Beruflich Dokumente
Kultur Dokumente
Technical Notes
P/N 300-010-644
REV A06
January 13, 2012
This document describes how to deploy EMC RecoverPoint with the
Brocade splitter to deliver a complete data replication solution without
host-based agents.
Topics include:
Revision history
Revision history
Table 1 on page 2 shows the revision history for this document.
Table 1
Revision history
Revision
Date
Description
A06
January 2012
A05
September 2011
Revision history
Table 1
Revision history
Revision
Date
Description
A04
January 2011
Revision history
Table 1
Revision history
Revision
Date
Description
A03
August 2010
Introduction
Introduction
Scope
Related documents
Brocade
Application Platform
Brocade splitter
virtual entities
Virtualization and
frame redirection
Figure 1
Zoning
Required zoning
Zone
Members
Host-to-storage
zones
RPA-to-storage
zone
Note: RPA Fibre Channel ports can act as initiators, targets, or both. For more
information, refer to the EMC RecoverPoint Zoning and LUN Masking Technical
Notes.
Host-to-Storage
Zoning
RPA-to-storage zone
Even though the WWNs of the virtual initiators and virtual targets
are different than those of the corresponding physical initiators and
targets, no changes are required in host-to-storage zoning or storage
array LUN masking, as all rerouting is handled at the FC ID level. In
other words, the storage target still sees the WWN of the physical
host; and the physical host still logs into the WWN of the storage
port.
RPA-to-storage zoning is required for all RecoverPoint installations.
For more information, refer to EMC RecoverPoint Zoning and LUN
Masking Technical Notes.
The RPA target zone <splitter_name>_FR_RPA_Target_Zone is
created during the splitter installation and contains RPA target ports,
all virtual initiators, and the System Virtual Initiator (SVI).
The RPA target zone enables data and management communication
between the RPA and the Brocade splitter.
In addition to communicating with the storage targets, the virtual
initiators also copy the writes that are written to replicated LUNs to
the RecoverPoint appliances.
Frame redirection
bindings
10
11
only one virtual target is created, the splitter agent randomly selects
one of the DPCs. As a result, the number of virtual targets on each
DPC will not necessarily be balanced. In addition, deleting virtual
targets may cause further imbalance.
Starting with RecoverPoint 3.3 SP2, the splitter agent always creates
new virtual targets on the DPC with fewer virtual targets. As a result,
the number of virtual targets on each DPC will normally not differ by
more than one. However, deleting virtual targets may still cause an
imbalance.
Unlike virtual initiator pWWNs, which are created from a predefined
pool, virtual targets are created on the fly as needed. The virtual
target pWWN is based on the storage pWWN and the DPC number
as follows:
Figure 2
To determine the number of virtual entities on each DPC, use the 4-bit
DPC number in the WWN to determine the DPC number of each
virtual target. Then, use the binding scheme to determine the number
of virtual initiators for each DPC. Note that the system virtual
initiator will always be created on DPC0.
Since virtual initiators and virtual targets that reside on different
DPCs cannot interact, a single initiator bound to targets on both
DPCs will be represented by separate virtual initiators on each DPC.
In other words, two virtual initiators may be created for one physical
host initiator if the virtual targets that host initiator is accessing are on
different DPCs. A physical target, however, is always represented by
a single virtual target.
Although the total number of virtual entities may be higher when
utilizing two DPCs, the number of virtual entities per DPC is always
lower than when using a single DPC. Hence, the possible scalability
12
with two DPCs is always higher (since the limits are per DPC). The
number of ITLs used does not change when using two DPCs, but the
maximum possible number of ITLs doubles, as does the number of
virtual initiators.
SCSI LUN reservations
13
Solution design
Solution design
Deploying RecoverPoint with Connectrix B-Series application
platforms and Brocade splitters requires the following items.
Hardware
requirements
Firmware
requirements
Fabric requirements
14
Solution design
Table 3
Switch Model
2, 6
10
12
16
17
Brocade 3800VL
18
21
22
26
27
33
15
Solution design
The best practice is that the FOS version of all switches in the fabric
should be identical. If you cannot use the same FOS on all switches,
consult the EMC Support Matrix for compatible versions.
