, uninstall the existing iSM before installing the updated program.
Please refer to 1.2.1 “Storage Manager Server Installation” and 1.2.2 “Storage Manager Server Uninstallation” for the
procedures.
1
.
2
.
1
.
2
.
1
.
2
.
o
o
t
t
t
o
o
o
o
o
o
g
r
a
g
r
a
g
r
a
r
a
r
a
l
u
l
u
l
u
e
g
g
g
m
m
m
e
e
e
e
e
e
e
M
e
M
M
a
M
M
M
L
L
L
a
a
n
a
g
e
r
S
e
r
v
e
r
U
n
i
n
s
t
a
l
l
a
t
i
o
n
n
a
g
e
r
S
e
r
v
e
r
U
n
i
n
s
t
a
l
l
a
n
a
g
e
r
S
e
r
v
e
r
U
n
i
n
s
t
a
n
a
g
e
r
S
e
r
v
e
r
U
p
d
a
d
d
d
d
d
a
a
U
U
U
t
t
t
n
n
a
n
a
g
e
r
S
e
r
v
e
r
U
a
n
a
g
e
r
S
e
r
v
e
i
s
t
I
n
s
t
a
l
l
a
t
i
o
i
s
t
I
n
s
t
a
l
l
i
s
t
I
n
s
a
t
a
l
l
a
n
t
i
o
n
t
i
o
n
p
r
U
p
a
n
a
n
a
n
a
e
n
e
e
t
l
l
a
t
i
n
s
i
n
s
i
n
s
i
o
n
i
o
n
t
a
l
l
a
t
i
o
n
t
a
l
l
a
a
t
l
l
a
t
t
i
o
n
i
o
n
The iSMvollist command is a tool for reporting disk information such as the disk array name or logical disk name of a
disk array connected via the fibre channel (FC). This command can be operated independently even on a server
machine where iSM has not been installed.
To install iSMvollist, follow the procedure below.
When iSMvollist is already installed, uninstall it and then install it again.
(1) Log on as the Administrator.
(2) Select the following installation program from [Add/Remove Programs] ([Add or Remove Programs] for
Windows Server 2003) in [Control Panel].
CD-ROM drive:\VOLLIST\WINDOWS\SETUP.EXE
(3) Follow the directions of the installer.
To uninstall iSMvollist, follow the procedure below.
(1) Log on as the Administrator.
(2) If the iSMvollist command and/or [Volume List Display] have been started, terminate all. If [Event Viewer] is
open, close it.
(3) Remove “Storage Manager Volume List” by using [Add/Remove Programs] ([Add or Remove Programs] for
Windows Server 2003) in [Control Panel].
I-4
Chapter 1 Server Installation
If you uninstall iSMvollist while iSMvollist and/or [Volume List Display] have been started, a message
prompting to restart the system may appear. In this case, follow the instruction and be sure to restart the
system.
1
.
3
E
n
v
i
r
o
n
m
e
n
t
S
e
t
t
i
n
g
1
.
3
E
n
v
i
r
o
n
m
e
n
t
S
e
t
1
.
3
E
n
v
i
r
o
n
m
e
n
t
Environment settings are required to start up the iSM server. This document describes how to perform environment
settings.
Perform environment settings when installing the iSM server or changing the settings because of the addition of the
disk arrays to be monitored or users after the installation.
1
.
3
.
1
S
e
t
t
i
n
g
D
i
s
k
A
r
1
.
3
.
1
S
e
t
t
i
n
g
D
i
s
1
.
3
.
1
S
e
t
t
i
n
g
Disk array information is set in the following screen. Disk array information includes identification of disk arrays
monitored by the iSM server and how to connect disk arrays.
To start the Setting Utility screen, select [Start] [Programs] ([All Programs] for Windows Server 2003) [Storage
Manager Server] [Setting Utility], or select [Server Menu] [Setting Utility]. If having changed the
environment setting, restart the iSM server. Information set on each screen is saved by clicking the [OK] button.
When iSM server is installed before the connection of disk arrays or the IP address and/or disk number of a disk array
is unknown, first select [Automatic detection of Disk Array Subsystems connected by FC] and make other setting
(such as 1.3.2 “Setting User Information”). In such a case, change the setting with the IP address and disk number
determined.
