Symantec, the Symantec logo, Veritas, CommandCentral, NetBackup, SANPoint, SANPoint
Control, and Storage Foundation are trademarks or registered trademarks of Symantec
Corporation or its affiliates in theU.S.andothercountries. Other names may be trademarks
of their respective owners.
This Symantec product may contain third party software for which Symantec is required
to provide attribution to the third party (“Third Party Programs”). Some of the Third Party
Programs are available under open source or free software licenses. The License Agreement
accompanying the Software does not alter any rights or obligations you may have under
those open source or free software licenses. Please see the Third Party Legal Notice
documentation accompanying this Symantec product for more information on the Third
Party Programs.
■ AIX is a registered trademark of IBM Corporation.
■ HP-UX is a registered trademark of Hewlett-Packard Development Company, L.P.
■ Linux is a registered trademark of Linus Torvalds.
■ Solaris is a trademark of Sun Microsystems, Inc.
The product described in this document is distributed under licenses restricting its use,
copying, distribution, and decompilation/reverse engineering. No part of this document
may be reproduced in any form by any means without prior written authorization of
Symantec Corporation and its licensors, if any.
THE DOCUMENTATION IS PROVIDED "AS IS" AND ALL EXPRESS OR IMPLIED CONDITIONS,
REPRESENTATIONS AND WARRANTIES, INCLUDING ANY IMPLIED WARRANTY OF
MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE OR NON-INFRINGEMENT,
ARE DISCLAIMED, EXCEPT TO THE EXTENT THAT SUCH DISCLAIMERS ARE HELD TO
BE LEGALLY INVALID. SYMANTEC CORPORATION SHALL NOT BE LIABLE FOR INCIDENTAL
OR CONSEQUENTIAL DAMAGES IN CONNECTION WITH THE FURNISHING,
PERFORMANCE, OR USE OF THIS DOCUMENTATION. THE INFORMATION CONTAINED
IN THIS DOCUMENTATION IS SUBJECT TO CHANGE WITHOUT NOTICE.
The Licensed Software and Documentation are deemed to be commercial computer software
as defined in FAR 12.212 and subject to restricted rights as defined in FAR Section 52.227-19
"Commercial Computer Software - Restricted Rights" and DFARS 227.7202, "Rights in
Commercial Computer Software or Commercial Computer Software Documentation", as
applicable, and any successor regulations.
Symantec Corporation
20330 Stevens Creek Blvd.
Cupertino, CA 95014
http://www.symantec.com
Technical Support
Symantec Technical Support maintains support centers globally. Technical
Support’s primary role is to respond to specific queries about product features
and functionality. The Technical Support group also creates content for our online
Knowledge Base. The Technical Support group works collaboratively with the
other functional areas within Symantec to answer your questions in a timely
fashion. For example, the Technical Support group works with Product Engineering
and Symantec Security Response to provide alerting services and virus definition
updates.
Symantec’s maintenance offerings include the following:
■ A range of support options that give you the flexibility to select the right
amount of service for any size organization
■ Telephone and Web-based support that provides rapid response and
up-to-the-minute information
■ Upgrade assurance that delivers automatic software upgrade protection
■ Global support that is available 24 hours a day, 7 days a week
■ Advanced features, including Account Management Services
For information about Symantec’s Maintenance Programs, you can visit our Web
site at the following URL:
www.symantec.com/techsupp/
Contacting Technical Support
Customers with a current maintenance agreement may access Technical Support
information at the following URL:
www.symantec.com/techsupp/
Before contacting Technical Support, make sure you have satisfied the system
requirements that are listed in your product documentation. Also, you should be
at the computer on which the problem occurred, in case it is necessary to replicate
the problem.
When you contact Technical Support, please have the following information
available:
■ Product release level
■ Hardware information
■ Available memory, disk space, and NIC information
■ Operating system
■ Version and patch level
■ Network topology
■ Router, gateway, and IP address information
■ Problem description:
■ Error messages and log files
■ Troubleshooting that was performed before contacting Symantec
■ Recent software configuration changes and network changes
Licensing and registration
If your Symantec product requires registration or a license key, access our technical
support Web page at the following URL:
www.symantec.com/techsupp/
Customer service
Customer service information is available at the following URL:
www.symantec.com/techsupp/
Customer Service is available to assist with the following types of issues:
■ Questions regarding product licensing or serialization
■ Product registration updates, such as address or name changes
■ General product information (features, language availability, local dealers)
■ Latest information about product updates and upgrades
■ Information about upgrade assurance and maintenance contracts
■ Information about the Symantec Buying Programs
■ Advice about Symantec's technical support options
■ Nontechnical presales questions
■ Issues that are related to CD-ROMs or manuals
Maintenance agreement resources
If you want to contact Symantec regarding an existing maintenance agreement,
please contact the maintenance agreement administration team for your region
as follows:
Additional enterprise services
Symantec offers a comprehensive set of services that allow you to maximize your
investment in Symantec products and to develop your knowledge, expertise, and
global insight, which enable you to manage your business risks proactively.