Fabric design
Zoning requirements
All I/Os between the bound host initiator and the storage target are
routed via the intelligent switch or blade. In consequence:
16
All Access. All devices within the fabric can communicate with
all other devices.
Solution design
Network
requirements
Host requirements
CAUTION
Brocade splitter binding and unbinding causes the FC ID of
affected HBAs to change. HP-UX hosts without agile addressing
and AIX hosts without dynamic tracking cannot automatically
rediscover the paths to storage if the FC ID has changed. To
discover the new paths, it may be necessary to reconfigure the
hosts, rescan the SAN, or take other action to have the hosts
recognize the new paths to storage. Host downtime may be
required.
For more information about FC ID changes with AIX hosts, refer to
the following:
17
Solution design
VAAI support
18
Solution design
Block Zeroing
Full Copy
Scalability
limitations
Version
VAAI behavior
Rejected
Rejected
Rejected
Unsupported
Unsupported
Unsupported
Replicated LUNs
Total LUNs
ITLs
19
Solution design
For example if, when using one DPC, the configuration includes:
2 host initiators
If, however, using frame redirection, you are able to use both DPCs,
then ITLs are calculated separately for each DPC. Hence, if the
configuration in the first example is changed, as follows:
500 (of the 1000 LUNs in the first example) are exposed to the
hosts through DPC 0, and the remaining 500 are exposed through
DPC 1
20
Solution design
= {[(2 host initiators) x (500 LUNs)] + [(1000 host ITLs for which
LUNs support reservations) x (4 RPA initiator ports)]} + {[(2 host
initiators) x (500 LUNs)] + [(400 host ITLs for which LUNs
support reservations) x (4 RPA initiator ports)]}
= {1000 + 4000} + {1000 + 1600}
= 7600
For RecoverPoint 3.1 and later:
ITLs = {ITLs for DPC 0} + {ITLs for DPC 1}
= {[(2 host initiators) x (500 LUNs)] + (1000 host ITLs for which
LUNs support reservations)} + {[(2 host initiators) x (500 LUNs)]
+ (400 host ITLs for which LUNs support reservations)}
= {1000 + 1000} + {1000 + 400}
= 3400
Beginning with RecoverPoint 3.0 SP1, the system displays warnings
whenever your system approaches or exceeds scalability limits for
ITLs, virtual entities, and total LUNs. Beginning with RecoverPoint
3.2, realtime ITL usage can be monitored in the Management
Application GUI, from the Splitters tab for the System Monitoring
component.
Removing unused ITLs
Solution approval
21
nsshow
Shows items currently in the switch name server. For each target,
shows its PWWN, NWWN, and symbolic name. Also shows
virtual initiators (Brocade virtual Initiator-slot#,DPC#) and
virtual targets (Brocade virtual target-slot#,DPC#).
switchshow
cfgshow
firmwareshow
Shows the version number for the Fabric Operating System (FOS)
installed on the Control Processor and the Storage Application
Services (SAS) installed on the Blade Processor.
ipaddrshow
ipaddrset
firmwaredownload
22
supportshow
diagDisablePost
Splitter identification
where:
SW_name is the name of the Blade Processor that you specified during
agent installation; it can be obtained by running hostname on the
Blade Processor.
SW_IPaddress is the IP address of the Blade Processor (at time of
agent installation); it can be obtained by running ifconfig on the
Blade Processor.
To determine the exact version of the splitter agent, run the following
command on the Blade Processor:
> cat
/thirdparty/recoverpoint/tweak/tweak.params.version
Preparing for
installation
23
1. Ensure that the host-storage zones exist, and that LUN masking
from the targets to the initiators is defined.
2. Verify that every host can access every presented LUN through all
available paths.
To install RecoverPoint appliances:
Installing
RecoverPoint
appliances
CAUTION
Upgrade the Fabric Operating System (FOS) and Storage
Application Services (SAS) on all switches and blades, one fabric at
a time to avoid risking downtime.
a. To upgrade the FOS, on the Control Processor, use the
firmwaredownload -c command. During the upgrade, the
FOS may be temporarily incompatible with the SAS until the
SAS is upgraded. The -c option disables the FOS/SAS
compatibility check.