D
k
i
s
k
r
A
r
r
A
r
r
S
a
a
a
e
y
y
y
t
t
t
I
n
I
n
I
i
i
n
n
n
f
f
g
g
o
r
m
a
t
i
o
n
o
r
m
a
m
a
t
t
f
o
r
i
o
n
i
o
n
I-5
Chapter 1 Server Installation
(i)
(ii)
(iii) (iv) (v)
Figure 1-2 Disk Array Subsystem List Screen
(i) [Automatic detection of Disk Array Subsystems connected by FC]
When you select [Automatic detection of Disk Array Subsystems connected by FC], disk arrays with the FC
connection are automatically detected and monitored.
(ii) [Disk Array Subsystem List]
[Disk Array Subsystem List] displays the disk array information currently registered.
(When a disk array specified by the disk number is selected, the column heading [IP Address or Host Name] in
the figure above appears as [Disk].) Up to 32 disk arrays can be registered in the [Disk Array Subsystem List].
(iii) [Add] button
To add a disk array, use the [Add] button to open the Add screen.
(iv) [Delete] button
To delete a disk array, select a disk array you want to delete, and click the [Delete] button.
I-6
Chapter 1 Server Installation
(v) [Edit] button
To modify a disk array, select a disk array you want to edit and click the [Edit] button, or double-click the disk
array and edit it on the Edit screen (Figures 1-4 and 1-5).
(vi)
(vii)
Figure 1-3 Disk Array Subsystem - Add Screen - 1
(vi) [Specification by IP Address]
To monitor a disk array in TCP/IP connection, select [Specification by IP Address] to display the IP address
addition screen (Figure 1-4).
(vii) [Specification by Disk Number]
To monitor a disk array in FC connection, select [Specification by Disk Number] to display the disk addition
screen (Figure 1-5). Disk number is a number assigned by Windows to manage logical disks. The setting is
generally not required since the disk arrays connected by FC are automatically detected by checking [Automatic
detection of Disk Array Subsystems connected by FC].
(viii)
(ix)
Figure 1-4 Disk Array Subsystem - Add Screen - 2
(viii) [Main IP Address]
In [Main IP Address], specify an IP address or host name. Up to 63 characters can be used for a host name.
Non-ASCII code characters, control characters, double quotation mark, and space cannot be used for a host
name.
iSM connects to the IP address or that specified for the host name (port number: 2730) to conduct monitoring.
I-7
Chapter 1 Server Installation
(ix) [Sub IP Address]
In [Sub IP Address], up to two IP addresses can be specified for the disk arrays with two SVPs.
iSM connects to the IP address or that specified for the host name (port number: 2730) to conduct monitoring.
(x)
Figure 1-5 Disk Array Subsystem - Add Screen - 3
(x) Disk Number Entry field
In an entry field on the screen as shown in the figure above, specify a disk number. A value from 0 to 9999
can be specified for a disk number. Check the disk number of the disk array to be monitored, using the
Volume List (iSMvollist -dl) command in advance. For details, refer to 5.3 “Volume List Command
(iSMvollist)”.
1. Without any disk number being specified, disk arrays can be monitored via FC by specifying [Automatic
detection of Disk Array Subsystems connected by FC].
Specification of a disk number is not recommended because the disk number may change when the OS is
rebooted or an FC fault occurs.
2. For Windows Server 2003, disks in disk arrays may not be accessed when, for example, the access control
setting is changed. Therefore, it is strongly recommended that disk arrays be monitored through TCP/IP
connection when iSM server is installed and used under Windows Server 2003.
I-8
Chapter 1 Server Installation
1
.
3
.
2
S
e
t
t
i
n
g
U
s
e
r
I
n
f
o
r
m
a
t
i
o
n
1
.
3
.
2
S
e
t
t
i
n
g
U
s
e
r
I
n
f
o
r
m
a
1
.
3
.
2
S
e
t
t
i
n
g
U
s
e
r
I
n
f
o
r
User information is set in the following screen. iSM server uses user information as an account. iSM server uses
this information in order to identify the user who connects by iSM client. This information is composed of user
names, passwords, and user levels (refer to explanation of the “User-Add” screen given later for details). As a
default, a user is registered having the user name of iSM, password of iSM and user level of L1 (only reference to the
information is allowed). Add, as required, users of the user level L3 who can change configuration of disk arrays.
For the iSM client, refer to 5.2 “Client Start/Stop”.