Enterprise services that are available include the following:
contractsadmin@symantec.comAsia-Pacific and Japan
semea@symantec.comEurope, Middle-East, and Africa
supportsolutions@symantec.comNorth America and Latin America
Symantec Early Warning Solutions
Managed Security Services
Consulting Services
Educational Services
To access more information about Enterprise services, please visit our Web site
at the following URL:
www.symantec.com
Select your country or language from the site index.
These solutions provide early warning of cyber attacks, comprehensive threat
analysis, and countermeasures to prevent attacks before they occur.
These services remove the burden of managing and monitoring security devices
and events, ensuring rapid response to real threats.
Symantec Consulting Services provide on-site technical expertise from
Symantec and its trusted partners. Symantec Consulting Services offer a variety
of prepackaged and customizable options that include assessment, design,
implementation, monitoring, and management capabilities. Each is focused on
establishing and maintaining the integrity and availability of your IT resources.
Educational Services provide a full array of technical training, security
education, security certification, and awareness communication programs.
Getting started with the
CommandCentral family
This document includes the following topics:
■ About the CommandCentral family
■ About Veritas CommandCentral Storage
■ About Veritas CommandCentral Storage Change Manager
■ About Veritas CommandCentral Enterprise Reporter
■ Getting CommandCentral up and running
■ Where to find more information about CommandCentral
About the CommandCentral family
The CommandCentral family includes the following modules:
■ CommandCentral Storage: A storage resource management solution that
provides centralized visibility and control across heterogeneous storage
environments while reducing risks and costs.
For more information, refer to the following:
See “About Veritas CommandCentral Storage” on page 8.
■ CommandCentral Storage Change Manager: A storage change management
solution that provides insight into storage infrastructure related changes in
your data center, helping you to ensure the availability of your storage
infrastructure, manage service level agreements more effectively, and improve
operational efficiency.
For more information, refer to the following:
See “About Veritas CommandCentral Storage Change Manager” on page 18.
Getting started with the CommandCentral family
8
About Veritas CommandCentral Storage
■ CommandCentral Enterprise Reporter: Provides a global view of storage assets
mapped to your organization, business insight about inventory and utilization,
on-demand customized reporting, and personalized dashboards.
For more information, refer to the following:
See “About Veritas CommandCentral Enterprise Reporter” on page 20.
About Veritas CommandCentral Storage
Veritas CommandCentral Storage by Symantec represents an entire storage
resource management (SRM) solution, giving you what you need to manage your
storage infrastructure more effectively. It gives you the following capabilities:
■ Offers a single console from which data center administrators deploy, manage,
and expand a multi-vendor networked storage environment. The
CommandCentral Storage Console seamlessly integrates performance and
policy management, storage provisioning, and zoning capabilities to ensure
that the storage infrastructure runs as efficiently as possible. The Console
enables users to set policies that automate notification, recovery, and other
user-definable actions.
■ Discovers and tracks the utilization and allocation of storage resources down
to the disk level. The reporting features in CommandCentral Storage provide
a complete and detailed view into precisely how and where storage—for office
documents, files, applications, email, and databases—is used in your enterprise.
■ Shows usage trends and makes forward projections. You can gather data both
locally and remotely (through a managed host). This means you can get baseline
information without huge deployment costs. Armed with this data, you can
do predictive modeling to analyze the return on your storage investment. You
also have what you need to implement a program of departmental chargeback.
Using CommandCentral Storage together with other Symantec software, IT
managers have the tools they need to perform real, active, end-to-end storage
resource management and make strategic decisions about their future storage
needs.
By actively managing the entire data path from application to array,
CommandCentral Storage helps ensure optimal performance and availability of
business critical applications. CommandCentral Storage also offers customizable
policy-based management to automate notification, recovery, and other
user-definable actions.
What’s new in CommandCentral Storage 5.1
CommandCentral Storage 5.1 contains and builds upon CommandCentral Storage
5.0 functionality, providing several new features.
Management and discovery
CommandCentral Storage 5.1 introduces the following management and discovery
features.