24
Control Processor
and Blade Processor
IP addresses
Example
25
27
28
CAUTION
Brocade splitter binding and unbinding causes the FC ID of
affected HBAs to change. HP-UX hosts without agile addressing
and AIX hosts without dynamic tracking cannot automatically
rediscover the paths to storage if the FC ID is changed. To discover
the new paths, it may be necessary to reconfigure the hosts, rescan
the SAN, or take other action to have the hosts recognize the new
paths to storage. Host downtime may be required.
For more information about FC ID changes with AIX hosts, refer
to the following:
EMC Host Connectivity Guide for IBM AIX
(powerlink.emc.com, Support > Technical Documentation
and Advisories > Installation/Configuration > Host
Connectivity/HBAs > HBAs Installation > Configuration)
EMC knowledge base solutions emc91523 and emc115725
29
CAUTION
Create bindings one fabric at a time to avoid risking downtime.
After adding bindings to a fabric, ensure that the hosts still have
access to targets.
It is required to keep both initiator and target available on the
fabric.
4. Use the bind_host_initiators CLI command to configure host
binding to storage targets, as in the following example:
s1-bos> bind_host_initiators site=s1-bos
splitter=sabre_172.16.0.17
host_initiators=10000000c92ab3bd target=500611111111
frame_redirect=yes
Initiator binding(s) successfully added.
30
CAUTION
Enabling the consistency groups will trigger a full sweep. If fast
first-time initialization is enabled, the last complete and consistent
image on the storage LUN will become inconsistent soon after the
full sweep starts. However, if fast first-time initialization is disabled,
the last complete and consistent image will be preserved as long as
sufficient space is available in the replica journal.
8. Enable the consistency groups.
31
Running the
RecoverPoint splitter
agent
The splitter agent verifies that it is compatible with the FOS and
the SAS. If a mismatch is found, the splitter agent will crash.
Note: In RecoverPoint 3.1 and later, this command reports the status of both
the low-level and high-level processes.
32
When the
RecoverPoint splitter
agent is stopped or
crashes
To clear all the virtual targets and virtual initiators, the Blade
Processor reboots automatically following a crash, except in the
following conditions:
The agent was stopped manually, using the kdrv stop command,
to allow maintenance or upgrade of the switch.
The agent was stopped manually, using the kdrv stop command,
to allow maintenance or upgrade of the switch.
33
Upgrading the
RecoverPoint splitter
agent
Uninstalling the
RecoverPoint splitter
agent
Uninstalling splitter
agent in RecoverPoint
3.3 and later
This script stops the splitter agent if necessary and removes all
RecoverPoint files from the Blade Processor. The script also prompts
the user about keeping splitter logs and persistent information before
uninstalling. Logs and persistent information are kept on the Blade
Processor in the directory /thirdparty/backup_logs.
Uninstalling splitter
agent in RecoverPoint
3.2 and earlier
3. Reboot the Blade Processor. Log in to the Blade Processor and run
the following command:
> reboot
34
Table 5
To
Procedure
Multi-VI mode
Frame Redirection
mode
Migration
RecoverPoint 2.4.x
RecoverPoint 3.0.x
RecoverPoint 3.1.x or
any later version
Disruptive
successive non-disruptive upgrades (3,1 --> 3.2 --> 3.3 --> 3.4);
splitters must be upgraded to the appropriate version at each
step.
disruptive upgrade in a single step (3.1 --> 3.4); if you choose this
option, it must be approved in advance by change control.
35
Disruptive upgrade
Upgrade preparation
36
37
If you connect from the same site as the RPA, record the
Box management IP Address.
If you are across the WAN from the RPA, record the
WAN IP Address.
b. Run PuTTY, using the IP address recorded from the
get_system_settings command.
c. Select Session > Logging and activate Log printable
output only.
d. Click Browse to specify a location for PuTTY log.
e. At the login prompt, log in as admin.
f. At the command line, type the get_account_settings
command.