Set user information on the Setting Utility screen shown below.
To start the Setting Utility screen, select [Start] [Programs] ([All Programs] for Windows Server 2003) [Storage
Manager Server] [Setting Utility], or select [Server Menu] [Setting Utility]. If having changed the
environment setting, restart the iSM server. Information set on each screen is saved by clicking the [OK] button.
Setting of one or more pieces of user information is required. Note that user information of iSM set on this screen
is independent of the OS user or password.
m
a
t
t
i
o
n
i
o
n
(i)
(ii) (iii) (iv)
Figure 1-6 User List Screen
I-9
Chapter 1 Server Installation
(i) [User List]
[User List] displays the list of users currently registered. This user name is used for obtaining authorization to
connect with an iSM server from an iSM client, and display and control the disk array information form the
iSM client. Up to 100 user names can be registered in the User List.
(ii) [Add] button
To add a user, use the [Add] button to open the Add screen (Figure 1-7).
(iii) [Delete] button
To delete a user, select a user you want to delete, and click the [Delete] button.
(iv) [Edit] button
To modify a user, select a user you want to edit and click the [Edit] button, or double-click the user and edit it
on the Edit screen (Figure 1-7).
(v)
(vi)
(vii)
Figure 1-7 User - Add Screen
(v) [User Name]
In [User Name], specify a user name within 20 characters. User Name is case-sensitive. Non-ASCII code
characters, control characters, double quotation mark, and space cannot be used for a user name.
(vi) [Password]
In [Password], specify a password of the user within 14 characters. Password is case-sensitive. Enter the
same password in [Password Confirmation] for confirmation. The character you enter is displayed as a “*”.
Non-ASCII code characters, control characters, and double quotation mark cannot be used for a password. A
password cannot consist of all spaces.
(vii) [User Level]
In [User Level], specify the operation authorization level of the user. iSM defines the three kinds of user
levels that set/refer information of disk arrays by iSM client. An upper level (L3>L2>L1) allows all
operations of a lower level.
L1(Level 1): Only reference to state display is authorized.
L2(Level 2): Operations at the level of the replication, performance monitoring, performance optimization, and
snapshot functions are authorized.
L3(Level 3): All operations are authorized, such as changing the disk array configuration.
I-10
Chapter 1 Server Installation
i
i
i
i
i
i
1
.
3
.
3
S
e
t
t
i
n
g
L
i
n
k
I
n
f
o
r
m
a
t
i
o
n
1
.
3
.
3
S
e
t
t
i
n
g
L
i
n
k
I
n
f
o
r
m
a
1
.
3
.
3
S
e
t
t
i
n
g
L
i
n
k
I
n
f
o
r
Set link information to use the event link function. For details on the event link function, refer to 3.6 “Event Link”.
Set link information on the Setting Utility screen shown below.
To start the Setting Utility screen, select [Start] [Programs] ([All Programs] for Windows Server 2003) [Storage
Manager Server] [Setting Utility], or select [Server Menu] [Setting Utility].
(1) Setting Utility screen
Even while the iSM server is operating, event link operation can be dynamically changed by clicking the
[Update Event Link Operation] button on the Setting Utility screen. At this time, information set on this screen
is saved. Restart the iSM server if not clicking the [Update Event Link Operation] button.
Information set on each screen is saved by clicking the [OK] button.
m
a
t
t
i
o
n
i
o
n
(i)
(ii)
(iv)
(v
)
(vii
(vii)
(ix)
)
(xi
(xvi)
Figure 1-8 Screen for Setting Link Information
(i) Authentication
NONE: Does not perform user authentication.
POP before SMTP: Performs user authentication using POP before SMTP.
SMTP-AUTH: Performs user authentication using SMTP Authentication.
)
) (xiv) (xv)
(xii
(ii
(v)
)
(x)
)
(x
I-11
Chapter 1 Server Installation
(ii) SMTP Server
In [SMTP Server], specify the SMTP server to which mails are sent within 235 characters.
(iii) SMTP Port
In [SMTP Port], specify the port number of the SMTP server to which mails are sent.
A value from 1 to 65535 can be specified. The default value is 25.
(iv) POP Server
In [POP Server], specify the POP server to access for authentication when sending mails within 235 characters.
This item is effective if you specify [POP before SMTP] for (i) [Authentication].