Enhanced agentless discovery of storage resources
If you do not install the CommandCentral managed host on hosts in your storage
network, the CommandCentral Management Server can discover those hosts and
their connections to storage resources through agentless discovery.
The process involves creating a user-created host in order to associate the
unidentified adapter (HBA) discovered through switch discovery to the host to
which it connects. In previous versions of CommandCentral, you could do this
one host at a time. Now, CommandCentral 5.1 provides you with the ability to
create multiple hosts at once and to automate the process by creating rules and
importing information from a CSV file.
For more information about this feature, see the CommandCentral Storage User’sGuide.
About Veritas CommandCentral Storage
9Getting started with the CommandCentral family
Detection of configuration related changes to storage arrays
In CommandCentral Storage 5.0 MP1, explorers initiate discovery of devices based
on the explorer’s polling interval. The polling interval is the amount of time that
the explorer waits to initiate discovery of the device. For example, the polling
interval might be 180 minutes.
In CommandCentral Storage 5.1, explorers continue to initiate discovery of devices
based on the explorer’s polling interval; however, for certain array explorers, you
can also enable change detection. When you enable change detection, explorers
listen to SNMP traps or frequently poll storage arrays—for example, every 15
minutes—in order to detect configuration related changes to that array—for
example, masking changes. When the explorer detects configuration related
changes to the storage array, the explorer initiates a full discovery of the array.
For example, if you enable change detection for EMC CLARiiON storage arrays,
by default, the explorer listens for SNMP traps from CLARiiON storage arrays.
When the explorer detects changes, it initiates discovery of the array. Because
the explorer discovers the changes in near real-time, CommandCentral Storage
can provide you with more up-to-date information about the storage array. In
contrast, if you do not enable change detection, discovery occurs only when the
Getting started with the CommandCentral family
10
About Veritas CommandCentral Storage
explorer polls the storage array using the polling interval—for example, a polling
interval of 180 minutes.
Change detection is available for the following storage arrays:
■ EMC CLARiiON
■ EMC Symmetrix
■ Hitachi HiCommand
■ HP EVA
■ NetApp unified storage devices
For information about enabling change detection, see the CommandCentral
Hardware and Software Configuration Guide.
Improved Data Module file scanning
In CommandCentral Storage 5.0 MP1, the Data Module file scanner determines a
file’s size by its logical size. Now, in CommandCentral Storage 5.1, the file scanner
also collects a file’s physical size. A file’s physical size provides you with a more
accurate account of space consumption over the logical size. You can use the Data
Module Importer settings and Data Module rules to specify whether you want
summary reports that report on directory size, user consumption, file type usage,
and aging data to display a file’s size by its logical size or physical size.
Additionally, you can drill down into detail reports to display both the logical size
and physical size.
For more information, see the CommandCentral Administrator’s Guide.
Discovery of device groups and composite groups for EMC Symmetrix
storage arrays
CommandCentral Storage now discovers the name of the device groups and
composite groups to which devices from EMC Symmetrix storage arrays belong.
The group names appear when you view an EMC Symmetrix storage array’s Devices
pane.
Discovery of replication objects for HP EVA storage arrays
CommandCentral Storage now discovers the following replication objects for HP
EVA storage arrays:
■ Snapshots
■ Vsnaps
■ Snapclones
About Veritas CommandCentral Storage
Added support for discovery of ESX servers through the VMware
Infrastructure SDK
In CommandCentral Storage 5.1, you can now configure discovery of ESX servers
through the VMware Infrastructure SDK (VI SDK). This allows you to discover
individual ESX servers through VI SDK or a VirtualCenter that manages multiple
ESX servers through VI SDK.
For information about configuring discovery through VI SDK, see the
CommandCentral Hardware and Software Configuration Guide.
Sybase ASE 15 support
CommandCentral now supports discovery of Sybase Adaptive Server Enterprise
(ASE) 15.
Added support for the correlation of non-HDS backend array volumes for
HDS Tagma USP and USP-V series arrays
CommandCentral now supports the correlation of the physical disks of HDS Tagma
USP and USP-V series arrays and their backend array volumes (LUNs) when the
backend arrays are from other vendors that are listed in the CommandCentralHardware and Software Compatibility List.
11Getting started with the CommandCentral family
Added support for the correlation of backend array volumes for NetApp
V-Series storage systems
CommandCentral now supports the correlation of the physical disks of NetApp
V-Series storage systems and their backend array volumes (LUNs).
Reporting
CommandCentral Storage 5.1 introduces the following reporting features.