The account settings are written to the PuTTY session log
file.
Using Plink:
In a console window, type the following command:
Plink -ssh <site management IP> -l admin
get_account_settings > get_account_settings.txt
38
CAUTION
Brocade splitter binding and unbinding causes the FC ID of
affected HBAs to change. HP-UX hosts without agile addressing
and AIX hosts without dynamic tracking cannot automatically
rediscover the paths to storage if the FC ID is changed. To discover
the new paths, it may be necessary to reconfigure the hosts, rescan
the SAN, or take other action to have the hosts recognize the new
paths to storage. Host downtime may be required.
For more information about FC ID changes with AIX hosts, refer
to the following:
EMC Host Connectivity Guide for IBM AIX
(powerlink.emc.com, Support > Technical Documentation
and Advisories > Installation/Configuration > Host
Connectivity/HBAs > HBAs Installation > Configuration)
EMC knowledge base solutions emc91523 and emc115725
39
CAUTION
The bindings should not all be removed simultaneously, to avoid
risking downtime. After removing bindings from a fabric, ensure
that the hosts still have access to targets.
Remove bindings for one splitter at a time:
a. In the RecoverPoint Management Application, select the
Brocade splitter, and remove the bindings.
a. Ensure that the hosts still have access to targets. Verify I/O
capability on all paths.
b. Verify that the frame redirection zones have been removed
from the fabric:
> cfgshow | grep lsan
> cfgsave
40
> cfgsave
Upgrading
RecoverPoint
appliances
41
d. From the Main menu, select Installation > Upgrade wizard >
Auto upgrade.
Auto upgrade is available only if you have not yet used the
Apply command to apply RPA settings, and you have not yet
attached the RPA to the RPA cluster. Both of these will be done
automatically by the Auto Upgrade wizard.
e. Type y (yes) when you are queried Are you sure you want to
perform auto upgrade? (y/n).
f. Type y (yes) once the machine finishes performing a SAN
diagnostics test.
g. Type y (yes) when you are queried Do you want to apply
these settings? (y/n).
h. A public/private DSA key pair is generated, stating the
identification and public key location, and the key fingerprint.
42
i. The RPA restarts and is attached to the RPA cluster. The RPA
should become fully functional.
Updating license
information
Once RPAs are fully functional and communicating with each other, a
new installation ID will be generated.
1. Log in to http://rplicense.emc.com.
2. Use the Account ID and License Key saved in Step 2 in Upgrade
preparation to log in.
3. If the upgrade request was approved (Step 4 in Upgrade
preparation), provide the new Installation ID to obtain a new
Activation Code.
4. To activate the upgraded RecoverPoint license, enter Account ID,
License Key, and new Activation Code.
43
<
converted_settings.txt
When prompted for password, enter admin (after the
upgrade, the password is reset to the default).
b. To type the command from a Windows host:
C:\ plink -ssh site_management_IP> -l admin -pw
admin -m converted_settings.txt
Note: At this point, you cannot proceed with configuring RecoverPoint until
the Fabric Operating System (FOS) and Storage Application Services (SAS)
upgrade (Upgrading FOS and SAS on page 44) has been completed. After
completing the Fabric Operating System (FOS) and Storage Application
Services (SAS) upgrade and installing the splitter agent, continue at
Configuring RecoverPoint and splitters on page 49.
44
CAUTION
Upgrade the Fabric Operating System (FOS) and Storage
Application Services (SAS) on all switches and blades, one fabric at
a time to avoid risking downtime.
The Fabric Operating System (FOS) and Storage Application
Services (SAS) combination must be supported by the release of
RecoverPoint to which you are upgrading. Refer to the release
notes for your release of RecoverPoint for supported Storage
Application Services (SAS) and Fabric Operating System (FOS)
combinations.
a. To upgrade the FOS, on the Control Processor, use the
firmwaredownload -c command. During the upgrade, the
FOS may be temporarily incompatible with the SAS until the
SAS is upgraded. The -c option disables the FOS/SAS
compatibility check.
b. To upgrade the SAS, on the Control Processor, use the
firmwaredownload command.