(v) POP Port
In [POP Port], specify the port number of the POP server to access for authentication when sending mails.
A value from 1 to 65535 can be specified. The default value is 110.
This item is effective if you specify [POP before SMTP] for (i) [Authentication].
(vi) User Name
In [User Name], specify the user name for authentication within 32 characters.
This item is effective if you specify either [POP before SMTP] or [SMTP-AUTH] for (i) [Authentication].
(vii) Password
In [Password], specify a password of the user name for authentication within 58 characters.
This item is effective if you specify either [POP before SMTP] or [SMTP-AUTH] for (i) [Authentication].
(viii) Password Confirmation
Enter the same password in [Password Confirmation] for confirmation.
This item is effective if you specify either [POP before SMTP] or [SMTP-AUTH] for (i) [Authentication].
(ix) Mail Header File
In [Mail Header File], specify the header file which is a template for sending a mail within 235 characters.
(x) [Browse] button
Displays the file selection screen on which you can specify an existing mail header file.
(xi) [Edit] button
Enables the creation of a new mail header file or the editing of an existing mail header file. Enter the path in
the [Mail Header File] field and click the [Edit] button. The Mail Header File Setting screen (Figure 1-9)
appears. Edit the contents and click the [Save] button or [Save as] button.
(xii) Link List
Displays the list of currently set link items.
(xiii) [Add] button
Displays the Link - Add screen (Figure 1-10) on which you can add link items.
(xiv) [Delete] button
To delete a link item, select the one you want to delete and click the [Delete] button.
(xv) [Edit] button
Select a link item and click the [Edit] button, or double-click the link item. The Link - Add screen (Figure
1-10) appears for changing link items.
(xvi) [Update Event Link Operation] button
A message is displayed asking if you want to apply new settings. If iSM is operating, selecting the [Yes]
button immediately applies the new settings. If iSM is not operating, only event link information is updated,
and the new settings become valid when iSM is started next time.
I-12
(2) Mail Header File Setting screen
(i)
Chapter 1 Server Installation
(ii) (iii)
Figure 1-9 Mail Header File Setting Screen
(i) Mail header file contents
Write the mail header file contents. For details, refer to Appendix B “Environment Definition Language”.
(ii) [Save] button
Saves the mail header file with the displayed contents and returns to the Link Information Setting screen
(Figure 1-8).
(iii) [Save as] button
Newly saves the mail header file with the displayed contents, and returns to the Link Information Setting screen
(Figure 1-8). The path name of a newly created file is entered in the [Mail Header File] field.
I-13
Chapter 1 Server Installation
(iv)
(3) Link-Add screen
(i)
(ii)
(iii)
Figure 1-10 Link Item Addition Screen
(i) Action Level
Select the execution level of the action performed for the message of iSM.
(ii) Action
Select the action (the sending of mail or the execution of a batch file or program) to be taken for the message of
iSM.
(iii) Mail Address
If [Mail Transmission] is selected, specify the mail address of the destination. Do not use parentheses in
specifying the mail address. The mail address can be specified with up to 235 characters.
(iv) Executable File
If [Batch File or Executable Program] is selected, click the [Browse] button and specify the path name of the
batch file or program. In this case, specify an executable file which does not require any interaction with the
screen. Do not use parentheses in specifying the executable file. The executable file can be specified with up
to 235 characters.
1. The [Browse] button is available only when [Batch File or Executable Program] is selected in the [Action]
field.
2. Do not register actions of the same contents repeatedly in the same action level.
I-14
Chapter 1 Server Installation
1
.
3
.
4
S
e
t
t
i
n
g
P
e
r
f
o
r
m
a
n
c
e
I
n
f
o
r
m
a
t
i
o
n
1
.
3
.
4
S
e
t
t
i
n
g
P
e
r
f
o
r
m
a
n
c
e
I
n
f
o
r
m
a
1
.
3
.
4
S
e
t
t
i
n
g
P
e
r
f
o
r
m
a
n
c
e
I
n
f
o
r
Set performance information on the Setting Utility screen shown below. Since the default values are recommended
for the information, it is not necessary to make any settings on this screen in ordinary operation.
To start the Setting Utility screen, select [Start] [Programs] ([All Programs] for Windows Server 2003) [Storage
Manager Server] [Setting Utility], or select [Server Menu] [Setting Utility]. If having changed the
environment setting, restart the iSM server. Information set on each screen is saved by clicking the [OK] button.