Added in-context performance reports for certain objects
When you use the Managing Summary section of the CommandCentral Storage
Console to navigate to an object's Reporting pane, you can now select performance
reports that are scoped for the following objects:
■ Fibre channel adapters
■ Fibre channel controllers
■ LUNs
■ Physical disks
■ RAID groups for Hitachi HDS storage arrays
■ Switch ports
Getting started with the CommandCentral family
12
About Veritas CommandCentral Storage
■ VxVM volumes
Added the Switch Port Usage Trend report
You can now view the Switch Port Usage Trend report, which allows you to track
used and unused ports over a specified time frame.
New sample ad hoc reports
CommandCentral Storage now includes the following sample ad hoc reports:
■ Application Access Path Inventory Report: Presents all the combinations of
end-to-end access path inventory (for the logical objects) from application to
the LUN (and the associated array).
■ Fibre Attached Storage Consumption Report: Displays information about fibre
attached storage given to hosts and how that capacity is utilized by the file
systems.
■ Local vs Remote Replication Report: Depicts how much of the primary (source)
capacity is replicated locally vs replicated remotely.
■ NetApp Quota Over-Provisioning Report: Provides details about quota allocation
on a NetApp volume and the % over-provisioning.
■ SAN Storage Report: Details array and host utilization of SAN storage and also
the shared claimed capacity between hosts.
For information about working with these custom reports, see the CommandCentralStorage User’s Guide.
Installation
CommandCentral Storage 5.1 introduces the following installation features.
New licensing options
In previous versions of CommandCentral Storage, you could purchase licenses to
enable the following modules:
■ Operations Module
■ Data Module
■ Operations Module and Data Module
In CommandCentral Storage 5.1, both the Operations Module and Data Module
install by default. CommandCentral Storage now includes the following types of
licenses:
■ Management Server
About Veritas CommandCentral Storage
■ Managed host
■ Switch port
■ NAS (TB)
Because of these new licensing options, you need to obtain new licenses when you
upgrade to CommandCentral 5.1. When you upgrade to 5.1, an evaluation license
installs. The evaluation license is valid for 60 days. Obtain new licenses before
the evaluation license expires.
For more information about obtaining new licenses, go to the Symantec Licensing
Portal: www.symantec.com/business/products/licensing/activation/
For more information about CommandCentral licensing, refer to the
CommandCentral Administrator’s Guide.
Ability to install a managed host and then configure it later
In CommandCentral Storage 5.1, you can now choose to install the managed host
without configuring it. You can then configure the host at a later time. For example,
you might use this feature to clone the managed host on multiple hosts for a faster
deployment.
For more information, see the CommandCentral Installation Guide.
13Getting started with the CommandCentral family
Reduced media and install footprint for the managed host
Both the media footprint and installation footprint of the CommandCentral
managed host was reduced. As a result, the managed host occupies less space.
Other enhancements
CommandCentral Storage 5.1 introduces the following features.
Windows Server 2008 support
You can now install the CommandCentral managed host and Push Install Utility
on Windows Server 2008 hosts.
Red Hat Linux 5.0 support
You can now install the CommandCentral managed host on Red Hat Linux 5.0
hosts.
SUSE Linux Enterprise server 9 and 10 support
You can now install the CommandCentral managed host on SUSE Linux Enterprise
server 9 and 10 hosts.
Getting started with the CommandCentral family
14
About Veritas CommandCentral Storage
Added links to access the CommandCentral Storage Change Manager
Console
If you enable CommandCentral Storage Change Manager on your Management
Server, you can load the CommandCentral Storage Change Manager Console from
the CommandCentral Storage Console. To do this, you can use the following links:
■ Storage Change Manager—this link appears in the header of the
CommandCentral Storage Console. When you click this link, the
CommandCentral Storage Change Manager Console loads in a new browser
window and the Home pane (Dashboard) displays.
■ Change History—this link appears in the Overview pane for storage resources
for which CommandCentral Storage Change Manager tracks the change history.
When you click this link, the CommandCentral Storage Change Manager
Console loads in a new browser window, displays the Changes pane, and filters
the pane to display the change history for the specific storage resource.
For more information, see the CommandCentral Storage User’s Guide.
Name of device managers display when viewing list of devices
When you view the list of configured devices in the Console, the Configured Devices
Summary now displays the name of the device manager that manages your devices.
This is helpful when you want to identify the device manager that manages a
specific device. For example, you may want to identify the CIMOM that manages
each of your storage arrays.
For more information, see the CommandCentral Administrator’s Guide.