Run the firmwaredownloadstatus command several times
until the following message appears:
(SAS) The internal firmware image is relocated
successfully.
45
46
ftp> bye
47
48
Configuring
RecoverPoint and
splitters
CAUTION
Brocade splitter binding and unbinding causes the FC ID of
affected HBAs to change. HP-UX hosts without agile addressing
and AIX hosts without dynamic tracking cannot automatically
rediscover the paths to storage if the FC ID is changed. To discover
the new paths, it may be necessary to reconfigure the hosts, rescan
the SAN, or take other action to have the hosts recognize the new
paths to storage. Host downtime may be required.
For more information about FC ID changes with AIX hosts, refer
to the following:
EMC Host Connectivity Guide for IBM AIX
(powerlink.emc.com, Support > Technical Documentation
and Advisories > Installation/Configuration > Host
Connectivity/HBAs > HBAs Installation > Configuration)
EMC knowledge base solutions emc91523 and emc115725
Deploying RecoverPoint with AIX Hosts Technical Notes
(powerlink.emc.com, Support > Technical Documentation
and Advisories > Software ~PR~ Documentation >
RecoverPoint > Technical Notes/Troubleshooting)
For more information about FC ID changes with HP-UX hosts,
refer to the following:
EMC Host Connectivity Guide for HP-UX
(powerlink.emc.com, Support > Technical Documentation
and Advisories > Installation/Configuration > Host
Connectivity/HBAs > HBAs Installation > Configuration)
49
CAUTION
The bindings should not all be loaded simultaneously, to avoid
risking downtime. After adding bindings to a fabric, ensure that
the hosts still have access to targets.
When working in frame redirection mode, it is required to keep
both initiator and target available on the fabric.
Load bindings for one splitter at a time:
4. Use the following procedure to load the bindings one splitter at a
time.
save_settings1.txt, which was saved at Step 3 in Upgrade
preparation, contains all bindings. Locate the
bind_host_initiator commands and copy them into separate files,
one file per splitter. If the names of the splitters were changed,
modify the bind_host_initiator commands to reflect the new
splitter names.
Use the following commands to load bindings one splitters at a
time:
a. To type the command from a UNIX host:
$ ssh site_management_IP -l admin
<
bindings_splitter1.txt
b. To type the command from a Windows host:
C:\ plink -ssh site_management_IP> -l admin -pw
admin -m bindings_splitter1.txt
Skip to Step 5.
5. After adding bindings to the fabric, ensure that the hosts still
have access to targets.
Repeat from Step 3 to Step 4 for each splitter.
6. Re-attach volumes to the Connectrix-based splitters.
7. Restart replication.
50
CAUTION
Enabling the consistency groups will trigger a full sweep. If fast
first-time initialization is enabled, the last complete and consistent
image on the storage LUN will become inconsistent soon after the
full sweep starts. However, if fast first-time initialization is disabled,
the last complete and consistent image will be preserved as long as
sufficient space is available in the replica journal.
8. Enable the consistency groups.
Non-disruptive
upgrade
FC IDs are not changed during the upgrade procedure. AIX and
HP-UX hosts do not need to be rebooted, and SAN rescanning is
not required.
51
Non-disruptive
upgrade of
RecoverPoint with
FOS or SAS upgrade
CAUTION
Perform the following procedure one fabric at a time, to avoid host
downtime.
2. Stop the RecoverPoint splitter agent. Run the following command
from the Blade Processor:
>/thirdparty/recoverpoint/install/kdrv stop
Even though the splitter agent has been stopped, the host path
and the splitter are still functioning.
3. Save the splitter settings to an off-switch location. These settings
will be used to restore the splitter configuration.
To save the files:
a. Run:
>/thirdparty/recoverpoint/install/save_settings.sh
52
ftp> bye
CAUTION
Perform Step 6 to Step 11 one fabric at a time to avoid host
downtime. This procedure causes hosts to lose connectivity with
the storage and makes the splitter unavailable on this fabric. If the
hosts have multipath capabilities, they can remain on-line by using
the other fabric.