(i)
(ii)
m
a
t
t
i
o
n
i
o
n
(iii)
(iv)
(v)
(vi)
(vii)
(viii)
(ix)
Figure 1-11 Screen for Setting Performance Information
In [Performance Monitoring Information], set information about the monitoring of disk array performance.
(i) PSL Folder
Specify the folder for containing the statistical information history file. The folder name can be specified with
up to 210 bytes.
For details, refer to the “PerformanceMonitor User’s Manual”.
The default folder is [installation destination folder]\etc\mon. If changing the folder, click the [Browse] button
and specify an existing folder.
I-15
Chapter 1 Server Installation
(ii) PSL Output Interval
Specify the interval at which statistical information is collected and output to the statistical information history
file. The default interval is 5 minutes. If changing the interval, specify a value from 1 to 60.
(iii) Adjustment of Output Interval
Statistical information may not be output at the currently specified interval if there are too many disk array
components. Specify this item to determine whether to automatically change to an interval at which statistical
information can be output.
Manual: The currently specified interval is not changed automatically to an interval at which statistical
information can be output.
Automatic: The currently specified interval is changed automatically to an interval at which statistical
information can be output.
(iv) Output PSL when iSM Server Starts
Determine whether to automatically start the output of statistical information for all the disk arrays that can use
PerformanceMonitor when the iSM server starts.
Don’t Output: Statistical information output is not automatically started.
Output: Statistical information output is automatically started. However, statistical information output is not
automatically started for disk arrays for which statistical information output was stopped in the previous
operation, and the previous operation state is retained instead.
(v) Display Refresh Rate
Specify the number of times data updated per minute in the numeric value table and the time-series graph on the
performance monitoring screen. For details, refer to the “PerformanceMonitor User’s Manual”. The default
number of times is 1 per minute. If changing the number of times, specify a value from 1 to 6.
(vi) Interval
Specify the monitoring interval as a threshold monitoring condition.
A value 1 to 60 (minutes) can be specified. The default monitoring interval is identical to the display refresh
rate.
(vii) Minimum I/O Count
Specify the minimum number of I/O operations as a threshold monitoring condition.
A value 1 to 120 (the number of times/minute) can be specified. The default minimum I/O count is 60 (times
per minute).
In [Performance Optimization Information], specify information about the performance optimization of disk arrays.
(viii) Log File Folder
Specify the folder for containing the performance optimization log file. The folder name can be specified with
up to 192 bytes.
The default folder is “[installation destination folder]\etc\optlog”. If changing the folder, click the [Browse]
button and specify an existing folder.
(ix) LD Movement Status Check Interval
Specify the interval at which the logical disk moving status is to be checked. The default interval is 10
seconds. If changing the interval, specify a value from 5 to 30.
I-16
Chapter 1 Server Installation
1
.
3
.
5
S
e
t
t
i
n
g
D
e
t
a
i
l
e
d
I
n
f
o
r
m
a
t
i
o
n
1
.
3
.
5
S
e
t
t
i
n
g
D
e
t
a
i
l
e
d
I
n
f
o
r
m
a
1
.
3
.
5
S
e
t
t
i
n
g
D
e
t
a
i
l
e
d
I
n
f
o
r
(1) Detailed information screen - 1
Set agent information, client information, state monitoring information, log information, and configuration
information on the Setting Utility screen shown below. Since the default values are recommended for the
information, there is no need to make any settings on this screen in ordinary operation.
To start the Setting Utility screen, select [Start] [Programs] ([All Programs] for Windows Server 2003)
[Storage Manager Server] [Setting Utility], or select [Server Menu] [Setting Utility]. If having changed
the environment setting, restart the iSM server. Information set on each screen is saved by clicking the [OK]
button.
m
a
t
t
i
o
n
i
o
n
(i)
(ii)
(iii)
(iv)
(v)
(vi)
(vii)
(viii)
Figure 1-12 Detailed Information Screen - 1
I-17
Chapter 1 Server Installation
In [Agent Information], set information regarding agent management
(i) Receive SNMP Trap
Select the receiving method in [Receive SNMP Trap]. SNMP trap is information sent from the disk array to
notify the iSM server of state transition of hardware, etc. It is enabled only for disk arrays monitored by
TCP/IP connection.