Ability to set new managed hosts in unmanaged state
In CommandCentral Storage 5.1, you can configure the Management Server to
detect new managed hosts, but not automatically manage those hosts. When this
happens, the Management Server does not collect any data from the managed
host and it does not monitor the managed host. When you are ready for the
Management Server to manage an unmanaged host, you can simply refresh the
managed host in the Console.
For example, you might do this if you have a standard system image policy or if
you need to take advantage of an available installation window.
For more information, see the CommandCentral Administrator’s Guide.
Hotfix deployment mechanism
CommandCentral introduces a new hotfix deployment mechanism that allows
you to push and install hotfixes on remote hosts. The mechanism also allows you
to determine the current version of a CommandCentral component so that you
can better manage the deployment of hotfixes.
About Veritas CommandCentral Storage
For more information about the hotfix deployment mechanism, see the
CommandCentral Administrator’s Guide.
What you can do with CommandCentral Storage
Symantec strives to help you manage the integrity of your information by enabling
you to maintain the right balance of information security and availability.
Symantec delivers market-leading technology, insight, and expertise in the areas
of information security, data management, systems management, storage
management, and application performance management.
With Symantec’s unmatched breadth and depth, your IT organization can better
align with business objectives and address the issues of cost, complexity and
compliance. Symantec is uniquely positioned to help keep your business up,
running, and growing, no matter what happens.
CommandCentral Storage provides a single, centralized, consistent storage
management console to simplify the complex tasks involved in deploying,
provisioning, managing, and growing a multi-vendor networked storage
environment.
Managing the storage network: introduction
Many organizations—as they adopt e-commerce, supply chain management,
compliance, and other data-intensive applications—find that their data is exploding.
More and more storage is needed to digitize manuals, corporate records, and other
paper-based information, and to hold ever-increasing multimedia content.
If all that volume and complexity weren’t enough of a management challenge,
today’s business environments demand that data be available immediately,
continuously, and from anywhere—to multiple applications and to hundreds,
thousands, or even millions of customers, business partners, and employees.
15Getting started with the CommandCentral family
Storage network technologies
Historically, enterprises have relied heavily on parallel SCSI technology to provide
the performance required for their enterprise data storage needs. More recently,
however, some enterprises are finding that the restrictions imposed by SCSI
architecture are too costly for SCSI to continue as a viable solution.
To overcome these restrictions, many enterprises have turned to a
network-attached storage (NAS) model that enables storage arrays to reside
directly on the main user network, where disk accesses may be made directly
rather than through the server’s network connection. However, this model can
add a significant load to the network, which frequently is already starved for
bandwidth.
Getting started with the CommandCentral family
16
About Veritas CommandCentral Storage
Responding to this problem, some enterprises have implemented storage area
networks (SANs) in which storage is placed on its own dedicated network. This
dedicated network can improve efficiency and reliability by effectively separating
traffic on the storage network from traffic on the main user network.
Storage virtualization
CommandCentral Storage is a valuable asset for enterprises that have implemented
storage virtualization—the process of taking multiple physical storage devices
and combining them into logical (virtual) storage devices that are allocated to
applications and users at will.
Storage virtualization helps ease management by building a layer of abstraction
above the physical storage; however, your administrators still need to penetrate
that layer in order to view and manage the physical storage. CommandCentral
Storage collects detailed information about how physical storage is apportioned
and used, and it provides a graphical user interface for presenting the information
to the administrator.
Although virtualization is not a new concept, CommandCentral Storage now
enables you to take advantage of storage virtualization services over the entire
storage network, across all types of storage hardware and server platforms. You
also gain storage resource management capabilities such as hardware discovery,
visualization, reporting, and a central administration point for your storage
network.
Storage administrator requirements
Because both storage resources and IT personnel vary widely from enterprise to
enterprise, the job of storage administrator is often filled by people with various
skill sets and work backgrounds: mainframe operators, traditional network
administrators, system administrators, and others in the IT industry.
In a utility computing environment, the storage administrator usually works
closely with network administrators and others whose responsibilities range
across the entire IT department. Nevertheless, the storage administrator needs
to know details about how storage is apportioned and used on both the logical
and physical levels. He or she is also responsible for providing overall guidance
on how the storage network is used and on the direction it will take in the future.
Here are some examples of other tasks a storage administrator typically performs:
■ Manage storage resources—for example allocating storage to hosts and the
applications that run on them, and defining logical groups for easier
management
■ Test new vendors’ hardware and integrate it into the storage network
Loading...
+ 36 hidden pages
You need points to download manuals.
1 point = 1 manual.
You can buy points or you can get point for every manual you upload.