6. Upgrade Fabric Operating System (FOS), Storage Application
Services (SAS), or both:
a. To upgrade the FOS, on the Control Processor, use the
firmwaredownload -c command. During the upgrade, the
FOS may be temporarily incompatible with the SAS until the
SAS is upgraded. The -c option disables the FOS/SAS
compatibility check.
b. To upgrade the SAS, on the Control Processor, use the
firmwaredownload command. Run the
firmwaredownloadstatus command several times until the
following message appears:
(SAS) The internal firmware image is relocated
successfully.
53
54
11. After the Blade Processor reboot is completed, verify that hosts
have access to storage through both paths and that the splitter is
available in RecoverPoint.
12. If you wish to enable Diagnostic Power-On Self-Tests (optional),
on the Control Processor, run the command:
> diagEnablePost
Non-disruptive
upgrade of
RecoverPoint
without FOS and SAS
upgrade
55
CAUTION
Perform the following procedure one fabric at a time, to avoid host
downtime.
2. Stop the RecoverPoint splitter agent. Run the following command
from the Blade Processor:
>/thirdparty/recoverpoint/install/kdrv stop
Even though the splitter agent has been stopped, the host path
and the splitter are still functioning.
3. Upgrade to the new version of the RecoverPoint splitter agent.
a. Download the RecoverPoint splitter agent installation file
from Powerlink at;
http://Powerlink.EMC.com
and copy the installation file onto the Blade Processor.
To do so:
1. Log in to Blade Processor as root.
2. Use ftp to download the RecoverPoint splitter agent binary
file to the /tmp directory:
> cd /tmp
> ftp ip_address
ftp> bin
ftp> get agent_binary_file
ftp> bye
56
Hardware replacement
CAUTION
Failure to add the -u parameter results in the loss of all
current splitter settings and cause a full sweep.
c. If prompted, enter the same hostname for the splitter as was
used before the upgrade.
The _ip address will automatically be appended to the name
you enter here. The name with appended _ip address is the
name of the splitter as it is displayed by the RecoverPoint
Management Application.
d. In RecoverPoint 3.2.x, you are prompted to enter the user
admin password for the Control Processor. This will enable
you to determine the Default Zone setting of the fabric during
splitter installation. Although you can skip this (press Enter),
it is recommended that you enter the password to allow
verification of this setting. The installation will be aborted if an
incorrect setting is detected.
4. Reboot the Blade Processor.
CAUTION
Rebooting the Blade Processor causes the bound host initiators to
lose connectivity with the storage and makes the splitter
unavailable. If the hosts have multipath capabilities, they can
remain on-line by using the other fabric.
Log in to the Blade Processor and run the following command:
> reboot
Hardware replacement
Adding or replacing
server node HBA
57
Hardware replacement
Prerequisites
Procedure
58
Hardware replacement
59
Troubleshooting
Troubleshooting
An important part of troubleshooting RecoverPoint issues in the
Brocade environment is collecting the correct logs to allow EMC
Customer Service to isolate, identify, and analyze the issues. The
following sections provide instructions for log collection at customer
sites according to the presenting issue. Collect the logs as soon after
the event as possible. Three use cases are presented here:
60
65
65
65
65
65
Troubleshooting
zoning
Frame Redirection
port errors
61
Troubleshooting
> supportsave
Troubleshooting
7. Record host and HBA pWWN details, HBA driver, and firmware.
8. Record storage (target) pWWN details.
9. Provide a topology diagram of the fabric: host nodes, storage
nodes, switches, and RecoverPoint appliances.
10. Provide a time line and information regarding any changes in
Fabric
Ports
Configuration
prior to the event.
Stale bindings
> cfgsave
> cfgsave
I/O performance
issues
63
Troubleshooting
Troubleshooting
Instructions for
specific symptoms
Root file system is full
When the root (/) file system on the Blade Processor module is full,
various problems may occur, such as an inability to run the
RecoverPoint splitter agent.
Beginning with RecoverPoint 3.2, you can monitor disk usage of the
Blade Processor module in the Management Application GUI, from
the Splitters tab of the System Monitoring component.