Don’t Receive: SNMP trap is not received.
Use the SNMP Trap Service: SNMP trap is received via the SNMP trap service.
Receive Directly: The iSM server receives it by using the port 162.
1. When you select [Use the SNMP Trap Service], SNMP Trap Service must be installed. When you select
[Receive Directly], a conflict with application collecting SNMP trap as SNMP Trap Service occurs. In
this case, don’t select [Receive Directly].
2. Disk arrays can be monitored even without SNMP trap being received. Performance may be degraded if
network security is compromised. Therefore, [Don’t Receive] should be selected.
(ii) Remonitoring Check Interval
When a trouble occurs in the connection between iSM server and the disk arrays, iSM server will stop the
monitoring of the disk arrays for a time, and later it will restart monitoring automatically.
In [Remonitoring Check Interval], specify an interval for checking whether the monitoring of disk arrays can be
restarted. The default value is 5 (minutes). A value from 1 to 60 can be specified.
In [Client Information], specify information regarding the iSM client.
(iii) Connection Port Number
In [Connection Port Number], specify the port number of the iSM server to which the iSM client connects.
For the iSM client, refer to 5.2 “Client Start/Stop” in Part III “Operations”. The default value is 8020. A
value from 1 to 65535 can be specified.
In [State Monitoring Information], specify information regarding the monitoring of the disk array status.
(iv) Monitoring Interval
In [Monitoring Interval], specify an interval for requesting status monitoring of disk arrays. The default value
is 15 (seconds). A value from 1 to 3600 can be specified.
For status monitoring, refer to 3.2 “State Monitoring” in Part II “Functions”.
(v) Duplicate Nickname Check
Determine whether to make a duplication check on identifiers that are assigned to components in the disk arrays
to be managed by iSM.
In [Duplicate Nickname Check], specify whether or not to execute the duplicated check for the identification
names of the components in the disk arrays that are targets of the iSM management.
Components to be checked in a duplicated manner are as follows:
y Disk Array Name
y Logical Disk Name
I-18
Chapter 1 Server Installation
y Port Name
Don’t Check: does not execute duplicated check.
Check: executes duplicated check.
In [Log Information] specify information regarding logs.
(vi) Log File Folder
In [Log File Folder], specify a folder that saves a file for outputting operation logs of iSM server. To change
the folder, use the [Browse] button to specify an existing folder. Specification uses up to 245 bytes.
For operation logs, refer to 3.5 “Log Output”.
(vii) Log File Size
In [Log File Size], specify the size (upper limit) of the file for outputting operation logs. The default value is 1
(MB). A value from 1 to 10 can be specified.
A serial number is assigned to each log file. Up to 100 files with the specified size are created.
In [Configuration Information], specify the information about configuration setting function
(viii) Automatically Correct Disk Array Subsystem’s Timer
In [Automatically Correct Disk Array Subsystem’s Timer], specify whether or not to correct the time in the disk
array by using the server automatically.
Correct: corrects the time in the disk array automatically.
Don’t Correct: does not correct the time in the disk array automatically.
(2) Detailed information screen - 2
File transfer information, replication information, and snapshot information settings are set in the following
setting screen. To use the file transfer function, items in [File Transfer Information] must be specified. In
normal operation, no settings are required in this screen since these items are set to the recommended default
values.
I-19
Chapter 1 Server Installation
(ix)
(x)
(xi)
(xii)
(xiii)
(xiv)
(xv)
(xvi)
(xvii)
(xviii)
(xix)
Figure 1-13 Detailed Information Screen - 2
In [File Transfer Information], specify information regarding the file transfer function.
To transfer files between the iSM server and iSM client, the iSM internally uses the FTP through the following
operations of the iSM client.
Therefore, the FTP site environment (installation of IIS FTP Publishing Service and building of the FTP site) must
be built on the iSM server node before the iSM server is operated.
y Selecting [Get Configuration Setting Info.] on the configuration setting screen
y Selecting [Download Statistic Information files] on the performance screen
y Selecting [Busy Ratio Graph] and [Replacement Effect Prediction] on the performance optimization screen
y Selecting [Difficulty Information Gather] on the main screen (iSM client)
When these functions are not used, settings for file transfer are unnecessary.
(ix) FTP User Name
Specify the name of an FTP user who is to make FTP connection from the iSM client to the iSM server node.