Use the df command to check disk usage, and remove files from the
file system. The core files under /thirdparty/recoverpoint/log are
usually the cause for this problem. Unless they are needed for bug
analysis, remove the core files.
If host initiators are able to see the virtual target and the LUNs, but
fail in writing to the storage, it is most likely a LUN-masking problem
in the target storage device.
Check the LUN configuration.
Replacing a faulty
intelligent module
/thirdparty/recoverpoint/install/analysis_pack/log_analysis.sh
65
Troubleshooting
Parameter
Description
Runs the changes analysis, to display the latest changes in SAN view
(added and removed paths).
Runs the host ITL analysis, and displays and count ITLs per host.
Parameter
Description
For example, if you want to see the SAN view as the splitter sees it,
run the command with the following parameters:
/thirdparty/recoverpoint/install/analysis_pack/log_analysis.sh vl
66
Troubleshooting
0
1
0x60012482c6de1000
0x60012482c6de1001
#########################################################################
#### Parsing results from file /thirdparty/recoverpoint/log/ram_log/host.log.00
#########################################################################
#########################################################################
#### View analysis
#########################################################################
Device information
#
WWN
LUN Port
Size (BLK) Size (MB) GUID
==========================================================================================
1
0x5001248205ae4bc8
0
1
2097152
1024
SHARK
(73,66,77,32,32,32,32,32,50,49,48,53,32,32,32,32,32,32,32,32,32
,32,32,32,50,53,48,50,54,32,32,32)
0x5001248205ae4bc8
1
1
4194304
2048
SHARK
(73,66,77,32,32,32,32,32,50,49,48,53,32,32,32,32,32,32,32,32,32
,32,32,32,50,53,48,50,55,32,32,32)
0x5001248205ae4bc8
2
1
6291456
3072
SHARK
(73,66,77,32,32,32,32,32,50,49,48,53,32,32,32,32,32,32,32,32,32
,32,32,32,50,53,48,50,56,32,32,32)
0x5001248205ae4bc8
3
1
8388608
4096
SHARK
(73,66,77,32,32,32,32,32,50,49,48,53,32,32,32,32,32,32,32,32,32
,32,32,32,50,53,48,50,57,32,32,32)
0x5001248205ae4bc8
4
1
10485760
5120
SHARK
(73,66,77,32,32,32,32,32,50,49,48,53,32,32,32,32,32,32,32,32,32
,32,32,32,50,53,48,51,48,32,32,32)
0x5001248205ae4bc8
5
1
12582912
6144
SHARK
(73,66,77,32,32,32,32,32,50,49,48,53,32,32,32,32,32,32,32,32,32
,32,32,32,50,53,48,51,49,32,32,32)
0x5001248205ae4bc8
6
1
14680064
7168
SHARK
(73,66,77,32,32,32,32,32,50,49,48,53,32,32,32,32,32,32,32,32,32
,32,32,32,50,53,48,51,50,32,32,32)
0x5001248205ae4bc8
7
1
16777216
8192
SHARK
(73,66,77,32,32,32,32,32,50,49,48,53,32,32,32,32,32,32,32,32,32
,32,32,32,50,53,48,51,51,32,32,32)
67
Troubleshooting
0x5001248205ae4bc8
8
1
18874368
9216
SHARK
(73,66,77,32,32,32,32,32,50,49,48,53,32,32,32,32,32,32,32,32,32
,32,32,32,50,53,48,51,52,32,32,32)
10
0x5001248205ae4bc8
9
1
20971520
10240
SHARK
(73,66,77,32,32,32,32,32,50,49,48,53,32,32,32,32,32,32,32,32,32
,32,32,32,50,53,48,51,53,32,32,32)
11
0x5001248205ae4bc8
10
1
23068672
11264
SHARK
(73,66,77,32,32,32,32,32,50,49,48,53,32,32,32,32,32,32,32,32,32
,32,32,32,50,53,48,51,54,32,32,32)
12
0x50060e8014427506
1
1
6291840
3072
LIGHTNING
(72,73,84,65,67,72,73,32,82,53,48,49,52,50,55,53,48,48,50,66)
1
1
0x50060e8014427526
68