You can specify only an FTP user who is permitted to use the FTP and authorized to read from and write to the
folder specified for [Temporary Folder].
The default user name is iSMuser. The FTP user name can be specified with up to 32 bytes.
I-20
Chapter 1 Server Installation
(x) FTP Password
Specify the password of the user specified for [FTP User Name].
If using “anonymous” or “ftp” as the FTP user, specify the mail address. The FTP user password can be
specified with up to 58 bytes.
(xi) FTP Password Confirmation
For confirmation, enter the same value as for [FTP Password].
(xii) IP Address of FTP Site
Specify the IP address to be used as the FTP connection destination from the iSM client. If the IP address of
the FTP site is not specified, the system automatically gets the IP address of the iSM server node and uses it as
the FTP connection destination.
Set a suitable IP address in the following cases:
y An IP address is explicitly written in the specification of the IP address of the FTP site.
(Select [Properties] of the FTP site used by iSM [FTP Site] [Identification] [IP Address], in which an
IP address has been specified.)
y The iSM server is used in cluster environment.
In particular, to operate the FTP service in cluster environment, place the iSM server and the FTP service in
the same failover group, and specify a floating (virtual) IP address. To operate the FTP service starting as a
service in cluster environment, specify the real IP address.
* Do not specify “127.0.0.1”, “0.0.0.0”, or “255.255.255.255” as an IP address.
(xiii) Port Number of FTP Site
Specify the port number of the FTP site to be used by iSM.
Select [Properties] of the FTP site used by iSM [FTP Site] [Identification] [TCP Port], in which a port
number has been specified. The port number must be specified here. The default port number is 21.
(xiv) FTP Root Folder
Specify the root folder of the FTP site to be used by iSM.
Select [Properties] of the FTP site used by iSM [Home Directory] [FTP Site Directory] [Local Path],
in which a path has been specified. The path must be specified here. The default root folder is the drive in
which the iSM server is installed. The root folder can be specified with up to 192 bytes.
* If not specifying a virtual directory path:
Select [Properties] of the FTP site used by iSM [Home Directory] [FTP Site Directory], in which check
permission for both read and write.
(xv) Temporary Folder
Specify the folder (the local directory of the computer on which the iSM server operates) that is to be used as a
temporary folder when the iSM uses the FTP. If a network resource or network directory is specified, the file
transfer function may not operate correctly.
This folder (drive) needs a free space of 300MB × the number of files concurrently transferred or more. If the
drive containing the iSM server does not have a free space large enough, specify the folder of a drive having a
free space large enough.
If not using the default folder, give the group administrators “Full Control” access authority to the specified
folder and the high-level folders.
Also authorize the user specified for [FTP User Name] to read from and write to the folder specified here.
The default folder is “installation destination folder\etc\temp”. The folder can be specified with up to 192
bytes.
I-21
Chapter 1 Server Installation
* In particular, to operate the FTP service under cluster control in cluster environment, you should place the
iSM server and the FTP service in the same fail over group on the local disk.
(xvi) Virtual Directory Path
If using a virtual directory, specify the path for the user, specified for [FTP User Name], to access [Temporary
Folder] through the FTP. The path can be specified with up to 192 bytes.
If [FTP Root Folder] is at a higher level than [Temporary Folder] (or if the folders are identical), [Virtual
Directory Path] need not be specified. The following shows examples:
Example 1: FTP Root Folder: C:\
Temporary Folder: C:\Program Files\NEC\iSMsvr\etc\temp
In this case, the temporary folder can be accessed through the path “/Program
Files/NEC/iSMsvr/etc/temp” in the FTP. Thus, a virtual directory path need not be specified.
Example 2: FTP Root Folder: C:\Program Files\NEC\iSMsvr\etc\temp
Temporary Folder: C:\Program Files\NEC\iSMsvr\etc\temp
In this case, the temporary folder can be accessed through the path “/” that is to the temporary
folder. Thus, a virtual directory path need not be specified.
In other cases, a virtual directory needs to be created and a virtual directory path needs to be specified. The
following shows examples:
Example 3: FTP Root Folder: C:\InetPub\FTPRoot
Temporary Folder: C:\Program Files\NEC\iSMsvr\etc\temp
If a virtual directory is created under the conditions below, specify “/iSMftp” for [Virtual
Directory Path]. In this case, the temporary folder is accessed through the path “/iSMftp” in the
FTP.
Alias: “iSMftp”
Path: “C:\Program Files\NEC\iSMsvr\etc\temp”
Example 4: FTP Root Folder: C:\InetPub\FTPRoot
Temporary Folder: D:\iSM\temp
If a virtual directory is created under the conditions below, specify “/iSMftp2” for [Virtual
Directory Path]. In this case, the temporary folder is accessed through the path “/iSMftp2” in the
FTP.
Alias: “iSMftp2”
Path: “D:\iSM\temp”
Example 5: FTP Root Folder: C:\InetPub\FTPRoot
Temporary Folder: D:\iSM\temp
If a virtual directory is created under the conditions below, specify “/iSMftp3/temp” for [Virtual
Directory Path]. In this case, the temporary folder is accessed through the path “/iSMftp3/temp”
in the FTP.
Alias: “iSMftp3”
Path: “D:\iSM”
* For the path to be specified in creating a virtual directory, be sure to specify the local directory of the
computer on which the iSM server operates. If a network resource or network drive (or a directory under the
drive) is specified, the file transfer function may not operate correctly.
* If specifying a virtual directory path (using a virtual directory), give access permission for both read and write
during creation of the virtual directory.
I-22
Chapter 1 Server Installation
The file transfer function of iSM is operated with FTP. An FTP command of Windows is used on the iSM client
side and an FTP server of each OS is used on the iSM server. In this case, only active mode (PORT mode) is used
as FTP data transfer function. Therefore, if there is a firewall or NAT in the network between the iSM client and
the iSM server, the file transfer function may not be available.
Before attempting to operate iSM, be sure to connect the FTP (and perform get and put processing) through the
command prompt on the computer on which the iSM client operates, and confirm that the items in [File Transfer
Information] are set correctly.
In [Replication Information], specify information regarding the replication function.
(xvii) Monitor of State Changes
Determine whether to monitor the transition of the replication states.
Monitor: The replication state transition is monitored.
Don’t Monitor: The replication state transition is not monitored.
(xviii) Port Number
Specify the number of the port to be used when the ReplicationControl command is issued via iSM. A value
from 1 to 65535 can be specified. The default value is 8030.
In [Snapshot Information], specify information regarding the snapshot function.
(xix) Port Number
Specify the port number to be used when the SnapControl command is issued via iSM. A value from 1 to
65535 can be specified. The default value is 8040.
I-23

Chapter 2 Client Installation

Chapter 2 Client Installation
2
.
1
O
p
e
r
a
t
i
n
g
E
n
v
i
r
o
n
2
.
1
O
p
e
r
a
t
i
n
g
E
n
v
i
2
.
1
O
p
e
r
a
t
i
n
g
E
(1) Network Environment Setting
Because TCP/IP socket communication is used between the iSM server and iSM client, which are operated on the
PC, TCP/IP connection environment with the concerned server should be bound for network environment
definitions of personal computer.
(2) Operating environment
The iSM client operates on the personal computer that has Windows 2000 (SP2 or later)/Windows XP/Windows
Server 2003 operating system.
Table 2-1 Required Memory Capacity -1
Main screen 21 (41) MB or more
Configuration setting screen 13 (22) MB or more
Replication screen 16 (29) MB or more
Performance monitoring screen 9 (17) MB or more
Performance optimization screen 7 (15) MB or more
Fault information gathering screen 10 (16) MB or more
Snapshot screen 7 (15) MB or more
n
v
r
i
r
o
o
n
n
m
m
m
e
e
e
n
n
n
t
t
t
* Memory capacity in addition to those for main memory is required for displaying a screen other than main
screen. The memory capacity is required when operating iSM client.
A value enclosed in parentheses indicates the memory capacity required when the iSM client operates under the
64-bit version of the operating system.
Table 2-2 Required Memory Capacity -2
Performance analysis supporting tool
* In addition to the memory capacity for operating the iSM client, the above memory capacity is necessary for
operating the performance analysis supporting tool.
A value enclosed in parentheses indicates the memory capacity required when the iSM client operates under the
64-bit version of the operating system.
Table 2-3 Required disk capacity
For only basic functions 21 MB or more
For basic+extended functions 37 MB or more
* The values above do not include file size for CSV output, etc.
9 (18) MB or more
I-24
Loading...
+ 198 hidden pages